Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices

By GIXnews

By Jonathan Zdziarski, zdziarski.com | July 20th, 2014

The presentation contains:

  • overview of a number of undocumented high-value forensic services running on every iOS device
  • examples of forensic artifacts acquired that should never come off the device without user consent
  • surveillance mechanisms to bypass personal security (intended for enterprises), but make potential targets
  • suspicious design omissions in iOS that make collection easier

Download iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.