PJ Vogt
๐ค SpeakerAppearances Over Time
Podcast Appearances
Okay. So you've recorded the message. You're going to try to send it. At the moment that Alex had recorded his voice note, I could see the log entries cascading down the screen. Any action the iPhone took required marshaling so many of these little tasks.
The voice note, of course, did not make it to my phone. But now Alex could check these tasks to see which one had failed.
The voice note, of course, did not make it to my phone. But now Alex could check these tasks to see which one had failed.
The voice note, of course, did not make it to my phone. But now Alex could check these tasks to see which one had failed.
So let's see. It's funny, you're like fluent in iPhone.
So let's see. It's funny, you're like fluent in iPhone.
So let's see. It's funny, you're like fluent in iPhone.
You speak enough iPhone to go on vacation in iPhone and like order some cocktails.
You speak enough iPhone to go on vacation in iPhone and like order some cocktails.
You speak enough iPhone to go on vacation in iPhone and like order some cocktails.
Alex's larger theory about what was going on here was that the unescaped ampersand had perhaps triggered one of the security systems built into the iPhone's internal code. I did not know about these security systems. And Alex started to explain to me how they worked and why Apple's developers created them in the first place.
Alex's larger theory about what was going on here was that the unescaped ampersand had perhaps triggered one of the security systems built into the iPhone's internal code. I did not know about these security systems. And Alex started to explain to me how they worked and why Apple's developers created them in the first place.
Alex's larger theory about what was going on here was that the unescaped ampersand had perhaps triggered one of the security systems built into the iPhone's internal code. I did not know about these security systems. And Alex started to explain to me how they worked and why Apple's developers created them in the first place.
And have there been issues in the past where because there's so many programs that are now sort of entering into iMessage, someone might find a vulnerability in like Memoji and then be able to get it and grab somebody's text messages or something? Oh, yeah.
And have there been issues in the past where because there's so many programs that are now sort of entering into iMessage, someone might find a vulnerability in like Memoji and then be able to get it and grab somebody's text messages or something? Oh, yeah.
And have there been issues in the past where because there's so many programs that are now sort of entering into iMessage, someone might find a vulnerability in like Memoji and then be able to get it and grab somebody's text messages or something? Oh, yeah.
And if somebody, nobody would ever do this to me, not that type of reporter, but if it happened to me, what would happen? Like one day I would get a text message from an unknown number with a funny emoji and that would be them breaking in?