Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Ubuntu Lucid Lynx 10.04 can read your iPhone's secrets
ZDNet ^ | May 27, 2010 | Adrian Kingsley-Hughes

Posted on 06/25/2010 12:17:10 PM PDT by PugetSoundSoldier

Do you have a PIN code on your iPhone? Well, while that might protect you from someone making a call or fiddling with your apps, it doesn’t prevent access to your data … as long as the person doing the snooping around is using Ubuntu “Lucid Lynx” 10.04.

Security experts Bernd Marienfeldt and Jim Herbeck discovered something really interesting when they hooked up a non-jailbroken, fully up-to-date iPhone 3GS to a PC running Lucid Lynx …

I uncovered a data protection vulnerability [9], which I could reproduce on 3 other non jail broken 3GS iPhones (MC 131B, MC132B) with different iPhone OS versions installed (3.1.3-7E18 modem firmware 05.12.01 and version 3.1.2 -7D11, modem 05.11.07) , all PIN code protected which means the vulnerability bypasses authentication for various data where people most likely rely on data protection through encryption and do not expect that authentication is not in place.

(Excerpt) Read more at zdnet.com ...


TOPICS: Business/Economy; Computers/Internet; Music/Entertainment
KEYWORDS: apple; fail; ilovebillgates; iphone; iwanthim; iwanthimbad; microsoftfanboys; secure
Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160 ... 221-229 next last
To: ~Kim4VRWC's~; 1234; 50mm; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; ...
Month old article claims Linux distribution can read iPhone files despite setting PIN—PING!

I suggest reading the article and ignoring the TROLLS.

DO NOT RESPOND TO ANY TROLLISH BEHAVIOR IN THE THREAD. THERE IS A LOT OF IT ALREADY.

You will recognize the names of the trolls

Give them wide berth, and let them have their fun talking among themselves.


Apple iPhone Ping!

If you want on or off the Mac Ping List, Freepmail me.

121 posted on 06/27/2010 3:23:35 AM PDT by Swordmaker (Remember, the proper pronunciation of IE is AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker; All

‘DO NOT RESPOND TO ANY TROLLISH BEHAVIOR IN THE THREAD. THERE IS A LOT OF IT ALREADY.”

Don’t forget your holy water, garlic, cross and rosary. A wooden stake might be handy too.


122 posted on 06/27/2010 5:10:00 AM PDT by driftdiver (I could eat it raw, but why do that when I have a fire.)
[ Post Reply | Private Reply | To 121 | View Replies]

To: zeugma

If you’re ignoring me why do you keep responding?


123 posted on 06/27/2010 6:03:29 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 115 | View Replies]

To: Swordmaker

I have the proof...show me where you CAN do that...the mere fact that you can’t is proof enough.

I know I’ve tried it on my windows mobile 6.5 and I can’t get in.

So if you’re claiming you can, let’s see the proof. Otherwise you’re just spreading FUD.


124 posted on 06/27/2010 6:09:46 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 119 | View Replies]

To: PugetSoundSoldier; zeugma
Yo Puget, when you copy a FReeper's material and knock it, you're supposed to *ping* that FReeper to the fact you're referencing his comment. That's courtesy.

In this case, it was my comment, and I happened to find this, so let me ease your mind a bit.

I wasn't "attacking" you, I was offering some advice to improve how you might state your position. Let's see...

>> Of course, you hate Apple with an unbridled passion, so it shouldn't surprise me that you take every opportunity to poke at OS-X with a stick, even when it makes you look stupid to do so.

> NOTE: I did not say one derogatory statement about OSX in that entire thread. But right there, the attacks start out.

That was not an attack. I merely said that comparing Win7's rate of sales to OS-X's rate of sales -- in raw number of copies sold -- was inappropriate, and actually weakened your argument. I was offering advice, "Pssstt, don't say that, it makes you look foolish. Say it in a way that works better for you."

>> It's NT6.1. Microsoft is gonna have to throw out the ancient, creaky NT codebase before they can write something that I'd call "slick" from a technical point of view... I gotta ask you, though. Do you write marketing copy for Microsoft? I'm not saying you're a MSFT shill -- I'm just saying you sound like one sometimes

> Again, nothing stated derogatory against any person or anything Apple, but here I'm a shill and the OS is ancient and creaky.

Ummm, Puget, the NT codebase under Win7 *IS* ancient and creaky. It was written in 1992-94. Now, that's not necessarily bad per se (e.g. the design BSD Unix is pretty old too), except that the design of BSD Unix is acknowledged to be very robust, whereas -everybody- admits that the design of NT3.1/3.5/4.0 was extremely weak. Patching a flawed design is not as good as having a solid design from early-on. Microsoft knows this -- that's why they intend to drop the NT codebase as soon as possible. Or didn't you know that?

And I did NOT call you a shill. I merely offered the advice that you tone down a bit of the sales-talk vocabulary because you were sounding like a fanboy. I am sure you want to avoid that, so I passed along a hint.

Personally, if you had written the comments I wrote, directed at me, I would take them as advice, not attacks.

Anyway, sorry you got your feelings hurt. That wasn't the intent.

125 posted on 06/27/2010 7:12:08 AM PDT by dayglored (Listen, strange women lying in ponds distributing swords is no basis for a system of government!)
[ Post Reply | Private Reply | To 118 | View Replies]

To: Swordmaker
Thanks Swordmaker, for the
Image Hosted by ImageShack.us !

126 posted on 06/27/2010 7:46:09 AM PDT by vox_freedom (America is being tested as never before in its history. May God help us.)
[ Post Reply | Private Reply | To 121 | View Replies]

To: Swordmaker

Thanks Swordmaker!


127 posted on 06/27/2010 7:54:22 AM PDT by SunkenCiv ("Fools learn from experience. I prefer to learn from the experience of others." -- Otto von Bismarck)
[ Post Reply | Private Reply | To 121 | View Replies]

To: brent13a
So someone would have to steal my phone and then physically connect it to a computer running a specific version of Ubuntu Linux.....OK, is that a security hole? Yes. Will it affect anyone? 99.999% chance that it will affect absolutely no one. Moving on.

It's unlikely to come up accidentally, but if someone steals your phone with the intention of stealing your information, they have a fairly easy way of doing so. It's the computer equivalent of a car lock -- it'll stop an opportunistic thief, but not a determined one.

128 posted on 06/27/2010 8:25:22 AM PDT by ReignOfError
[ Post Reply | Private Reply | To 8 | View Replies]

To: Swordmaker
I know there are many, but in this case, when you lock your Android (or WinMo, or BB, or Symbian) phone it doesn't automount as a device when you plug it into a computer.

Proof?

Does that somehow invalidate the security hole in iPhone? Is the article in error?

129 posted on 06/27/2010 8:27:14 AM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 119 | View Replies]

To: Swordmaker
30 seconds to copy 16GB? I don't think so.

I see you pulled the usual Swordmaker trick of putting words in my mouth to suddenly qualify my statement so that you can try to prove your point; I never said what size iPhone, now did I?

But let's just take a look anyway... With a transfer rate of 480 Mbps, you could copy 8 GB in about 20 seconds, and 16 GB in about 40 seconds.

I know I've seen close to that sustained rate with Ubuntu and Win 7; is the iPhone too slow to allow those kinds of transfer rates?

130 posted on 06/27/2010 8:34:56 AM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 120 | View Replies]

To: dayglored; zeugma

Dayglored,

Your comments really didn’t bother me, one way or another. It’s just that recently zeugma’s taken to constant charges of “evil Mac Trolls start everything!” and given his post was literally just 4-5 after your own charges of hatred and being like a shill, well...

I have nothing personally against you; it’s guys like zeugma and Swordmaker who apparently have some sort of holy crusade for Mac that bother me. Take Swordmaker’s bull-like entry into this thread, immediately charging “well can you prove the other phones don’t have this problem, too?” Never mind it’s about iPhones, and PROVEN to be an issue...


131 posted on 06/27/2010 8:42:21 AM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 125 | View Replies]

To: for-q-clinton

If someone gets physical access to your machine they can also reset via jumpers or simply pulling the battery for 5 minutes. BIOS passwords should *never* be the sole means of security.


132 posted on 06/27/2010 8:45:28 AM PDT by Fire_on_High (Trijicon, the scope of CRUSADERS!!)
[ Post Reply | Private Reply | To 52 | View Replies]

To: PugetSoundSoldier
Leave your iPhone at your desk when you run to the bathroom. I walk over, plug it into my laptop (dual-boot with Ubuntu), take 30 seconds to copy the entire contents, then leave

Leave the key in your Ferrari, run into Starbucks for ?????, come back and the car is gone. Who knew that could happen.

133 posted on 06/27/2010 8:47:46 AM PDT by itsahoot (Each generation takes to excess, what the previous generation accepted in moderation.)
[ Post Reply | Private Reply | To 15 | View Replies]

To: PugetSoundSoldier
Oh, same with me! But with more and more people doing lots of e-mail and SMS messaging on their iPhones - and many of those people using them for business - suddenly you can have a LOT of confidential information floating around on a phone that everyone thought was secure.

You are worried about some individual getting access to eMail, when the government already has access to all you communication, text and Mail and Location, guess what they don't need a warrant. Now don't you feel all better.

134 posted on 06/27/2010 8:50:40 AM PDT by itsahoot (Each generation takes to excess, what the previous generation accepted in moderation.)
[ Post Reply | Private Reply | To 22 | View Replies]

To: itsahoot
Leave your iPhone at your desk when you run to the bathroom.

Leave the key in your Ferrari, run into Starbucks for ?????, come back and the car is gone. Who knew that could happen.

So at the office, you take your phone with you to the bathroom every time? Take your laptop as well?

135 posted on 06/27/2010 8:58:50 AM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 133 | View Replies]

To: PugetSoundSoldier
Does that somehow invalidate the security hole in iPhone? Is the article in error?

The article is not in error, it is just not useful, unless you plan giving you iPhone to a hacker that uses Ubuntu. Even a metal Safe is not safe if you let some one have it. Why not worry about all the banks vaults that may be vulnerable.

Disclaimer: Bad example since the Government has assumed many unknown rights concerning your money in banks.

136 posted on 06/27/2010 9:01:45 AM PDT by itsahoot (Each generation takes to excess, what the previous generation accepted in moderation.)
[ Post Reply | Private Reply | To 129 | View Replies]

To: PugetSoundSoldier
But let's just take a look anyway... With a transfer rate of 480 Mbps, you could copy 8 GB in about 20 seconds, and 16 GB in about 40 seconds.

Never used an IPhone huh? Theoretical and real are two different things.

137 posted on 06/27/2010 9:03:28 AM PDT by itsahoot (Each generation takes to excess, what the previous generation accepted in moderation.)
[ Post Reply | Private Reply | To 130 | View Replies]

To: itsahoot
You are worried about some individual getting access to eMail, when the government already has access to all you communication, text and Mail and Location, guess what they don't need a warrant. Now don't you feel all better.

Then why have any security features at all? If your problem is that the Government can do it, so everyone else can do it, then why even run security features? Why not just leave your phone always unlocked and everything in plain text?

The Government also can enter your home, search it, and leave without your approval or even notifying you; thus using your logic I recommend you leave your house unlocked and the front door open.

138 posted on 06/27/2010 9:05:01 AM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 134 | View Replies]

To: itsahoot
Never used an IPhone huh? Theoretical and real are two different things.

Not recently, no... What kinds of USB transfer rates does the iPhone support when you mount it as a file device? Ever tried that? Not through iTunes, but direct to Ubuntu...

I know with my HTC WinMo phone I can transfer 200 MB of data in just over a second to my Ubuntu install; extrapolating, that's about 40 seconds for a full 8 GB.

Is the iPhone noticeably slower than that? Or is your caution based on an assumption, since you may not have tested this particular access mode?

139 posted on 06/27/2010 9:15:11 AM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 137 | View Replies]

To: itsahoot
The article is not in error, it is just not useful, unless you plan giving you iPhone to a hacker that uses Ubuntu

Rather, it is not useful to you; do you work in an environment with a mix of OSes, like many of our IT brethren here?

If you're a traveling worker (such as I am, a self-employed technical consultant) who spends lots of time at your various client's offices, are you 100% certain that no one there has an Ubuntu install and would not be interested in the contents of your phone?

Just because a security hole does not apply to your specific situation does not mean it is a non-issue to everyone else.

140 posted on 06/27/2010 9:19:10 AM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 136 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 101-120121-140141-160 ... 221-229 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson