General Technical discussion: NSA backdoor/jailbreak and comparable root access methods

Discussion in 'Jailbreaks and iOS Hacks' started by Patrick J, Dec 30, 2013.

  1. Patrick J macrumors 65816

    Patrick J

    Joined:
    Mar 12, 2009
    Location:
    Oporto, Portugal
    #1
    Not a political or religious discussion, nor one of Social Issues.

    Specifically interested in theorising about similarities between our current jailbreak method and the NSAs method.

    As mentioned in sources, they require physical access to the devices via rerouted shipping, and no over the air exploit yet.

    I suppose they are getting root access through some exploit in iOS and installing some proprietary tools.


    Link to Thread discussion Political side of this
    Spiegel
    CultofMac
     
  2. Patrick J thread starter macrumors 65816

    Patrick J

    Joined:
    Mar 12, 2009
    Location:
    Oporto, Portugal
    #2
    Apparently they can push and pull files, hot mic, camera, through a "Software Implant" called DROPOUTJEEP, which communicates with NSA servers.


    [​IMG]
     
  3. Carlanga macrumors 604

    Carlanga

    Joined:
    Nov 5, 2009
    #3
    They prob just bought i0nic jb, injection vectors, etc or from any other "security" firm that works with iOS devices.
     
  4. Patrick J thread starter macrumors 65816

    Patrick J

    Joined:
    Mar 12, 2009
    Location:
    Oporto, Portugal
    #4
    So it is a given that at any number of time, there are multiple vectors in iOS7. Now it makes sense that Apple fixes up and holes as fast as they can.

    Maybe they could invest some of that stash in buying these exploits from companies, and fixing them?
     
  5. oplix, Dec 31, 2013
    Last edited: Dec 31, 2013

    oplix macrumors 65816

    oplix

    Joined:
    Jun 29, 2008
    Location:
    New York, NY
    #5
    Technical discussion: NSA backdoor/jailbreak and comparable root access methods

    If they are hacking iphones on a large scale it is guaranteed to be carrier and/or apple server hacking which is out of your hands. There is zero chance that it is being done locally on anyone's phone outside of actual "person of interest" scenarios where they might use some limited resources to intercept and install malware on physical devices.
     

Share This Page