Archiv: imessage (spy program)


03.09.2021 - 20:21 [ Wired ]

Apple Backs Down on Its Controversial Photo-Scanning Plans

In August, Apple detailed several new features intended to stop the dissemination of child sexual abuse materials. The backlash from cryptographers to privacy advocates to Edward Snowden himself was near-instantaneous, largely tied to Apple’s decision not only to scan iCloud photos for CSAM, but to also check for matches on your iPhone or iPad. After weeks of sustained outcry, Apple is standing down. At least for now.

09.08.2021 - 09:38 [ Eva, Director of Cybersecurity @EFF / Twitter ]

Apple distributed this internal memo this morning, dismissing their critics as „the screeching voices of the minority.“ I will never stop screeching about the importance of privacy, security, or civil liberties. And neither should you.

(06.08.2021)

09.08.2021 - 09:04 [ CyberPreserve / Twitter ]

A week after Apple introduced an important update iOS 14.7, which despite including critical security fixes, failed to address a vulnerability in iMessage that can be misused by the adversaries to pose a threat and attack iPhones via Pegasus malware.

(02.08.2021)

09.08.2021 - 08:53 [ Raya / Twitter ]

Shocking how Apple still has the nerve to claim they care about user privacy, just a few weeks after the Pegasus leak revealed that a spyware took advantage of (among other things) a big vulnerability on iMessage… the same app they’re now deploying a privacy backdoor to…

(06.08.2021)

09.08.2021 - 08:36 [ Will Cathcart, Head of @WhatsApp at @Facebook / Twitter ]

I read the information Apple put out yesterday and I’m concerned. I think this is the wrong approach and a setback for people’s privacy all over the world. People have asked if we’ll adopt this system for WhatsApp. The answer is no.

(06.08.2021)

09.08.2021 - 06:42 [ Electronic Frontier Foundation ]

Apple’s Plan to „Think Different“ About Encryption Opens a Backdoor to Your Private Life

(05.08.2021)

To say that we are disappointed by Apple’s plans is an understatement. Apple has historically been a champion of end-to-end encryption, for all of the same reasons that EFF has articulated time and time again. Apple’s compromise on end-to-end encryption may appease government agencies in the U.S. and abroad, but it is a shocking about-face for users who have relied on the company’s leadership in privacy and security.

There are two main features that the company is planning to install in every Apple device. One is a scanning feature that will scan all photos as they get uploaded into iCloud Photos to see if they match a photo in the database of known child sexual abuse material (CSAM) maintained by the National Center for Missing & Exploited Children (NCMEC). The other feature scans all iMessage images sent or received by child accounts—that is, accounts designated as owned by a minor—for sexually explicit material, and if the child is young enough, notifies the parent when these images are sent or received. This feature can be turned on or off by parents.

09.08.2021 - 06:37 [ Eva, Director of Cybersecurity @EFF / Twitter ]

Louder, for the people in the back: it’s impossible to build a client-side scanning system that can only be used for sexually explicit images sent or received by children.

(05.08.2021)

09.08.2021 - 06:31 [ newsnationnow.com ]

Apple’s plan to scan iPhone images raises privacy concerns

(05.08.2021)

Apple intends to install software on iPhones sold in the United States to scan for child abuse imagery, raising alarm that the move could open the door to surveillance of millions of personal devices.

Liberty Vittert, a professor of data science at Washington University in St. Louis and the features editor of the Harvard Data Science Review, says this is “a cosmic shift in big tech monitoring.”

19.07.2021 - 06:19 [ Organized Crime and Corruption Reporting Project / Twitter ]

iMessage, WhatsApp, and FaceTime are vulnerable to „zero-click exploits“ — bugs that allow hackers to commandeer a mobile phone even when the target does nothing to trigger the breach. #PegasusProject

19.07.2021 - 06:15 [ Bill Marczak / Twitter ]

(1) @AmnestyTech saw an iOS 14.6 device hacked with a zero-click iMessage exploit to install Pegasus. We at @citizenlab also saw 14.6 device hacked with a zero-click iMessage exploit to install Pegasus. All this indicates that NSO Group can break into the latest iPhones.

19.07.2021 - 05:06 [ Tagesschau.de ]

Spähsoftware: Wie „Pegasus“ aufs Handy kommt

Sicherheitsexperten von Amnesty International fanden auf mehreren, auch aktuellen iPhones Spuren der „Pegasus“-Software, die anscheinend auf diesem Weg auf das Gerät gelangt war. Ihrer Analyse zufolge kann das Spähprogramm unter Ausnutzung des internetbasierten Dienstes iMessage aus der Ferne installiert werden. Die NSO-Kunden müssen dafür nur die Telefonnummer der Zielperson eingeben.