07-27-2014, 02:36 PM
|
|
Registered User
Industry Role:
Join Date: Nov 2012
Posts: 69
|
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices
Looks like we are already under surveillance. What do you think about this?
Proof and documents:
Original: http://issuu.com/jora66/docs/ios
Mirror: http://www.zdziarski.com/blog/wp-con...m s_Moved.pdf
|
|
|