Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Cold Heat
And yes, Android is not secure either...It’s the phone dummy, it’s insecurity is entirely a product of it’s features that are running at any one time.

I'm a "dummy?" Amazing. I provide a link to an article proving your assertion wrong and you call me an insulting name. Ad hominem attacks are the last resort of those with out facts to back up their positions.

So when I say that the Apple phone is even less secure then some, I base it on numbers and on their propensity to lie about it all the time. They can’t have business people thinking for a second that their phone data is in the wind.

And your evidence of these perpetual lying is? I thought not.

The ability of malware authors to break into an OS is indicative of the strength of the security of the protections built into it. . . and Blackberries have been compromised by malware.

Cold Heat. You did not state that ALL cellular phones were vulnerable, You stated, authoritatively without proof, that:

PS.... it (the iPhone) is one of the most unsecure phones on the planet.
when, contrary to your false claim, it is the most secure. That is totally false, which I provided authoritative proff from the company that provides the software to break into mobile devices to police agencies and governments stating they could not get into iOS devices. Your claim that "because as soon as they update the OS or hardware, the Government will do a workaround" Is totally bogus because the government relies on contractors who provide them with the access software. . . which uses the vulnerabilities that hackers find. These are the same vulnerabilities that are used by the authors of malware, Cold Heat. If they aren't there, or don't allow exploitation, or connect to only heavily encrypted data without a key, nothing can be done with the invasion.

You are pulling your "facts" out of your FUD filled navel.

35 posted on 08/17/2014 1:46:04 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 34 | View Replies ]


To: Swordmaker
Amazing. I provide a link to an article proving your assertion wrong and you call me an insulting name

I went back over what I said, and then your copy and pastes.

I find no difference between what I said to another poster, Your copy/and pastes, and the truth of the matter, yet you say I lied and pulled crap outa my azz... Just who made a ad hominum attack you useless piece of Apple core..

36 posted on 08/17/2014 3:10:42 PM PDT by Cold Heat (Have you reached your breaking point yet? If not now....then when?)
[ Post Reply | Private Reply | To 35 | View Replies ]

To: Swordmaker

As to Apple being secure....

LOL...that a figment of your imagination. (aided by a bunch of Mac-head propaganda) Apple phones are no more secure than any other over the counter consumer crap.

Blackberry, as I said, was at one time a fairly secure device, but they are no longer.

There are no secure phones anymore that you can buy mass market. The various governments of the world have seen to that.


37 posted on 08/17/2014 3:15:10 PM PDT by Cold Heat (Have you reached your breaking point yet? If not now....then when?)
[ Post Reply | Private Reply | To 35 | View Replies ]

To: Swordmaker
These are the same vulnerabilities that are used by the authors of malware, Cold Heat. If they aren't there, or don't allow exploitation, or connect to only heavily encrypted data without a key, nothing can be done with the invasion.

You keep returning to exploits and hacks, malware and gibberish while I have repeatedly said and this thread also says that these issues are not the topic being discussed.

I could care less about bozo malware, consumer data theft, and the usual crap they insert into apps. That's not what is being discussed here nor the point of the article.

The topic, which you keep diverting from, is government State access to data. The topic here is in regard to the Chi-Coms specifically.

Apple has turned over all their customer data in the Chinese region to mainland China who reads it, analyzes it, and uses it to compile dossiers of it's people of interest. (pretty much anyone)

It does not matter if they have the encryption keys because they have broken all of those. The programs and hardware they need to break these codes, they have stolen from us..Our wonderful CIA, NSA, and alphabet soup agencies..They don't need a damn key.

Nor does the NSA for that matter. They have or can break them all... Encryption has not scared anyone for years. Actually it never has. But if you want snooping neighbors out of your stuff, it's as effective as a padlock before it meets Mr. Bolt Cutter..

38 posted on 08/17/2014 3:33:18 PM PDT by Cold Heat (Have you reached your breaking point yet? If not now....then when?)
[ Post Reply | Private Reply | To 35 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson