this seems overly complicated to me. it all starts with getting a malicious app on the users phone. if you can get the app there, why use such a complicated attack when a root kit would do alot more for you?

it's a great write up on how caching can be used maliciously but the demonstrated usage seems like the wrong way to use it

Reply to this note

Please Login to reply.

Discussion

No replies yet.