Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Ultimately, does this require installing a sketchy app in the first place?


Lots of credible apps use lots of dependencies. Find an abandoned one, get your code into it, …


Or a reputable one with that line of code included (in one of the updates, after having built a good reputation); maybe dormant until a certain date.


Or a bug in some good app that allows an attacker to execute the right thing.


Yes.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: