Most interesting. The PIN does lock your phone, unless you happen to plug it in to a computer running the latest release of Ubuntu. Then it's just wide-open, for you to copy all the data off as you desire, and crunch through it later.
Pretty major security hole, especially for any business users who require confidentiality/security.
To: for-q-clinton; driftdiver
2 posted on
06/25/2010 12:17:54 PM PDT by
PugetSoundSoldier
(Indignation over the Sting of Truth is the defense of the indefensible)
To: PugetSoundSoldier
Any Android vulnerabilities?
3 posted on
06/25/2010 12:25:14 PM PDT by
P8riot
(I carry a gun because I can't carry a cop.)
To: PugetSoundSoldier
Man this has to stop. If this keeps up Apple may be seen as not secure.
We can’t have that now can we. Maybe if they were a little less successful in sales then this exploit wouldn’t have been made widely known. You know like the Mac security.
4 posted on
06/25/2010 12:28:23 PM PDT by
for-q-clinton
(If at first you don't succeed keep on sucking until you do succeed)
To: PugetSoundSoldier
5 posted on
06/25/2010 12:34:13 PM PDT by
dangerdoc
To: PugetSoundSoldier
Uh... yeah. I look at porn most of the day on my iphone. I've got a lot of the sites listed under fake names in my Favorites>Blogs folder.
What's so secret about that?
6 posted on
06/25/2010 12:43:54 PM PDT by
End Times Sentinel
(In Memory of my Dear Friend Henry Lee II)
To: PugetSoundSoldier
So someone would have to steal my phone and then physically connect it to a computer running a specific version of Ubuntu Linux.....OK, is that a security hole? Yes. Will it affect anyone? 99.999% chance that it will affect absolutely no one. Moving on.
8 posted on
06/25/2010 12:48:29 PM PDT by
brent13a
(You're a Great American! NO you're a Great American! NO NO NO YOU'RE a Great American! Nooo.....WTF?)
To: PugetSoundSoldier
Physical access required. For an iPhone user this could be useful. For someone that loses their phone, bad.
To: PugetSoundSoldier
Physical access required. For an iPhone user this could be useful. For someone that loses their phone, bad.
To: PugetSoundSoldier
what does jail-broken mean exactly..?
21 posted on
06/25/2010 1:04:34 PM PDT by
rahbert
(Our enemy has yet to reveal himself...)
To: PugetSoundSoldier
If you give physical access to nearly ANY computer, it can be hacked.
28 posted on
06/25/2010 1:38:38 PM PDT by
rlmorel
(We are traveling "The Road to Serfdom".)
To: ShadowAce
35 posted on
06/25/2010 2:04:16 PM PDT by
for-q-clinton
(If at first you don't succeed keep on sucking until you do succeed)
To: PugetSoundSoldier
It just occurred to me, if you can just plug it in and read, you could just as easily write. Is the iPhone acting as a dumb drive? Could someone replace critical files with modified versions giving them live access any time they wanted?
To: ShadowAce
Security experts Bernd Marienfeldt and Jim Herbeck discovered something really interesting when they hooked up a non-jailbroken, fully up-to-date iPhone 3GS to a PC running Lucid Lynx
ping
41 posted on
06/25/2010 2:16:46 PM PDT by
GOPJ
(http://www.portpublishing.com/Computer%20Based/retaildetailgmsea.htm)
To: PugetSoundSoldier; rdb3; Calvinist_Dark_Lord; GodGunsandGuts; CyberCowboy777; Salo; Bobsat; ...
43 posted on
06/25/2010 2:25:57 PM PDT by
ShadowAce
(Linux -- The Ultimate Windows Service Pack)
To: PugetSoundSoldier
So, are you saying then, that a windows (or Linux, or OSX computer for that matter) has a security hole if you can boot off a CD and access the data from the hard disk?
Everyone involved in computer security knows that once someone has physical access, unless all data on the device is fully encrypted, that it is vulnerable. I'm sorry, but this particular "vulnerability" is fairly lame.
47 posted on
06/25/2010 4:13:03 PM PDT by
zeugma
(Ad Majorem Dei Gloriam)
To: PugetSoundSoldier
84 posted on
06/26/2010 8:24:46 AM PDT by
LearnsFromMistakes
(Yes, I am happy to see you. But that IS a gun in my pocket.)
To: PugetSoundSoldier
Pretty major security hole, especially for any business users who require confidentiality/security. Yes, is. Any business that handles confidential information like credit card numbers, ss numbers, bank account numbers, or medical information should be concerned about this. If the company deals in and uses that kind of information there's a good change some of it is going to be included in or attached to emails. If they've got an iPhone and sych it with their company email system then that information can be had by anyone who can get their hands on that phone for just a few minutes, and there's no audit trail that records the fact the data was accessed.
Biggle podslurping.
87 posted on
06/26/2010 9:10:28 AM PDT by
tacticalogic
("Oh bother!" said Pooh, as he chambered his last round.)
To: ~Kim4VRWC's~; 1234; 50mm; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; ...
Month old article claims Linux distribution can read iPhone files despite setting PINPING!
I suggest reading the article and ignoring the TROLLS.
DO NOT RESPOND TO ANY TROLLISH BEHAVIOR IN THE THREAD. THERE IS A LOT OF IT ALREADY.
You will recognize the names of the trolls
Give them wide berth, and let them have their fun talking among themselves.
![](http://files.me.com/swordmaker/kr40gp)
Apple iPhone Ping!
If you want on or off the Mac Ping List, Freepmail me.
121 posted on
06/27/2010 3:23:35 AM PDT by
Swordmaker
(Remember, the proper pronunciation of IE is AAAAIIIIIEEEEEEE!)
To: PugetSoundSoldier
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson