Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.
Not only that, but using an initial exploit which could be remotely triggered with NO user interaction or visibility. That’s scary shit