Answer the question
In order to leave comments, you need to log in
How are vulnerabilities searched for in devices, such as the iPhone? How does this happen?
Now I'm learning to code, I'm learning Qt, I thought maybe I'll learn something during this time, but I didn't know anything new in this matter.
What interests me is this: searching for vulnerabilities, for example, in the iPhone, for jailbreak. How it happens, what to read, and in general, some kind of educational program on this issue :)
Many thanks.
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question