06-08-10 08:02 AM
42 12
tools
  1. WillieLee's Avatar
    Graham, I am not arguing with you or yanking your chain. This is in the
    interest of our community.

    All I am asking is ONE person write a lucid and detailed explanation as to what makes
    the security employed by RIM better (or as some say, bulletproof) than everything
    else on the market.

    Otherwise, it is just people reciting what they have heard but with nothing to
    back it up. That simple.
    All the information you are asking about is provided by RIM on their website.
    05-28-10 01:59 PM
  2. MrObvious's Avatar
    Here's the thing about security. You have to have physical access to do these kind of hacks (loading a JVM, mounting via Ubuntu, etc.). If the phone gets out of your hands you're screwed no matter what. Now as far as remote exploits, as long as you have Bluetooth off, you can avoid a hack using that. But we just are getting into an era where our resources are becoming much more open whether we want them to or not. Look at Google, they collected open hotspot data driving by Wi-Fi signals as they got pictures for Google Maps for Street View and cataloged all of it and stored it.

    There are a few basic things you can do, but some things will never work. The only real way to keep data safe is to deliver it yourself in person or encrypt it.
    05-28-10 02:16 PM
  3. infamyx's Avatar
    Here's the thing about security. You have to have physical access to do these kind of hacks (loading a JVM, mounting via Ubuntu, etc.). If the phone gets out of your hands you're screwed no matter what.
    This right here sums it all up, if you can get your hands on the actual device, it's essentially game over.

    Posted from my CrackBerry at wapforums.crackberry.com
    05-29-10 12:10 AM
  4. grahamf's Avatar
    When you encrypt an iPhone is it as effective as encrypting a blackberry? iirc with a certain type of BB encryption the data cannot be recovered if the password is forgotten.

    Posted from my CrackBerry at wapforums.crackberry.com
    05-29-10 12:44 AM
  5. stuaw11's Avatar
    When you encrypt an iPhone is it as effective as encrypting a blackberry? iirc with a certain type of BB encryption the data cannot be recovered if the password is forgotten.

    Posted from my CrackBerry at wapforums.crackberry.com
    Its the same way on iphone; you just have to set it to do so. In the Passcode settings there's an option to wipe the phone after a certain number of incorrect inputs (10 i believe). Same thing BB does.



    People just need to face the facts, as others have stated, when you have the physical device you open yourself up to all types of exploits. When the device is in your hand you can do a lot more with it and a computer than wirelessly. This is one TINY exploit that requires many circumstances to occur before youre going to lose your data (and not have any remote security features like remote wipe). As I said earlier, youre probably more likely to be struck by lighting and win the lottery on the same day than fall victim to this specific exploit.

    Now regarding wireless security, BES vs Exchange security is a negligible difference in terms of email security and can be argued for both sides.

    But both devices have remote wipe, passwords, and wipe features for incorrect passwords. OS 4.0 on iphone will also give users better password protection where you can set it to any combination of letters, number, and characters instead of 4 numbers. Both devices are decently solid in terms of password protection, IF you use it (thats the key here)

    iPhone security is not NEARLY as bad as people make it out to be, IF you use the features it offer. No phone is 100% ever secure, and even less so if you dont use the full extent of the security options given no matter what platform it is.
    Last edited by stuaw11; 05-29-10 at 01:42 AM.
    05-29-10 01:20 AM
  6. pkcable's Avatar
    PK, I was good with the title. Graham and I are cool and I know it was just
    his dry wit, not a jab or insult.

    We'll leave it up to him
    Yea I liked the humor of it too, and I always thought it was a detective squirrel myself, the current avatar always reminded me of Secret Squirrel & Morocco Mole! And I KNOW you are old enough to remember them too.

    05-29-10 02:06 AM
  7. i7guy's Avatar
    Big deal. Nothing is safe from old school ways. I'm the one that came up with a way to pull off all the Java OS files off a BB using nothing more then a text editor, Excel, and a batch file. Lol. Look it up in the Storm forums.

    Posted from my CrackBerry at wapforums.crackberry.com
    Ill give you my BBery to try and get the data off.

    Posted from my CrackBerry at wapforums.crackberry.com
    05-29-10 02:43 AM
  8. travelingfool's Avatar
    Ill give you my BBery to try and get the data off.

    Posted from my CrackBerry at wapforums.crackberry.com
    Define "give"

    Posted from my CrackBerry at wapforums.crackberry.com
    05-29-10 02:48 AM
  9. stuaw11's Avatar
    Ahhh so once again the blogs only regurgitate what other blogs say and neglect to do their own research.

    From the ORIGINAL story: "The unprotected iPhone 3GS mounting is “limited” to the DCIM folder " iPhone business security framework « Bernd Marienfeldt

    So ALL the "hacker" has access to is your music/podcasts, voice recordings, and photos. I DOUBT any sensitive info in your music or podcasts, and I hope for your sake not photos because that violates most corporate policies to take pics with a camera phone of sensitive company info.

    Yet again the media blows something so tiny into something big and causing public paranoia by not providing all the true facts. Youre not going to lose all your contacts and email, or anything sensitive, to a hacker through this hole
    Last edited by stuaw11; 05-30-10 at 01:42 PM.
    05-30-10 01:33 PM
  10. WillieLee's Avatar
    Ahhh so once again the blogs only regurgitate what other blogs say and neglect to do their own research.

    From the ORIGINAL story: "The unprotected iPhone 3GS mounting is “limited” to the DCIM folder " iPhone business security framework « Bernd Marienfeldt

    So ALL the "hacker" has access to is your music/podcasts, voice recordings, and photos. I DOUBT any sensitive info in your music or podcasts, and I hope for your sake not photos because that violates most corporate policies to take pics with a camera phone of sensitive company info.

    Yet again the media blows something so tiny into something big and causing public paranoia by not providing all the true facts. Youre not going to lose all your contacts and email, or anything sensitive, to a hacker through this hole
    Don't worry, only parts of your phone are completely accessible when your system to block all access is active.
    05-30-10 01:47 PM
  11. stuaw11's Avatar
    Im not worried, if someone wants to mess with my music, podcasts, or my 2 scenery photos on my phone be my guest.

    Not exactly valuable info to me that cant be put back on the phone or I care that much to lose


    But im also not that dumb to let my phone out of my possession/sight in the first place, so I have THE ULTIMATE security feature. As said before, it starts with the owner not being negligent with their device and this hole wont matter.
    Last edited by stuaw11; 05-30-10 at 01:57 PM.
    05-30-10 01:51 PM
  12. PurpleSwordfish's Avatar
    I do think it's rather ballsy of the original poster calling people out with the original thread title. Not a fan at all of that type of behavior, it's tacky.

    However, I think that this is way overblown. It's not as if the iPhone is impervious to security risks, but this is a stretch.

    Posted from my CrackBerry at wapforums.crackberry.com
    05-30-10 04:55 PM
  13. MrObvious's Avatar
    I agree. It is a poorly worded title that makes it seem like RIM is better because there is more encryption and security and it somehow makes a BB better. Blackberrys still have exploits just like any other system. You can set up an iPhone with push mail that's encrypted just like a BB (not quite as integrated, but doable) using AS over SSL.
    05-30-10 05:37 PM
  14. qbnkelt's Avatar
    About the same as the odds of losing an iphone prototype at the bar
    I wonder whether the person who lost the iPhone prototype has read this bit of news this morning...

    That makes it 11 suicides in the last year, if you count the one last year, was it?

    Another death at China iPhone maker's plant | Reuters
    Last edited by Qbnkelt; 05-31-10 at 07:47 AM.
    05-31-10 07:39 AM
  15. Jiggavel's Avatar
    I would have to say rim security is pretty good

    Posted from my CrackBerry at wapforums.crackberry.com
    06-04-10 01:13 AM
  16. EdNewman's Avatar
    I think the big advantage that BB has over the iPhone is the BES. We use IT policies on our BES server to enforce security policies such as auto-lock and password policies. There is no method that I know of to do this with iPhones, they are all rouge devices in a secure enterprise.
    06-07-10 08:40 PM
  17. The_Engine's Avatar
    I think the big advantage that BB has over the iPhone is the BES. We use IT policies on our BES server to enforce security policies such as auto-lock and password policies. There is no method that I know of to do this with iPhones, they are all rouge devices in a secure enterprise.
    I think most of what you can do via BES can be done via Exchange auto sync. You just have to set it up. You can't necceaserily restrict what happens on the device like you can on BES but you can secure your exchange from the device pretty well.

    Posted from my CrackBerry at wapforums.crackberry.com
    06-08-10 08:02 AM
42 12
LINK TO POST COPIED TO CLIPBOARD