Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

NSA and GCHQ target 'leaky' phone apps like Angry Birds to scoop user data
UK Guardian ^ | January 27, 2014 | James Ball

Posted on 01/27/2014 10:58:33 AM PST by C19fan

The National Security Agency and its UK counterpart GCHQ have been developing capabilities to take advantage of "leaky" smartphone apps, such as the wildly popular Angry Birds game, that transmit users' private information across the internet, according to top secret documents.

The data pouring onto communication networks from the new generation of iPhone and Android apps ranges from phone model and screen size to personal details such as age, gender and location. Some apps, the documents state, can share users' most sensitive information such as sexual orientation – and one app recorded in the material even sends specific sexual preferences such as whether or not the user may be a swinger.

(Excerpt) Read more at theguardian.com ...


TOPICS: Foreign Affairs
KEYWORDS: angrybirds; angtybirds; gchq; nsa; nsascandals; snowden
Navigation: use the links below to view more comments.
first previous 1-2021-29 last
To: for-q-clinton
Also iPhones are easily hacked by police...they Have a tool the plug into the iPhone and get all the data. No tool exists fir windows phone so windows phone is more secure.

Uh, no. . . The demonstrated hack was simplistic and worked only on UN-encrypted older iPhones. It also requires physical possession of the phone. The claim there is a cache of keys that have been pressed such as a key logger would keep that can be accessed is also completely bogus. The 4S has been on the market for almost three years. . . and almost anyone can set the iPhone to wipe the phone after a set number of failed attempts with the wrong code on even older iPhones. . . or encrypt the data.

Update: Mike Dickinson has clarified that Micro Systemation’s XRY tool doesn’t support the iPhone 4S, iPad 2 or iPad 3. It does, however, support the latest version of Apple’s iOS operating system, so he says that older devices that have the latest software installed are still vulnerable.

After bypassing the iPhone’s security restrictions to run its code on the phone, the tool “brute forces” the phone’s password, guessing every possible combination of numbers to find the correct code, as Dickinson describes it. In the video above, the process takes seconds. (Although admittedly, the phone’s example passcode is “0000″, about the most easily-guessed password possible.)

Dicksinson acknowledges that users who set longer passcodes for devices can in fact make the devices far tougher to crack. “The more complex the password, the longer and harder it’s going to be to access the phone,” he says. “In some cases, it takes so long to brute force that it’s not worth doing it.” That may have been the situation, for instance, in one recent case involving the phone of Dante Dears, a paroled convict accused of running a prostitution ring known as “Pimping Hoes Daily” from his Android phone; The FBI, apparently unable or unwilling to crack the phone, asked Google to help in accessing it.

Frankly, if the police have a legitimate reason to access an iPhone, they can petition Apple to access it with the correct court orders.

I fully expected your Angry Birds claim. . .

21 posted on 01/28/2014 9:16:42 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Swordmaker

You can ignore the truth but it doesn’t change the facts of reality. IPhone is less secure than windows phone.


22 posted on 01/28/2014 11:10:54 PM PST by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 21 | View Replies]

To: for-q-clinton

I always discount anything you say. It is usually false. I find nothing to back up your claim.


23 posted on 01/29/2014 12:11:56 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 22 | View Replies]

To: Swordmaker

Yep it’s best you just ignore it...it would destroy your world to admit windows phone is more secure.


24 posted on 01/29/2014 3:04:34 AM PST by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 23 | View Replies]

To: Swordmaker

http://bgr.com/2013/03/26/iphone-security-software-vulnerabilities-ios-397421/


25 posted on 01/29/2014 9:01:49 AM PST by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 23 | View Replies]

To: for-q-clinton

Good grief, read the actual report. I did. Your link is to a twaddle report on a study (no statistician would give it the time of day) that merely counted CVE reports over the existence of the development of each platform. . . and assumes that those CVEs are still exploitable vulnerabilities! How absurd!

iOS has existed far longer as a platform than either Android and Microsoft’s new Windows Phone, so yes, Apple has more reported CVEs over the years for iOS than either Google or Microsoft has for their platforms BUT, those vulnerabilities have have been long ago CLOSED and are not current vulnerabilities. To release a comparison report based merely on a mere count without normalizing the count for time is disingenuous to say the least. . . and most likely deliberately designed to be propaganda to benefit the competition.

It turns out to get the total counted against Apple’s iOS, some of the vulnerabilities this report counted were CVEs in UNIX from 1988, for Pete’s sake! This is clearly FUD when all other serious reports of true mobile security exploits show that better than 99% exist for the Android platform! Those few that have hit the iOS platform have mostly hit the jailbreaking community and THEY deserve what they get for opening their devices to anything that comes in.

You lame attempt to spread FUD is just exactly what I said in my last post. Untrue.


26 posted on 01/29/2014 5:36:14 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 25 | View Replies]

To: Swordmaker

Your response fails because had anyone used that excuse in OSX vs windows you’d claim just the opposite. You talk out of both sides of your mouth.


27 posted on 01/29/2014 10:18:08 PM PST by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 26 | View Replies]

To: for-q-clinton

The point is that counting CVEs and comparing sheer numbers of reports is FUD when one is counting CVEs from the underlying UNIX plus the OS has been around far longer than the com parables, then equating numbers of antique reported CVEs as though they are still “vulnerabilities” and implying they are current risk factors is deliberately designed to detract from the bad publicity that is being garnered by another platform with REAL EXPLOITS. You are just doing what you have done for years. Quit spreading lies and FUD, FOR-q-Clinton.


28 posted on 01/29/2014 10:57:44 PM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 27 | View Replies]

To: Swordmaker

Oh come on you know you participated in that FUD all the time when it comes to windows. You’d use Windows in the generic sense (meaning 9x and XP) which have been long out of support.


29 posted on 01/30/2014 4:35:00 AM PST by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 28 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-29 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson