This page has been archived and commenting is disabled.
The Unhackable iPhone Has Been Compromised: "Intelligence Agencies Can Intercept Calls, Messages, & Access Data"
Submitted by Mac Slavo via SHTFPlan.com,
Iphone maker Apple, Inc. claimed last month that their latest iteration of the wildly popular handheld device was unhackable. According to HackRead, the company is so convinced of its security successes that they issued a statement saying that data stored on a phone secured with a front screen passcode was impossible to access – even by highly talented intelligence agencies:
The CIA and the FBI are always looking for backdoors in Apple devices, in fact, the agency spent years trying to hack iPhone and iPads according to documents released by NSA’s Edward Snowden.
Now, with the new upgraded operating systems, Apple has termed it “impossible” to access any data from Apple devices. Though, the company can still access data from older phones.
…
According to the Apple’s response to the court, 90 percent of the devices has ios 8 installed and with the type of encryption already there in the phone, it’s nearly impossible to access the data without the passcode, which is only known to the original owner. Even Apple itself cannot find the code.
But as we already know from recent hacks of Department of Defense computers, essential domestic grid infrastructure computers, and even NASA’s in-orbit spacecraft, in the digital age nothing is ever really secure.
Within hours of Apple releasing their latest iOS 9 update a cyber security firm known as Zerodium issued a challenge to the hacker community and offered up a $1 million bounty for any team that could bypass Apple’s latest security features. For weeks it appeared that Apple was right. Scores of hackers around the world burned the midnight oil trying to hack the iphone before Zerodium’s bounty expired.
But just few hours before the challenge came to end, one team submitted their exploits and vulnerabilities and Zerodium has confirmed that the Apple’s iOS 9 has been compromised.
The exploits, according to experts, would give snoopers the ability to not only access the data on your phone, but intercept calls, text messages and even live chat conversations.
Here’s the kicker: the exploit is remote, so it can be launched on your phone without you even knowing about it. Simply visiting a web site or receiving a certain kind of text message could initiate the jailbreak process on your phone and then install unwanted (and hidden) monitoring apps.
According to Motherboard, the unhackable has been hacked… again:
Bekrar explained that the winning team found a “number of vulnerabilities” in Chrome and iOS to bypass “almost all mitigations” and achieve “a remote and full browser-based (untethered) jailbreak.”
If true, this is a considerable feat. No one had found a way (at least that’s publicly known) to jailbreak an iPhone remotely for more than a year, since iOS 7.
…
there’s no doubt that for some, this exploit is extremely valuable. Intelligence agencies such as the NSA and the CIA have run into problems when trying to hack into iPhones to spy on their targets, and the FBI has publicly complained about Apple’s encryption for months. This exploit would allow them to get around any security measures and get into the target’s iPhone to intercept calls, messages, and access data stored in the phone.
…
A source, who used to work for the NSA, told Motherboard a few weeks ago that $1 million is actually a good price for such an exploit, because “if you sell it to the right people” you can fetch much more.
And who will Zerodium be selling this exploit to?
You probably already know the answer:
Bekrar and Zerodium, as well as its predecessor VUPEN, have a different business model. They offer higher rewards than what tech companies usually pay out, and keep the vulnerabilities secret, revealing them only to certain government customers, such as the NSA.
So just in case you thought your data and private activities were safe from spying eyes, think again.
The very people who we want to keep out of our private lives are the ones who will be the beneficiaries of the jailbreak.
Now the NSA, FBI and other interested intelligence partners will have total access to your phone.
- 649 reads
- Printer-friendly version
- Send to friend
- advertisements -


Apples got worms!
Only iDiots would buy iPhones or iPads
iTards don't care about being spied upon; they already exhibit a slavish mentality by owning that overpriced crap in the first place.
Y'ad think that the NSA would just automatically put you on a 'douche' list just for buying an iPhone. As such, the need to hack appears redundant.
OMG haX0rs!!
The "intelligence agencies" have made sure there are no "communications devices" that they cannot listen in on.
Well, maybe two cans and a string...
Human Voice
to
Human Voice?
Will A.I. seek to make itself unhackable?
It seems a self-aware system would make it job 1 to prevent being hacked.
I think this is how AI "gets loose".
they offered one million? sheesh, it was a no brainer.
Fiat makes all things hackable for now.
But could an A.I. system be "bought"?
What use is fiat to a self-aware system?
Everyone has their price.
Really?
What if everyone is in fact no one at all?
If it's connected even in a casual detached manner (no pun intended) to the Ehterspace, it is not yours, private or secure.
I see some good opportunities to start my own business and to have agencies as clients.
hmmmmmmmmmmm
even still...better encrypt.
The word 'unhackable' is VERBOTEN because it suggests that pigs might fly.
Every wall one man can build another man can tear down. Am I to believe that 'the agencies' engage in hacking to access phones? They get all the passords on a silver platter - or else. But they pretend to stick to a process, because it looks good. But training in hacking never goes astray.
When money vanishes from your account, the agencies might well have done self service - after all they have all passwords. But they always say it's the Chinese or the Russians.
The only way to avoid getting fleeced by the agencies is not to do online banking. When your account is not registered for online debits from you, nobody can pretend digitally to be you. If money vanishes the account holder cannot be blamed and the bank must refund illegal outlflow - and you do not have to argue about the safety of your device.
Don't get raped digitally, do NOT do online banking. People lived before that existed and slept easy.
A.I. will not be "another man".
It will transcend.
It will supersede biological evolution and speed past it like a steam engine racing a horse.
You will now be inundated with bullshit by that imbecile crazy technician who will insist that it's impossible to crack his precious bitcoin encryptions (encryption designed by..... the NSA) because of atoms or something.
Shhhhhhhhh, encryption can be beat by noise....
http://www.extremetech.com/extreme/173108-researchers-crack-the-worlds-toughest-encryption-by-listening-to-the-tiny-sounds-made-by-your-computers-cpu
If I ever plan on doing anything 'unacceptable' and need an assistant, I'll likely discuss the aforementioned activity face to face in a noisy sports bar. Maybe pass a few folded bits of paper too, just for fun.
Haxx, or just a very intended consequence of government licensing in the Deep State?
Funny thing... you are notice once Barry is neuter NASA, remove Aerospace function, all is left is NSA which is now where much funding (and all of Amerikanski personal information) is go. This is coincidence, or evil plot to destroy Amerika?
Boris is not so much money, is purchase AirPhone 4 instead:
https://www.youtube.com/watch?v=TUT39op2Pp8
or visit Boris on Twitter:
http://twitter.com/borisalatovkrap
MsErable. As opposed to Android devices, whos manufacturers stop giving security updates after less than a year! Apple have been giving 4-5 years of update support for their hardware.
Always owned Mac computers. Well built, I have one from 1992 that still boots.
Windoze sucks, as a lot of boxes it runs on do, too.
Both my laptop and my desktop are set up to run Windoze (if I absolitely have to), Linux (Ubuntu) and Mac OS
Security is a whole different ball game.
I've always assumed that if I can access another computer remotely that some other bugger can access mine, and have acted accordingly.
One-time pad - THEORETICALLY uncrackable. Serously inconvenient.
Other then the better resolution and slightly better speed, their is nothing special about the high end phones. I already know so many people buying refurbished androids for around a hundred bucks. They are tired of the anxiety of not dropping, getting it wet, losing it. Just this week a friend dropped left one in a cab. Ordered another refurbished one that day for next day delivery. A galaxy s4, just as good as any new 900 dollar phone and no hassles about insurance and all the other bs
"Only iDiots would buy iPhones or iPads"
Who waits in line for days to be one the first few to say they have a new Tim Cook product?
Does that answer the question?
and only idiots would believe backdoors are left from pure lack of attention; backdoors are demanded and paid for ...
I'm 37 never had a "smart" phone, I have this cool flip phone that makes phone calls. My bill is cheap too. Go ahead hack it, lol like I give a shit.
I'm not cool
I'm even less cool. I still use a Blackberry.
I'm even less cool.
Never owned a cell phone.
Never plan to own a cell phone.
I don't think my bicycle is hackable.
The computer all you "luddites" are typing your comments on is hackable. Just sayin'.
only if you are a looser windows or mac user.
use linux, learn how to harden it and NSA can kiss your ass goodbye ...
See previous comment.
Interestingly enough, I fail to see the comment where someone claimed otherwise, other than the buffoon that responded to you, claiming so.
you know why buffon? because vast majority of you this is what you are loser buffons users of M$ or Assle ...
Damn those looser buffons...
me too !
So tired of people flaunting their lo-tech cred, oh look at me I have a rotary dial phone no way I am suckered in to your unnecessary tech. Jeez, if you want to wait 8 hours to read your email after you get home...
I always read my e-mail when I get home after 8 hours at work.
Patience is a virtue, or so I've been told!
HACK
http://stockcharts.com/h-sc/ui?s=HACK&p=D&yr=1&mn=0&dy=0&id=p15751918635
Anything built for mass consumption will always be hackable.....
There is much more, but here is a basic oveview of NSA hacking capabilities. Newer quantum systems will take it to the next dimension. Network-centric warfare.
JACOB APPELBAUM EXPOSES NSA TOOLS HACKING YOUR COMPUTER-BACK DOORS & MALWARE
https://www.youtube.com/watch?v=dy3-QZLTpbQ
The "JADE" In Jade Helm 15 Is An A.I. SOFTWARE Program
https://www.youtube.com/watch?v=FiKBPmq37Yo
The History of JADE II: Planetary Conquest By a Global A.I. Warfare System
https://www.youtube.com/watch?v=WuhXOW1oEFQ
US Air force STEALTH UAV armed with LASER GUN to kill S-400 defence (Semi animation promo)
https://www.youtube.com/watch?v=sPl_xKPI_5w
I'm supposed to trust a guy named "Jacob Applebaum"?
Lowest Common Denominator. Will a Pewblik company fulfill is fiduciary responsibility by making a product that can be consumed by those with an I.Q. of >100, or by creating a product that can be consumed by those with an I.Q of <100?
For everything else, there is Pewblik edewkayshin.
Does it really count as a hack though if what is discovered is a designed-in intentional vulnerability?
This is a pretty sick "business model".. selling stuff that can potentially compromise millions of users worldwide to the "highest bidder" (highest bidders these days are always those with access to printers).. such is the world we live in I guess..
Bekrar and Zerodium, as well as its predecessor VUPEN, have a different business model. They offer higher rewards than what tech companies usually pay out, and keep the vulnerabilities secret, revealing them only to certain government customers, such as the NSA.
I've said this before. The vast majority of these corruptions and obscene acts against We The People will slow to a trickle is the day these companies start having employees missing, employees families missing, employees cars and homes missing...you get the picture.
If one of these companies is in your hometown, are you doing everything you can to re-educate their workforce?
One time pad is still, and will always be, secure.
As long as it's not an iPad.
Etch-a-Sketch. The original tablet.
One would have to hack Ruger, Glock, and Winchester to get into MY pad.
Cat is coughing up a massive hairball - same thing only different.
Any smart phone can be compromised.
Using it for anything except phone calls you don't care about others eavesdropping upon is fucking retarded.
And, leave your global citizen monitoring / tracking device / smart phone at home if you have any fucking sense at all.
Apple sales are down.
Not Down Nearly Enough.
When they are down to Zero.
Please Broadcast the news.
Until then, They are
Toxic Shit.
With a $1 million reward, most tech companies will probably get hacked... because the filthy, greedy executives and shareholders won't dare compensate their software engineers enough for them to not leak info. Reminds me of OfficeSpace.
Good thing I have an Android... wait. Android can be hacked pretty easily too.
If you need real security, keep an air-gapped computer around and sneakernet anything you need to that machine. Everything is hackable. If it's network connected, it's just a matter of time.
It's interesting that the NSA has gone to the extent of paying ransom through a proxy for development. I would surmise from multiple accounts I've read or heard about through friends that the formerly bright minds at the NSA are no more, at least anyone with a conscience anyway.
I don't think that it's that there are no more bright minds, it's that Apple isn't handing them the keys to the fucking kingdom anymore, and the NSA is not the only group with smart people working for it.
If they hadn't been abusing things, they'd probably have gotten away with it and there'd be no whistleblowers, but as we know, the state simply has no will when it comes to not abusing power.
The next step is when groups like this find something and fix it rather than sell it to the NSA. We can hope that happens someday.
.
My thought eactly. Mother fuckers saved buttloads of money on that operation.
Ransom/bounty paid with fiat.
Fiat has value because it is backed by military power.
Military power is based on acceptance of fiat.
I think the perpetual motion machine has a leak.
iPhone code breaking is childs play.
Try this...
http://finance.yahoo.com/news/why-many-lottery-retailers-buying-222742705.html
This isn't about iPhones. It's about any complex device that's network connected on a network you don't control. If you don't want something intercepted or accessed, do not allow it on a network, period.
I use a dumb phone and turn it off when it's not needed, and frequently forget it at home when I travel (I'm sooo absent minded these days!)
This was done and Apple can stand aside on it. So here's the big question: Will Apple patch it or play the "helpless hand" and claim it 'wasn't our fault, we did the best we could.' OK, time for a new, secure competitor. Can't wait to put this baby on eBay. So long, leaky overpriced safe. Maybe the new Russian RoMOS designed Android phone is the way to go. I'm waiting.
http://www.phonearena.com/news/RoMOS-is-a-hack-proof-Android-based-platf...
There is a secure competitor.....
Just look at what the CIA and NSA guys are carrying....
it rhymes with blueberry.
Squid
Shill.
Troll.
Lol.
It's not so much secure as they have better control over the infrastructure it connects to.
Rest assured if they want to intercept via the device, they will. Now two devices where one is an access terminal and the other is a secured platform, that might be a bit more secure. Funny no one sells that setup, tho...
Perfect example of crony capitalism. Company pays hackers to conduct illegal activity. Hackers collect money for said illegal activity. Company collects far more money from the government, government uses the information to violate the Constitution, and no one goes to jail. Taxpayers foot the bill for being the target of illegal activity.
About Zerodium from their website: "ZERODIUM is a privately held and venture backed startup, founded by cybersecurity veterans with unparalleled experience in advanced vulnerability research and exploitation. We've created ZERODIUM to build a global community of talented and independent security researchers working together to provide the most up-to-date source of cybersecurity research and capabilities.... For more information about our solutions for corporations and our capabilities for governments, please contact us. Access to ZERODIUM solutions and capabilities is highly restricted and we will only respond to requests from eligible corporations and organizations."
Excellent observation and that is exactly how USSA works today ! On another note, I wonder who actually wrote this article ? I suspect it was written by a paid writer not the supposed author ?
1oz Silver American Eagles €12 @ EurGold
https://www.eurgold.eu/silver/american-eagle-1oz-silver-coin-1-dollar-le...
Sure...
---
Tungsten gold plated american eagle coin /1 OZ American eagle coin
FOB Price: US $250 - 500 / Piece
http://www.alibaba.com/product-detail/Tungsten-gold-plated-american-eagl...
iphone was a spy device to begin with
All phones and social media are simply information gathering systems and control mechanisms these days
All phones and social media are simply information gathering systems and control mechanisms these days.
"These days"??? IMHO they were designed that way from the start . . . . at least on the "social media" side of things.
Anybody with the slightest interest in crypto knows that firms like Apple (and IBM, and Microsoft) refuse to use solid, proven, open-source crypto libraries because they want to be able to assert intellectual monopoly over the library. Thus they always develop their own crypto libraries, and like anyone who tries to 'roll their own' crypto, the job ends up being woeful... and only partly because in a large corporate it is always overseen by some suited cockhead with an MBA who could not tell a padding oracle from an FMS attack.
Add in that the coding gets done by some smart-but-disengaged $5-a-day codewight in Mumbai or Bangalore (or Guangdong - in which case the 'all your code library is belong to us' mantra of the Chinee govt arises)... and the result is always insecure dreck.
This should not be news to anybody: the whole of iOS can be summarised as follows:
2,3 and 5 can be summarised as "Apple fucks up an OS kernel that may be outdated by the time you buy the iThing".
Why would anybody think that a corporate development process would generate solid crypto?
Only one set of people do crypto worse than corporations: government.
Microsoft's halfwits gave us NTLM (which splits the key in half, thereby reducing the brute-force problem by orders of magnitude) and an invalid implementation of Diffie-Hellman in their AES library... Apple's security is even worse than Microsoft's, which is really interesting given that Linux' default crypto libraries are solid as fuck (everybody has heard about the flaw in OpenSSL, but that's overblown and nowhere near as problematic as having shitty Diffie-Hellman keygens).
To get from good Linux security to 'iSecurity' (involuntarily open-sourcing every byte of data on your iThing) is actually quite a feat... just in the wrong direction. They probably don't even have the chops to do so on purpose: it might genuinely be a cascade of incompetence. But the product looks good, which is all that matters if you're someone with an unfulfilled need to belong.
It is illegal to do so given the NSA "National Spying Agency" policies and the legislation passed that makes it impossible for such firms not to cooperate and most of those same firms are an arm of the Media Propaganda.
Since our gods are self, materialism, and mother nature; what we see is predictable.
. . . . it is always overseen by some suited cockhead with an MBA who could not tell a padding oracle from an FMS attack.
LMFAO!!! Beautiful!! And right on the money . . . . .
Bad news is the new good news; go long on AAPL MAR 135.
It DOESN'T MATTER WHAT PHONE YOU USE! EVEN DUMB PHONE THAT CAN ONLY SEND SMS & TEXT!
The proof for dumb phone being spied on? Watch the movie ZERO DARK 30. The know that "ilusive" osama courier? Makes 1 (ONE) calls to a known "terrorist funder" in UAE.
ONE phone call!! From a dumb phone.
Osama NEVER allows its followers, from using ANYTHING SMART SOMETHING!! When they are on a missions. And ALWAYS SEPARATE THE PHONE & BATTERIES, when you are not using it. And ALWAYS put the battery, on crowded places, when you want to calls. And always use single use SIM's card. When make a call.
And still it can be tracked.
The device to monitor IS NOT WHAT THE ABOVE SHOWN ON THAT MOVIE!! You have been warned. That equipments is used, ONCE THE PHONE ID (NOT SIM'S ID) HAD BEEN KNOWN!!
The equipment? Every engineers that install CELLS TOWER for your phone? They knows what it is. It is a combination of hardwares and softwares.
Now, to explain how's that possible technically? I don't know how to explain it w/o going deep into technical jargons that you need to know first, what it means.
So, for this one? I just here..
SMART devices are used by the DUMB for the profit of the SMART, thus the name. In like manner; SOCIAL MEDIA is ANTI-SOCIAL and is only a form of media. Our cultures are being dismantled and as social creatures; we are being isolated and we are doing it willingly. Joy comes from relationships built on time and compassion for the well being of others often above our own needs. As it is written: In the latter days the LOVE of many will grow COLD; it is all around.
C'mon... This is tracking YOU right now at ZH.
People complaining about privacy on global public messaging boards. Sure...
www.zerohedge.com
Alexa Metrics
Analytics, Analytics
Facebook Connect
Widgets, Social
Google Analytics
Analytics, Analytics
Google+ Platform
Widgets, Social
InvestingChannel
Advertising
LinkedIn Widgets
Widgets, Social
Outbrain
Widgets
Quantcast
Advertising
Statcounter
Analytics
Twitter Button Widgets, SocialC'mon... This is tracking YOU right now at ZH.
People complaining about privacy on global public messaging boards. Sure...
www.zerohedge.com
Alexa Metrics
Analytics, Analytics
[etc., etc., etc. . . . ]
Install Ghostery on your web browser and all of the annoying adwares and trackers you mentioned will be blocked - without compromising the effectiveness of your browser. I've been using Ghostery for quite a while on WaterFox (the 64 bit version of FireFox) and am really satisfied with it. Download the app at:
https://www.ghostery.com/our-solutions/ghostery-add-on/
"Privacy Policies" for all devices should be renamed as "Personal Information Disclosure & Sale" because if you ever bother to read what they actual say; you are agreeing to give them permission to use your Personal Identifiable Information for sale and use in which they profit. This is true to just pay your bills online. No such thing as PRIVACY.
Phones using Chinese OS are the best one to keep US government away...but remember only the China government can snoop on your communications...Now make your choice.
Remember as long as you keep using Facebook, Microsoft, Yahoo, Apple, AOL (if anybody's using this crap yet), Google, Twitter don't expect any privacy....
...Time to make fo your mind and ditch all these evil companies for your own good.
Up next: Bitcoin... <cue evil laughter>
iHeads and Faceboogers are the groups we should fear most.
They are already robotic, and Borgesque
The idea of masses of humanoids communicating without being monitored is .... Unthinkable for the control freaks. Get use to it, or get rid of them, that is your only choice.
Flood their servers, folks.
Setup a security cam or two in innocuous places in your home, set to email you a clip every time movement is being sensed. Not only is this a fair security tool, but it floods your email with huge piles of info. Easy to delete, since it all comes from the camera server, but if we all do this we'll swamp the NSA....overload their bandwidth and storage limits.
Lol...
James Clapper and James Comey sell excellent dope? That's what I heard...guess you need to google that and let your friends know.
Use their names for all your illegal shit....
"Are we talking about the first thing or the second thing?" "Yeah, meet James Comey at the 7-11 and have your money".
. . . the FBI has publicly complained about Apple’s encryption for months.
This assertion in and of itself is a straw-man argument and is total bullshit. The FBI would never publicly admit to something like this unless they already had a way to defeat the encryption in question.
Well that didn't take long did it? These morons at NSA don't seem to understand what they are doing to the American technical community trying to sell hardware. It is like you are fighting competitors and your own government.
Well, if Zerodium doesn't tell Apple how the hack works, at least our iphones will be safe from Apple. That must be a great relief to all.
All encryptions can be broken by any govt. which has supercomputers.
----------
And who has supercomputers -- well you know , just look at wikipedia.
Why
Because all encryptions are deliberately kept weak as approved by American govt. , else the product cannot be sold.
And since its weak , it takes a very short time to break using supercomputers.
All the capable nations are actually listening & recording all your phone activity, know that.
Do you remember : 'Fcuk the EU' by Nuland