Linuxx https://www.forbes.com/sites/daveywinder/2025/01/13/apple-iphone-usb-c-hacked-what-you-need-to-know/
- This so far is not a big deal. The discoverer of the vulnerability says, in the article:
When it came to the ACE3 attack, however, Roth said that while Apple βsaw the attack complexity and said that they don't see it as a threat - I agree with that sentiment but wanted to at least have reported it!β The reasoning being, Roth told me, that as already explained βthis is essentially foundational research, the first steps that are needed to find other attacks on the chip.β
- The attack described is completely specific to specific Apple hardware and has no implications for Pixel hardware.
Linuxx "Can I understand that grapheneOS has better vulnerability protection than IOS?"
Because Grapheneos Team implemented software and hardware-level restrictions to disable USB-C data transfer from an early stage.
Probably! USB-C power negotiation in theory might expose enough attack surface to be exploitable. That is much less than the entire USB protocol space, but if the smaller surface is where a bad bug is, then it will still be a bad bug.
Overall, GrapheneOS mitigations reduce risk substantially, but not to zero, because that's not possible.
Please note that I do not speak for the GrapheneOS project.