By Jonathan Zdziarski, zdziarski.com | July 20th, 2014
The presentation contains:
- overview of a number of undocumented high-value forensic services running on every iOS device
- examples of forensic artifacts acquired that should never come off the device without user consent
- surveillance mechanisms to bypass personal security (intended for enterprises), but make potential targets
- suspicious design omissions in iOS that make collection easier
Download iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.