Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Apple's iPhone Gets Hacked (NSA Ex-Employee Offers To Sell Apple A Fix- What's Wrong With That?)
CBS-TheSkinny ^ | July 23, 2007 | Keach Hagey

Posted on 07/23/2007 9:04:40 AM PDT by fight_truth_decay

The Skinny: Team Of Computer Security Consultants Says They Can Take Control of Your iPhone

It didn't take long. The iPhone has been hacked, according to the New York Times. A team of computer security consultants said they could take control of a person's iPhone through a WiFi connection or by tricking users into going to a Web site that contains malicious code.

Although Apple built considerable security measures into the device, according to Charles Miller, the main analyst for the firm, "Once you did manage to find the hole, you were in complete control."

So far, there's no evidence that the flaw has been exploited, and the firm generously offered to sell Apple a plug-in to fix the leak. Which would ease our worries completely, except Miller is described as "a former employee of the National Security Agency," and we all know how hesitant that agency has been to spy on American citizens.


TOPICS: Business/Economy; Crime/Corruption; Extended News; News/Current Events
KEYWORDS: cbs; charlesmiller; chat; duplicate; iphone; mediabias; nytimes; security
Navigation: use the links below to view more comments.
first 1-2021-4041-42 next last
"..except Miller is described as "a former employee of the National Security Agency," and we all know how hesitant that agency has been to spy on American citizens"-Keach Hagey, CBS, The Skinny.

Miller from the firm, Independent Security Evaluators, holds a doctorate in computer science. Miller recently demonstrated the hack to a reporter by using his iPhone’s Web browser to visit a Web site of his own design. The site injected a bit of code into the iPhone that then took over the phone. The phone was said to promptly follow instructions to transmit a set of files to the attacking computer that included recent text messages — including one that had been sent to the reporter’s cellphone moments before — as well as telephone contacts and e-mail addresses. Miller says he has "generously offered to sell Apple a fix". Wired.Com (Video of Hack in Action)

CBS hack, "what's his name", take on the top news found no need to further include Miller's academic/bio credentials, only the fact Miller "was a former employee of the NSA", belonging to "the firm" and a "spy on Americans" crack comment.

However, many software companies has suggested an "offer to patch" is an attempt at blackmail. But is it? Isn't Miller's team entitled to "sell" this patch? Legitimate company offering a service, security being the "game"? If one vendor refuses to buy, then another vendor, perhaps a reported competitior of the iPhone -Nokia, Qualcomm- with similar patents as the iPhone may pay to talk with Miller?

More details on the vulnerability can be found at exploitingiphone.com (which currently still redirects to another site, but should be live later today), writes Wired. Independent Security Evaluators plan to demonstrate at the upcoming BlackHat conference on Aug. 2nd.

In the past companies have refrained from purchasing the information themselves, discouraging a pattern of extortion.

A black market has long existed for trading information about vulnerabilities in software from Microsoft Corp., Cisco Systems Inc. and other vendors of products crucial to running computers and sending data over the Internet.

Experts (?)say... government agencies have been buying such knowledge --"not to warn the public but potentially to break into computers for national security or criminal investigations". Named again was, Charlie Miller, "a former National Security Agency employee", one agency who Miller wouldn't name, paid him $50,000 in September. (FederalNewsRadio, July 21, 2007)

Researchers historically have shared knowledge for free, "there's been a market that has naturally evolved where this information is power," said Ken Durham, director of the rapid response team with VeriSign-iDefense. "Our concern is people would start to turn to the dark side(Hollywood drool material) unless they had a responsible avenue."

Has this Computer Science PhD, Miller, and "the firm" hit the big time with a security issue discovery in iPhone?

1 posted on 07/23/2007 9:04:46 AM PDT by fight_truth_decay
[ Post Reply | Private Reply | View Replies]

To: fight_truth_decay

YAWN

I’ll never own one.


2 posted on 07/23/2007 9:07:36 AM PDT by bicyclerepair (Ft. Lauderdale, Florida)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

ISE’s mission is to provide the outside technical resources companies need to control their technology risk. The experts at ISE have vast experience in every facet of security. The team includes computer scientists, electrical engineers, and cryptographers. ISE experts have testified before Congress, served as expert witnesses, participated in creating standards, and evaluated systems for both government and private industry.

ISE researchers have published several influential books and dozens of scientific papers in the top refereed conferences and journals. They have also analyzed and helped repair several widely used commercial systems. ISE was formed to offer this expertise to the private sector. -http://securityevaluators.com/


3 posted on 07/23/2007 9:14:49 AM PDT by fight_truth_decay (John Edwards -- " War on Terror : A Bumper Sticker")
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

ISE’s mission is to provide the outside technical resources companies need to control their technology risk. The experts at ISE have vast experience in every facet of security. The team includes computer scientists, electrical engineers, and cryptographers. ISE experts have testified before Congress, served as expert witnesses, participated in creating standards, and evaluated systems for both government and private industry.

ISE researchers have published several influential books and dozens of scientific papers in the top refereed conferences and journals. They have also analyzed and helped repair several widely used commercial systems. ISE was formed to offer this expertise to the private sector. -http://securityevaluators.com/


4 posted on 07/23/2007 9:14:52 AM PDT by fight_truth_decay (John Edwards -- " War on Terror : A Bumper Sticker")
[ Post Reply | Private Reply | To 1 | View Replies]

To: bicyclerepair
I’ll never own one

I will or one like, in time.

5 posted on 07/23/2007 9:16:10 AM PDT by fight_truth_decay (John Edwards -- " War on Terror : A Bumper Sticker")
[ Post Reply | Private Reply | To 2 | View Replies]

To: fight_truth_decay

Have any FReepers purchased an iPhone?

If so, what has been your experience?

Thanks,
Kelly


6 posted on 07/23/2007 9:17:31 AM PDT by kellynla (Freedom of speech makes it easier to spot the idiots! Semper Fi!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: fight_truth_decay
However, many software companies has suggested an "offer to patch" is an attempt at blackmail. But is it?

It's more like extortion.

If one vendor refuses to buy, then another vendor, perhaps a reported competitior of the iPhone -Nokia, Qualcomm- with similar patents as the iPhone may pay to talk with Miller?

I'll speculate that the purported vulnerability is unique to the iPhone, and does not involve any patented technology. More likely, it's a flaw in JavaScript in the Safari browser.

7 posted on 07/23/2007 9:20:17 AM PDT by HAL9000
[ Post Reply | Private Reply | To 1 | View Replies]

To: bicyclerepair
I like gadgets but I’ll never own one. Didn’t own a cell phone for a long time. Music and an MP3 player make sense.

But watching movies or surfing the net using a tiny little screen won’t cut it for me.

Where is the latest glasses projection technology? Put a video port on the device and design some glasses that can project the image.

If cost is right, there will be a demand for this type of projection system.

8 posted on 07/23/2007 9:22:59 AM PDT by dhs12345
[ Post Reply | Private Reply | To 2 | View Replies]

To: fight_truth_decay

When communications are critical, don't hook up to a network or you'll get hacked... that's all there is to it.

Would I ever own an iPhone......?

Now where's that old analog popcorn maker of mine?

9 posted on 07/23/2007 9:30:12 AM PDT by MarineBrat (My wife and I took an AIDS vaccination that the Church offers.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: fight_truth_decay
However, many software companies has suggested an "offer to patch" is an attempt at blackmail.

No more blackmail than an offer to fix a flat tire for a fee.

10 posted on 07/23/2007 9:30:44 AM PDT by glorgau
[ Post Reply | Private Reply | To 1 | View Replies]

To: bicyclerepair
I’ll never own one.

I'd consider it on the T-Mobile network, but otherwise, not leaving them. T-Mobile@Home is getting me to cut the tether for the landline, a simple bluetooth box allows me to link up to my cell line from any of the phones in my home, and my cost vs savings horizon for adding this, buying equipment, etc, is two months.

11 posted on 07/23/2007 9:33:44 AM PDT by kingu (No, I don't use sarcasm tags - it confuses people.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: HAL9000
It's more like extortion

Why extortion..an offer to purchase..capitalism at its' "secure" best. Last time I looked iPhone and other soft ware companies are not listed as "charities". They get the big bucks, why shouldn't the 'start up companies' that offer a product needed. Little companies become purchased all the time. Look at the success of google and where they started, Youtube...

Actually there are patents held by Qualcomm, Nokia etc which news of moved their stocks when the iPhone news broke. They were the cutting edge competitors in the lead. Only have to check back in the Business/Stocks section during their stocks aforementioned run time. I also read this story as not just about the iPhone, but about the media to highlight this piece with the Ex-NSA/spy On Americans reference! Legit company, credentials and they can't sell a product? All open and up front.

12 posted on 07/23/2007 9:34:43 AM PDT by fight_truth_decay (John Edwards -- " War on Terror : A Bumper Sticker")
[ Post Reply | Private Reply | To 7 | View Replies]

To: MarineBrat
Would you believe, the portable "Cone of Silence"?

Never been hacked, Chief.

13 posted on 07/23/2007 9:35:26 AM PDT by BallyBill (Serial Hit-N-Run poster)
[ Post Reply | Private Reply | To 9 | View Replies]

To: fight_truth_decay
Apple fell into the same flaw that Microsoft did. Too many fingers in the kettle. Had they outsourced the browser to another company, they would never have dreamed of making as many connections between it and the browser on the kernel level as they did.

Since they disregarded what the courts have said, countless times, to OS providers, they’ve got an embarrassing problem on their hands, and a tight concentration of very public targets for hackers to exploit the flaw.

Make your OS, make it as swift as possible, and let everyone else make the programs to run atop it, or it’ll backfire in your face every time.

14 posted on 07/23/2007 9:37:51 AM PDT by kingu (No, I don't use sarcasm tags - it confuses people.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: fight_truth_decay

Guys like Miller are like the countless villains depicted on Steven Seagal and Bruce Willis movies — who hijack the nuclear weapon and offer not to blow up New York City/Hollywood if their “modest demands” are met.

So how are they different from other terrorists — who think they should be rewarded handsomely for not undermining and destroying safety and security for everyone else?

Only in America, instead of getting 40 virgins in paradise, they can get 40 lap dancers at Club Paradise.

Meanwhile, the mainstream media and ACLU is justifying that ensuring their freedom expression and right to assert themselves, protects everybody else’s civil rights — which they will recognize after they’ve been killed.


15 posted on 07/23/2007 9:41:56 AM PDT by MikeHu
[ Post Reply | Private Reply | To 1 | View Replies]

To: kingu
Apple fell into the same flaw that Microsoft did. Too many fingers in the kettle. Had they outsourced the browser to another company, they would never have dreamed of making as many connections between it and the browser on the kernel level as they did.

Safari is just an application. Safari is not a part of the kernel, nor is the kernel part of Safari. Because Safari is not kernel-dependent, it is available on multiple platforms - Mac OS X, Windows and iPhone.

16 posted on 07/23/2007 9:55:59 AM PDT by HAL9000
[ Post Reply | Private Reply | To 14 | View Replies]

To: kingu

One other note - the Safari browser is based on open-source technology that was originally developed for Linux.


17 posted on 07/23/2007 10:00:31 AM PDT by HAL9000
[ Post Reply | Private Reply | To 14 | View Replies]

To: MikeHu

That analogy doesn’t hold. Hijacking a nuclear weapon is illegal before you offer to blow it up. The reality here is that Apple made a mistake. This guy merely discovered it. He didn’t ‘make’ anything. It’s there. And if he can find it, so can someone else. He’s not the one threating to blow anything up or steal someone’s iPhone. He’s saying “if you don’t fix this, someone will do that.”. If Apple wants to be stubborn about it, let them. We’ll see how that holds up when the torrent of iPhone viruses hits.


18 posted on 07/23/2007 10:14:22 AM PDT by jack_napier
[ Post Reply | Private Reply | To 15 | View Replies]

To: kellynla

My husband purchased one. He travels a lot for his job and wanted a device that would allow him internet access with phone and day planning capabilities. He was going to buy a laptop until he heard about he IPhone. He feels it gives him all of what he needed a laptop to do for him and he loved the fact that it would fit into his pocket. He absolutely loves the device!

He has used it on business trips to browse websites and make stock transactions, listen to his favorite music, keep track of his appointments, email, text message and make calls.

The only downside for us is that it is ATT service. However, the service has been fine for the 2 weeks we’ve used it. We have about 18 months left on a family plan with Sprint, so he still has a Sprint phone if he needs it.


19 posted on 07/23/2007 10:47:43 AM PDT by Warriormom
[ Post Reply | Private Reply | To 6 | View Replies]

To: fight_truth_decay
Not possible. Macs cannot be hacked. Nope. Ridiculous. Never happened. . . .
20 posted on 07/23/2007 10:51:53 AM PDT by Born to Conserve
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-42 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson