Jonathan Zdziarski, known security researcher Apple products, and author of books on forensics proved his research that there are systemic services that can be used as a backdoor for iPhones and iPads.
The first way to get into the mobile Apple hardware is called. Dropoutjeep. Under this mysterious name conceals the NSA operation. Thanks to the information disclosed by Edward Snowden known that the American Agency for Safety “implanted” for electronic devices the software or brazed corresponding component provides services to the opportunity to take advantage of the backdoor. How is it done? As it turns out, in the simplest possible. Ordered at the hardware store is sent to the warehouse the NSA, where he gets into the hands of technicians who with Swiss precision break it into pieces, modify and send to the recipient.
Another way of spying on the user’s access provided directly by the Apple. Zdziarski is true praises iOS 7 for good security against hacker attacks, but on the other hand, points out that the relevant departments thus have easier access to user data. Confirmation of this fact is to find on the pages of Apple, where you can find principles of cooperation with the services with the template application for the Police to acquire customer data. In a statement, you can find the sentence: Apple, after receiving from the staff locked within the device is able to obtain from him some information, so-called. “Active system data”, ie, among others, Texting, pictures, videos, contacts, audio, history of dialed calls. At the same time Apple points out that it is not able to provide data on calendars, e-mails and data from non-native applications. Zdziarski says that the data recovery process takes about four months, and the cost is $ 1000. Is normal, average user has nothing to fear? Unless disliked special services, and the news is not abusing phrases such as – anthrax, bomb, bombing or similar suspicious sentences, it can sleep peacefully. In the case of stolen, the thief will not be able to access the data, unless there is a friend in the NSA, the prosecutor’s office or the headquarters of Apple. The police control the phone would be able to get to our data, if the officer will have time to hook the iPhone to the device, which is it is obviously highly unlikely. Additionally, it will be impossible when the smartphone is disabled. You should also remember that the charging stations or radio of the presentation space on the iPhone are able to steal from him the keys of evaporation. Apple silent on these backdoors. Zdziarski tried to contact in the case of Tim Cook and Steve Jobs of his time. He answered only the first, but selectively, ignoring the messages that concerned vulnerabilities. Of course, the hole in the software can be found anywhere and everywhere. Not only in iOS but also Android, którego You can hack the voice .Source text: Niebezpiecznik
No comments:
Post a Comment