Apple Has Backdoors in iOS?Added: Friday, July 25th, 2014
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2013, www.extratorrent.cc
The online debates continue to grow, and Apple might have to explain to its customers why iOS features installed backdoors. According to the security researcher Jonathan Zdziarski, Apple might have deliberately installed security holes in its devices running iOS.
Jonathan Zdziarski, when at the HOPE security conference, demonstrated some “undocumented high-value forensic services’ that can be found running on every iOS device, along with some suspicious design omissions in the operating system that made collection easier. Finally, Zdziarski also pointed at the examples of forensic artefacts acquired which “should never come off the device” without user consent.
The security researcher believes that the tech giant did that all the while it shored up the security in the rest of the iOS in order to make it harder to break in. The interesting thing is that the iPhone proves to be reasonably secure to a typical hacker, with the iPhone 5 and iOS 7 being more secure from everybody except Apple and the government. For instance, Zdziarski has pointed out that locking your Apple device doesn’t necessarily mean that information on it is encrypted.
He says that the only way to encrypt the data is to shut the phone down. In other words, as long as your device is on, you run the risk to see your data stolen. Indeed, commercial forensic instruments can perform deep extraction using these backdoor services. Zdziarski believes that Apple might have succumbed to the pressure of the security services and law enforcement and installed such security holes to just make it easier for the government to break in with a warrant.
Although the company has promised to be transparent when faced with government requests, the security researcher believes that it is still a breach of customers’ trust. Of course, the backdoors are undocumented and customers are unaware of them.
Posted by: Date:
Friday, July 25th, 2014
|posted by (2014-07-25 21:31:28)|
|"Of course, the backdoors are undocumented and customers are unaware of them."|
Proves I was RIGHT in never purchasing an Apple product!
|It does not matter which electronic device you purchase. If it connects to the internet there are backdoors. No ifs, ands, or buts about it.|
|Added thought: Big Brother is dead. What we have now is Uncle Peeping Tom.|
|That's why you root your phone and install custom ROMs. If you can build your own even better.|
|posted by (2014-07-26 02:37:54)|
|Right on. Android and rooted. Way to go.|
|Old news and nothing new with AppleCrap. Plus they've a build|
in tracking device in every phone which can be decompile and
reverse engineering. Apple's MacBook Pro or Air computers
are very easy, mainly turning on the Icam without no lights on
and watching your enemy, lol. Apple's users are not very bright
and not computer literacy. I think you can't even upgrade the
processor and video card on most laptops.
|posted by (2014-07-26 07:06:39)|
|like there isnt security holes in other devices.|
|Thank you for posting this information.|
|Dont whine about apple you idiots android has even more backdoors than you know|
|Yeah most things that connect have backdoors tph.Apple has more backdoor holes than Asbos Stag party last year in Phuket,Thailand|
|posted by (2014-07-27 03:44:16)|
|Backdoors within not affecting devices drivers into any can help Apple to have secure devices and detect backdoors later if it in any security research to find it.|
|`cggc` still not found a decent translator then mate, but i must admit i think i know what what your saying this time.... possibly..... sort of|
|And how exactly is a rooted android phone running a custom rom more secure?|
|Apple and Windows are no different both have remote access whether it is requited or not,lest we forget Microsoft accessed over 3 million machines in one go when trying to fire break a new virus threat without the consent of the owners and bypassed all security dropping a payload which proved ineffective against the virus ,but proved they could takeover any machine or machines they wished to,ethical hacking does depend on whether you are acting ethically to begin with and I for one do not trust either Apple or Microsoft's ethics..|
|@3 So True (;^D)|
|posted by (2014-07-29 22:36:49)|
|Mac doesn't sell you a device, they let you use one, for a lot of money. They still control what you can put on it and how other developers design software. Of course they left a way they could get back into their device, even if it is in your pocket.|
|posted by (2014-07-31 23:17:13)|
|Maybe e.g. bootable ISO password delete can works in remote share access doing what it is backdoors because can mind many to bypass any devise or OS with secure hard drive if just some with experience of cmos windows problems taking off battery to erase password looking methods to doing all about it. of course, networks companies have history records and that going to filcher!...etc...||
Most Popular Stories