A wicked problem is a problem that is difficult or impossible to solve because of incomplete, contradictory, and changing requirements that are often difficult to recognize. It refers to an idea or problem that can not be fixed, where there is no single solution to the problem. The use of the term "wicked" here has come to denote resistance to resolution, rather than evil.
RISC-V offers computer architects a way to standardise their sockets and plumbing without having to gain permission from (and pay royalties to) either of the monopolists—for any company or individual may download it from the internet. It was originally written by computer scientists at the University of California, Berkeley, who wanted an instruction set that they could use for publishable research.
Impact: The implant has access to almost all of the personal information available on the device, which it is able to upload, unencrypted, to the attacker's server. The implant binary does not persist on the device; if the phone is rebooted then the implant will not run until the device is re-exploited when the user visits a compromised site again. Given the breadth of information stolen, the attackers may nevertheless be able to maintain persistent access to various accounts and services by using the stolen authentication tokens from the keychain, even after they lose access to the device.
In preparation for a talk on Seventh Edition Unix this fall, I stumbled upon a service list from DEC for all known PDP-7 machines. From that list, and other sources, I believe that PDP-7 serial number 34 was the original Unix machine.