From a story on ArsTechnica that goes into some of the use cases….
“Say, you plant such a bug in a conference room or an event where politicians, celebrities, or other "VIPs" come together (e.g., Oscar Awards). As soon as one of them opens the sharing pane on an Apple device, you can get hold of at least their private mobile phone number.”
Given any room of VIP’s, anyone here can get their mobile phone number of anyone there, primarily BECAUSE they’re VIP’s. I mean, they can’t even enter the room anonymously, so I’VE GOT THEIR NAME JUST BY ENTERING THE ROOM! Now, if there was only a vast trove of prior exploits that may, potentially, have obtained the cellular numbers of VIP’s…………………….
“Say you have been in email contact with a celebrity to cover a story. In case the celebrity has therefore stored your email address, you can easily get hold of their private mobile phone number when being in proximity (e.g., during an interview). In this case, the celebrity [does] not even have to open the sharing pane or otherwise touch their device!”
WOooh, now THIS is scary… A celebrity you’ve been in contact with that has shared with you their email address… YOU COULD GET THEIR PHONE NUMBER??? THAT’S SO WILD! Oh, you mean other than just asking them for it. Oh, ok, I guess that’s… but… kinda weird they’d trust you with their email address but not phone number??
When given an opportunity to come up with some reasonable use cases, THIS is what they come up with? Kinda sounds like security researchers are folks that don’t understand how folks that AREN’T security researchers communicate.
