The Unhackable iPhone Has Been Compromised: "Intelligence Agencies Can Intercept Calls, Messages, & Access Data"

Tyler Durden's picture

Submitted by Mac Slavo via,

Iphone maker Apple, Inc. claimed last month that their latest iteration of the wildly popular handheld device was unhackable. According to HackRead, the company is so convinced of its security successes that they issued a statement saying that data stored on a phone secured with a front screen passcode was impossible to access – even by highly talented intelligence agencies:

The CIA and the FBI are always looking for backdoors in Apple devices, in fact, the agency spent years trying to hack iPhone and iPads according to documents released by NSA’s Edward Snowden.


Now, with the new upgraded operating systems, Apple has termed it “impossible” to access any data from Apple devices. Though, the company can still access data from older phones.



According to the Apple’s response to the court, 90 percent of the devices has ios 8 installed and with the type of encryption already there in the phone, it’s nearly impossible to access the data without the passcode, which is only known to the original owner. Even Apple itself cannot find the code.

But as we already know from recent hacks of Department of Defense computers, essential domestic grid infrastructure computers, and even NASA’s in-orbit spacecraft, in the digital age nothing is ever really secure.

Within hours of Apple releasing their latest iOS 9 update a cyber security firm known as Zerodium issued a challenge to the hacker community and offered up a $1 million bounty for any team that could bypass Apple’s latest security features. For weeks it appeared that Apple was right. Scores of hackers around the world burned the midnight oil trying to hack the iphone before Zerodium’s bounty expired.

But just few hours before the challenge came to end, one team submitted their exploits and vulnerabilities and Zerodium has confirmed that the Apple’s iOS 9 has been compromised.

The exploits, according to experts, would give snoopers the ability to not only access the data on your phone, but intercept calls, text messages and even live chat conversations.

Here’s the kicker: the exploit is remote, so it can be launched on your phone without you even knowing about it. Simply visiting a web site or receiving a certain kind of text message could initiate the jailbreak process on your phone and then install unwanted (and hidden) monitoring apps.

According to Motherboard, the unhackable has been hacked… again:

Bekrar explained that the winning team found a “number of vulnerabilities” in Chrome and iOS to bypass “almost all mitigations” and achieve “a remote and full browser-based (untethered) jailbreak.”


If true, this is a considerable feat. No one had found a way (at least that’s publicly known) to jailbreak an iPhone remotely for more than a year, since iOS 7.



there’s no doubt that for some, this exploit is extremely valuable. Intelligence agencies such as the NSA and the CIA have run into problems when trying to hack into iPhones to spy on their targets, and the FBI has publicly complained about Apple’s encryption for months. This exploit would allow them to get around any security measures and get into the target’s iPhone to intercept calls, messages, and access data stored in the phone.



A source, who used to work for the NSA, told Motherboard a few weeks ago that $1 million is actually a good price for such an exploit, because “if you sell it to the right people” you can fetch much more.

And who will Zerodium be selling this exploit to?

You probably already know the answer:

Bekrar and Zerodium, as well as its predecessor VUPEN, have a different business model. They offer higher rewards than what tech companies usually pay out, and keep the vulnerabilities secret, revealing them only to certain government customers, such as the NSA.

So just in case you thought your data and private activities were safe from spying eyes, think again.

The very people who we want to keep out of our private lives are the ones who will be the beneficiaries of the jailbreak.

Now the NSA, FBI and other interested intelligence partners will have total access to your phone.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Pladizow's picture

Apples got worms!

beemasters's picture

Only iDiots would buy iPhones or iPads

Ms. Erable's picture

iTards don't care about being spied upon; they already exhibit a slavish mentality by owning that overpriced crap in the first place.

The Pope's picture

Y'ad think that the NSA would just automatically put you on a 'douche' list just for buying an iPhone. As such, the need to hack appears redundant.

coinhead's picture
coinhead (not verified) The Pope Nov 3, 2015 5:58 PM

OMG haX0rs!!

wee-weed up's picture



The "intelligence agencies" have made sure there are no "communications devices" that they cannot listen in on.

Well, maybe two cans and a string...

Crisismode's picture



Human Voice


Human Voice?


Supernova Born's picture

Will A.I. seek to make itself unhackable?

It seems a self-aware system would make it job 1 to prevent being hacked.

I think this is how AI "gets loose".

weburke's picture

they offered one million? sheesh, it was a no brainer. 

Supernova Born's picture

Fiat makes all things hackable for now.

But could an A.I. system be "bought"?

What use is fiat to a self-aware system?

Everyone has their price.


What if everyone is in fact no one at all?

knukles's picture

If it's connected even in a casual detached manner (no pun intended) to the Ehterspace, it is not yours, private or secure.

hungarianboy's picture

I see some good opportunities to start my own business and to have agencies as clients.


A Nanny Moose's picture

even still...better encrypt.

uhland62's picture

The word 'unhackable' is VERBOTEN because it suggests that pigs might fly.

Every wall one man can build another man can tear down. Am I to believe that 'the agencies' engage in hacking to access phones? They get all the passords on a silver platter - or else. But they pretend to stick to a process, because it looks good. But training in hacking never goes astray. 

When money vanishes from your account, the agencies might well have done self service - after all they have all passwords. But they always say it's the Chinese or the Russians.

The only way to avoid getting fleeced by the agencies is not to do online banking. When your account is not registered for online debits from you, nobody can pretend digitally to be you. If money vanishes the account holder cannot be blamed and the bank must refund illegal outlflow - and you do not have to argue about the safety of your device. 

Don't get raped digitally, do NOT do online banking. People lived before that existed and slept easy.

Supernova Born's picture

A.I. will not be "another man".

It will transcend.

It will supersede biological evolution and speed past it like a steam engine racing a horse.

Pickleton's picture

You will now be inundated with bullshit by that imbecile crazy technician who will insist that it's impossible to crack his precious bitcoin encryptions (encryption designed by..... the NSA) because of atoms or something.


Shhhhhhhhh, encryption can be beat by noise....

logicalman's picture

If I ever plan on doing anything 'unacceptable' and need an assistant, I'll likely discuss the aforementioned activity face to face in a noisy sports bar. Maybe pass a few folded bits of paper too, just for fun.


A Nanny Moose's picture

The better too see you with, my dear - Big Bad Wolf

Haxx, or just a very intended consequence of government licensing in the Deep State?


Boris Alatovkrap's picture

Funny thing... you are notice once Barry is neuter NASA, remove Aerospace function, all is left is NSA which is now where much funding (and all of Amerikanski personal information) is go. This is coincidence, or evil plot to destroy Amerika?

Boris Alatovkrap's picture

Boris is not so much money, is purchase AirPhone 4 instead:

or visit Boris on Twitter:

Eng7's picture

MsErable. As opposed to Android devices, whos manufacturers stop giving security updates after less than a year! Apple have been giving 4-5 years of update support for their hardware.

logicalman's picture

Always owned Mac computers. Well built, I have one from 1992 that still boots.

Windoze sucks, as a lot of boxes it runs on do, too.

Both my laptop and my desktop are set up to run Windoze (if I absolitely have to), Linux (Ubuntu) and Mac OS

Security is a whole different ball game.

I've always assumed that if I can access another computer remotely that some other bugger can access mine, and have acted accordingly.

One-time pad - THEORETICALLY uncrackable. Serously inconvenient.


Groundhog Day's picture

Other then the better resolution and slightly better speed, their is nothing special about the high end phones. I already know so many people buying refurbished androids for around a hundred bucks. They are tired of the anxiety of not dropping, getting it wet, losing it. Just this week a friend dropped left one in a cab. Ordered another refurbished one that day for next day delivery. A galaxy s4, just as good as any new 900 dollar phone and no hassles about insurance and all the other bs

yogibear's picture

"Only iDiots would buy iPhones or iPads"

Who waits in line for days to be one the first few to say they have a new Tim Cook product?

Does that answer the question?

Luc X. Ifer's picture

and only idiots would believe backdoors are left from pure lack of attention; backdoors are demanded and paid for  ...

Hitlery_4_Dictator's picture

I'm 37 never had a "smart" phone, I have this cool flip phone that makes phone calls. My bill is cheap too. Go ahead hack it, lol like I give a shit.

A Nanny Moose's picture

I'm even less cool. I still use a Blackberry.

logicalman's picture

I'm even less cool.

Never owned a cell phone.

Never plan to own a cell phone.

I don't think my bicycle is hackable.


maitrepoulet's picture

The computer all you "luddites" are typing your comments on is hackable. Just sayin'.

Luc X. Ifer's picture

only if you are a looser windows or mac user. 

use linux, learn how to harden it and NSA can kiss your ass goodbye ...

Pickleton's picture

Interestingly enough, I fail to see the comment where someone claimed otherwise, other than the buffoon that responded to you, claiming so.


Luc X. Ifer's picture

you know why buffon? because vast majority of you this is what you are loser buffons users of M$ or Assle ...

maitrepoulet's picture

Damn those looser buffons...

Funn3r's picture

So tired of people flaunting their lo-tech cred, oh look at me I have a rotary dial phone no way I am suckered in to your unnecessary tech. Jeez, if you want to wait 8 hours to read your email after you get home... 

logicalman's picture

I always read my e-mail when I get home after 8 hours at work.

Patience is a virtue, or so I've been told!


A Lunatic's picture

Anything built for mass consumption will always be hackable.....

omniversling's picture

There is much more, but here is a basic oveview of NSA hacking capabilities. Newer quantum systems will take it to the next dimension. Network-centric warfare.

The "JADE" In Jade Helm 15 Is An A.I. SOFTWARE Program
The History of JADE II: Planetary Conquest By a Global A.I. Warfare System
US Air force STEALTH UAV armed with LASER GUN to kill S-400 defence (Semi animation promo)

The Pope's picture

I'm supposed to trust a guy named "Jacob Applebaum"?

A Nanny Moose's picture

Lowest Common Denominator. Will a Pewblik company fulfill is fiduciary responsibility by making a product that can be consumed by those with an I.Q. of  >100, or by creating a product that can be consumed by those with an I.Q of <100?

For everything else, there is Pewblik edewkayshin.

HenryHall's picture

Does it really count as a hack though if what is discovered is a designed-in intentional vulnerability?

localizer's picture

This is a pretty sick "business model".. selling stuff that can potentially compromise millions of users worldwide to the "highest bidder" (highest bidders these days are always those with access to printers).. such is the world we live in I guess..

Shift For Brains's picture

Bekrar and Zerodium, as well as its predecessor VUPEN, have a different business model. They offer higher rewards than what tech companies usually pay out, and keep the vulnerabilities secret, revealing them only to certain government customers, such as the NSA.


I've said this before. The vast majority of these corruptions and obscene acts against We The People will slow to a trickle is the day these companies start having employees missing, employees families missing, employees cars and homes get the picture.


If one of these companies is in your hometown, are you doing everything you can to re-educate their workforce?

xrxs's picture

One time pad is still, and will always be, secure.

BadLibertarian's picture

As long as it's not an iPad.

A Nanny Moose's picture

Etch-a-Sketch. The original tablet.

Implied Violins's picture

One would have to hack Ruger, Glock, and Winchester to get into MY pad.