logoalt Hacker News

Someone1234yesterday at 6:11 PM1 replyview on HN

I think this just further highlights my credibility point.


Replies

walterbellyesterday at 6:25 PM

With the link I provided, a hacker can use iOS emulated in QEMU for:

  • Restore / Boot
  • Software rendering
  • Kernel and userspace debugging
  • Pairing with the host
  • Serial / SSH access
  • Multitouch
  • Network
  • Install and run any arbitrary IPA
Unlike a locked-down physical Apple device. It's a good starting point.
show 1 reply