Project Zero releases a 0-click exploit chain for the Pixel 9.
-
Project Zero releases a 0-click exploit chain for the Pixel 9. This one targets the Pixel, but the 0-click bug and exploit techniques used also apply to most other Android devices.
https://projectzero.google/2026/01/pixel-0-click-part-1.html
-
Project Zero releases a 0-click exploit chain for the Pixel 9. This one targets the Pixel, but the 0-click bug and exploit techniques used also apply to most other Android devices.
https://projectzero.google/2026/01/pixel-0-click-part-1.html
@evacide nice. an exploit pegasus will prolly use.
-
Project Zero releases a 0-click exploit chain for the Pixel 9. This one targets the Pixel, but the 0-click bug and exploit techniques used also apply to most other Android devices.
https://projectzero.google/2026/01/pixel-0-click-part-1.html
@evacide
Does that impact GrapheneOS mods? -
Project Zero releases a 0-click exploit chain for the Pixel 9. This one targets the Pixel, but the 0-click bug and exploit techniques used also apply to most other Android devices.
https://projectzero.google/2026/01/pixel-0-click-part-1.html
@evacide I'm an end user.
From skimming the parts of the article I can understand, my takeaway is that having turned off every AI "feature" and never using the transcription tool on my Android device reduces its vulnerability to this particular 0-click exploit chain. Is that accurate?
-
@evacide nice. an exploit pegasus will prolly use.
-
-
@evacide
Does that impact GrapheneOS mods?@tadbithuman @evacide looks like the Dolby side of things was patched in the January 2026 ASB, which is included in the latest version of GrapheneOS.
https://source.android.com/docs/security/bulletin/2026/2026-01-01#dolby -
Project Zero releases a 0-click exploit chain for the Pixel 9. This one targets the Pixel, but the 0-click bug and exploit techniques used also apply to most other Android devices.
https://projectzero.google/2026/01/pixel-0-click-part-1.html
@evacide "Incoming SMS and RCS audio attachments received by Google Messages are now automatically decoded with no user interaction." Is there a way to turn that off? (Asking for those who have not yet switched to an alternate SMS app.)
-
@evacide I'm an end user.
From skimming the parts of the article I can understand, my takeaway is that having turned off every AI "feature" and never using the transcription tool on my Android device reduces its vulnerability to this particular 0-click exploit chain. Is that accurate?
@Fishercat @evacide Not necessarily. According to the report, the audio-decoding is automatic. The user turning things off may only turn off the *display* of the result.
Better to switch to a different, more old-school SMS app. There are plenty. I *think* that would help.
-
@Fishercat @evacide Not necessarily. According to the report, the audio-decoding is automatic. The user turning things off may only turn off the *display* of the result.
Better to switch to a different, more old-school SMS app. There are plenty. I *think* that would help.
-
undefined stefano@mastodon.bsd.cafe shared this topic