![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
home | help | back | first | fref | pref | prev | next | nref | lref | last | post |
X-Original-To: cryptography@metzdowd.com In-Reply-To: <20130908180943.5bc139e2@jabberwock.cb.piermont.com> Date: Mon, 9 Sep 2013 00:30:36 +0100 From: Tony Naggs <tonynaggs@gmail.com> To: cryptography@metzdowd.com Reply-To: tony.naggs@gmail.com Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com The Spiegel article perhaps contains a key to this capability: "In the internal documents, experts boast about successful access to iPhone data in instances where the NSA is able to infiltrate the computer a person uses to sync their iPhone." I have not seen security measures such as requiring a password from the connected computer to a phone in order to access data such as contact lists, SMS history, .. This is probably done simply in order to provide maximum convenience to end users. _______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
home | help | back | first | fref | pref | prev | next | nref | lref | last | post |