Anonymous ID: a65fd9 Jan. 13, 2020, 8:59 p.m. No.7807420   🗄️.is 🔗kun   >>7560 >>7585

>>7807319 (pb)

 

Well its not… there are numerous articles talking about back doors in applications and every layer of the OSI model. You can look up many applications , for example candy crush or angry birds , fakebook whatever bullshit crap app you download for free. The user gives permission to microphone, camera, contacts, gps etc… Look at the tracking going on with the fakebook app for android and iphone. You are tracked even if you are not a user of fakebook. Verizon install the app and you can't delete it from your phone.

 

https:// www.bloomberg.com/news/articles/2014-01-29/nsa-spying-on-apps-shows-perils-of-google-candy-crush-

 

https://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data

 

https://www.theguardian.com/world/2014/jan/27/nsa-gchq-smartphone-app-angry-birds-personal-data

 

https://www.theregister.co.uk/2018/04/17/facebook_admits_to_tracking_non_users/

 

Do you want me to go on? This scam has been going on for many many years.

 

Don't believe me…Dig for yourself.

Anonymous ID: a65fd9 Jan. 13, 2020, 9:05 p.m. No.7807475   🗄️.is 🔗kun

>>7807319 (pb)

 

iOS Devices Are Secure

 

We praised the iOS security model on multiple occasions. Speaking of the current pack of iOS versions (including iOS 11.4 release, 11.4.1 public beta and 12.0 first developer beta), we have full-disk encryption with decryption keys derived from the user’s passcode and protected by Secure Enclave. Thanks to the iOS keychain, we enjoy the additional layer of protection for our passwords and other sensitive information. If you protected your iPhone with a 6-digit passcode (which you really should, and which is the default since at least iOS 10), most of your information is securely encrypted until you first unlock your iPhone after it completes the boot sequence. Even if they take the memory chip off, they won’t get anything meaningful due to the encryption.

 

Starting with iOS 11.4.1 beta, Apple went an extra mile in an attempt to protect your iPhone against attackers trying to brute force your passcode. The newly implemented USB Restricted Mode disables the USB port on your iPhone one hour after you last unlocked the device (fingerprint, Face ID or passcode) or one hour after you disconnected it from a trusted USB accessory. Even if someone gets your iPhone, they’ll have to start brute forcing your passcode within one hour – or they won’t be able to start it at all.

 

https://blog.elcomsoft.com/2018/06/protecting-your-data-and-apple-account-if-they-know-your-iphone-passcode/