Eli5: How are Zero-click exploits even possible?

600 views

Like if nobody “asks” a piece of software to execute how does it get downloaded to my phone or PC and then execute it self ? I can understand attacks e.g where you download a jpeg and then click to open it and the jpeg had some extra malicious code in it etc, but without anybody “authorizing” anything how does the kernel allow the code to be run by the cpu etc ?

**EDIT** I am talking about forced entry zero click software like the one pegasus created for iphones

In: 190

20 Answers

Anonymous 0 Comments

Have you seen the battle for Helms Deep (Lord of the Rings)?
If trying to enter through the front gate, there’s lots of protection, and you don’t “just” enter.

But sometimes there’s a flaw in the design, such as the place where they blow a hole in the wall.

When you go to a website, all of the text and images are loaded, meaning basically their code has been run, even if you didn’t click it.

You are viewing 1 out of 20 answers, click here to view all answers.