Find a Question:
Security Researcher explains backdoors exposed in iOS 7
Security Researcher Jonathan Zdziarski claims a number of backdoors in iOS 7 to have found. The back doors can be used to bypass the encryption. Of the OS Apple has not yet responded to the findings.
According to Zdziarski user data is accessible via the so-called file_relay function. For example, get an attacker access to virtually any data on an iPhone or iPad even if they must be encrypted. For example, reading address books to retrieve account information and view. Gps logs It is still unclear whether the file_relay feature even remotely can be used to read or just locally can be applied. Device from Zdziarski also describes pcapd an integrated packet sniffer to intercept network data. Pcap can be activated via wifi remote.
The security researcher claims that the backdoors and undocumented features most likely be put in by Apple. Pressure from the American secret services in iOS The functionality would be useless for debugging and support purposes. Older iOS versions contain some of the backdoors.
Zdziarski claims that Apple violates the privacy of its users by making to circumvent encryption whole and not to inquire if data is tapped by the user. Possible include Backdoors would also provide opportunities for criminals and other malicious, Apple would not comment on the issue, while the company recently claimed that it never worked with government to build. backdoors in its products
Backdoor in iOS 7Viewing:-169
Answer this Question
You must be Logged In to post an Answer.
Not a member yet? Sign Up Now »
Star Points Scale
Earn points for Asking and Answering Questions!