IPhone hacked
-
http://www.abcnews.go.com/Technology/story?id=3404299&page=1[^]
"I don't want more choice. I just want better things!" - Edina Monsoon
"If hackers connect the server to a computer, as the security firm did, then they can download all of the information." A server connected to a computer!! what an idea.:omg: (are there servers that are not computers?)
-
..And..? I don't see your point in relation to my post, or are you just trying to inflate your post count?
"I don't want more choice. I just want better things!" - Edina Monsoon
No, he wouldnt' do *that*, would he? :) Gasp the horrors!
¡El diablo está en mis pantalones! ¡Mire, mire! Real Mentats use only 100% pure, unfooled around with Sapho Juice(tm)! SELECT * FROM User WHERE Clue > 0 0 rows returned Save an Orange - Use the VCF! VCF Blog
-
No, he wouldnt' do *that*, would he? :) Gasp the horrors!
¡El diablo está en mis pantalones! ¡Mire, mire! Real Mentats use only 100% pure, unfooled around with Sapho Juice(tm)! SELECT * FROM User WHERE Clue > 0 0 rows returned Save an Orange - Use the VCF! VCF Blog
bunny rabbits
public static void DoSomething() { DoSomethingElse(); } public static void DoSomethingElse() { Dosomething(); }
-
"If hackers connect the server to a computer, as the security firm did, then they can download all of the information." A server connected to a computer!! what an idea.:omg: (are there servers that are not computers?)
hlmechanic wrote:
A server connected to a computer!! what an idea. (are there servers that are not computers?)
Well - the girl who brought me dinner yesterday definitely wasn't a computer.
Deja View - the feeling that you've seen this post before.
-
http://www.abcnews.go.com/Technology/story?id=3404299&page=1[^]
"I don't want more choice. I just want better things!" - Edina Monsoon
Again?
"Why don't you tie a kerosene-soaked rag around your ankles so the ants won't climb up and eat your candy ass..." - Dale Earnhardt, 1997
-----
"...the staggering layers of obscenity in your statement make it a work of art on so many levels." - Jason Jystad, 10/26/2001 -
hlmechanic wrote:
A server connected to a computer!! what an idea. (are there servers that are not computers?)
Well - the girl who brought me dinner yesterday definitely wasn't a computer.
Deja View - the feeling that you've seen this post before.
Pete O`Hanlon wrote:
hlmechanic wrote: A server connected to a computer!! what an idea. (are there servers that are not computers?) Well - the girl who brought me dinner yesterday definitely wasn't a computer.
But did you manage to download?
-
http://www.abcnews.go.com/Technology/story?id=3404299&page=1[^]
"I don't want more choice. I just want better things!" - Edina Monsoon
Interesting, thanks John. Though in fairness that is a poorly written article, I hope it isn't an ABC tech. journalist. The WiFi hack is true for any WiFi system (heck, it is true for any connection between two computers where you can't see the entire linkage.) (I think people think you are linking to yet another iPhone activation hack, not an iPhone security breach.)
regards, Paul Watson Ireland & South Africa
Shog9 wrote:
And with that, Paul closed his browser, sipped his herbal tea, fixed the flower in his hair, and smiled brightly at the multitude of cute, furry animals flocking around the grassy hillside where he sat coding Ruby on his Mac...
-
Pete O`Hanlon wrote:
hlmechanic wrote: A server connected to a computer!! what an idea. (are there servers that are not computers?) Well - the girl who brought me dinner yesterday definitely wasn't a computer.
But did you manage to download?
Mark Wallace wrote:
But did you manage to download?
:) I think he didn't download.. but he tried to install something :P
Thanks and Regards, Michael Sync ( Blog: http://michaelsync.net)
-
Mark Wallace wrote:
But did you manage to download?
:) I think he didn't download.. but he tried to install something :P
Thanks and Regards, Michael Sync ( Blog: http://michaelsync.net)
Michael Sync wrote:
I think he didn't download.. but he tried to install something
No - the motherboard was sitting next to me, hindering inter-process communication. No device access allowed.;P
Deja View - the feeling that you've seen this post before.
-
bunny rabbits
public static void DoSomething() { DoSomethingElse(); } public static void DoSomethingElse() { Dosomething(); }
-
Interesting, thanks John. Though in fairness that is a poorly written article, I hope it isn't an ABC tech. journalist. The WiFi hack is true for any WiFi system (heck, it is true for any connection between two computers where you can't see the entire linkage.) (I think people think you are linking to yet another iPhone activation hack, not an iPhone security breach.)
regards, Paul Watson Ireland & South Africa
Shog9 wrote:
And with that, Paul closed his browser, sipped his herbal tea, fixed the flower in his hair, and smiled brightly at the multitude of cute, furry animals flocking around the grassy hillside where he sat coding Ruby on his Mac...
Yeah, although I read the story and understood they mean you can visit a malicious website which can download all the data off your IPhone as well as the other stuff. I guess by now there are better reports on it.
"I don't want more choice. I just want better things!" - Edina Monsoon
-
http://www.abcnews.go.com/Technology/story?id=3404299&page=1[^]
"I don't want more choice. I just want better things!" - Edina Monsoon
It's true it's an issue, but if you are stupid enough to follow a link that was sent to you from a person you don't even know, what do you expect? i don't think it's the developer's job to protect people against their own stupidity.. and the part of the hacker being in between the user and the real server, it's quite an old trick really, but again the user must have run a script/program to make the iphone not connect to the real server, but to the hacker.. but well, if apple can do something about it without having to ask you twice if you're sure you want to do what you're doing (like some other real secure os's do...), be my guest
-
It's true it's an issue, but if you are stupid enough to follow a link that was sent to you from a person you don't even know, what do you expect? i don't think it's the developer's job to protect people against their own stupidity.. and the part of the hacker being in between the user and the real server, it's quite an old trick really, but again the user must have run a script/program to make the iphone not connect to the real server, but to the hacker.. but well, if apple can do something about it without having to ask you twice if you're sure you want to do what you're doing (like some other real secure os's do...), be my guest
Oh come on, don't take the piss with me mate! :) This is Apple we're talking about here, they are godlike and infinitely wise surely they can make a device which is inherently secure regardless of what the user does.
"I don't want more choice. I just want better things!" - Edina Monsoon
-
bunny rabbits
public static void DoSomething() { DoSomethingElse(); } public static void DoSomethingElse() { Dosomething(); }
Pssst... You gotta typo in the last line: Dosomething(); "s" is not capitalized. Where did you learn programming? :suss: TJ
-
Oh come on, don't take the piss with me mate! :) This is Apple we're talking about here, they are godlike and infinitely wise surely they can make a device which is inherently secure regardless of what the user does.
"I don't want more choice. I just want better things!" - Edina Monsoon
lol :) yea i certainly agree on the fact that apple is godlike ;) (hooray for steve jobs!) as for the inherently secure part, i have my doubts :s perhaps they can give established 3th party developers some kind of digital signature or something (i don't know i'm not a security expert :p) but if one uses his iPhone with just a drop of common sense i'm sure it will be safe :) now if i only had the money to buy one :((