Jump to content

CIA program sought to compromise security of Apple devices


Recommended Posts

Guest Joseph Keller
Posted (edited)

More information has come to light on government surveillance, with new information revealing a campaign by the CIA to break through the security of Apple devices.

 

 

755d632cb5c6c0795f85b047371ff92a.jpg

 

Researchers working with the agency would apparently present their latest efforts at a yearly meeting called the "Jamboree". Tactics included creating a modified version of Xcode, the software used by developers to build apps for OS X and iOS, according to The Intercept:

 

The security researchers also claimed they had created a modified version of Apple's proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. Xcode, which is distributed by Apple to hundreds of thousands of developers, is used to create apps that are sold through Apple's App Store.

 

The researchers said that they could also use this modified version of Xcode to steal passwords and messages off of affected devices. They further claimed that they could use the modified Xcode to grab data from multiple apps:

 

Researchers also claimed the modified Xcode could "force all iOS applications to send embedded data to a listening post." It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode.

 

Also unclear is how successful the CIA has been in implementing their efforts against Apple, and Apple itself has declined to comment. It should be noted that the agency hasn't discovered a backdoor, but are rather working to attack specific points they believe to be vulnerable.

 

Apple has said on multiple occasions that they have not worked with any government agencies to create backdoors into their devices and software. Apple CEO Tim Cook in particular often notes the value of privacy for the company's devices and software, penning a letter on privacy in September 2014.

 

You can read the full report at The Intercept at the link below.

 

Nick Arnott contributed to this article.

 

Source: The Intercept

 

c0860a310537153a4df70144438bb82b.gif

 

 

729ac0e5c5f08b86e7ea68232aa5f694._.png

467afdb89f277666b361882eca1b9d73._.png

fbfc1452e032c951c2fc964653db138b._.gif

 

[/url]9252a6b56757d34fd86f8c76d2eb2d94._.gif5dcaae5ece3a60399fb22d1a1fea759c._.gif

 

Continue reading...

Edited by AWS

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...