Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Most interesting. The PIN does lock your phone, unless you happen to plug it in to a computer running the latest release of Ubuntu. Then it's just wide-open, for you to copy all the data off as you desire, and crunch through it later.

Pretty major security hole, especially for any business users who require confidentiality/security.

1 posted on 06/25/2010 12:17:16 PM PDT by PugetSoundSoldier
[ Post Reply | Private Reply | View Replies ]


To: for-q-clinton; driftdiver

Ping!


2 posted on 06/25/2010 12:17:54 PM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier

Any Android vulnerabilities?


3 posted on 06/25/2010 12:25:14 PM PDT by P8riot (I carry a gun because I can't carry a cop.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier

Man this has to stop. If this keeps up Apple may be seen as not secure.

We can’t have that now can we. Maybe if they were a little less successful in sales then this exploit wouldn’t have been made widely known. You know like the Mac security.


4 posted on 06/25/2010 12:28:23 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier

bump


5 posted on 06/25/2010 12:34:13 PM PDT by dangerdoc
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier
Uh... yeah. I look at porn most of the day on my iphone. I've got a lot of the sites listed under fake names in my Favorites>Blogs folder.

What's so secret about that?

6 posted on 06/25/2010 12:43:54 PM PDT by End Times Sentinel (In Memory of my Dear Friend Henry Lee II)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier

So someone would have to steal my phone and then physically connect it to a computer running a specific version of Ubuntu Linux.....OK, is that a security hole? Yes. Will it affect anyone? 99.999% chance that it will affect absolutely no one. Moving on.


8 posted on 06/25/2010 12:48:29 PM PDT by brent13a (You're a Great American! NO you're a Great American! NO NO NO YOU'RE a Great American! Nooo.....WTF?)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier

Physical access required. For an iPhone user this could be useful. For someone that loses their phone, bad.


13 posted on 06/25/2010 12:51:49 PM PDT by AFreeBird
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier

Physical access required. For an iPhone user this could be useful. For someone that loses their phone, bad.


20 posted on 06/25/2010 1:03:41 PM PDT by AFreeBird
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier

what does jail-broken mean exactly..?


21 posted on 06/25/2010 1:04:34 PM PDT by rahbert (Our enemy has yet to reveal himself...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier

If you give physical access to nearly ANY computer, it can be hacked.


28 posted on 06/25/2010 1:38:38 PM PDT by rlmorel (We are traveling "The Road to Serfdom".)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce

tech ping please


35 posted on 06/25/2010 2:04:16 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier

It just occurred to me, if you can just plug it in and read, you could just as easily write. Is the iPhone acting as a dumb drive? Could someone replace critical files with modified versions giving them live access any time they wanted?


36 posted on 06/25/2010 2:04:53 PM PDT by dangerdoc
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ShadowAce
Security experts Bernd Marienfeldt and Jim Herbeck discovered something really interesting when they hooked up a non-jailbroken, fully up-to-date iPhone 3GS to a PC running Lucid Lynx …

ping

41 posted on 06/25/2010 2:16:46 PM PDT by GOPJ (http://www.portpublishing.com/Computer%20Based/retaildetailgmsea.htm)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier; rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; ...

43 posted on 06/25/2010 2:25:57 PM PDT by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier
So, are you saying then, that a windows (or Linux, or OSX computer for that matter) has a security hole if you can boot off a CD and access the data from the hard disk?

Everyone involved in computer security knows that once someone has physical access, unless all data on the device is fully encrypted, that it is vulnerable. I'm sorry, but this particular "vulnerability" is fairly lame.

47 posted on 06/25/2010 4:13:03 PM PDT by zeugma (Ad Majorem Dei Gloriam)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier

cj ping


84 posted on 06/26/2010 8:24:46 AM PDT by LearnsFromMistakes (Yes, I am happy to see you. But that IS a gun in my pocket.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier
Pretty major security hole, especially for any business users who require confidentiality/security.

Yes, is. Any business that handles confidential information like credit card numbers, ss numbers, bank account numbers, or medical information should be concerned about this. If the company deals in and uses that kind of information there's a good change some of it is going to be included in or attached to emails. If they've got an iPhone and sych it with their company email system then that information can be had by anyone who can get their hands on that phone for just a few minutes, and there's no audit trail that records the fact the data was accessed.

Biggle podslurping.

87 posted on 06/26/2010 9:10:28 AM PDT by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ~Kim4VRWC's~; 1234; 50mm; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; ...
Month old article claims Linux distribution can read iPhone files despite setting PIN—PING!

I suggest reading the article and ignoring the TROLLS.

DO NOT RESPOND TO ANY TROLLISH BEHAVIOR IN THE THREAD. THERE IS A LOT OF IT ALREADY.

You will recognize the names of the trolls

Give them wide berth, and let them have their fun talking among themselves.


Apple iPhone Ping!

If you want on or off the Mac Ping List, Freepmail me.

121 posted on 06/27/2010 3:23:35 AM PDT by Swordmaker (Remember, the proper pronunciation of IE is AAAAIIIIIEEEEEEE!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: PugetSoundSoldier

bkmrk for later


222 posted on 06/28/2010 4:40:06 PM PDT by CAluvdubya (WASS!)
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson