[cryptome] Re: Identifying back doors, attack points, and surveillance mechanisms in iOS devices

  • From: Shaun O'Connor <capricorn8159@xxxxxxxxx>
  • To: cryptome@xxxxxxxxxxxxx
  • Date: Sun, 20 Jul 2014 11:24:03 +0100

not in the slightest surprising just like those"incentives" your cell
company pushes your way in an attempt to persuade you to use your cell
more often for more activities.. the unwary swallow the crap  and get
sucked in to the game while the more navvy think twice before"upgrading"
etc.
On 20/07/2014 02:20, coderman wrote:
> doubt this will surprise anyone; iOS intentionally designed to support
> surveillance.
>
> ---
>
> http://www.sciencedirect.com/science/article/pii/S1742287614000036
>
> "Identifying back doors, attack points, and surveillance mechanisms in
> iOS devices"
>  by Jonathan Zdziarski
>
> Abstract
>
> The iOS operating system has long been a subject of interest among the
> forensics and law enforcement communities. With a large base of
> interest among consumers, it has become the target of many hackers and
> criminals alike, with many celebrity thefts (For example, the recent
> article “How did Scarlett Johansson's phone get hacked?”) of data
> raising awareness to personal privacy. Recent revelations (Privacy
> scandal: NSA can spy on smart phone data, 2013 and How the NSA spies
> on smartphones including the BlackBerry) exposed the use (or abuse) of
> operating system features in the surveillance of targeted individuals
> by the National Security Agency (NSA), of whom some subjects appear to
> be American citizens. This paper identifies the most probable
> techniques that were used, based on the descriptions provided by the
> media, and today's possible techniques that could be exploited in the
> future, based on what may be back doors, bypass switches, general
> weaknesses, or surveillance mechanisms intended for enterprise use in
> current release versions of iOS. More importantly, I will identify
> several services and mechanisms that can be abused by a government
> agency or malicious party to extract intelligence on a subject,
> including services that may in fact be back doors introduced by the
> manufacturer...
> '''
>
>

-- 
*_PRIVACY IS A BASIC RIGHT - NOT A CONCESSION _*

Other related posts: