AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
**Creating an intentional vulnerability will lead to exploitation **
A company circumvented Apple's operating system feature to access a phone, but found nothing of relevance as the data was backed up in the cloud. The debate arose on whether to create a vulnerability in the system to fulfill law enforcement requests. The concern was that once the vulnerability was created, it could be exploited by malicious actors. The case of WannaCry was highlighted as an example where a leaked vulnerability led to significant harm, showcasing the challenge of keeping such vulnerabilities hidden and protected.