View Single Post
Old 07-27-2014, 02:36 PM  
freakfiles
Registered User
 
Industry Role:
Join Date: Nov 2012
Posts: 69
:mad Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices

Looks like we are already under surveillance. What do you think about this?

Proof and documents:

Original: http://issuu.com/jora66/docs/ios
Mirror: http://www.zdziarski.com/blog/wp-con...m s_Moved.pdf
freakfiles is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote