Posted on 03/29/2017 10:33:27 AM PDT by Swordmaker
According to Dan Scavino, White House Director of Social Media, President Trump has now switched from some random unsecured Android phone (possibly a Samsung Galaxy model) to a real Apple iPhone.
Apple iPhones are more secure than Android phones. In fact, earlier this month, it was reported that 36 widely-used Android devices shipped with malware preinstalled. Numerous Samsung Galaxy phones populate that list of malware-infested iPhone knockoffs.
Now, though, the U.S. President’s smartphone offers security and privacy because it’s a real Apple iPhone, not a knockoff wannabe. It’s also from an American company, as opposed to one based in South Korea.
MacDailyNews Take: If it isn’t an iPhone, it isn’t an iPhone.
Anyone who values their security and privacy would be foolish to use any device that fails to sport the Apple logo. MacDailyNews, March 22, 2016
All the rich coastal liberals who swear by the iPhone are going to love this.
Pinging ThunderSleeps for the Android ping list. . .
The latest Apple/Mac/iOS Pings can be found by searching Keyword "ApplePingList" on FreeRepublic's Search.
If you want on or off the Mac Ping List, Freepmail me
/s
Big mistake. He’s going to regret it.
“... listening in on all of Trump’s calls.” Doesn’t everybody? ;-)
Also included in this release is the manual for the CIA's "NightSkies 1.2" a "beacon/loader/implant tool" for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.
While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization's supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
Now tweeting in hi def Retina Display mode.
Most secure choice there is AFAIK.
“Big mistake. Hes going to regret it.”
Why?
First bad mistake he’s made. I tried IPhone for a year. So cumbersome to use. That home button is so annoying. Love my Samsung Galaxy.
New source of leaks coming in 3... 2... 1...
I just happen to be an Android guy because I will NOT pay outrageous money to have an iphone. But I have no problem at all with THE DONALD using one. It seems only right since he’s been working with Apple to have the phones manufactured here.
Only one kind of idiot thinks FR needs the take of Tim Cook’s public relations department LOL!
The Kabuki theater of the iPhone being 'uncrackable' last year was hilarious, especially in light of the Wikileaks Vault 7 release revealing that there is no such security in any sort of personal electronics.
When they inject at the pre-OS level no encryption scheme helps. Even if there's a cute piece of fruit on the cover.
There is not pretending about it. There are millions of malware and exploits in the wild for the Android platform. There essentially zero for the iOS platform. That alone make the iPhone more secure.
The iPhone COMES with built-in 256 bit AES encryption that is essentially unbreakable. The passcode is not stored on the device. Even Samsung's vaunted Knox attempt to do the same was found to keep its passcode in an unencrypted text file in an external library that could be easily found by any hacker. Again, the iPhone is proved more secure.
Apple's iPhones are easily updated in total to fix any vulnerabilities found. Better than 85% of the iOS users are already using the latest OS most secure version. For Android, the fragmentation and intransigence of the carriers and Android makers have resulted in a condition in the Android universe where the vast majority of Android users are NOT even using he latest, most secure versions of the OS, but more importantly some 70% of the installed base cannot even BE upgraded to close the most dire of the vulnerabilities. Again, the iPhone has been shown to be more secure and safer than the Android phones.
The "supply-chain" was not at manufacturing, or anything like you are implying. The devices were diverted just before they were DELIVERED to the person they were targeting and then adulterated. That is a far cry from modifying the devices during manufacturing you want people to infer from your "supply-chain" implication. They were pulling them out of the mailman's bag, the UPS or FedEx truck, or what ever other means they could. . . not getting at the device while it was being made.
The Kabuki theater of the iPhone being 'uncrackable' last year was hilarious, especially in light of the Wikileaks Vault 7 release revealing that there is no such security in any sort of personal electronics.
The Wikileaks #Vault7 was the low comedy routine from the Three Stooges of technology in terms of antiquity. The vulnerabilities and exploits revealed by the documents were from 2008, and applied to an old design of IPhones not used since the iPhone 3GS! The same exploit was revealed by the document dump from the NSA by Edward Snowden in 2013. There was NOT ONE THING DIFFERENT for iPhones in the Wikileaks from what Snowden released. Nothing in those documents would work on any iPhone released since the iPhone 4 came out in September of 2010. Nothing. It would require an entirely new theoretical and philosophical approach to breach the iPhones from the 4 to the 5C, and then another sea change in security was developed for the iPhones from the 5S onward that would require another order of magnitude in thinking in mobile phone cracking to get into them, none of which is even approached by what they were doing or even hinting at doing in the #Vault7 dump. I read it and laughed!
Apple has announced that ALL of the vulnerabilities revealed in those documents had been long ago closed. . . and the ones for the Mac had been closed at least by last year. Even then, they ALL required physical access to the target devices. Not one could be done remotely. Not one.
They cannot inject something into the pre-OS level that can effect the encryption. . . because it still will not effect the passcodes the USER enters that are part of the encryption key. Without the encryption key, they have bupkis. On the modern iPhones, the encryption engine is independent of the OS and is not accessible by the data processor.
Sorry, you don't know what you are talking about. I do.
Uh, there was nothing new or startling in the #Vault7 dump. Edward Snowden released the same information back in 2013. That exploit would only work on iPhones up to the 3Gs and has been closed since September of 2010. It won't work on any iPhone since the iPhone 4. . . and the iPhones' security model has been radically changed with the iPhone 5S model onward which does not permit such an attack. Sorry. Nice try.
Modern iPhones have four, inter-registered ICs that if modified in any way, will block the booting of the iPhone. That includes inserting non-authorized code. Remove or modify any one and the registration has to be re-newed by Apple in each of the four specific ICs so that they will work together again. This is what was giving rise the "Error 53" issues with people who had replaced the screen with a non-Apple version that did not have an Apple TouchID button. . . or just disconnected the Apple one.
The Samsung flagship phones cost MORE on introduction than the equivalent iPhones. The new Samsung S8, the smaller one, costs $749 with locked service to a carrier. An unlocked iPhone 7 is just $649.
Coutndown until the trolls label @RealDonaldTrump a homosexual...
Beacon’s hole was plugged several years ago... nice try.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.