lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [<thread-prev] [day] [month] [year] [list]
Message-ID: <kZJ4mtHG2lWVT7o0tusri0vS5H98CzHEIHKLAdL6T5OtCdR0AYYYQZh3-xe-WbzhV3ePcfoIAQ2bXnCUtIdPMacMq5sgICgm0WT10DRLRP8=@protonmail.ch>
Date: Fri, 07 Nov 2025 15:27:43 +0000
From: Patrick via Fulldisclosure <fulldisclosure@...lists.org>
To: Jan Schermer <jan@...ermer.cz>
Cc: fulldisclosure@...lists.org, Noor Christensen <kchr+fd@...post.org>
Subject: Re: [FD]
	: "Glass Cage" – Zero-Click iMessage → Persistent iOS Compromise + Bricking (CVE-2025-24085 / 24201, CNVD-2025-07885)

Hello Jan,

You are completely right and it’s something I warned about early, which is abuse of AI-generated sensationalized headline and fake PoC-s, for fame.

I urge the Full Disclosure staff to look into it.

Discussions with the individual responsible seem to be fruitless, and this likely constitutes abuse of this mailing list.


Sent from Proton Mail for iOS.

-------- Original Message --------
On Friday, 11/07/25 at 15:54 Jan Schermer <jan@...ermer.cz> wrote:
I looked at few repos and posts of "Joseph Goydish".
It all seems to be thinly veiled AI slop and BS.
Cited vulns are not attributed to him really and those chains don’t make a lot of sense. Screen recordings look suspicious, some versions reference High Sierra for some reason (but I can’t find those bits now).

I invite anyone to look at his GH repos and scroll through commit history.
Does this make any sense? https://github.com/JGoyd/Apple-Silicon-A17-Flaw

I wonder if the purpose of this is to confuse HR somewhere, need for fame or something else.

Jan


> On 29. 10. 2025, at 12:15, josephgoyd via Fulldisclosure <fulldisclosure@...lists.org> wrote:
>
> The exploit I caught in the wild and the flow of the attack chain are in this repo: https://github.com/JGoyd/Glass-Cage-iOS18-CVE-2025-24085-CVE-2025-24201
>
> The report was constructed via log analysis.
>
> -------- Original Message --------
> On Wednesday, 10/29/25 at 01:44 Christoph Gruber <list@...u.at> wrote:
> It seems, the whole account is down
> --
> Christoph Gruber
>
>> Am 29.10.2025 um 03:37 schrieb Noor Christensen <kchr+fd@...post.org>:
>>
>> On Thu Oct 2, 2025 at 11:45 PM CEST, josephgoyd via Fulldisclosure wrote:
>>>> ----------------------------------------------------------------------
>>>>
>>>> Full Technical Disclosure:
>>>>
>>>> [Glass Cage iOS Attack Chain](https://weareapartyof1.substack.com/p/glass-cage-zero-day-imessage-attack)
>>
>> Hi Joseph,
>>
>> Looks like your post with the technical details is down; I'm getting a 404 since
>> yesterday.
>>
>> -- kchr
>> _______________________________________________
>> Sent through the Full Disclosure mailing list
>> https://nmap.org/mailman/listinfo/fulldisclosure
>> Web Archives & RSS: https://seclists.org/fulldisclosure/
>
> _______________________________________________
> Sent through the Full Disclosure mailing list
> https://nmap.org/mailman/listinfo/fulldisclosure
> Web Archives & RSS: https://seclists.org/fulldisclosure/

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ