Lock and Code cover image

The world’s most coveted spyware, Pegasus

Lock and Code

00:00

Is the PDF Fort Compression Corrupted?

The exploit is one of the most technically sophisticated we've ever seen. Using over 70 thousand segment commands defining logical bit operations, they define a small computer architecture with features such as registers and a full 64 bit adder and comparator. It's not as fast as java script, but it's fundamentally computationally equivalent. This is one exploit for one vulnerability.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app