So called "0-click" exploits, in which no user interaction is required to compromise a mobile device, have become a highly interesting topic for security researchers, and not just because Apple announced a one million dollar bug bounty for such exploits against the iPhone last year. This talk will go into the details of how a single memory corruption vulnerability in iMessage was remotely exploited to compromise an iPhone without any user interaction. Special attention will be given to features and internals specific to iOS and macOS that were (ab)used for exploitation.