## Tweets
- https://twitter.com/msuiche/status/1591370094160269312
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">I've no idea what I'm doing. <a href="https://t.co/F823BXsKQR">https://t.co/F823BXsKQR</a> <a href="https://t.co/wvUV0G20zy">pic.twitter.com/wvUV0G20zy</a></p>— Matt Suiche (@msuiche) <a href="https://twitter.com/msuiche/status/1591370094160269312?ref_src=twsrc%5Etfw">November 12, 2022</a></blockquote>
- https://twitter.com/jeffssh/status/1512163019807240198
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">The code to trigger FORCEDENTRY (CVE-2021-30860) and create the VM described in <a href="https://twitter.com/i41nbeer?ref_src=twsrc%5Etfw">@i41nbeer</a> and <a href="https://twitter.com/5aelo?ref_src=twsrc%5Etfw">@5aelo</a>'s initial blogpost is available here: <a href="https://t.co/QhYgcMse1K">https://t.co/QhYgcMse1K</a>. Not a working exploit, I don't have the hardware to do x-dev on iOS, this was all done with xpdf on OSX. <a href="https://t.co/SSPLVmWFXE">https://t.co/SSPLVmWFXE</a></p>— jeff (@jeffssh) <a href="https://twitter.com/jeffssh/status/1512163019807240198?ref_src=twsrc%5Etfw">April 7, 2022</a></blockquote>
## Links
- https://github.com/jeffssh/exploits/blob/main/CVE-2021-30860/exploit.py