Skip to comments.Apple vows they've never worked with NSA on backdoor deal
Posted on 12/31/2013 2:35:18 PM PST by rickmichaels
SAN FRANCISCO - Apple Inc responded on Tuesday to reports that the National Security Agency had developed a system to hack into and monitor iPhones called "Dropout Jeep," saying it never worked with the U.S. spy agency and was unaware of efforts to target its smartphones
(Excerpt) Read more at torontosun.com ...
Possible. But Who makes the chips in the product?
China. Who do we owe?
Right. They TOLD us what to do.
There was no DEAL to be worked on! :)
We had a long discussion on the Apple iPhone not being able to have spyware installed UNLESS it is JAILBROKEN. It can’t be done remotely or from a link - because of the “sandboxing” and design of the iOS and also because you can ONLY get the software from the Apple Authorized site.
NSA tracking cellphone locations worldwide, Snowden documents show
Unless you jailbreak your iPhone, thats not going to happen (with the NSA). And if you think someone else has jailbroken it, you can completely erase everything and reload directly from Apple. And, by the way, you shouldnt jailbreak the phone, since it takes away the protections that Apple has put up to prevent others from doing this to you - and it voids the warranty, too.
Very simply put, that is not going to happen on an iPhone, unless you let someone have it for a whole and they did something to the phone, without you knowing it. And if so, you can solve that problem by completing reloading the iOS (operating system).
Good ‘legal weasel-word’ analysis. Bet you that you are dead-on.
So either Apple is not being honest, or their phones cant keep out the NSA, or any other hacker.
If you have an iPhone, and if you have not jailbroken it (which you should not do because you will end up overriding Apples protections) - you then know that you cant download any such (even cheap) app from Apples App Store - without signing in with the owners password (you should have a strong password, too).
AND ... Apple does not have any such spyware, in the Apple App Store, where this can be done. Its ONLY JAILBROKEN iPHONES that can have that, and you should NEVER jailbreak your iPhone for security reasons!
See this one discussion at the Apple website ...
NOW ... mind you ... Im not talking about the Android phones - which ARE INSECURE or the other phones on the market. You CAN do it with those other phones but NOT on a NON-JAILBROKEN iPHONE.
These conspiracies stories are sounding more idiotic each day.
There are limits on what management can know about what’s inside their electronic products. A high level tech manager working for the NSA could sneak about anything into the code burned into the chips.
So we should believe Apple, along with RSA, Microsoft, AT&T, Cisco...... sure, right.
The NSA is converting millions to open source software just like Obama is gun salesman of the year.
Got rid of my Droid...piece of crap and the OS really stinks.
National Security Letters make companies wet themselves and say all manner of manglespeak.
But the real question is.....
We all know that the NSA has the capability and have installed spyware/malware on many devices. The ability to turn on cameras, microphones, read documents, essentially own the device. None of that is disputed. The question is, how do they transmit the data back in a manner that is not detectable by the numerous network monitoring tools available? Any geek with wireshark should be able to detect the traffic and post his discovery to the internet. But nobody has...... Think about that for a bit.
Technically, Apple’s message was:
“It” “never” “worked” “with” “the” “U.S.” “spy” “agency”.
You have to parse it a tad. Like Bill Clinton parsed “is”.
I’m probably the only doofus around who has only an old Samsung flip phone. I refuse to upgrade it, since I only use it for phone calls. I refuse to do texting, and I have it blocked on my little flip phone.
Anybody who wants to reach me can either call my cell phone of email me.
Bull$#it. Apple collaborated with the NSA just the same as Microsoft did. Like Microsoft, they were likely unwilling and did so under threat as is indicated by the MS Windows 8 registry key for the NSA back door that starts off as “NSA_***”
Nothing to worry about. Nothing at all. /sarcasm
Especially see 0:44 for a discussion of Apple vulnerabilities.
Question is: do we believe Apple or Snowden?
It would be cheaper to plant/buy a few key employees, and it would also be deniable.
“Anybody who wants to reach me can either call my cell phone of email me.”
I don’t have your number-so please speak into your desk lamp.
I’m pretty sure you don’t really want to call me—LOL!
The problem with this is, that you may be looking for not a needle, but a speck of dust in a haystack. Also, there are lots of ways to hide information in a torrent of TCP/IP data (hints: packet timing, sequence numbers). Your Wireshark program won’t help there.
works ‘WITH’ the NSA?
No. FOR the NSA.
We already know that tech companies are being forced to lie under basically treason law. So even if they wanted to admit they had worked with them, they couldn’t.
Right ... wink, wink, wink.... Stupid Progressives will believe anything .... just keep denying.
Or, they just got out of the way and have no idea if they did anything bad or not...
Ignorance Knows no bounds.
Me? No. My job only requires a Security+ certification. But there are hundreds of thousands of top of their field Cybersecurity and network people out there whose job it is to do that very thing. All it takes is for one of them to raise a red flag and publish it to the internet. Especially in foreign governments or banking systems where just like us they dedicate large sums to their cybersecurity programs. Ya think they don’t routinely scan network traffic for anomalies?
For pervasive computer surveillance to occur, it would have to generate a flood of traffic. It all couldn’t be hidden using standard network methods on a worldwide scale over a period of years. It just couldn’t have gone unnoticed.
There is something missing....
The SecuSmart solution is not a one-off single-user security enhancement, it requires back-end services and network re-routing to work. Among other things, it completely bypasses the carrier's voice network for voice calls and sends that traffic via their own NOC using secure VoIP. It also authenticates the entity at the other side of the call, but in order to do that they probably have to be using SecuSmart as well. You can't make a secure voice call to someone at some random payphone somewhere. The whole point is to keep the traffic 100% off the insecure PSTN or wireless carrier voice network.
SecuSmart's President said that it would take the NSA 149 years to break their security. "That should keep the Americans busy", he observed.
Looks like they are using manufacturers to implant ICs that can transmit via radio frequency up to 8 miles away.