There are some light restricts, but it's mostly paperwork.Ok, for whatever reason, Apple still makes you send a classification report to the US government if you produce an iOS app that uses TLS.
There are some light restricts, but it's mostly paperwork.Ok, for whatever reason, Apple still makes you send a classification report to the US government if you produce an iOS app that uses TLS.
Just to make sure I understand: Someone need physical access to the device to deploy this spyware, correct?
That’s actually quite a good idea, especially for those who know to be targets. The downside is the hassle in restoring the fake and real accounts back n forth when traveling.I wonder how this can be detected by a user? I’m thinking of various countries now, and more likely in the future, that want to confiscate your phone at a border crossing/airport international arrival. Would they all install this as a matter of course? It makes me think one might consider setting up a fake iCloud account and tie your phone into that while traveling and wipe/restore your phone to the original iCloud account after passing through the borders.
That’s actually quite a good idea, especially for those who know to be targets. The downside is the hassle in restoring the fake and real accounts back n forth when traveling.
How often do you get arrested in the middle of the night and interrogated with violence for hours at a time and then thrown into a dark cell? How often are you and your family harassed by police forces?
For "associated forced," in other words terrorism and suspected terrorism. A US Citizen who fights for a terrorist group ...
I don't backup anything to any cloud server period. Your backup server should only be your external drive at home.
I happen to think that the US constitution and its amendments are some of the finest legal and ethical documents written.
People like Snowden are not whistle blowers. The media love to call him one, but he's not. He's a traitor. He's no better than Aldrich Ames. And the only thing he deserves is a bullet to the head.
Only if you have an extremely fast upload speed which most people tend not to have and even then with most systems averaging in the many gigabytes it would take forever.
Exactly. How will they get a hard line into your phone?
Now excuse me while I plug my phone into a random USB port in this airport...
(Not picking on you, DCIFRTHS, this was just something I’ve contemplated when I find myself using public charging options. Surprised this hasn’t popped up in a movie. Or real life.)
Plenty of evidence that this government CAN with a National security letter compel the inclusion of a backdoor or weaknesses, implicit or explicitly, in hardware or software.He published papers on the NSA being a "man in the middle" or spying through hacking. There's no evidence that they can, say, break an HTTPS connection between me and some server. Nor is there evidence of them having backdoors into every smartphone, but they'll try their best to get in, just like any criminal can. The US gov't can force companies to access customers' datas from servers, though. I'm not saying it's not scary.
Wiretapping should probably be unconstitutional, but somehow in these cases they've justified it. That is, the NSA isn't going rogue in doing it. Anyway, I was replying about the offshore prisons.
But then your house burns down, and its all gone-zo…d'oh!
My employer doesn't allow the use of public clouds for work product. So you don't put work stuff on iCloud, Google, Microsoft, DropBox, etc. I only put things on iCloud that I would expect could be made public. I put other things on Growly Notes in encrypted documents and only store them locally, backed up of course. I'm not an important person though - celebrities really should take stronger actions to protect their privacy.
Regarding how often it happens, I really don't know. It can happen on either side of the border so whether a foreign government would want to search a phone is entirely dependent on what country you are traveling to. In the past 3 years I've gone to Spain, Germany, Peru and New Zealand without any issue. Coming back into the US, your chances of having a phone or tablet searched will probably depend on what country you have visited as well as behavior profiling (do you act nervous waiting in line to go through customs) and there may even be a completely random "audit" where one out of XXX people going through line are randomly selected for an inspection.Yeah, the targeted attacks is key here.
Yes, you want people involved in your backups that have some expertise in the matter, not just poorly implemented add-ons.
And, yes, there is a HUGE difference between sync and backup. Just remember a sync can quickly and efficiently delete that crucial document across all your devices if you (or the sync vendor) makes a mistake.
I'm guessing maybe it gets incorporated in other apps, and then some social engineering to attract the target? I'm not sure, but I wouldn't necessarily trust the App Store review to catch it unless blatantly obvious.
It doesn't exactly take a rocket scientist to have a basic understanding of human nature.
No doubt. Most people don't have adequate archival/backup.
(As an aside... it's interesting how incompetent the gov't seems to be at backup if you've ever filed a somewhat controversial FoIA request. I was involved in one such attempt where we documented it being on at least 7 different computers, yet not one of them, or backups, had the video in question any longer. A bit too convenient, I think.)
I wonder how much that really happens. I recently traveled internationally, and was wondering if someone might ask to see my phone or unlock it, etc. I'd probably just do it, but I kind of want to resist on principal.
That's because the whole Russia thing was just political theatre towards an end. No one would care much otherwise.
And, it's also quite hypocritical, as the USA regularly interferes in the elections of other countries, and with real and more direct impact. Or, that internal USA entities (like, say, Google) had more influence on many millions of votes.
By the way, I don't really believe "random" means random. Shortly after 9/11 I was traveling between Indianapolis and Los Angeles frequently and I was "randomly" chosen for an extra pat down and search of my carry on bags at the gate on 11 out of 12 flights. I have no idea what I was doing or wearing that fit some profile but there is no way I was "randomly" chosen on over 90% of my flights within a 4 month time period.
Coming back into the US, your chances of having a phone or tablet searched will probably depend on what country you have visited as well as behavior profiling (do you act nervous waiting in line to go through customs) ...
By the way, I don't really believe "random" means random. Shortly after 9/11 I was traveling between Indianapolis and Los Angeles frequently and I was "randomly" chosen for an extra pat down and search of my carry on bags at the gate on 11 out of 12 flights. I have no idea what I was doing or wearing that fit some profile but there is no way I was "randomly" chosen on over 90% of my flights within a 4 month time period.
this is no good.
this is cyber terrorism.
I don't care who they sell these hacks to and why, it should stop.
Apple should address this immediately.
Doesn't mean that every phone is hackable. Government backdoors have existed, but nobody's found one in iOS or Android.Plenty of evidence that this government CAN with a National security letter compel the inclusion of a backdoor or weaknesses, implicit or explicitly, in hardware or software.
Snowden revelations provides further plenty of evidence that they have an ambition and track records if grabbing data purely for the reason of its existence.
Last but not least their rabid insistence that the Chinese (who have but a fraction of the US’s financial resources and expertise dedicated to this field) MUST be doing this....is the clearest and most telling indicator that they’re doing something in this area at the very least. How much and where, is the real question.
Exactly. How will they get a hard line into your phone?
Now excuse me while I plug my phone into a random USB port in this airport...
(Not picking on you, DCIFRTHS, this was just something I’ve contemplated when I find myself using public charging options. Surprised this hasn’t popped up in a movie. Or real life.)
Doesn't mean that every phone is hackable. Government backdoors have existed, but nobody's found one in iOS or Android.
I like the idea of that, but it says at the bottom of the description, "Please Note: Not compatible with original APPLE cables"
I'm not sure why, but there seems to be some intelligence going on with some devices and even charging (I think the Lightning cables have a little chip in them). Or, Playstation controllers won't just charge when plugged into power only either. So... I wonder if this will actually work for iPhone/iPad?
Still doesn't allude to a government backdoor, just that an elite hacking group somehow found a way in. It's happened in the past, doesn't mean everything you own is always hackable. They haven't really demonstrated the hack, though.As of now we do know that the iPhone and Android phones are hackable by Israeli companies which is what this thread is about. Unless this can be closed it can also be considered a backdoor although a perhaps unapproved backdoor. Behind closed doors we don't know what was and was not approved. What we do know today though is that there is an open backdoor with access to all info on OS in IOS and Android.
Kashoggi found out the hard way before being hacked to pieces.
Yes, I'm pretty sure that there is some comm between the iOS cable and the charger to check for compatibility. But for $3 it might be worth a try. I carry an extra battery for this stuff anyway. I wonder if wireless chargers do the same.
Yeah, I was thinking about it for family members. I can't actually remember the last time I've ever used a USB port in a public place. I also carry a battery for this when I travel, just in case, but I hardly end up using it either.