No, he is correct. A program is only similar to (not equal to) a trojan if it is a corporate MDM installed, knowing the risks, since it is not intentionally corrupting files or causing harm. Spyware, yes, but not trojan.
No, they’re wrong. They were wrong as soon as they said a Trojan you have to install yourself, which is exactly how it works. It can’t work if you weren’t tricked into installing it. The Trojan doesn’t have to cause harm it’s called a Trojan based on the way it has to be deployed.
People will slap the shit out of you on a malware/security forum if you told them this. Behaviour upon execution is a proper determinant rather than deployment method. It is why heuristics and real world execution sandboxes are utilised by security firms.
It was initially launched through TestFlight you’re conflating two ways it was distributed to just try to call me an idiot. I’m assuming you don’t even know what TestFlight is.
No, he is correct. A program is only similar to (not equal to) a trojan if it is a corporate MDM installed, knowing the risks, since it is not intentionally corrupting files or causing harm. Spyware, yes, but not trojan.
No, they’re wrong. They were wrong as soon as they said a Trojan you have to install yourself, which is exactly how it works. It can’t work if you weren’t tricked into installing it. The Trojan doesn’t have to cause harm it’s called a Trojan based on the way it has to be deployed.
Let’s phrase it differently: Those who blindly install some MDM profile deserve everything that happens after.
I agree, but it was initially snuck on through TestFlight.
Similar characteristics does not define a virus type. You are confidently incorrect. Please learn the difference between Trojan and MDM.
https://www.kaspersky.co.in/resource-center/threats/trojans
https://www.malwarebytes.com/cybersecurity/business/what-is-mobile-device-management-mdm
https://www.bleepingcomputer.com/news/security/hackers-breach-company-s-mdm-server-to-spread-android-malware/
People will slap the shit out of you on a malware/security forum if you told them this. Behaviour upon execution is a proper determinant rather than deployment method. It is why heuristics and real world execution sandboxes are utilised by security firms.
It was initially launched through TestFlight you’re conflating two ways it was distributed to just try to call me an idiot. I’m assuming you don’t even know what TestFlight is.
You are the only educated one about Apple software development in this world. We are all idiots.
I have no interest in playing with chess pigeons. Have a good day.