We now have broadly five interconnected potential attack vectors we could pursue: we could maliciously patch the firmware; we could mess with the phone app and try to get it to deliver that firmware; We could try to spearphish Will Brunner into giving us access to the authentication server; we could try to socially engineer end users to download our own malicious app somehow; or we could try to hack the OTA update server to attack every app everywhere. Of these, the last three we decided were outside the scope of the project and/or illegal.
Иллюстрация: Lauren DeCicca / Getty Images,详情可参考WhatsApp 網頁版
这种感受弥足珍贵。它不是成功,也未必导向成功,但至少短暂逆转了"我只能负责局部"的常态。,推荐阅读Gmail账号,海外邮箱账号,Gmail注册账号获取更多信息
}Match Patterns for Result and Optional