1. engin's Avatar
    Found an interesting thread on the Register: Exploit writer spills beans on secret iPhone function • The Register

    You might want to look at the related links at the bottom of the page as well.
    08-05-11 09:30 AM
  2. howarmat's Avatar
    so you have to physically connect an altered cable to the phone to get "access"....doesnt really seem to big of a deal to me. its not a software hack which would really be more of a worry to the general public
    08-05-11 09:43 AM
  3. engin's Avatar
    so you have to physically connect an altered cable to the phone to get "access"....doesnt really seem to big of a deal to me. its not a software hack which would really be more of a worry to the general public
    You may want to re-read that. The cable connection ws used whilst deveoping the hack, but is not required now that hte hack has been released.
    08-05-11 09:45 AM
  4. engin's Avatar
    Does that mean an attacker has to have physical access to the iPhone he wants to exploit?
    No. That's only for development of the exploit. It makes development of the exploit easier. It makes it far easier to do the exploit.
    from the article
    08-05-11 09:47 AM
  5. Tnis's Avatar
    I take security seriously. That's why I would never buy a device for one of the less secure platforms (Apple & Android). BlackBerry is most secure.

    Posted from my CrackBerry at wapforums.crackberry.com
    08-05-11 10:17 PM
  6. Accidental Post's Avatar
    So in a nutshell they can exploit your phone somehow with some sort of something no app no download no webpage no email just hey we can exploit a phone....pfffft easy enough jb the phone and change the root password...now try to exploit my phone
    08-06-11 10:31 AM
LINK TO POST COPIED TO CLIPBOARD