Get the latest tech news

iOS Elegantbouncer: When you can't get samples but still need to catch threats


The story of how ELEGANTBOUNCER was born from the frustration of not having access to in-the-wild exploit samples, and why structural analysis beats signatures for advanced mobile threats

When Citizen Lab and Google TAG discover NSO Group’s latest 0-click exploits targeting journalists and activists, we get brilliant technical writeups, CVE numbers, and patches. This is where ELEGANTBOUNCER was born - not from having access to elite exploit collections, but from the opposite: having to detect threats based solely on technical descriptions, vulnerability reports, and proof-of-concept recreations. If you’ve researched mobile exploits, analyzed iOS attack chains, or reverse-engineered file format vulnerabilities, we need your expertise.

Get the Android app

Or read this on Hacker News

Read more on:

Photo of threats

threats

Photo of samples

samples

Photo of elegantbouncer

elegantbouncer

Related news:

News photo

Nothing busted using professional photos as Phone 3 samples

News photo

'Dark side of AI': How teen girl allegedly faked threats from 2 boys — and cops bought it

News photo

Election workers fear threats and intimidation without feds' support in 2026