ExtraTorrent.cc - The Largest Bittorent SystemLogin   |   Register
Latest Articles
Most searched
Hot torrents
First Cams
View Torrent Info: Moana 2016 HD-TS XviD AC3-CPG
View Torrent Info: Shut.In.2016.HDCAM.x264 - Lesnar
View Torrent Info: Fantastic Beast and Where To Find Them 2016 HD-TS x264-CPG
View Torrent Info: Arrival 2016 HDCAM x264 AC3-TuttyFruity
Hot torrents
XVID DIVX
View Torrent Info: Sully.2016.BRRip.XviD.AC3-ETRG
View Torrent Info: Storks.2016.BRRip.XviD.AC3-EVO
View Torrent Info: The.Accountant.2016.HC.HDRip.X264.AC3-EVO
View Torrent Info: White.Girl.2016.HDRip.XviD.AC3-EVO
Hot torrents
H264 X264
View Torrent Info: The.Accountant.2016.KOR.HDRip.1080p.H264.AAC-STY[EtHD]
View Torrent Info: Sully.2016.720p.BluRay.x264-SPARKS[EtHD]
View Torrent Info: Independence.Day.Resurgence.2016.BluRay.720p.DTS.AC3.x264-ETRG
View Torrent Info: Zootopia.2016.BluRay.1080p.AVC.DTS-HD.MA 7.1 x264-ETRG
Hot torrents
Television
View Torrent Info: Van.Helsing.S01E12.WEB-DL.x264-FUM[ettv]
View Torrent Info: Z.Nation.S03E12.WEB-DL.x264-FUM[ettv]
View Torrent Info: Gold.Rush.S07E08.Mega.Barge.and.Kid.Commando.HDTV.x264-CRiMSON[ettv]
View Torrent Info: The.Vampire.Diaries.S08E06.HDTV.x264-LOL[ettv]
View Torrent Info: Kahaani 2 (2016) Hindi 1CD Desi Cam x264 AAC - Downloadhub
View Torrent Info: Air Bud (1997) 720p HDTVRip x264 Eng Subs [Dual Audio] [Hindi 2.0 - English 5.1] -=!Dr.STAR!=-
View Torrent Info: Morgan 2016 720p BDRip Hindi DD 5.1 x264-SnowDoN
View Torrent Info: Ardaas (2016) DVDRIP 1CDRIP x264 AAC ESub [DDR]
30s
Chat
To add new messages please Login or Register for FREE
Warning! Protect Yourself from Lawsuits and Fines!
Your IP Address is 54.161.208.7.   Location is United States
Your IP Address is visible to EVERYONE. Hide your IP ADDRESS with a VPN while torrenting!
ExtraTorrent strongly recommends using Trust.Zone VPN to anonymize your torrenting. It's FREE!

ExtraTorrent.cc > Articles > Apple Has Backdoors in iOS?

Apple Has Backdoors in iOS?

Apple Has Backdoors in iOS?

Added: Friday, July 25th, 2014
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
The online debates continue to grow, and Apple might have to explain to its customers why iOS features installed backdoors. According to the security researcher Jonathan Zdziarski, Apple might have deliberately installed security holes in its devices running iOS.
Screen_Hunter_01_Jul.jpg

Jonathan Zdziarski, when at the HOPE security conference, demonstrated some “undocumented high-value forensic services’ that can be found running on every iOS device, along with some suspicious design omissions in the operating system that made collection easier. Finally, Zdziarski also pointed at the examples of forensic artefacts acquired which “should never come off the device” without user consent.

The security researcher believes that the tech giant did that all the while it shored up the security in the rest of the iOS in order to make it harder to break in. The interesting thing is that the iPhone proves to be reasonably secure to a typical hacker, with the iPhone 5 and iOS 7 being more secure from everybody except Apple and the government. For instance, Zdziarski has pointed out that locking your Apple device doesn’t necessarily mean that information on it is encrypted.

He says that the only way to encrypt the data is to shut the phone down. In other words, as long as your device is on, you run the risk to see your data stolen. Indeed, commercial forensic instruments can perform deep extraction using these backdoor services. Zdziarski believes that Apple might have succumbed to the pressure of the security services and law enforcement and installed such security holes to just make it easier for the government to break in with a warrant.

Although the company has promised to be transparent when faced with government requests, the security researcher believes that it is still a breach of customers’ trust. Of course, the backdoors are undocumented and customers are unaware of them.

Posted by:  SuperAdmin
Date:  Friday, July 25th, 2014



Comments (17) (please add your comment »)

1
posted by Kitty (2014-07-25 21:31:28)
Crash1 avatar"Of course, the backdoors are undocumented and customers are unaware of them."

UNTIL NOW!

Proves I was RIGHT in never purchasing an Apple product!

2
posted by Trusted UploaderSite FriendSuperman (2014-07-25 22:51:24)
trialNerror avatarIt does not matter which electronic device you purchase. If it connects to the internet there are backdoors. No ifs, ands, or buts about it.

3
posted by Trusted UploaderSite FriendSuperman (2014-07-25 22:52:14)
trialNerror avatarAdded thought: Big Brother is dead. What we have now is Uncle Peeping Tom.

4
posted by (2014-07-25 23:09:04)
No avatarThat's why you root your phone and install custom ROMs. If you can build your own even better.

5
posted by (2014-07-26 02:37:54)
Creaator avatarRight on. Android and rooted. Way to go.

6
posted by men (2014-07-26 05:58:56)
ZerlindaX avatarOld news and nothing new with AppleCrap. Plus they've a build
in tracking device in every phone which can be decompile and
reverse engineering. Apple's MacBook Pro or Air computers
are very easy, mainly turning on the Icam without no lights on
and watching your enemy, lol. Apple's users are not very bright
and not computer literacy. I think you can't even upgrade the
processor and video card on most laptops.

7
posted by (2014-07-26 07:06:39)
ao1jmm avatarlike there isnt security holes in other devices.

8
posted by (2014-07-26 13:02:51)
1gr8flslkr avatarThank you for posting this information.

9
posted by (2014-07-26 14:31:27)
dimitry199 avatarDont whine about apple you idiots android has even more backdoors than you know

10
posted by ModeratorTrue LoveGirl (2014-07-26 14:38:45)
SiLvErDuSt avatarYeah most things that connect have backdoors tph.Apple has more backdoor holes than Asbos Stag party last year in Phuket,Thailand

11
posted by (2014-07-27 03:44:16)
cggc avatarBackdoors within not affecting devices drivers into any can help Apple to have secure devices and detect backdoors later if it in any security research to find it.

12
posted by (2014-07-28 00:06:26)
hairpin100 avatar`cggc` still not found a decent translator then mate, but i must admit i think i know what what your saying this time.... possibly..... sort of

13
posted by (2014-07-28 13:27:13)
No avatarAnd how exactly is a rooted android phone running a custom rom more secure?

14
posted by Site FriendET loverSuperman (2014-07-29 21:20:28)
Embolism avatarApple and Windows are no different both have remote access whether it is requited or not,lest we forget Microsoft accessed over 3 million machines in one go when trying to fire break a new virus threat without the consent of the owners and bypassed all security dropping a payload which proved ineffective against the virus ,but proved they could takeover any machine or machines they wished to,ethical hacking does depend on whether you are acting ethically to begin with and I for one do not trust either Apple or Microsoft's ethics..

15
posted by Site FriendET loverSuperman (2014-07-29 21:29:36)
Embolism avatar@3 So True (;^D)

16
posted by (2014-07-29 22:36:49)
No avatarMac doesn't sell you a device, they let you use one, for a lot of money. They still control what you can put on it and how other developers design software. Of course they left a way they could get back into their device, even if it is in your pocket.

17
posted by (2014-07-31 23:17:13)
cggc avatarMaybe e.g. bootable ISO password delete can works in remote share access doing what it is backdoors because can mind many to bypass any devise or OS with secure hard drive if just some with experience of cmos windows problems taking off battery to erase password looking methods to doing all about it. of course, networks companies have history records and that going to filcher!...etc...



Articles Search
Most Popular Stories
Articles Categories
Articles Tags


Home - Browse Torrents - Upload Torrent - Stat - Forum - FAQ - Login
ExtraTorrent.cc is in compliance with copyrights
BitCoin: 12DiyqsWhENahDzdhdYsRrCw8FPQVcCkcm
Can't load ExtraTorrent? Try our official mirrors: etmirror.com - etproxy.com - extratorrentonline.com - extratorrentlive.com
2006-2016 ExtraTorrent.cc1