surveillance

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices

By Jonathan Zdziarski, zdziarski.com | July 20th, 2014 The presentation contains: overview of a number of undocumented high-value forensic services running on every iOS device examples of forensic artifacts acquired that should never come off the device without user consent surveillance mechanisms to bypass personal security (intended for enterprises), but make potential targets suspicious design …

Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices Read More »