All the information you are asking about is provided by RIM on their website.
Printable View
All the information you are asking about is provided by RIM on their website.
Here's the thing about security. You have to have physical access to do these kind of hacks (loading a JVM, mounting via Ubuntu, etc.). If the phone gets out of your hands you're screwed no matter what. Now as far as remote exploits, as long as you have Bluetooth off, you can avoid a hack using that. But we just are getting into an era where our resources are becoming much more open whether we want them to or not. Look at Google, they collected open hotspot data driving by Wi-Fi signals as they got pictures for Google Maps for Street View and cataloged all of it and stored it.
There are a few basic things you can do, but some things will never work. The only real way to keep data safe is to deliver it yourself in person or encrypt it.
This right here sums it all up, if you can get your hands on the actual device, it's essentially game over.
Posted from my CrackBerry at wapforums.crackberry.com
When you encrypt an iPhone is it as effective as encrypting a blackberry? iirc with a certain type of BB encryption the data cannot be recovered if the password is forgotten.
Posted from my CrackBerry at wapforums.crackberry.com
Its the same way on iphone; you just have to set it to do so. In the Passcode settings there's an option to wipe the phone after a certain number of incorrect inputs (10 i believe). Same thing BB does.
People just need to face the facts, as others have stated, when you have the physical device you open yourself up to all types of exploits. When the device is in your hand you can do a lot more with it and a computer than wirelessly. This is one TINY exploit that requires many circumstances to occur before youre going to lose your data (and not have any remote security features like remote wipe). As I said earlier, youre probably more likely to be struck by lighting and win the lottery on the same day than fall victim to this specific exploit.
Now regarding wireless security, BES vs Exchange security is a negligible difference in terms of email security and can be argued for both sides.
But both devices have remote wipe, passwords, and wipe features for incorrect passwords. OS 4.0 on iphone will also give users better password protection where you can set it to any combination of letters, number, and characters instead of 4 numbers. Both devices are decently solid in terms of password protection, IF you use it (thats the key here)
iPhone security is not NEARLY as bad as people make it out to be, IF you use the features it offer. No phone is 100% ever secure, and even less so if you dont use the full extent of the security options given no matter what platform it is.
Yea I liked the humor of it too, and I always thought it was a detective squirrel myself, the current avatar always reminded me of Secret Squirrel & Morocco Mole! And I KNOW you are old enough to remember them too. ;)
Ill give you my BBery to try and get the data off.
Posted from my CrackBerry at wapforums.crackberry.com
Define "give" :D
Posted from my CrackBerry at wapforums.crackberry.com
Ahhh so once again the blogs only regurgitate what other blogs say and neglect to do their own research.
From the ORIGINAL story: "The unprotected iPhone 3GS mounting is “limited” to the DCIM folder " iPhone business security framework � Bernd Marienfeldt
So ALL the "hacker" has access to is your music/podcasts, voice recordings, and photos. I DOUBT any sensitive info in your music or podcasts, and I hope for your sake not photos because that violates most corporate policies to take pics with a camera phone of sensitive company info.
Yet again the media blows something so tiny into something big and causing public paranoia by not providing all the true facts. Youre not going to lose all your contacts and email, or anything sensitive, to a hacker through this hole
Don't worry, only parts of your phone are completely accessible when your system to block all access is active.
Im not worried, if someone wants to mess with my music, podcasts, or my 2 scenery photos on my phone be my guest.
Not exactly valuable info to me that cant be put back on the phone or I care that much to lose
But im also not that dumb to let my phone out of my possession/sight in the first place, so I have THE ULTIMATE security feature. As said before, it starts with the owner not being negligent with their device and this hole wont matter.
I do think it's rather ballsy of the original poster calling people out with the original thread title. Not a fan at all of that type of behavior, it's tacky.
However, I think that this is way overblown. It's not as if the iPhone is impervious to security risks, but this is a stretch.
Posted from my CrackBerry at wapforums.crackberry.com
I agree. It is a poorly worded title that makes it seem like RIM is better because there is more encryption and security and it somehow makes a BB better. Blackberrys still have exploits just like any other system. You can set up an iPhone with push mail that's encrypted just like a BB (not quite as integrated, but doable) using AS over SSL.
I wonder whether the person who lost the iPhone prototype has read this bit of news this morning...
That makes it 11 suicides in the last year, if you count the one last year, was it?
Another death at China iPhone maker's plant | Reuters
I would have to say rim security is pretty good
Posted from my CrackBerry at wapforums.crackberry.com
I think the big advantage that BB has over the iPhone is the BES. We use IT policies on our BES server to enforce security policies such as auto-lock and password policies. There is no method that I know of to do this with iPhones, they are all rouge devices in a secure enterprise.
I think most of what you can do via BES can be done via Exchange auto sync. You just have to set it up. You can't necceaserily restrict what happens on the device like you can on BES but you can secure your exchange from the device pretty well.
Posted from my CrackBerry at wapforums.crackberry.com