Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Status
Not open for further replies.
It is a security flaw. One the Apple can never fix as well. The encryption is pointless if a SSH ramdisk is used because the file system is mounted through the encryption engine and once done it can be DD'ed off the device for browsing at a later time.

I did not know this, thanks for enlightening me ^_^
 
I went into a verizon wireless store today to buy 2 cases. they included a screen protector and then gave me 30% off.

The lady asked if i wanted the screen protector installed on my phone and i said sure why not,

So she took the phone and said im going to go to the back because there is not as much "DUST" in there. and before i knew it she walked rite in the back. She was in the for about 7 mins, and when she came out she didn't have the screen protector on but Yet she was still "CLEANING" the iphone screen for dust.

Is there any chance she could or might of installed some spyware or something of that nature? if so , how can i check and see if she did? or check if anything was installed "Behind my back"

I would wipe the phone clean for sure. She could have installed anything on your phone. I had the same thing happen to me when I bought my 3GS a few years ago.

I have switched to AT&T since then and haven't had any problems.
 
I would wipe the phone clean for sure. She could have installed anything on your phone. I had the same thing happen to me when I bought my 3GS a few years ago.

I have switched to AT&T since then and haven't had any problems.

The 3Gs was never with Verizon. Once again, nothing could have been installed on the OP's phone.
 
You should've had a passcode activated. Ca you do a restore as new to clean it out?

There's nothing installed on it. Any executable binary would require Apple's digital signature. Unless Apple is now allowing carriers to install spyware at their stores (CarrierIQ is not spyware) or Verizon forged Apple privet key, nothing is running on the OP's phone.
 
Do note that those types of things only work on the iPad 2 and newer if and only if the phone does not have a passcode set or the passcode has not yet locked the device.
Oh ok, might read the IOS page. You are wrong hope you are never in a situation to find out.
 
You've clearly never owned an iOS device before, have you :)

If she'd installed anything it would be on the homescreen. If she'd browser on your internet, it would be in the history. If she'd opened an app, it would most likely show up in the app draw (double tap the home button).
 
You've clearly never owned an iOS device before, have you :)

If she'd installed anything it would be on the homescreen. If she'd browser on your internet, it would be in the history. If she'd opened an app, it would most likely show up in the app draw (double tap the home button).

History and apps can be cleared/closed with 2 taps.
 
Last edited by a moderator:
cant they clone my simcard?
Bottom line with today's technology/laws yes they can, and yes they do dump everything off the any phone,tablet, PC, Mac. IF you are doing something wrong stop, don't be stupid, if not be happy. The connection between capability and your nice customer service lady is very unlikely.
If your lifestyle is such then just go prepaid and change often. Not a fun way to live.
:cool:
 
Last edited:
Seriously, she probably just botched the application of the screen protector and had to try multiple times.

She might not have felt comfortable putting it on in front of you (because she hasn't done well in the past), but was obligated an extra step of customer service.

Screen protectors are not easy to put on unless you're trained at doing it.

There's absolutely no way she could have installed something without you knowing just by looking at the apps.
 
Oh ok, might read the IOS page. You are wrong hope you are never in a situation to find out.

I know what I know. And I know those devices cannot work on the iPad 2 or newer because they do not have a bootrom exploit. The only way to break into those devices is to not use a passcode, plug the device into the computer before it locks itself, or have an unsecured jailbreak. When I say unsecured jailbreak, I'm not talking about changing your SSH password, I'm talking about editing the services.plist back to defaults to remove afc2 and reset afc to only the media directory.
 
Status
Not open for further replies.
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.