Posted on 06/25/2010 12:17:10 PM PDT by PugetSoundSoldier
Do you have a PIN code on your iPhone? Well, while that might protect you from someone making a call or fiddling with your apps, it doesnt prevent access to your data as long as the person doing the snooping around is using Ubuntu Lucid Lynx 10.04.
Security experts Bernd Marienfeldt and Jim Herbeck discovered something really interesting when they hooked up a non-jailbroken, fully up-to-date iPhone 3GS to a PC running Lucid Lynx
I uncovered a data protection vulnerability [9], which I could reproduce on 3 other non jail broken 3GS iPhones (MC 131B, MC132B) with different iPhone OS versions installed (3.1.3-7E18 modem firmware 05.12.01 and version 3.1.2 -7D11, modem 05.11.07) , all PIN code protected which means the vulnerability bypasses authentication for various data where people most likely rely on data protection through encryption and do not expect that authentication is not in place.
(Excerpt) Read more at zdnet.com ...
Pretty major security hole, especially for any business users who require confidentiality/security.
Ping!
Any Android vulnerabilities?
Man this has to stop. If this keeps up Apple may be seen as not secure.
We can’t have that now can we. Maybe if they were a little less successful in sales then this exploit wouldn’t have been made widely known. You know like the Mac security.
bump
What's so secret about that?
What's so secret about that?
Nothing now - you've outed that info yourself, so you're no longer a target of porn-blackmailing hackers!
And remind me to NEVER handle your iPhone!
Unless, of course, I'm wearing the new iPhone 4 accessory:
So someone would have to steal my phone and then physically connect it to a computer running a specific version of Ubuntu Linux.....OK, is that a security hole? Yes. Will it affect anyone? 99.999% chance that it will affect absolutely no one. Moving on.
I know there are many, but in this case, when you lock your Android (or WinMo, or BB, or Symbian) phone it doesn't automount as a device when you plug it into a computer.
For some reason I find mixing discussion of porn and that picture troubling.
Can't be. I've been told by many on FR that iOS and OSX are invulnerable because they're designed and written differently. They cannot be hacked or infected.
And I guess, in this case, they're right. No software or hacking needed, unless you count the act of physically plugging a USB cable into a computer a hack...;)
About a year ago, a buddy asked me if the iphone could get viruses like a home computer can.
Well, if you can, I'm sure I will, the sites I go to...
Physical access required. For an iPhone user this could be useful. For someone that loses their phone, bad.
So that is why I have to manually mount the drive when I plug in the phone. I always considered it a PIA, apparently there was a reason after all.
Leave your iPhone at your desk when you run to the bathroom. I walk over, plug it into my laptop (dual-boot with Ubuntu), take 30 seconds to copy the entire contents, then leave.
I now have ever bit of data you have on your phone. Didn’t have to do anything except plug a cable in. Instant access to everything, and I just drag-and-drop to my hard disk.
So, unless you trust everyone around with every bit of information you may keep on your phone, you should never leave your iPhone laying around. Ever. Not at the office, not at a friend’s party, not even in your hotel room when you go down to take a swim.
A cable and a few seconds. That’s all it takes to copy all your data. So much for a PIN protecting you!
Or even leaves the phone unattended for 2-3 minutes at a business meeting...
Fair enough. It doesn’t bother me because I don’t keep anything important on my phone and I rarely leave it laying anywhere. I don’t work in a traditional office setting so I don’t have to worry about my co-workers. 98% of the time my iphone is in my pocket if I’m not using it. Plus, if I found out a co-worker was fingering my things my fist would have a discussion with their face.
I have been to a few meetings where personal phones had to be surrendered before entry into the room was allowed. That would be a good time to “gather” the competitors data. Just a little in-house espionage.
Physical access required. For an iPhone user this could be useful. For someone that loses their phone, bad.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.