Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: ImJustAnotherOkie; Swordmaker; CodeToad; rlmorel; nascarnation; marron; vette6387; DuncanWaring
From Unpatched stealthy iOS MDM hack spells ruin for Apple tech enterprises - Reg, by Darren Pauli, 2016 March 31 :

"And now for something completely different..."

From US asked Google to unlock phones 9 times since 2012 - CNBC, by Arjun Kharpal, 2016 March 31 :

Sometimes "quiet is good," but I guess this time it was not a "bug" [up their @ss], it was a "feature" — it was about terrorism, not drug-related?

79 posted on 04/01/2016 12:05:25 AM PDT by CutePuppy (If you don't ask the right questions you may not get the right answers)
[ Post Reply | Private Reply | To 68 | View Replies ]


To: CutePuppy; ImJustAnotherOkie; Swordmaker; CodeToad; rlmorel; nascarnation; marron; vette6387; ...

Apple has really dropped the ball in the software department.

It’s been one disaster after another. ‘It just works’ should be replaced by it just Bricks’.

I just upgraded my 5S to 9.3.1 skipping 9.3.0. It immediately prompted me for my Apple Password. I use a password manager because it is complex. Could I get to my password manager? No. Did I know, or was I advised I of a new requirement of needing a password right off the bat? No. Fortunately .1 lets you defer the password, I guess .0 doesn’t. On top of that my Win10 iTunes had to be re-installed and the USB driver didn’t install properly.

This is exactly the kind of stuff that gets Apple in trouble.

Software is all about attention to the smallest details, and Apple is blowing it in the details department.


80 posted on 04/01/2016 8:33:23 AM PDT by ImJustAnotherOkie
[ Post Reply | Private Reply | To 79 | View Replies ]

To: CutePuppy
The unmatched hack – dubbed SideStepper and crafted by Israel-based Check Point hackers Ohad Bobrov and Avi Bashan – begins with a near-perfect phishing attack targeted at staff, and ends with complete compromise of fully updated iOS devices running version 9.2.

I see what you did there. . . you clipped the cited article before the money quote in the article:

"We found a way to do a man-in-the-middle attack on an iOS mobile device and replace an original command such as 'query device' with one to install a malicious enterprise certificate application," Bobrov says.

That means for this to work, they'd have to have stolen the involved company's Enterprise Certificate. There is why it won't work. Good try.

As for the rest of your post, Apple's Law Enforcement Guideline page available on its website outlines exactly what it can and cannot do for such devices. It states that it has never "unlocked" iOS devices, but has been able to retrieve un-encrypted data for law enforcement pursuant to legal search warrants on devices prior to devices which were fully encrypted to which Apple does not have the keys. The ACLU article included a survey of devices back to 2008 which included devices that did not have any encryption at all and were only protected by the passcode with no lock-out.

86 posted on 04/01/2016 9:27:48 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue..)
[ Post Reply | Private Reply | To 79 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson