The following table highlights a list of the potential behaviors that may be observed while interacting with the application, a brief description of each behavior and what it might be used for, and the applicable architecture (MACH-O slice) in which that behavior was detectable.
Steps to Reproduce
The following table highlights a list of the potential behaviors that may be observed while interacting with the application, a brief description of each behavior and what it might be used for, and the applicable architecture (MACH-O slice) in which that behavior was detectable.
Application
See more detail in the NowSecure Report