The competition for such deals is off the charts - a good project can already go to Sequoia
Posted: Mon Jan 20, 2025 4:40 am
Accel or other Venrock, the best deals do not even reach second-tier funds.</p>
<p>My partners and I are directing the second Venture Angels fund to international investments at seed and early stages, which are now the most attractive - with average risks they show the highest profitability, although it forces you to delve deeper into the details of the project due to the lack of clear indicators on the surface"</p>
Subscribe to our Telegram channel to stay up to date with all the news and events of the Runet.
Anton
Baranov
Lead Virus Analyst
ESET
"A few days ago, security experts suggested that the FBI usa mobile phone numbers database and the "third-party contractors" mentioned by the agency would use a method of copying information from a NAND chip (so-called NAND mirroring) to decrypt data. It allows you to copy the contents of an iPhone's memory an unlimited number of times and crack a password using a brute-force attack - without limiting the number of attempts to enter the data.
<p>But it is more likely that a 0-day exploit or a previously unknown jailbreak was used for this task. The cost of such exploits is quite high, so companies have an incentive to look for them in iOS. One way or another, only the FBI knows the exact answers so far. If the hack was carried out using a new exploit, it is not a fact that it poses a threat to all Apple devices"
The FBI's success may also be due to the fact that the terrorist used an older model iPhone that did not have a fingerprint sensor - the 5C.
Main_nikitin
Sergey
Nikitin
Deputy Head of the Laboratory of Computer Forensics and Malicious Code Analysis
Group-IB
"The specific iPhone of the specific terrorist is an iPhone 5C, a fairly old model, without a fingerprint sensor and with an old processor model. The theoretical possibility of hacking it was clear from the very beginning. All the security features that really make the iPhone difficult to hack were implemented only in models with a fingerprint sensor, starting with the iPhone 5S."
<p>My partners and I are directing the second Venture Angels fund to international investments at seed and early stages, which are now the most attractive - with average risks they show the highest profitability, although it forces you to delve deeper into the details of the project due to the lack of clear indicators on the surface"</p>
Subscribe to our Telegram channel to stay up to date with all the news and events of the Runet.
Anton
Baranov
Lead Virus Analyst
ESET
"A few days ago, security experts suggested that the FBI usa mobile phone numbers database and the "third-party contractors" mentioned by the agency would use a method of copying information from a NAND chip (so-called NAND mirroring) to decrypt data. It allows you to copy the contents of an iPhone's memory an unlimited number of times and crack a password using a brute-force attack - without limiting the number of attempts to enter the data.
<p>But it is more likely that a 0-day exploit or a previously unknown jailbreak was used for this task. The cost of such exploits is quite high, so companies have an incentive to look for them in iOS. One way or another, only the FBI knows the exact answers so far. If the hack was carried out using a new exploit, it is not a fact that it poses a threat to all Apple devices"
The FBI's success may also be due to the fact that the terrorist used an older model iPhone that did not have a fingerprint sensor - the 5C.
Main_nikitin
Sergey
Nikitin
Deputy Head of the Laboratory of Computer Forensics and Malicious Code Analysis
Group-IB
"The specific iPhone of the specific terrorist is an iPhone 5C, a fairly old model, without a fingerprint sensor and with an old processor model. The theoretical possibility of hacking it was clear from the very beginning. All the security features that really make the iPhone difficult to hack were implemented only in models with a fingerprint sensor, starting with the iPhone 5S."