The iPhone®, which runs an Apple® version of Unix® runs everything as root.
1) Every process runs as root. MobileSafari, MobileMail, even the Calculator, all run with full root privileges. Any security flaw in any iPhone application can lead to a complete system compromise. A rootkit takes on a whole new meaning when the attacker has access to the camera, microphone, contact list, and phone hardware. Couple this with "always-on" internet access over EDGE and you have a perfect spying device.So, unlike your home computer, this is more vulnerable, and it can be set to listen in and photograph you with a remote compromise.
This is the NSA's wet dream, you've bugged yourself.
No comments:
Post a Comment