Archiv: iOS (operating system)


03.09.2021 - 20:21 [ Wired ]

Apple Backs Down on Its Controversial Photo-Scanning Plans

In August, Apple detailed several new features intended to stop the dissemination of child sexual abuse materials. The backlash from cryptographers to privacy advocates to Edward Snowden himself was near-instantaneous, largely tied to Apple’s decision not only to scan iCloud photos for CSAM, but to also check for matches on your iPhone or iPad. After weeks of sustained outcry, Apple is standing down. At least for now.

09.08.2021 - 09:38 [ Eva, Director of Cybersecurity @EFF / Twitter ]

Apple distributed this internal memo this morning, dismissing their critics as „the screeching voices of the minority.“ I will never stop screeching about the importance of privacy, security, or civil liberties. And neither should you.

(06.08.2021)

09.08.2021 - 09:04 [ CyberPreserve / Twitter ]

A week after Apple introduced an important update iOS 14.7, which despite including critical security fixes, failed to address a vulnerability in iMessage that can be misused by the adversaries to pose a threat and attack iPhones via Pegasus malware.

(02.08.2021)

09.08.2021 - 08:53 [ Raya / Twitter ]

Shocking how Apple still has the nerve to claim they care about user privacy, just a few weeks after the Pegasus leak revealed that a spyware took advantage of (among other things) a big vulnerability on iMessage… the same app they’re now deploying a privacy backdoor to…

(06.08.2021)

09.08.2021 - 08:36 [ Will Cathcart, Head of @WhatsApp at @Facebook / Twitter ]

I read the information Apple put out yesterday and I’m concerned. I think this is the wrong approach and a setback for people’s privacy all over the world. People have asked if we’ll adopt this system for WhatsApp. The answer is no.

(06.08.2021)

09.08.2021 - 06:42 [ Electronic Frontier Foundation ]

Apple’s Plan to „Think Different“ About Encryption Opens a Backdoor to Your Private Life

(05.08.2021)

To say that we are disappointed by Apple’s plans is an understatement. Apple has historically been a champion of end-to-end encryption, for all of the same reasons that EFF has articulated time and time again. Apple’s compromise on end-to-end encryption may appease government agencies in the U.S. and abroad, but it is a shocking about-face for users who have relied on the company’s leadership in privacy and security.

There are two main features that the company is planning to install in every Apple device. One is a scanning feature that will scan all photos as they get uploaded into iCloud Photos to see if they match a photo in the database of known child sexual abuse material (CSAM) maintained by the National Center for Missing & Exploited Children (NCMEC). The other feature scans all iMessage images sent or received by child accounts—that is, accounts designated as owned by a minor—for sexually explicit material, and if the child is young enough, notifies the parent when these images are sent or received. This feature can be turned on or off by parents.

09.08.2021 - 06:37 [ Eva, Director of Cybersecurity @EFF / Twitter ]

Louder, for the people in the back: it’s impossible to build a client-side scanning system that can only be used for sexually explicit images sent or received by children.

(05.08.2021)

09.08.2021 - 06:31 [ newsnationnow.com ]

Apple’s plan to scan iPhone images raises privacy concerns

(05.08.2021)

Apple intends to install software on iPhones sold in the United States to scan for child abuse imagery, raising alarm that the move could open the door to surveillance of millions of personal devices.

Liberty Vittert, a professor of data science at Washington University in St. Louis and the features editor of the Harvard Data Science Review, says this is “a cosmic shift in big tech monitoring.”

09.08.2021 - 06:18 [ BGR.com ]

Apple just announced a major change that has privacy advocates totally freaked out

If the thousands of security and privacy experts who’ve raised an outcry on social media over the past few days — and signed at least one letter calling for change — are correct, then Apple is about to make a staggeringly awful miscalculation. More specifically, they’re warning that a new feature set baked into the company’s software in the name of cracking down on one very specific, very horrible act (using iPhones in the service of child exploitation) will actually open the door to the very dystopian privacy nightmare that Apple’s own leaders have warned about for years.

19.07.2021 - 18:16 [ Golem.de ]

NSO Group: Pegasus-Staatstrojaner für Android entdeckt

(4. April 2017)

Die Sicherheitsfirma Lookout hat in Kooperation mit Google eine Android-Version der Pegasus-Spionagesoftware gefunden. Im vergangenen Jahr hatte das Unternehmen in Kooperation mit dem Citizen Lab der Universität Toronto die iOS-Version der Schadsoftware gefunden, die vor allem gegen Aktivisten und Dissidenten eingesetzt wird.

19.07.2021 - 06:19 [ Organized Crime and Corruption Reporting Project / Twitter ]

iMessage, WhatsApp, and FaceTime are vulnerable to „zero-click exploits“ — bugs that allow hackers to commandeer a mobile phone even when the target does nothing to trigger the breach. #PegasusProject

19.07.2021 - 06:15 [ Bill Marczak / Twitter ]

(1) @AmnestyTech saw an iOS 14.6 device hacked with a zero-click iMessage exploit to install Pegasus. We at @citizenlab also saw 14.6 device hacked with a zero-click iMessage exploit to install Pegasus. All this indicates that NSO Group can break into the latest iPhones.

19.07.2021 - 05:06 [ Tagesschau.de ]

Spähsoftware: Wie „Pegasus“ aufs Handy kommt

Sicherheitsexperten von Amnesty International fanden auf mehreren, auch aktuellen iPhones Spuren der „Pegasus“-Software, die anscheinend auf diesem Weg auf das Gerät gelangt war. Ihrer Analyse zufolge kann das Spähprogramm unter Ausnutzung des internetbasierten Dienstes iMessage aus der Ferne installiert werden. Die NSO-Kunden müssen dafür nur die Telefonnummer der Zielperson eingeben.

11.06.2021 - 10:15 [ Ultrasurf.us ]

ULTRASURF

Why Use Ultrasurf?
– Circumvent internet censorship
– Encrypt online communications
– Hide your IP from websites visited
– Fast page loads
– Easy to use

06.06.2021 - 12:00 [ Ultrasurf.us ]

ULTRASURF

Why Use Ultrasurf?
– Circumvent internet censorship
– Encrypt online communications
– Hide your IP from websites visited
– Fast page loads
– Easy to use

17.04.2021 - 18:20 [ Radio Utopie ]

Wie Ihr Eure Emails verschlüsselt – ein für allemal!

Auf pep.security findet Ihr alles Weitere. Die einzelnen Download Links zu den Programmversionen für Outlook, Thunderbird, iOS und Android erspare ich mir hier, die findet Ihr dort.

Wenn Ihr wissen wollt, wer da nun wieder dahintersteckt: hier die Ratsmitglieder der pep Foundation. Der harte Kern. Mehr muss ich dazu nicht sagen.

24.03.2021 - 17:44 [ Apple App Store ]

pEp Email with Encryptio‪n‬

pEp is an email client for all kind of E-Mail accounts.

With pEp you organize all your existing mailboxes like iCloud, Gmail, Outlook, Office365, Yahoo, AOL, IMAP or Exchange in one single iOS app.

24.03.2021 - 17:40 [ pep.security ]

Privacy by Default: p=p security

Support for all established encryption methods. And all your devices. Fully automatic. For your peace of mind. And your convenience.

03.03.2021 - 14:52 [ Apple App Store ]

pEp Email with Encryptio‪n‬

pEp is an email client for all kind of E-Mail accounts.

With pEp you organize all your existing mailboxes like iCloud, Gmail, Outlook, Office365, Yahoo, AOL, IMAP or Exchange in one single iOS app.

03.03.2021 - 14:43 [ pep.security ]

Privacy by Default: p=p security

Support for all established encryption methods. And all your devices. Fully automatic. For your peace of mind. And your convenience.

03.03.2021 - 13:06 [ macobserver.com ]

5 Encrypted DNS Services to Use on iOS and macOS

Short for Domain Name System, DNS is commonly referred to as the “phone book” of the internet. It helps connect web browsers with web servers by translating addresses like 104.26.0.124 into www.macobserver.com. Here are five encrypted DNS services that I recommend.

There are several different ways to use a DNS server. One is to manually go into network settings on each and configure the Wi-Fi. The second way is to download an app, and the third way is to go into your router settings and configure it there.

03.01.2021 - 09:45 [ Haaretz ]

A Shady Israeli Intel Genius, His Cyber-spy Van and Million-dollar Deals

(31.12.2020)

Aliada, according to the suit, is a group of cyberweapon companies whose products are branded under the name Intellexa. In May 2019, it added, the group recruited Eran Beck, a former head of the Military Intelligence’s cyber department, as its director of development.

02.07.2020 - 16:41 [ DailyMail..co.uk ]

Is there a secret Covid tracker on your phone? Android and iPhone users say new feature has suddenly appeared on their handsets – without anyone installing it

Proponents are hailing the arrival of the system as a step towards stamping out the virus and ending lockdown.

The function is automatically disabled in countries without contact-tracing apps, such as Britain and the US.

31.08.2019 - 08:38 [ Project Zero team at Google ]

Implant Teardown

The implant has access to all the database files (on the victim’s phone) used by popular end-to-end encryption apps like Whatsapp, Telegram and iMessage. We can see here screenshots of the apps on the left, and on the right the contents of the database files stolen by the implant which contain the unencrypted, plain-text of the messages sent and received using the apps:

(…)

There’s something thus far which is conspicuous only by its absence: is any of this encrypted? The short answer is no: they really do POST everything via HTTP (not HTTPS) and there is no asymmetric (or even symmetric) encryption applied to the data which is uploaded. Everything is in the clear. If you’re connected to an unencrypted WiFi network this information is being broadcast to everyone around you, to your network operator and any intermediate network hops to the command and control server.

This means that not only is the end-point of the end-to-end encryption offered by messaging apps compromised; the attackers then send all the contents of the end-to-end encrypted messages in plain text over the network to their server.

31.08.2019 - 08:26 [ Project Zero team at Google ]

A very deep dive into iOS Exploit chains found in the wild

I recommend that these posts are read in the following order:

31.08.2019 - 08:20 [ Gizmodo ]

Google Hackers Reveal Websites Hacked Thousands of iPhone Users Silently for Years

“To be targeted might mean simply being born in a certain geographic region or being part of a certain ethnic group,” he said. “All that users can do is be conscious of the fact that mass exploitation still exists and behave accordingly; treating their mobile devices as both integral to their modern lives, yet also as devices which when compromised, can upload their every action into a database to potentially be used against them.”

31.08.2019 - 07:50 [ derStandard.at ]

Mysteriöser iOS-Hack: Websites infizierten jahrelang iPhones

Außerdem war die IP-Adresse des Servers, zu dem die Daten versandt wurden, fest in der Malware kodiert. Das erleichtert es, den Angreifer ausfindig zu machen – Google hat aber hierzu keine weiteren Informationen öffentlich gemacht.