Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. IPhone hacked

IPhone hacked

Scheduled Pinned Locked Moved The Lounge
ioscomquestion
18 Posts 12 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M Member 96

    http://www.abcnews.go.com/Technology/story?id=3404299&page=1[^]


    "I don't want more choice. I just want better things!" - Edina Monsoon

    H Offline
    H Offline
    hlmechanic
    wrote on last edited by
    #4

    "If hackers connect the server to a computer, as the security firm did, then they can download all of the information." A server connected to a computer!! what an idea.:omg: (are there servers that are not computers?)

    P 1 Reply Last reply
    0
    • M Member 96

      ..And..? I don't see your point in relation to my post, or are you just trying to inflate your post count?


      "I don't want more choice. I just want better things!" - Edina Monsoon

      J Offline
      J Offline
      Jim Crafton
      wrote on last edited by
      #5

      No, he wouldnt' do *that*, would he? :) Gasp the horrors!

      ¡El diablo está en mis pantalones! ¡Mire, mire! Real Mentats use only 100% pure, unfooled around with Sapho Juice(tm)! SELECT * FROM User WHERE Clue > 0 0 rows returned Save an Orange - Use the VCF! VCF Blog

      M 1 Reply Last reply
      0
      • J Jim Crafton

        No, he wouldnt' do *that*, would he? :) Gasp the horrors!

        ¡El diablo está en mis pantalones! ¡Mire, mire! Real Mentats use only 100% pure, unfooled around with Sapho Juice(tm)! SELECT * FROM User WHERE Clue > 0 0 rows returned Save an Orange - Use the VCF! VCF Blog

        M Offline
        M Offline
        Minosknight
        wrote on last edited by
        #6

        bunny rabbits

        public static void DoSomething() { DoSomethingElse(); } public static void DoSomethingElse() { Dosomething(); }

        B T 2 Replies Last reply
        0
        • H hlmechanic

          "If hackers connect the server to a computer, as the security firm did, then they can download all of the information." A server connected to a computer!! what an idea.:omg: (are there servers that are not computers?)

          P Offline
          P Offline
          Pete OHanlon
          wrote on last edited by
          #7

          hlmechanic wrote:

          A server connected to a computer!! what an idea. (are there servers that are not computers?)

          Well - the girl who brought me dinner yesterday definitely wasn't a computer.

          Deja View - the feeling that you've seen this post before.

          M 1 Reply Last reply
          0
          • M Member 96

            http://www.abcnews.go.com/Technology/story?id=3404299&page=1[^]


            "I don't want more choice. I just want better things!" - Edina Monsoon

            R Offline
            R Offline
            realJSOP
            wrote on last edited by
            #8

            Again?

            "Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
            -----
            "...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001

            1 Reply Last reply
            0
            • P Pete OHanlon

              hlmechanic wrote:

              A server connected to a computer!! what an idea. (are there servers that are not computers?)

              Well - the girl who brought me dinner yesterday definitely wasn't a computer.

              Deja View - the feeling that you've seen this post before.

              M Offline
              M Offline
              Mark_Wallace
              wrote on last edited by
              #9

              Pete O`Hanlon wrote:

              hlmechanic wrote: A server connected to a computer!! what an idea. (are there servers that are not computers?) Well - the girl who brought me dinner yesterday definitely wasn't a computer.

              But did you manage to download?

              M 1 Reply Last reply
              0
              • M Member 96

                http://www.abcnews.go.com/Technology/story?id=3404299&page=1[^]


                "I don't want more choice. I just want better things!" - Edina Monsoon

                P Offline
                P Offline
                Paul Watson
                wrote on last edited by
                #10

                Interesting, thanks John. Though in fairness that is a poorly written article, I hope it isn't an ABC tech. journalist. The WiFi hack is true for any WiFi system (heck, it is true for any connection between two computers where you can't see the entire linkage.) (I think people think you are linking to yet another iPhone activation hack, not an iPhone security breach.)

                regards, Paul Watson Ireland & South Africa

                Shog9 wrote:

                And with that, Paul closed his browser, sipped his herbal tea, fixed the flower in his hair, and smiled brightly at the multitude of cute, furry animals flocking around the grassy hillside where he sat coding Ruby on his Mac...

                M 1 Reply Last reply
                0
                • M Mark_Wallace

                  Pete O`Hanlon wrote:

                  hlmechanic wrote: A server connected to a computer!! what an idea. (are there servers that are not computers?) Well - the girl who brought me dinner yesterday definitely wasn't a computer.

                  But did you manage to download?

                  M Offline
                  M Offline
                  Michael Sync
                  wrote on last edited by
                  #11

                  Mark Wallace wrote:

                  But did you manage to download?

                  :) I think he didn't download.. but he tried to install something :P

                  Thanks and Regards, Michael Sync ( Blog: http://michaelsync.net)

                  P 1 Reply Last reply
                  0
                  • M Michael Sync

                    Mark Wallace wrote:

                    But did you manage to download?

                    :) I think he didn't download.. but he tried to install something :P

                    Thanks and Regards, Michael Sync ( Blog: http://michaelsync.net)

                    P Offline
                    P Offline
                    Pete OHanlon
                    wrote on last edited by
                    #12

                    Michael Sync wrote:

                    I think he didn't download.. but he tried to install something

                    No - the motherboard was sitting next to me, hindering inter-process communication. No device access allowed.;P

                    Deja View - the feeling that you've seen this post before.

                    1 Reply Last reply
                    0
                    • M Minosknight

                      bunny rabbits

                      public static void DoSomething() { DoSomethingElse(); } public static void DoSomethingElse() { Dosomething(); }

                      B Offline
                      B Offline
                      Blekk
                      wrote on last edited by
                      #13

                      Lol :)

                      1 Reply Last reply
                      0
                      • P Paul Watson

                        Interesting, thanks John. Though in fairness that is a poorly written article, I hope it isn't an ABC tech. journalist. The WiFi hack is true for any WiFi system (heck, it is true for any connection between two computers where you can't see the entire linkage.) (I think people think you are linking to yet another iPhone activation hack, not an iPhone security breach.)

                        regards, Paul Watson Ireland & South Africa

                        Shog9 wrote:

                        And with that, Paul closed his browser, sipped his herbal tea, fixed the flower in his hair, and smiled brightly at the multitude of cute, furry animals flocking around the grassy hillside where he sat coding Ruby on his Mac...

                        M Offline
                        M Offline
                        Member 96
                        wrote on last edited by
                        #14

                        Yeah, although I read the story and understood they mean you can visit a malicious website which can download all the data off your IPhone as well as the other stuff. I guess by now there are better reports on it.


                        "I don't want more choice. I just want better things!" - Edina Monsoon

                        1 Reply Last reply
                        0
                        • M Member 96

                          http://www.abcnews.go.com/Technology/story?id=3404299&page=1[^]


                          "I don't want more choice. I just want better things!" - Edina Monsoon

                          D Offline
                          D Offline
                          Den danny
                          wrote on last edited by
                          #15

                          It's true it's an issue, but if you are stupid enough to follow a link that was sent to you from a person you don't even know, what do you expect? i don't think it's the developer's job to protect people against their own stupidity.. and the part of the hacker being in between the user and the real server, it's quite an old trick really, but again the user must have run a script/program to make the iphone not connect to the real server, but to the hacker.. but well, if apple can do something about it without having to ask you twice if you're sure you want to do what you're doing (like some other real secure os's do...), be my guest

                          M 1 Reply Last reply
                          0
                          • D Den danny

                            It's true it's an issue, but if you are stupid enough to follow a link that was sent to you from a person you don't even know, what do you expect? i don't think it's the developer's job to protect people against their own stupidity.. and the part of the hacker being in between the user and the real server, it's quite an old trick really, but again the user must have run a script/program to make the iphone not connect to the real server, but to the hacker.. but well, if apple can do something about it without having to ask you twice if you're sure you want to do what you're doing (like some other real secure os's do...), be my guest

                            M Offline
                            M Offline
                            Member 96
                            wrote on last edited by
                            #16

                            Oh come on, don't take the piss with me mate! :) This is Apple we're talking about here, they are godlike and infinitely wise surely they can make a device which is inherently secure regardless of what the user does.


                            "I don't want more choice. I just want better things!" - Edina Monsoon

                            D 1 Reply Last reply
                            0
                            • M Minosknight

                              bunny rabbits

                              public static void DoSomething() { DoSomethingElse(); } public static void DoSomethingElse() { Dosomething(); }

                              T Offline
                              T Offline
                              Timothy Jones
                              wrote on last edited by
                              #17

                              Pssst... You gotta typo in the last line: Dosomething(); "s" is not capitalized. Where did you learn programming? :suss: TJ

                              1 Reply Last reply
                              0
                              • M Member 96

                                Oh come on, don't take the piss with me mate! :) This is Apple we're talking about here, they are godlike and infinitely wise surely they can make a device which is inherently secure regardless of what the user does.


                                "I don't want more choice. I just want better things!" - Edina Monsoon

                                D Offline
                                D Offline
                                Den danny
                                wrote on last edited by
                                #18

                                lol :) yea i certainly agree on the fact that apple is godlike ;) (hooray for steve jobs!) as for the inherently secure part, i have my doubts :s perhaps they can give established 3th party developers some kind of digital signature or something (i don't know i'm not a security expert :p) but if one uses his iPhone with just a drop of common sense i'm sure it will be safe :) now if i only had the money to buy one :((

                                1 Reply Last reply
                                0
                                Reply
                                • Reply as topic
                                Log in to reply
                                • Oldest to Newest
                                • Newest to Oldest
                                • Most Votes


                                • Login

                                • Don't have an account? Register

                                • Login or register to search.
                                • First post
                                  Last post
                                0
                                • Categories
                                • Recent
                                • Tags
                                • Popular
                                • World
                                • Users
                                • Groups