- cross-posted to:
- technology
The Beijing institute developed the technique to crack an iPhone’s encrypted device log to identify the numbers and emails of senders who share AirDrop content, the city’s judicial bureau said in an online post. Police have identified multiple suspects via that method, the agency said, without disclosing if anyone was arrested. “It improves the efficiency and accuracy of case-solving and prevents the spread of inappropriate remarks as well as potential bad influences,” the bureau said.
Further read: https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html
hottari ( @hottari@lemmy.ml ) 35•1 year agoApple has been taking massive Ls after Ls wrt the security of their iPhones in recent times. It’s almost as if magically branding your products “private and secure” doesn’t work.
ExLisper ( @ExLisper@linux.community ) English14•1 year agoFinding an exploit created by state-level actor is not a massive L. They have shown in the past that they are able to hack air gaped systems, weaken commonly used security standards and implant vulnerabilities into commercial software. I don’t think you will find a company that is immune to this. Other than that, did they really have so many security issues recently?
hottari ( @hottari@lemmy.ml ) 10•1 year agoRead the article. The exploit was found by the state actors not created by them. Apple is ultimately responsible for the mishap due to the insecure design of the aforementioned feature.
Even though China partially had a hand in the creation of this flaw according to the history of the feature.
And yes, Apple has been a constant feature on the news for such privacy leaks of late. You just haven’t been paying attention.
ExLisper ( @ExLisper@linux.community ) English6•1 year agoIf state actor would create it it would be a backdoor. Exploits are by definition bugs/security issues that can be… well, exploited and state-level actors are really good at finding them. Still, if it takes resources of state actor to find an exploit I don’t think it’s a massive L. Yes, it’s totally possible they had some other serious security issues recently and I haven’t been paying attention. That’s why I’m asking.
redfellow ( @red@sopuli.xyz ) 7•1 year agoOrdering your hardware from China makes it a tad bit easier to shoehorn backdoors in it.
body_by_make ( @Cqrd@lemmy.dbzer0.com ) 6•1 year agoThat’s… basically all hardware these days…
redfellow ( @red@sopuli.xyz ) 1•1 year agoIndeed 😬
Aatube ( @Aatube@kbin.social ) 7•1 year agoIt’s almost as if an authoritarian nation has espionage professionals.
Southern Wolf ( @southernwolf@pawb.social ) 14•1 year agoWhile I have little respect for Apple’s overall privacy practices, this sounds a lot like the CCP making something up to scare protesters and dissidents from using AirDrop. There’s no sensible reason they would be advertising such an exploit openly, especially when it could potentially be used to secretly spy on dissidents, protesters, or even used in foreign espionage. Something doesn’t sit right with this.
BearOfaTime ( @BearOfaTime@lemm.ee ) 7•1 year agoWell if Apple doesn’t fix it, like they haven’t fixed the iMessage flaws) they’ve known about for years, then it’s still useful.
And most people won’t even know of this issue, and they’d still use Airdrop anyway, saying “I’m not interesting enough to spy on”.
iMessage lacks forward secrecy, so if I get your RSA key which never changes, I can read all your old messages and any new ones too. And that’s just one issue with iMessage. And people don’t know about it, and still use it, thinking it’s secure. (it’s pretty good in my opinion, just wish Apple would fix the issues linked article).
Totally agree. Their logic is to hide and deny everything, and if they say something openly, it’s likely a lie.
Possibly linux ( @possiblylinux127@lemmy.zip ) English13•1 year agoProbably not a reliable source but you should still use Foss with strong encryption (RSA2048+ ideally)
ebits21 ( @ebits21@lemmy.ca ) English9•1 year agoOh China, you rascal.
Apollo2323 ( @Apollo2323@lemmy.dbzer0.com ) 6•1 year agoThis is a great podcast about the vulnerabilities China has for their own only…
Click Here: 101. Bug bounties with Chinese characteristics
Episode webpage: http://www.recordedfuture.com/podcast
Media file: https://chrt.fm/track/DG79BE/traffic.megaphone.fm/RFEI8990516258.mp3?updated=1704745626
kworpy ( @kworpy@lemm.ee ) English5•1 year agoYou guys are gullible as shit if you think this is real. This is yet another bullshit scare tactic by the Chinese government. Also these articles are hardly even sourced and are just copypasted from other news sites to farm clicks.
Possibly linux ( @possiblylinux127@lemmy.zip ) English3•1 year agoYeah this does smell fishy. The Chinese government is quick to manipulate and lie and I doubt they would want to get people not to use a service they can break.
WebTheWitted ( @WebTheWitted@beehaw.org ) 1•1 year agoAhh, that makes sense. I was wondering, “Why the hell are they announcing their zero day to the Internet?”