Lock and Code cover image

The world’s most coveted spyware, Pegasus

Lock and Code

00:00

Is the PDF Fort Compression Corrupted?

The exploit is one of the most technically sophisticated we've ever seen. Using over 70 thousand segment commands defining logical bit operations, they define a small computer architecture with features such as registers and a full 64 bit adder and comparator. It's not as fast as java script, but it's fundamentally computationally equivalent. This is one exploit for one vulnerability.

Play episode from 20:36
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app