Free Republic
Browse · Search
General/Chat
Topics · Post Article

An attacker could assault an Apple iOS device using Siri to make a phone call or send a text message, but it will not allow the attacker to open a website or download any malicious apps, transfer bank account information, or even open the iPhone or iPad to access any private data.

This is also a "local" exploit, requiring the hacker to be close to the target device. It is also a general attack that cannot single out specific user's device from among all others in the area unless the device is isolated. If the attackers is close enough to attack the device, he's already close enough to eavesdrop on any conversation the target may be engaged in having. In addition, texting using this technique would require zero ambient background conversation to override the intended text. In other words, this sounds like a neat, but extremely impractical, trick hack to accomplish anything malicious.

14 posted on 09/07/2017 12:31:57 PM PDT by Swordmaker (!This tag line is a Microsoft insult free zone... bet if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 12 | View Replies ]


To: Swordmaker
a neat, but extremely impractical, trick hack to accomplish anything malicious.
My question is why anyone would digitize voice microphone data in such a way as to be sensitive to ultrasound?

Even if they want to use a microphone which happens to be sensitive to those frequencies, they need to low pass filter the output as a first step to getting good-quality digital data. If they don’t do it analog - which in this day and age might not be cheap in context - it is trivial to do it digitally. This should never be a problem.


15 posted on 09/07/2017 12:49:35 PM PDT by conservatism_IS_compassion (Presses can be 'associated,' or presses can be independent. Demand independent presses.)
[ Post Reply | Private Reply | To 14 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson