You have downloaded this file 0 times in the last 24 hours, limit is 5.
Your file downloads total 0 in the last 24 hours, limit is 5.

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices
Download

Description:

Forensic scientist and author Jonathan Zdziarski has posted the slides (PDF) from his talk at the Hackers On Planet Earth (HOPE/X) conference in New York called Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices.
In his talk, Zdziarski demonstrates "a number of undocumented high-value forensic services running on every iOS device" and "suspicious design omissions in iOS that make collection easier." He also provides examples of forensic artifacts acquired that "should never come off the device" without user consent.

According to one slide the iPhone is "reasonably secure" to a typical attacker and the iPhone 5 and iOS 7 are more secure from everybody except Apple and the government.

Submitted By:
Peter Jahn (peter)
Submitted On:
22 Jul 2014
File Size:
2,040.51 Kb
Downloads:
26
File Version:
1
Log in to cast your vote
Be the first to comment! Please sign in or register.
Diese Seite verwendet Cookies. Für eine uneingeschränkte Nutzung der Webseite werden Cookies benötigt. Sie stimmen der Verwendung von Cookies durch Anklicken von "OK" zu. Nähere Informationen finden Sie in unseren Datenschutzbestimmungen und unter dem folgenden Link "Weitere Informationen".