Hacker Read top | best | new | newcomments | leaders | about | bookmarklet login
Apple iPhones allow extraction of deep personal data, researcher finds (www.reuters.com) similar stories update story
23.0 points by testrun | karma 4196 | avg karma 4.42 2014-07-27 20:50:00+00:00 | hide | past | favorite | 7 comments



view as:

This is ridiculously stupid. You need to (a) have your device unlocked, (b) connected to a computer you don't know and (c) have clicked the 'Trust This Computer' button.

Of course your deep personal data is going to be exposed if you manage to get through all that.


The article touches on the "backdoors" used to help customers unbrick their phones, which provide access to more information than is really necessary.

>> This is ridiculously stupid

No, it's not. IMHO the problem is not the exact procedure, but the lack of option for the user to properly encrypt their data.


Precise: anyone with access to the computers you have "trusted" to pair with your iPhone, can extract encrypted data from your iPhone because that's what the trusted pairing is intended to do.

There are also "backdoor" systems that Apple Store employees use to unlock your phones, which can be exploited by Law Enforcement to extract text messages, contact lists and photos.

Noting of course that Law Enforcement already has access to numbers you have called and all SMS & MMS messages you have sent by subpoena to the carrier responsible for your service.


>> Noting of course that Law Enforcement already has access to numbers you have called and all SMS & MMS messages you have sent by subpoena to the carrier responsible for your service.

That's a poor excuse. Those calls may have been made in a different country.


Please see HN submission early this week: https://news.ycombinator.com/item?id=8074654

Legal | privacy