Results 1 to 8 of 8

Thread: The New iPhone 5S Spyware Device

  1. #1

    The New iPhone 5S Spyware Device

    This video is a spoof about the new iPhone 5S, but it does show people's increasing irritation with devices that have the potential for misuse by the government.



    For those who are not aware of it, the iPhone 5S has advanced features that create some serious privacy concerns, such as the use of fingerprint biometric data.

    Apple says the fingerprint biometric data is only stored on the phone. Do you believe them? Me neither.
    "Democracy is two wolves and a lamb voting on what to have for lunch. Liberty is a well-armed lamb contesting the vote." -- Benjamin Franklin


  2. #2
    iSpy: How the NSA Accesses Smartphone Data

    http://www.spiegel.de/international/world/how-the-nsa-spies-on-smartphones-including-the-blackberry-a-921161.html

    In all of these new technologies, the dark side is that the devices can spy on you from any skilled people: the good, the bad and the ugly.
    Those who can make you believe absurdities can make you commit atrocities.

    Voltaire


  3. Do you really honestly think that the fingerprint feature will send data to the government? Really?!?
    Need links? Try AuthorLinks where you can buy or sell links based on Authorship and Klout score. Check out my blog or like me on Facebook.

  4. #4
    Quote Originally Posted by bhartzer View Post
    Do you really honestly think that the fingerprint feature will send data to the government? Really?!?
    Yes really, a little research will answer you.

    Those who can make you believe absurdities can make you commit atrocities.

    Voltaire


  5. #5
    Those who can make you believe absurdities can make you commit atrocities.

    Voltaire


  6. #6
    Quote Originally Posted by bhartzer View Post
    Do you really honestly think that the fingerprint feature will send data to the government? Really?!?
    I did not say that, but six months ago you would probably not have believed that all the large phone companies were selling information to the government. The 5S device does have the potential for more abuse.

    What most of the phone companies did not reveal is that the government is paying them big bucks for network access as well as data on individuals and it has become a huge profit center for them. From other articles that I read, the going rate for providing all of your call history is $400 to $600.

    NSA paying U.S. companies for access to communications networks - Washington Post

    We know that Google has been in cahoots with the government for several years. Be careful where you use the Chrome browser. It is very likely the most popular piece of spyware on the planet.
    "Democracy is two wolves and a lamb voting on what to have for lunch. Liberty is a well-armed lamb contesting the vote." -- Benjamin Franklin


  7. #7
    Security-Enhanced Android: NSA Edition

    Tech giants listed as part of the National Security Agency’s Prism spying program have gone to some lengths to convince the world they aren’t in bed with the U.S. government. Google has filed a request with the U.S. Foreign Intelligence Surveillance Act court asking permission to disclose more information about the government’s data requests. So there’s a certain irony that NSA programmers are now refining code that Google has approved for the company’s mobile operating system, Android. Google spokeswoman Gina Scigliano confirms that the company has already inserted some of the NSA’s programming in Android OS. “All Android code and contributors are publicly available for review at source.android.com,” Scigliano says, declining to comment further.
    Through its open-source Android project, Google has agreed to incorporate code, first developed by the agency in 2011, into future versions of its mobile operating system, which according to market researcher IDC runs on three-quarters of the smartphones shipped globally in the first quarter. NSA officials say their code, known as Security Enhancements for Android, isolates apps to prevent hackers and marketers from gaining access to personal or corporate data stored on a device. Eventually all new phones, tablets, televisions, cars, and other devices that rely on Android will include NSA code, agency spokeswoman Vanee’ Vines said in an e-mailed statement. NSA researcher Stephen Smalley, who works on the program, says, “Our goal is to raise the bar in the security of commodity mobile devices.”

    In a 2011 presentation obtained by Bloomberg Businessweek, Smalley listed among the benefits of the program that it’s “normally invisible to users.” The program’s top goal, according to that presentation: “Improve our understanding of Android security.”
    VIDEO: Obama: NSA Can't Target U.S. Persons' Phone, E-mail
    Read the entire article: Security-Enhanced Android: NSA Edition - Businessweek

    Why keeping the middle man? Remove google, offer Free NSA brand telephone and Free Gov network, and get the information you want guys, it will cost you almost nothing
    Those who can make you believe absurdities can make you commit atrocities.

    Voltaire


  8. #8
    Apple's iPhone 5S fingerprint scanner hacked by German computer club

    Apple's iPhone 5S is off to a running start with record-breaking sales, but it appears that the device's much-hyped security feature Touch ID has already been cracked. A German biometrics hacking group called the Chaos Computer Club posted a video online on Sunday demonstrating how they've bypassed the iPhone 5S' fingerprint scanner.

    The hackers say they spoofed Touch ID by taking a high-resolution photo of the users fingerprint and inverting the image, which is then printed onto a transparent sheet, using a thick toner. A thin layer of wood glue or pink latex milk was then poured over the printed image. Once dried, a thin layer of latex is created that can be used as a fingerprint.
    "Apple's sensor has just a higher resolution compared to the sensors so far. So we only needed to ramp up the resolution of our fake," a hacker nicknamed Starbug, who performed the test, saidon the group's blog. "As we have said now for more than years, fingerprints should not be used to secure anything. You leave them everywhere, and it is far too easy to make fake fingers out of lifted prints."
    The team photographed the fingerprint at an extremely high resolution of 2,400 dots per inch and printed the inverted image at 1,200 dpi. By comparison, a typical online photo is about 72 dpi, while print images are typically 300 dpi. Apple uses a 500 dpi fingerprint sensor.
    According to CNET, Starbug has been offered a reward through a website created by security researcher Nick DePetrillo, called IsTouchIDHackedYet.com. The site took pledges from donors who agreed to pay the hacker who was first to crack Touch ID. The total amount so far has passed $14,000.
    Fingerprint scanners have been tricked in the past and security researchers warn that even biometric security is not impentetrable. In 2002, a Japanese cryptographer Tsutomu Matsumoto used gelatin and a plastic mold to fake a fingerprint. In 2009, Agence France-Presse (AFP) reported that a South Korean woman spoofed a multimillion dollar fingerprint sensor with a piece of tape on her finger, in order to gain entrance into Japan.

    "We hope that this finally puts to rest the illusions people have about fingerprint biometrics," Frank Rieger, spokesperson of the Chaos Computer Club, said in a blog post. "It is plain stupid to use something that you can't change and that you leave everywhere every day as a security token."
    Apple has not responded to a request for comment.
    Apple's iPhone 5S fingerprint scanner hacked by German computer club - CBS News

    It didn't take long before security was cracked...
    Those who can make you believe absurdities can make you commit atrocities.

    Voltaire


Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •