Welcome to DU!
The truly grassroots left-of-center political community where regular people, not algorithms, drive the discussions and set the standards.
Join the community:
Create a free account
Support DU (and get rid of ads!):
Become a Star Member
Latest Breaking News
General Discussion
The DU Lounge
All Forums
Issue Forums
Culture Forums
Alliance Forums
Region Forums
Support Forums
Help & Search
Latest Breaking News
In reply to the discussion: Signaling Post-Snowden Era, New iPhone Locks Out N.S.A. [View all]IDemo
(16,926 posts)16. A top iOS security expert questions this -
But as the media and privacy activists congratulated Apple on that new resistance to government snooping, iOS forensics expert Jonathan Zdziarski offered a word of caution for the millions of users clamoring to pre-order the iPhone 6 and upgrade to iOS 8. In many cases, he points out, the cops can still grab and offload sensitive data from your locked iPhone without Apples help, even in iOS 8. All they need, he says, is your powered-on phone and access to a computer youve previously used to move data onto and off of it.
I am quite impressed, Mr. Cook! That took courage, Zdziarski wrote in a blog post. But it does not mean that your data is beyond law enforcements reach.
Just after Apples announcement, Zdziarski confirmed with his own forensics software that he was still able to pull from a device running iOS 8 practically all of its third-party application datathat means sensitive content from Twitter, Facebook, Instagram, web browsers, and moreas well as photos and video. The attack he used impersonates a trusted computer to which a user has previously connected the phone; it takes advantage of the same mechanisms that allow users to siphon data off a device with programs like iTunes and iPhoto without entering the gadgets passcode.
http://www.wired.com/2014/09/apple-iphone-security/
I am quite impressed, Mr. Cook! That took courage, Zdziarski wrote in a blog post. But it does not mean that your data is beyond law enforcements reach.
Just after Apples announcement, Zdziarski confirmed with his own forensics software that he was still able to pull from a device running iOS 8 practically all of its third-party application datathat means sensitive content from Twitter, Facebook, Instagram, web browsers, and moreas well as photos and video. The attack he used impersonates a trusted computer to which a user has previously connected the phone; it takes advantage of the same mechanisms that allow users to siphon data off a device with programs like iTunes and iPhoto without entering the gadgets passcode.
http://www.wired.com/2014/09/apple-iphone-security/
Edit history
Please sign in to view edit histories.
47 replies
= new reply since forum marked as read
Highlight:
NoneDon't highlight anything
5 newestHighlight 5 most recent replies
RecommendedHighlight replies with 5 or more recommendations
Since when is it 'holding yourself beyond the law' to seek privacy when you communicate with someone
Chemisse
Sep 2014
#27
Apologists and security concern trolls always have the option to disable it. I hope people
whereisjustice
Sep 2014
#2
NSA's collection activities are strategic. They won't stop crime or terror attacks.
whereisjustice
Sep 2014
#8
Be Careful, I saw a PBS Special where they indicated that future Quantum Computers...
AZ Progressive
Sep 2014
#9