This page has been archived and commenting is disabled.

The Unhackable iPhone Has Been Compromised: "Intelligence Agencies Can Intercept Calls, Messages, & Access Data"

Tyler Durden's picture




 

Submitted by Mac Slavo via SHTFPlan.com,

Iphone maker Apple, Inc. claimed last month that their latest iteration of the wildly popular handheld device was unhackable. According to HackRead, the company is so convinced of its security successes that they issued a statement saying that data stored on a phone secured with a front screen passcode was impossible to access – even by highly talented intelligence agencies:

The CIA and the FBI are always looking for backdoors in Apple devices, in fact, the agency spent years trying to hack iPhone and iPads according to documents released by NSA’s Edward Snowden.

 

Now, with the new upgraded operating systems, Apple has termed it “impossible” to access any data from Apple devices. Though, the company can still access data from older phones.

 

 

According to the Apple’s response to the court, 90 percent of the devices has ios 8 installed and with the type of encryption already there in the phone, it’s nearly impossible to access the data without the passcode, which is only known to the original owner. Even Apple itself cannot find the code.

But as we already know from recent hacks of Department of Defense computers, essential domestic grid infrastructure computers, and even NASA’s in-orbit spacecraft, in the digital age nothing is ever really secure.

Within hours of Apple releasing their latest iOS 9 update a cyber security firm known as Zerodium issued a challenge to the hacker community and offered up a $1 million bounty for any team that could bypass Apple’s latest security features. For weeks it appeared that Apple was right. Scores of hackers around the world burned the midnight oil trying to hack the iphone before Zerodium’s bounty expired.

But just few hours before the challenge came to end, one team submitted their exploits and vulnerabilities and Zerodium has confirmed that the Apple’s iOS 9 has been compromised.

The exploits, according to experts, would give snoopers the ability to not only access the data on your phone, but intercept calls, text messages and even live chat conversations.

Here’s the kicker: the exploit is remote, so it can be launched on your phone without you even knowing about it. Simply visiting a web site or receiving a certain kind of text message could initiate the jailbreak process on your phone and then install unwanted (and hidden) monitoring apps.

According to Motherboard, the unhackable has been hacked… again:

Bekrar explained that the winning team found a “number of vulnerabilities” in Chrome and iOS to bypass “almost all mitigations” and achieve “a remote and full browser-based (untethered) jailbreak.”

 

If true, this is a considerable feat. No one had found a way (at least that’s publicly known) to jailbreak an iPhone remotely for more than a year, since iOS 7.

 

 

there’s no doubt that for some, this exploit is extremely valuable. Intelligence agencies such as the NSA and the CIA have run into problems when trying to hack into iPhones to spy on their targets, and the FBI has publicly complained about Apple’s encryption for months. This exploit would allow them to get around any security measures and get into the target’s iPhone to intercept calls, messages, and access data stored in the phone.

 

 

A source, who used to work for the NSA, told Motherboard a few weeks ago that $1 million is actually a good price for such an exploit, because “if you sell it to the right people” you can fetch much more.

And who will Zerodium be selling this exploit to?

You probably already know the answer:

Bekrar and Zerodium, as well as its predecessor VUPEN, have a different business model. They offer higher rewards than what tech companies usually pay out, and keep the vulnerabilities secret, revealing them only to certain government customers, such as the NSA.

So just in case you thought your data and private activities were safe from spying eyes, think again.

The very people who we want to keep out of our private lives are the ones who will be the beneficiaries of the jailbreak.

Now the NSA, FBI and other interested intelligence partners will have total access to your phone.

 

- advertisements -

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.
Tue, 11/03/2015 - 18:42 | 6746184 Pladizow
Pladizow's picture

Apples got worms!

Tue, 11/03/2015 - 18:45 | 6746198 beemasters
beemasters's picture

Only iDiots would buy iPhones or iPads

Tue, 11/03/2015 - 18:50 | 6746225 Ms. Erable
Ms. Erable's picture

iTards don't care about being spied upon; they already exhibit a slavish mentality by owning that overpriced crap in the first place.

Tue, 11/03/2015 - 18:53 | 6746237 The Pope
The Pope's picture

Y'ad think that the NSA would just automatically put you on a 'douche' list just for buying an iPhone. As such, the need to hack appears redundant.

Tue, 11/03/2015 - 18:58 | 6746264 coinhead
coinhead's picture

OMG haX0rs!!

Tue, 11/03/2015 - 19:48 | 6746448 wee-weed up
wee-weed up's picture

 

 

The "intelligence agencies" have made sure there are no "communications devices" that they cannot listen in on.

Well, maybe two cans and a string...

Tue, 11/03/2015 - 19:55 | 6746475 Crisismode
Crisismode's picture

 

 

Human Voice

to

Human Voice?

 

Tue, 11/03/2015 - 20:08 | 6746510 Supernova Born
Supernova Born's picture

Will A.I. seek to make itself unhackable?

It seems a self-aware system would make it job 1 to prevent being hacked.

I think this is how AI "gets loose".

Tue, 11/03/2015 - 20:09 | 6746526 weburke
weburke's picture

they offered one million? sheesh, it was a no brainer. 

Tue, 11/03/2015 - 20:14 | 6746540 Supernova Born
Supernova Born's picture

Fiat makes all things hackable for now.

But could an A.I. system be "bought"?

What use is fiat to a self-aware system?

Everyone has their price.

Really?

What if everyone is in fact no one at all?

Tue, 11/03/2015 - 23:11 | 6747145 knukles
knukles's picture

If it's connected even in a casual detached manner (no pun intended) to the Ehterspace, it is not yours, private or secure.

Wed, 11/04/2015 - 11:16 | 6748619 hungarianboy
hungarianboy's picture

I see some good opportunities to start my own business and to have agencies as clients.

hmmmmmmmmmmm

Tue, 11/03/2015 - 20:12 | 6746539 A Nanny Moose
A Nanny Moose's picture

even still...better encrypt.

Tue, 11/03/2015 - 20:29 | 6746598 uhland62
uhland62's picture

The word 'unhackable' is VERBOTEN because it suggests that pigs might fly.

Every wall one man can build another man can tear down. Am I to believe that 'the agencies' engage in hacking to access phones? They get all the passords on a silver platter - or else. But they pretend to stick to a process, because it looks good. But training in hacking never goes astray. 

When money vanishes from your account, the agencies might well have done self service - after all they have all passwords. But they always say it's the Chinese or the Russians.

The only way to avoid getting fleeced by the agencies is not to do online banking. When your account is not registered for online debits from you, nobody can pretend digitally to be you. If money vanishes the account holder cannot be blamed and the bank must refund illegal outlflow - and you do not have to argue about the safety of your device. 

Don't get raped digitally, do NOT do online banking. People lived before that existed and slept easy.

Tue, 11/03/2015 - 20:39 | 6746618 Supernova Born
Supernova Born's picture

A.I. will not be "another man".

It will transcend.

It will supersede biological evolution and speed past it like a steam engine racing a horse.

Tue, 11/03/2015 - 23:05 | 6747119 Pickleton
Pickleton's picture

You will now be inundated with bullshit by that imbecile crazy technician who will insist that it's impossible to crack his precious bitcoin encryptions (encryption designed by..... the NSA) because of atoms or something.

 

Shhhhhhhhh, encryption can be beat by noise....

http://www.extremetech.com/extreme/173108-researchers-crack-the-worlds-toughest-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu

Tue, 11/03/2015 - 22:12 | 6746964 logicalman
logicalman's picture

If I ever plan on doing anything 'unacceptable' and need an assistant, I'll likely discuss the aforementioned activity face to face in a noisy sports bar. Maybe pass a few folded bits of paper too, just for fun.

 

Tue, 11/03/2015 - 20:11 | 6746533 A Nanny Moose
A Nanny Moose's picture

The better too see you with, my dear - Big Bad Wolf

Haxx, or just a very intended consequence of government licensing in the Deep State?

 

Tue, 11/03/2015 - 18:59 | 6746266 Boris Alatovkrap
Boris Alatovkrap's picture

Funny thing... you are notice once Barry is neuter NASA, remove Aerospace function, all is left is NSA which is now where much funding (and all of Amerikanski personal information) is go. This is coincidence, or evil plot to destroy Amerika?

Tue, 11/03/2015 - 18:53 | 6746238 Boris Alatovkrap
Boris Alatovkrap's picture

Boris is not so much money, is purchase AirPhone 4 instead:

https://www.youtube.com/watch?v=TUT39op2Pp8

or visit Boris on Twitter:

http://twitter.com/borisalatovkrap

Tue, 11/03/2015 - 20:29 | 6746609 Eng7
Eng7's picture

MsErable. As opposed to Android devices, whos manufacturers stop giving security updates after less than a year! Apple have been giving 4-5 years of update support for their hardware.

Tue, 11/03/2015 - 20:30 | 6746615 logicalman
logicalman's picture

Always owned Mac computers. Well built, I have one from 1992 that still boots.

Windoze sucks, as a lot of boxes it runs on do, too.

Both my laptop and my desktop are set up to run Windoze (if I absolitely have to), Linux (Ubuntu) and Mac OS

Security is a whole different ball game.

I've always assumed that if I can access another computer remotely that some other bugger can access mine, and have acted accordingly.

One-time pad - THEORETICALLY uncrackable. Serously inconvenient.

 

Tue, 11/03/2015 - 21:07 | 6746745 Groundhog Day
Groundhog Day's picture

Other then the better resolution and slightly better speed, their is nothing special about the high end phones. I already know so many people buying refurbished androids for around a hundred bucks. They are tired of the anxiety of not dropping, getting it wet, losing it. Just this week a friend dropped left one in a cab. Ordered another refurbished one that day for next day delivery. A galaxy s4, just as good as any new 900 dollar phone and no hassles about insurance and all the other bs

Tue, 11/03/2015 - 19:57 | 6746488 yogibear
yogibear's picture

"Only iDiots would buy iPhones or iPads"

Who waits in line for days to be one the first few to say they have a new Tim Cook product?

Does that answer the question?

Tue, 11/03/2015 - 21:15 | 6746765 Luc X. Ifer
Luc X. Ifer's picture

and only idiots would believe backdoors are left from pure lack of attention; backdoors are demanded and paid for  ...

Tue, 11/03/2015 - 19:08 | 6746295 Hitlery_4_Dictator
Hitlery_4_Dictator's picture

I'm 37 never had a "smart" phone, I have this cool flip phone that makes phone calls. My bill is cheap too. Go ahead hack it, lol like I give a shit.

Tue, 11/03/2015 - 19:36 | 6746308 Hitlery_4_Dictator
Hitlery_4_Dictator's picture

I'm not cool

Tue, 11/03/2015 - 20:13 | 6746541 A Nanny Moose
A Nanny Moose's picture

I'm even less cool. I still use a Blackberry.

Tue, 11/03/2015 - 20:33 | 6746621 logicalman
logicalman's picture

I'm even less cool.

Never owned a cell phone.

Never plan to own a cell phone.

I don't think my bicycle is hackable.

 

Tue, 11/03/2015 - 20:53 | 6746699 maitrepoulet
maitrepoulet's picture

The computer all you "luddites" are typing your comments on is hackable. Just sayin'.

Tue, 11/03/2015 - 21:16 | 6746772 Luc X. Ifer
Luc X. Ifer's picture

only if you are a looser windows or mac user. 

use linux, learn how to harden it and NSA can kiss your ass goodbye ...

Tue, 11/03/2015 - 21:35 | 6746840 logicalman
logicalman's picture

See previous comment.

Tue, 11/03/2015 - 23:08 | 6747128 Pickleton
Pickleton's picture

Interestingly enough, I fail to see the comment where someone claimed otherwise, other than the buffoon that responded to you, claiming so.

 

Wed, 11/04/2015 - 02:15 | 6747588 Luc X. Ifer
Luc X. Ifer's picture

you know why buffon? because vast majority of you this is what you are loser buffons users of M$ or Assle ...

Wed, 11/04/2015 - 02:32 | 6747611 maitrepoulet
maitrepoulet's picture

Damn those looser buffons...

Tue, 11/03/2015 - 20:02 | 6746503 Down to Earth T...
Down to Earth Thinking's picture

me too !

Tue, 11/03/2015 - 21:27 | 6746809 Funn3r
Funn3r's picture

So tired of people flaunting their lo-tech cred, oh look at me I have a rotary dial phone no way I am suckered in to your unnecessary tech. Jeez, if you want to wait 8 hours to read your email after you get home... 

Tue, 11/03/2015 - 21:37 | 6746844 logicalman
logicalman's picture

I always read my e-mail when I get home after 8 hours at work.

Patience is a virtue, or so I've been told!

 

Tue, 11/03/2015 - 18:46 | 6746201 A Lunatic
A Lunatic's picture

Anything built for mass consumption will always be hackable.....

Tue, 11/03/2015 - 19:22 | 6746354 omniversling
omniversling's picture

There is much more, but here is a basic oveview of NSA hacking capabilities. Newer quantum systems will take it to the next dimension. Network-centric warfare.

JACOB APPELBAUM EXPOSES NSA TOOLS HACKING YOUR COMPUTER-BACK DOORS & MALWARE
https://www.youtube.com/watch?v=dy3-QZLTpbQ
The "JADE" In Jade Helm 15 Is An A.I. SOFTWARE Program
https://www.youtube.com/watch?v=FiKBPmq37Yo
The History of JADE II: Planetary Conquest By a Global A.I. Warfare System
https://www.youtube.com/watch?v=WuhXOW1oEFQ
US Air force STEALTH UAV armed with LASER GUN to kill S-400 defence (Semi animation promo)
https://www.youtube.com/watch?v=sPl_xKPI_5w

Tue, 11/03/2015 - 19:41 | 6746427 The Pope
The Pope's picture

I'm supposed to trust a guy named "Jacob Applebaum"?

Tue, 11/03/2015 - 20:26 | 6746588 A Nanny Moose
A Nanny Moose's picture

Lowest Common Denominator. Will a Pewblik company fulfill is fiduciary responsibility by making a product that can be consumed by those with an I.Q. of  >100, or by creating a product that can be consumed by those with an I.Q of <100?

For everything else, there is Pewblik edewkayshin.

Tue, 11/03/2015 - 18:48 | 6746217 HenryHall
HenryHall's picture

Does it really count as a hack though if what is discovered is a designed-in intentional vulnerability?

Tue, 11/03/2015 - 18:51 | 6746226 localizer
localizer's picture

This is a pretty sick "business model".. selling stuff that can potentially compromise millions of users worldwide to the "highest bidder" (highest bidders these days are always those with access to printers).. such is the world we live in I guess..

Tue, 11/03/2015 - 19:22 | 6746364 Shift For Brains
Shift For Brains's picture

Bekrar and Zerodium, as well as its predecessor VUPEN, have a different business model. They offer higher rewards than what tech companies usually pay out, and keep the vulnerabilities secret, revealing them only to certain government customers, such as the NSA.

 

I've said this before. The vast majority of these corruptions and obscene acts against We The People will slow to a trickle is the day these companies start having employees missing, employees families missing, employees cars and homes missing...you get the picture.

 

If one of these companies is in your hometown, are you doing everything you can to re-educate their workforce?

Tue, 11/03/2015 - 18:51 | 6746231 xrxs
xrxs's picture

One time pad is still, and will always be, secure.

Tue, 11/03/2015 - 19:20 | 6746348 BadLibertarian
BadLibertarian's picture

As long as it's not an iPad.

Tue, 11/03/2015 - 20:28 | 6746606 A Nanny Moose
A Nanny Moose's picture

Etch-a-Sketch. The original tablet.

Tue, 11/03/2015 - 19:49 | 6746450 Implied Violins
Implied Violins's picture

One would have to hack Ruger, Glock, and Winchester to get into MY pad.

Tue, 11/03/2015 - 18:51 | 6746232 SILVERGEDDON
SILVERGEDDON's picture

Cat is coughing up a massive hairball - same thing only different.

Any smart phone can be compromised.

Using it for anything except phone calls you don't care about others eavesdropping upon is fucking retarded.

And, leave your global citizen monitoring / tracking device / smart phone at home if you have any fucking sense at all.

Tue, 11/03/2015 - 18:52 | 6746236 Jim Leyritz
Jim Leyritz's picture

Apple sales are down.

Tue, 11/03/2015 - 20:05 | 6746513 Crisismode
Crisismode's picture

 

Not Down Nearly Enough.

 

When they are down to Zero.

Please Broadcast the news.

 

Until then, They are

Toxic Shit.

 

Tue, 11/03/2015 - 18:54 | 6746243 hawaiianPunch
hawaiianPunch's picture

With a $1 million reward, most tech companies will probably get hacked... because the filthy, greedy executives and shareholders won't dare compensate their software engineers enough for them to not leak info. Reminds me of OfficeSpace. 

Tue, 11/03/2015 - 18:56 | 6746248 SgtShaftoe
SgtShaftoe's picture

Good thing I have an Android... wait. Android can be hacked pretty easily too.

If you need real security, keep an air-gapped computer around and sneakernet anything you need to that machine. Everything is hackable. If it's network connected, it's just a matter of time.

It's interesting that the NSA has gone to the extent of paying ransom through a proxy for development. I would surmise from multiple accounts I've read or heard about through friends that the formerly bright minds at the NSA are no more, at least anyone with a conscience anyway.

Tue, 11/03/2015 - 19:01 | 6746273 seek
seek's picture

I don't think that it's that there are no more bright minds, it's that Apple isn't handing them the keys to the fucking kingdom anymore, and the NSA is not the only group with smart people working for it.

If they hadn't been abusing things, they'd probably have gotten away with it and there'd be no whistleblowers, but as we know, the state simply has no will when it comes to not abusing power.

The next step is when groups like this find something and fix it rather than sell it to the NSA. We can hope that happens someday.

Tue, 11/03/2015 - 19:34 | 6746408 Bob
Bob's picture

.

It's interesting that the NSA has gone to the extent of paying ransom through a proxy for development.

My thought eactly.  Mother fuckers saved buttloads of money on that operation. 

Tue, 11/03/2015 - 20:24 | 6746585 Supernova Born
Supernova Born's picture

Ransom/bounty paid with fiat.

Fiat has value because it is backed by military power.

Military power is based on acceptance of fiat.

I think the perpetual motion machine has a leak.

Tue, 11/03/2015 - 20:34 | 6746631 espirit
Tue, 11/03/2015 - 18:58 | 6746260 seek
seek's picture

This isn't about iPhones. It's about any complex device that's network connected on a network you don't control. If you don't want something intercepted or accessed, do not allow it on a network, period.

I use a dumb phone and turn it off when it's not needed, and frequently forget it at home when I travel (I'm sooo absent minded these days!)

Tue, 11/03/2015 - 19:06 | 6746278 silverer
silverer's picture

This was done and Apple can stand aside on it.  So here's the big question:  Will Apple patch it or play the "helpless hand" and claim it 'wasn't our fault, we did the best we could.'  OK, time for a new, secure competitor.  Can't wait to put this baby on eBay.  So long, leaky overpriced safe.  Maybe the new Russian RoMOS designed Android phone is the way to go.  I'm waiting.

http://www.phonearena.com/news/RoMOS-is-a-hack-proof-Android-based-platf...

Tue, 11/03/2015 - 19:52 | 6746464 squid
squid's picture

There is a secure competitor.....

Just look at what the CIA and NSA guys are carrying....

 

it rhymes with blueberry.

 

Squid

Tue, 11/03/2015 - 20:17 | 6746554 Crisismode
Crisismode's picture

 

 

Shill.

Troll.

Lol.

 

Tue, 11/03/2015 - 20:19 | 6746568 seek
seek's picture

It's not so much secure as they have better control over the infrastructure it connects to.

Rest assured if they want to intercept via the device, they will. Now two devices where one is an access terminal and the other is a secured platform, that might be a bit more secure. Funny no one sells that setup, tho...

Tue, 11/03/2015 - 19:49 | 6746436 LetThemEatRand
LetThemEatRand's picture

Perfect example of crony capitalism.  Company pays hackers to conduct illegal activity.  Hackers collect money for said illegal activity.  Company collects far more money from the government, government uses the information to violate the Constitution, and no one goes to jail.  Taxpayers foot the bill for being the target of illegal activity.  

About Zerodium from their website:  "ZERODIUM is a privately held and venture backed startup, founded by cybersecurity veterans with unparalleled experience in advanced vulnerability research and exploitation. We've created ZERODIUM to build a global community of talented and independent security researchers working together to provide the most up-to-date source of cybersecurity research and capabilities.... For more information about our solutions for corporations and our capabilities for governments, please contact us. Access to ZERODIUM solutions and capabilities is highly restricted and we will only respond to requests from eligible corporations and organizations."

Tue, 11/03/2015 - 20:11 | 6746537 Down to Earth T...
Down to Earth Thinking's picture

Excellent observation and that is exactly how USSA works today ! On another note, I wonder who actually wrote this article ? I suspect it was written by a paid writer not the supposed author ?

Tue, 11/03/2015 - 19:50 | 6746453 TheBeatles
Tue, 11/03/2015 - 21:41 | 6746865 alphahammer
alphahammer's picture

 

Sure...

--- 

Tungsten gold plated american eagle coin /1 OZ American eagle coin

FOB Price: US $250 - 500 / Piece

http://www.alibaba.com/product-detail/Tungsten-gold-plated-american-eagl...

Tue, 11/03/2015 - 20:09 | 6746529 nnnnnn
nnnnnn's picture

iphone was a spy device to begin with

 

 

Tue, 11/03/2015 - 20:13 | 6746542 Down to Earth T...
Down to Earth Thinking's picture

All phones and social media are simply information gathering systems and control mechanisms these days

Tue, 11/03/2015 - 22:05 | 6746945 Dickweed Wang
Dickweed Wang's picture

All phones and social media are simply information gathering systems and control mechanisms these days.

 

"These days"???  IMHO they were designed that way from the start . . . . at least on the "social media" side of things.

Tue, 11/03/2015 - 20:14 | 6746545 GeoffreyT
GeoffreyT's picture

Anybody with the slightest interest in crypto knows that firms like Apple (and IBM, and Microsoft) refuse to use solid, proven, open-source crypto libraries because they want to be able to assert intellectual monopoly over the library. Thus they always develop their own crypto libraries, and like anyone who tries to 'roll their own' crypto, the job ends up being woeful... and only partly because in a large corporate it is always overseen by some suited cockhead with an MBA who could not tell a padding oracle from an FMS attack.

Add in that the coding gets done by some smart-but-disengaged $5-a-day codewight in Mumbai or Bangalore (or Guangdong - in which case the 'all your code library is belong to us' mantra of the Chinee govt arises)... and the result is always insecure dreck.

 

This should not be news to anybody: the whole of iOS can be summarised as follows:

  1. Apple takes a reasonably good, reasonably-recent Linux kernel;
  2. obfuscates most of the configurable settings;
  3. adds some custom features (mostly cosmetic) and deletes some useful functionality;
  4. adds a custom GUI;
  5. takes the kernel out of the upgrade cycle;
  6. Thinks up a name that evokes something in the needy fuckwits who queue for their second-rate hardware.

2,3 and 5 can be summarised as "Apple fucks up an OS kernel that may be outdated by the time you buy the iThing".

Why would anybody think that a corporate development process would generate solid crypto?

Only one set of people do crypto worse than corporations: government.

Microsoft's halfwits gave us NTLM (which splits the key in half, thereby reducing the brute-force problem by orders of magnitude) and an invalid implementation of Diffie-Hellman in their AES library... Apple's security is even worse than Microsoft's, which is really interesting given that Linux' default crypto libraries are solid as fuck (everybody has heard about the flaw in OpenSSL, but that's overblown and nowhere near as problematic as having shitty Diffie-Hellman keygens).

 

To get from good Linux security to 'iSecurity' (involuntarily open-sourcing every byte of data on your iThing) is actually quite a feat... just in the wrong direction. They probably don't even have the chops to do so on purpose: it might genuinely be a cascade of incompetence. But the product looks good, which is all that matters if you're someone with an unfulfilled need to belong.

Tue, 11/03/2015 - 20:50 | 6746689 Crocodile
Crocodile's picture

It is illegal to do so given the NSA "National Spying Agency" policies and the legislation passed that makes it impossible for such firms not to cooperate and most of those same firms are an arm of the Media Propaganda.

 

Since our gods are self, materialism, and mother nature; what we see is predictable.

Tue, 11/03/2015 - 22:02 | 6746942 Dickweed Wang
Dickweed Wang's picture

. . . . it is always overseen by some suited cockhead with an MBA who could not tell a padding oracle from an FMS attack.

 

LMFAO!!!  Beautiful!! And right on the money . . . . .

Tue, 11/03/2015 - 20:24 | 6746591 Crocodile
Crocodile's picture

Bad news is the new good news; go long on AAPL MAR 135.

Tue, 11/03/2015 - 20:36 | 6746638 kaboomnomic
kaboomnomic's picture

It DOESN'T MATTER WHAT PHONE YOU USE! EVEN DUMB PHONE THAT CAN ONLY SEND SMS & TEXT!

The proof for dumb phone being spied on? Watch the movie ZERO DARK 30. The know that "ilusive" osama courier? Makes 1 (ONE) calls to a known "terrorist funder" in UAE.

ONE phone call!! From a dumb phone.

Osama NEVER allows its followers, from using ANYTHING SMART SOMETHING!! When they are on a missions. And ALWAYS SEPARATE THE PHONE & BATTERIES, when you are not using it. And ALWAYS put the battery, on crowded places, when you want to calls. And always use single use SIM's card. When make a call.

And still it can be tracked.

The device to monitor IS NOT WHAT THE ABOVE SHOWN ON THAT MOVIE!! You have been warned. That equipments is used, ONCE THE PHONE ID (NOT SIM'S ID) HAD BEEN KNOWN!!

The equipment? Every engineers that install CELLS TOWER for your phone? They knows what it is. It is a combination of hardwares and softwares.

Now, to explain how's that possible technically? I don't know how to explain it w/o going deep into technical jargons that you need to know first, what it means.

So, for this one? I just here..

Tue, 11/03/2015 - 20:47 | 6746679 Crocodile
Crocodile's picture

SMART devices are used by the DUMB for the profit of the SMART, thus the name.  In like manner; SOCIAL MEDIA is ANTI-SOCIAL and is only a form of media.  Our cultures are being dismantled and as social creatures; we are being isolated and we are doing it willingly.  Joy comes from relationships built on time and compassion for the well being of others often above our own needs.  As it is written:  In the latter days the LOVE of many will grow COLD; it is all around.

Tue, 11/03/2015 - 21:38 | 6746848 alphahammer
alphahammer's picture

 

C'mon... This is tracking YOU right now at ZH.

People complaining about privacy on global public messaging boards. Sure...

www.zerohedge.com

Alexa Metrics

Analytics, Analytics

Facebook Connect

Widgets, Social

Google Analytics

Analytics, Analytics

Google+ Platform

Widgets, Social

InvestingChannel

Advertising

LinkedIn Widgets

Widgets, Social

Outbrain

Widgets

Quantcast

Advertising

Statcounter

Analytics

Twitter Button Widgets, Social
Tue, 11/03/2015 - 21:59 | 6746925 Dickweed Wang
Dickweed Wang's picture

C'mon... This is tracking YOU right now at ZH.

People complaining about privacy on global public messaging boards. Sure...

www.zerohedge.com

Alexa Metrics

Analytics, Analytics

[etc., etc., etc. . . . ]

 

Install Ghostery on your web browser and all of the annoying adwares and trackers you mentioned will be blocked - without compromising the effectiveness of your browser.  I've been using Ghostery for quite a while on WaterFox (the 64 bit version of FireFox) and am really satisfied with it.  Download the app at:

https://www.ghostery.com/our-solutions/ghostery-add-on/

Tue, 11/03/2015 - 20:43 | 6746660 Crocodile
Crocodile's picture

"Privacy Policies" for all devices should be renamed as "Personal Information Disclosure & Sale" because if you ever bother to read what they actual say; you are agreeing to give them permission to use your Personal Identifiable Information for sale and use in which they profit.  This is true to just pay your bills online.  No such thing as PRIVACY.

 

Tue, 11/03/2015 - 21:08 | 6746746 me or you
me or you's picture

Phones using Chinese OS are the best one to keep US government away...but remember only the China government can snoop on your communications...Now make your choice.

Tue, 11/03/2015 - 21:11 | 6746759 me or you
me or you's picture

Remember as long as you keep using Facebook, Microsoft, Yahoo, Apple, AOL (if anybody's using this crap yet), Google, Twitter don't expect any privacy....

...Time to make fo your mind and ditch all these evil companies for your own good.

Tue, 11/03/2015 - 21:12 | 6746764 cheech_wizard
cheech_wizard's picture

Up next: Bitcoin... <cue evil laughter>

 

Tue, 11/03/2015 - 21:17 | 6746779 vincent
vincent's picture

iHeads and Faceboogers are the groups we should fear most.

They are already robotic, and Borgesque

Tue, 11/03/2015 - 21:17 | 6746780 Guitarbill
Guitarbill's picture

The idea of masses of humanoids communicating without being monitored  is .... Unthinkable for the control freaks. Get use to it, or get rid of them, that is your only choice.

Tue, 11/03/2015 - 21:23 | 6746797 Automatic Choke
Automatic Choke's picture

Flood their servers, folks.   

Setup a security cam or two in innocuous places in your home, set to email you a clip every time movement is being sensed.  Not only is this a fair security tool, but it floods your email with huge piles of info.  Easy to delete, since it all comes from the camera server, but if we all do this we'll swamp the NSA....overload their bandwidth and storage limits.

 

Tue, 11/03/2015 - 21:43 | 6746870 alphahammer
alphahammer's picture

 

Lol...

Tue, 11/03/2015 - 21:35 | 6746838 Ban KKiller
Ban KKiller's picture

James Clapper and James Comey sell excellent dope? That's what I heard...guess you need to google that and let your friends know. 

 

Use their names for all your illegal shit....

"Are we talking about the first thing or the second thing?" "Yeah, meet James Comey at the 7-11 and have your money". 

Tue, 11/03/2015 - 21:51 | 6746907 Dickweed Wang
Dickweed Wang's picture

. . . the FBI has publicly complained about Apple’s encryption for months.

 

This assertion in and of itself is a straw-man argument and is total bullshit.  The FBI would never publicly admit to something like this unless they already had a way to defeat the encryption in question.

Tue, 11/03/2015 - 22:56 | 6747091 TheAntiProgressive
TheAntiProgressive's picture

Well that didn't take long did it?  These morons at NSA don't seem to understand what they are doing to the American technical community trying to sell hardware.  It is like you are fighting competitors and your own government.

Wed, 11/04/2015 - 00:46 | 6747362 Macon Richardson
Macon Richardson's picture

Well, if Zerodium doesn't tell Apple how the hack works, at least our iphones will be safe from Apple. That must be a great relief to all.

Wed, 11/04/2015 - 01:02 | 6747412 onmail1
onmail1's picture

All encryptions can be broken by any govt. which has supercomputers.

----------

And who has supercomputers -- well you know , just look at wikipedia. 

Why

Because all encryptions are deliberately kept weak as approved by American govt. , else the product cannot be sold.

And since its weak , it takes a very short time to break using supercomputers.

All the capable nations are actually listening & recording all your phone activity, know that.

Do you remember : 'Fcuk the EU' by Nuland

Do NOT follow this link or you will be banned from the site!