So you think your messaging app encryption is secure because the company whose servers your messages go through told you that it was secure.
https://apnews.com/article/encrypted-phones-crime-encrochat-drugs-arrests-3ccc15ef095c201eb9fe55837bfdd886
It's not.
So you think your messaging app encryption is secure because the company whose servers your messages go through told you that it was secure.
https://apnews.com/article/encrypted-phones-crime-encrochat-drugs-arrests-3ccc15ef095c201eb9fe55837bfdd886
My message was to let people know that whatever security they are using, is already broken, whether or not we know it - as it's highly unlikely
(probably not even likely in the least) that our free encryption is secure.
So you think your messaging app encryption is secure because the company
whose servers your messages go through told you that it was secure.
https://apnews.com/article/encrypted-phones-crime-encrochat-drugs-arrests-3ccc15ef095c201eb9fe55837bfdd886
Never heard of EncroChat or SkyECC before this. I guess criminals don't
have the best security programmers?
I suspect they're out of business now?
My message was to let people know that whatever security they are using, is already broken, whether or not we know it - as it's highly unlikely (probably not even likely in the least) that our free encryption is secure.
Implementing secure end-to-end encryption is not child's play. It has
to be done diligently, carefully and fully tested. A tiny error can
crack open an attack vector (which here appears to be the servers, not
the point to point comms). To be clear if two phones negotiate an
end-to-end encrypted channel using ECDH, then the server is not even
really involved other than initial connection and (optionally) being a conduit for the traffic.
To imply that the failure of these criminals to correctly implement such indicates that Apple, Signal, Google(Messages) or others who employ professionals and who test their systems (or have them 3rd party tested; and/or exposed to White Hats) are also incompetent is silly.
And proven time and again when the FBI are rebuffed by the likes of
Apple when the FBI wants special access to iPhones.
To imply that the failure of these criminals to correctly implement such
indicates that Apple, Signal, Google(Messages) or others who employ
professionals and who test their systems (or have them 3rd party tested;
and/or exposed to White Hats) are also incompetent is silly.
And proven time and again when the FBI are rebuffed by the likes of
Apple when the FBI wants special access to iPhones.
while what you say is true, it doesn't actually matter.
On Thu, 29 Jun 2023 10:47:38 -0400, nospam wrote:
To imply that the failure of these criminals to correctly implement
such indicates that Apple, Signal, Google(Messages) or others who
employ professionals and who test their systems (or have them 3rd
party tested; and/or exposed to White Hats) are also incompetent is
silly.
And proven time and again when the FBI are rebuffed by the likes of
Apple when the FBI wants special access to iPhones.
while what you say is true, it doesn't actually matter.
It's not actually true but you're right that it doesn't actually matter.
The chance of Apple's encryption being secure is below zero simply because
it's the big guy to go after and Apple has a terrible history on security.
When Apple goes just one iOS release without dozens of zero-day bugs, then come back and then tell everyone how great Apple's professional coding is.
As for the FBI, you fell for their political ploy. They didn't even care about that particular iPhone. It was all James Comey's political games.Ah yes - the echo chamber conspiracies always come out ...
In article <B4gnM.1722$fNr5.1411@fx16.iad>, Alan Browne <bitbucket@blackhole.com> wrote:
Implementing secure end-to-end encryption is not child's play. It has
My message was to let people know that whatever security they are using, is >>> already broken, whether or not we know it - as it's highly unlikely
(probably not even likely in the least) that our free encryption is secure. >>
to be done diligently, carefully and fully tested. A tiny error can
crack open an attack vector (which here appears to be the servers, not
the point to point comms). To be clear if two phones negotiate an
end-to-end encrypted channel using ECDH, then the server is not even
really involved other than initial connection and (optionally) being a
conduit for the traffic.
To imply that the failure of these criminals to correctly implement such
indicates that Apple, Signal, Google(Messages) or others who employ
professionals and who test their systems (or have them 3rd party tested;
and/or exposed to White Hats) are also incompetent is silly.
And proven time and again when the FBI are rebuffed by the likes of
Apple when the FBI wants special access to iPhones.
while what you say is true, it doesn't actually matter.
the easiest way to 'break encryption' is very simple: get someone to
flip and provide all of their text messages on their phone or computer, already unencrypted, which they have to be for that person to read and respond, along with any other evidence they may have. even the best encryption in the world can't protect against that.
as the saying goes, one person can keep a secret, but not two.
On 2023-06-29 12:05, Oscar Mayer wrote:
On Thu, 29 Jun 2023 10:47:38 -0400, nospam wrote:
To imply that the failure of these criminals to correctly implement
such indicates that Apple, Signal, Google(Messages) or others who
employ professionals and who test their systems (or have them 3rd
party tested; and/or exposed to White Hats) are also incompetent is
silly.
And proven time and again when the FBI are rebuffed by the likes of
Apple when the FBI wants special access to iPhones.
while what you say is true, it doesn't actually matter.
It's not actually true but you're right that it doesn't actually matter.
The chance of Apple's encryption being secure is below zero simply because
You realize in the context that "below zero" in this context reveals
your utter stupidity?
it's the big guy to go after and Apple has a terrible history on security.
Does it? Funny how the FBI have to beg for access and Apple turn them down.
When Apple goes just one iOS release without dozens of zero-day bugs, then >> come back and then tell everyone how great Apple's professional coding is.
All co's have 0 day bugs. A funny one being Android's recent 999 boo-boo.
But will entertain your citations where Apple encryption in Messages has
been successfully attacked. (And save your time: "social" attacks and
weak passwords are user side problems).
As for the FBI, you fell for their political ploy. They didn't even care
about that particular iPhone. It was all James Comey's political games.
Ah yes - the echo chamber conspiracies always come out ...
On Thu, 29 Jun 2023 13:05:23 -0400, Alan Browne wrote:
On 2023-06-29 12:05, Oscar Mayer wrote:
On Thu, 29 Jun 2023 10:47:38 -0400, nospam wrote:
To imply that the failure of these criminals to correctly implement
such indicates that Apple, Signal, Google(Messages) or others who
employ professionals and who test their systems (or have them 3rd
party tested; and/or exposed to White Hats) are also incompetent is
silly.
And proven time and again when the FBI are rebuffed by the likes of
Apple when the FBI wants special access to iPhones.
while what you say is true, it doesn't actually matter.
It's not actually true but you're right that it doesn't actually matter. >>>
The chance of Apple's encryption being secure is below zero simply
because
You realize in the context that "below zero" in this context reveals
your utter stupidity?
The point was that it's definite that Apple's encryption is compromised.
it's the big guy to go after and Apple has a terrible history on
security.
Does it? Funny how the FBI have to beg for access and Apple turn them
down.
Funny. The government _owned_ the phone that they made that big stink
about. Yes. They owned not only the phone, but _all_ the backups.
Your logic that the FBI needed to 'beg for access' to a phone that they
said then they had all the data to
<misinformation>On 2023-06-29 10:57, Oscar Mayer wrote:
Quote!
On Thu, 29 Jun 2023 13:05:23 -0400, Alan Browne wrote:
On 2023-06-29 12:05, Oscar Mayer wrote:
On Thu, 29 Jun 2023 10:47:38 -0400, nospam wrote:
To imply that the failure of these criminals to correctly implement
such indicates that Apple, Signal, Google(Messages) or others who
employ professionals and who test their systems (or have them 3rd
party tested; and/or exposed to White Hats) are also incompetent is
silly.
And proven time and again when the FBI are rebuffed by the likes of
Apple when the FBI wants special access to iPhones.
while what you say is true, it doesn't actually matter.
It's not actually true but you're right that it doesn't actually matter. >>>
The chance of Apple's encryption being secure is below zero simply
because
You realize in the context that "below zero" in this context reveals
your utter stupidity?
The point was that it's definite that Apple's encryption is compromised.
it's the big guy to go after and Apple has a terrible history on
security.
Does it? Funny how the FBI have to beg for access and Apple turn them
down.
Funny. The government _owned_ the phone that they made that big stink
about. Yes. They owned not only the phone, but _all_ the backups.
Your logic that the FBI needed to 'beg for access' to a phone that they
said then they had all the data to is no different than Trump's logic that
he won the election before the ballots were even finished counting.
You fell, hook, line & sinker... for the politics (and apparently you never read the news thereafter that the FBI admitted it was all just a ploy).
When Apple goes just one iOS release without dozens of zero-day bugs,
then
come back and then tell everyone how great Apple's professional
coding is.
All co's have 0 day bugs. A funny one being Android's recent 999
boo-boo.
Funny that iOS has had more than ten times the number of zero-day bugs for the past five years in a row. That's how terribly bad iOS security is.
But will entertain your citations where Apple encryption in Messages
has been successfully attacked. (And save your time: "social" attacks
and weak passwords are user side problems).
Apple can't even code a web browser without twenty zero-day holes in it. There's no operating system less secure than iOS due to Apple's bad coding.
As for the FBI, you fell for their political ploy. They didn't even care >>> about that particular iPhone. It was all James Comey's political games.
Ah yes - the echo chamber conspiracies always come out ...
You're the one who doesn't know the FBI admitted they never needed anything for that iPhone (or for any iPhone) since they're completely compromised.
On Thu, 29 Jun 2023 13:05:23 -0400, Alan Browne wrote:
On 2023-06-29 12:05, Oscar Mayer wrote:
The chance of Apple's encryption being secure is below zero simply
because
You realize in the context that "below zero" in this context reveals
your utter stupidity?
The point was that it's definite that Apple's encryption is
compromised.
Does it? Funny how the FBI have to beg for access and Apple turn
them down.
Funny. The government _owned_ the phone that they made that big stink
about. Yes. They owned not only the phone, but _all_ the backups.
Your logic that the FBI needed to 'beg for access' to a phone that
they said then they had all the data to
You fell, hook, line & sinker... for the politics
When Apple goes just one iOS release without dozens of zero-day
bugs, then come back and then tell everyone how great Apple's
professional coding is.
All co's have 0 day bugs. A funny one being Android's recent 999
boo-boo.
Funny that iOS has had more than ten times the number of zero-day bugs
for the past five years in a row. That's how terribly bad iOS security
is.
But will entertain your citations where Apple encryption in Messages
has been successfully attacked. (And save your time: "social"
attacks and weak passwords are user side problems).
Apple can't even code a web browser without twenty zero-day holes in
it.
Funny. The government _owned_ the phone that they made that big stink
about. Yes. They owned not only the phone, but _all_ the backups.
The phone I'm referring to was the property of a mass shooter - seized
by the FBI.
Same crap being recycled, distorted, derives to nonsense, as usual.
On Thu, 29 Jun 2023 14:12:11 -0400, Alan Browne wrote:
Same crap being recycled, distorted, derives to nonsense, as usual.
Are you seriously denying the existence of numerous zero-day holes in iOS? What's next with you Trumpists who only care to make Apple great again
There are so many zero-day holes in iOS that they stopped accepting them.
The result is that every iPhone is already fully & completely compromised. Why do you think the FBI doesn't even care about Apple security anymore?
On Jun 29, 2023, Alan Browne wrote
(in article<news:0OjnM.3422$t9v6.456@fx15.iad>):
Funny. The government _owned_ the phone that they made that big
stink about. Yes. They owned not only the phone, but _all_ the
backups.
The phone I'm referring to was the property of a mass shooter -
seized by the FBI.
Only a dumb fool like you blah blah blah...
as the saying goes, one person can keep a secret, but not two.
It's not clear how the police broke in here - and they definitely won't
be telling.
If the crooks used an iPhone, they're all already broken into long ago. https://cyberscoop.com/ios-zero-day-zerodium-high-supply/
Charles Jack Jones <charliejackjones@cjj.com> wrote:
as the saying goes, one person can keep a secret, but not two.
It's not clear how the police broke in here - and they definitely won't
be telling.
If the crooks used an iPhone, they're all already broken into long ago.
https://cyberscoop.com/ios-zero-day-zerodium-high-supply/
Apple has the worst record in smartphones for zero day holes but all the operating systems have been increasing (not decreasing) in their numbers.
https://www.darkreading.com/edge-articles/apple-s-constant-battles-against-zero-day-exploits
as the saying goes, one person can keep a secret, but not two.
It's not clear how the police broke in here - and they definitely won't
be telling.
On Thu, 29 Jun 2023 12:58:35 -0400, Alan Browne wrote:
as the saying goes, one person can keep a secret, but not two.
It's not clear how the police broke in here - and they definitely
won't be telling.
If the crooks used an iPhone, they're all already broken into long
ago.
as the saying goes, one person can keep a secret, but not two.
It's not clear how the police broke in here - and they definitely
won't be telling.
If the crooks used an iPhone, they're all already broken into long
ago.
Another bullshit claim without evidence.
On 30 Jun 2023 03:15:26 GMT, Jolly Roger wrote:
as the saying goes, one person can keep a secret, but not two.
It's not clear how the police broke in here - and they definitely
won't be telling.
If the crooks used an iPhone, they're all already broken into long
ago.
Another bullshit claim without evidence.
Apple iPhones are most vulnerable to hacking when powered off https://www.gizmochina.com/2022/05/24/apple-iphone-vulnerable-hacking-powered-off/
Charles Jack Jones <charliejackjones@cjj.com> wrote:
as the saying goes, one person can keep a secret, but not two.
It's not clear how the police broke in here - and they definitely won't
be telling.
If the crooks used an iPhone, they're all already broken into long ago.
https://cyberscoop.com/ios-zero-day-zerodium-high-supply/
Apple has the worst record in smartphones for zero day holes but all the operating systems have been increasing (not decreasing) in their numbers.
https://www.darkreading.com/edge-articles/apple-s-constant-battles-against-zero-day-exploits
On Thu, 29 Jun 2023 13:05:23 -0400, Alan Browne wrote:
On 2023-06-29 12:05, Oscar Mayer wrote:
On Thu, 29 Jun 2023 10:47:38 -0400, nospam wrote:You realize in the context that "below zero" in this context reveals
To imply that the failure of these criminals to correctly implement
such indicates that Apple, Signal, Google(Messages) or others who
employ professionals and who test their systems (or have them 3rd
party tested; and/or exposed to White Hats) are also incompetent is
silly.
And proven time and again when the FBI are rebuffed by the likes of
Apple when the FBI wants special access to iPhones.
while what you say is true, it doesn't actually matter.
It's not actually true but you're right that it doesn't actually matter. >>>
The chance of Apple's encryption being secure is below zero simply because >>
your utter stupidity?
The point was that it's definite that Apple's encryption is compromised.
Apple iPhones are most vulnerable to hacking when powered off
https://www.gizmochina.com/2022/05/24/apple-iphone-vulnerable-hacking-powered-off/
More bullshit.
On Jun 29, 2023, Alan Browne wrote
(in article<news:0OjnM.3422$t9v6.456@fx15.iad>):
Funny. The government _owned_ the phone that they made that big stink
about. Yes. They owned not only the phone, but _all_ the backups.
The phone I'm referring to was the property of a mass shooter - seized
by the FBI.
Only a dumb fool like you would think that case was about an iPhone.
It was about backdoors into EVERY system, Microsoft & Android included. https://www.wired.com/2016/02/apple-fbi-privacy-security/
The case was very carefully selected simply because it was a terrorism case where people (like you are) were emotional about it and not at all logical.
Ron, the lamest troll in town.
Am 30.06.23 um 03:56 schrieb Peter:
Charles Jack Jones <charliejackjones@cjj.com> wrote:
as the saying goes, one person can keep a secret, but not two.
It's not clear how the police broke in here - and they definitely
won't be telling.
If the crooks used an iPhone, they're all already broken into long
ago. https://cyberscoop.com/ios-zero-day-zerodium-high-supply/
Apple has the worst record in smartphones for zero day holes but all
the operating systems have been increasing (not decreasing) in their
numbers.
https://www.darkreading.com/edge-articles/apple-s-constant-battles-against-zero-day-exploits
Arlen! Are you back?
On 30 Jun 2023 03:15:26 GMT, Jolly Roger wrote:
as the saying goes, one person can keep a secret, but not two.
It's not clear how the police broke in here - and they definitely
won't be telling.
If the crooks used an iPhone, they're all already broken into long
ago.
Another bullshit claim without evidence.
Apple iPhones are most vulnerable to hacking when powered off https://www.gizmochina.com/2022/05/24/apple-iphone-vulnerable-hacking-powered-off/
Am 30.06.2023 um 05:46:17 Uhr schrieb Bob Campbell:
Apple iPhones are most vulnerable to hacking when powered off
More bullshit.
There's a new zero day zero click exploit in the iPhone nearly every week.
On 2023-06-30, Patron Saint <patron@saint.com> wrote:
On 30 Jun 2023 03:15:26 GMT, Jolly Roger wrote:
as the saying goes, one person can keep a secret, but not two.
It's not clear how the police broke in here - and they definitely
won't be telling.
If the crooks used an iPhone, they're all already broken into long
ago.
Another bullshit claim without evidence.
Apple iPhones are most vulnerable to hacking when powered off
https://www.gizmochina.com/2022/05/24/apple-iphone-vulnerable-hacking-powered-off/
This shit article claims something "could be potentially exploited", and *that's* your evidence? Your trolls are *weak* as ever.
as the saying goes, one person can keep a secret, but not two.
It's not clear how the police broke in here - and they definitely
won't be telling.
If the crooks used an iPhone, they're all already broken into long
ago.
Another bullshit claim without evidence.
Apple iPhones are most vulnerable to hacking when powered off
https://www.gizmochina.com/2022/05/24/apple-iphone-vulnerable-hacking-powered-off/
This shit article claims something "could be potentially exploited", and *that's* your evidence? Your trolls are *weak* as ever.
Am 30.06.2023 um 05:46:17 Uhr schrieb Bob Campbell:
Apple iPhones are most vulnerable to hacking when powered off
https://www.gizmochina.com/2022/05/24/apple-iphone-vulnerable-hacking-powered-off/
More bullshit.
There's a new zero day zero click exploit in the iPhone nearly every week. https://www.wired.com/story/kaspersky-apple-ios-zero-day-intrusion/
This is from just yesterday but tomorrow there will be more iOS exploits. https://www.lifewire.com/zero-day-flaw-leaves-iphone-vulnerable-7554530
There's a new zero day zero click exploit in the iPhone nearly every week.
New zero day vulnerabilities are regularly discovered in *most* operating systems, dumb ass - Android isn't special in that regard:
Google advises Android users to take action after finding 18 zero-day vulnerabilities in popular phones
"All an attacker needs is the target's phone number" <https://www.techspot.com/news/97971-google-advises-android-users-take-action-after-finding.html>
*All* technology has security vulnerabilities. Security researchers look
for and find vulnerabilities all of the time - in Apple products and
products made by Apple's competitors. What really matters most is how
each company reacts to address vulnerabilities as they are found or
reported, and how the company protects the security and privacy of its customers. Generally Apple does a pretty good job of patching security vulnerabilities in its products in a timely manner - though there is
always an occasional case or two where they could improve. And Apple
does a much better job than their competitors of ensuring the majority
of customers are running the latest version of the operating system for
their device. Most iOS attacks only work with older models that are
still running older operating systems that have not been updated.
Google doesn't need to build an entire new operating system version just to patch a few lines of code in any given application or kernel exploit.
It's understandable when you understand Apple has to release an entire new operating system version on every bug fix while nobody else has to do that.
The reason is Apple has to compile & release an entire iOS operating system while every other operating system just has to fix a few lines of code.
It's understandable when you understand Apple has to release an entire new operating system version on every bug fix while nobody else has to do that.
Am 30.06.2023 um 22:55:07 Uhr schrieb Jolly Roger:
There's a new zero day zero click exploit in the iPhone nearly every
week.
New zero day vulnerabilities are regularly discovered in *most*
operating systems, dumb ass - Android isn't special in that regard:
What's "special" is that iOS has the worst track record in history
Google doesn't need to build an entire new operating system version
just to patch a few lines of code in any given application or kernel
exploit.
*All* technology has security vulnerabilities. Security researchers
look for and find vulnerabilities all of the time - in Apple products
and products made by Apple's competitors. What really matters most is
how each company reacts to address vulnerabilities as they are found
or reported, and how the company protects the security and privacy of
its customers. Generally Apple does a pretty good job of patching
security vulnerabilities in its products in a timely manner - though
there is always an occasional case or two where they could improve.
And Apple does a much better job than their competitors of ensuring
the majority of customers are running the latest version of the
operating system for their device. Most iOS attacks only work with
older models that are still running older operating systems that have
not been updated.
What really matters is how slow Apple is to patch known iOS bugs.
What really matters is how slow Apple is to patch known iOS bugs.
The reason is Apple has to compile & release an entire iOS operating system while every other operating system just has to fix a few lines of code.
On 30 Jun 2023 14:46:05 GMT, Jolly Roger wrote:
as the saying goes, one person can keep a secret, but not two.
It's not clear how the police broke in here - and they definitely
won't be telling.
If the crooks used an iPhone, they're all already broken into long
ago.
Another bullshit claim without evidence.
Apple iPhones are most vulnerable to hacking when powered off
https://www.gizmochina.com/2022/05/24/apple-iphone-vulnerable-hacking-powered-off/
This shit article claims something "could be potentially exploited",
and *that's* your evidence? Your trolls are *weak* as ever.
With iOS 16 being even buggier than normal
there's no chance of iPhones being secure
You never read news
The FBI doesn't need a backdoor into iOS
Apple does NOT release an entire 5GB iOS
version for a bugfix. x.x.x updates are usually under 100MB.
What really matters is how slow Apple is to patch known iOS bugs.
Another bullshit claim without evidence
On 6/30/23 10:54 AM, Bob Campbell wrote:
Apple does NOT release an entire 5GB iOS
version for a bugfix. x.x.x updates are usually under 100MB.
What never changes is the sheer stupid ignorance of Apple posters such as this moron, Bob Campbell who confuses the release with the delta build.
Am 29.06.23 um 07:01 schrieb Stefan Claas:
So you think your messaging app encryption is secure because the company
whose servers your messages go through told you that it was secure.
https://apnews.com/article/encrypted-phones-crime-encrochat-drugs-arrests-3ccc15ef095c201eb9fe55837bfdd886
It's not.
Your link/article is superold news. The company Encrochat does not exist anymore for a longer period of time.
On 29.06.23 8:06, Alan Browne wrote:
So you think your messaging app encryption is secure because the company >>> whose servers your messages go through told you that it was secure.
https://apnews.com/article/encrypted-phones-crime-encrochat-drugs-arrests-3ccc15ef095c201eb9fe55837bfdd886
Never heard of EncroChat or SkyECC before this. I guess criminals
don't have the best security programmers?
I suspect they're out of business now?
My message was to let people know that whatever security they are using, is already broken, whether or not we know it - as it's highly unlikely
(probably not even likely in the least) that our free encryption is secure.
The app ceased to exist in 2020. It could only be installed on Android
phones specifically modified to have it on their system, on terminals
that did not have a SIM card and on which the GPS, camera and microphone
were disabled.
On 6/30/23 12:01 PM, Jolly Roger wrote:
What really matters is how slow Apple is to patch known iOS bugs.
Another bullshit claim without evidence
idiot morons
moron
idiot
all idiots
idiot
incredibly stupid _all_ these idiot
stupidly
Carlos E.R. <robin_listas@es.invalid> wrote:
The app ceased to exist in 2020. It could only be installed on
Android phones specifically modified to have it on their system, on
terminals that did not have a SIM card and on which the GPS, camera
and microphone were disabled.
Now that’s an interesting bit of info. “It could only be installed
on Android phones specifically modified to have it on their system”.
Strange that the OT (original troll) did not mention that. I wonder
why?
On 2023-06-30, Bob Campbell <nunya@none.none> wrote:
Carlos E.R. <robin_listas@es.invalid> wrote:
The app ceased to exist in 2020. It could only be installed on
Android phones specifically modified to have it on their system, on
terminals that did not have a SIM card and on which the GPS, camera
and microphone were disabled.
Now that’s an interesting bit of info. “It could only be installed
on Android phones specifically modified to have it on their system”.
Strange that the OT (original troll) did not mention that. I wonder
why?
So they could insinuate this affects iPhone users too, of course. 😉
«The encrypted communications application EncroChat, widely used by organized crime, has so far resulted in 6,558 arrests worldwide, 197 of
whom were considered "high-value targets", according to the first report
on EncroChat that was presented yesterday in Lille, France, by German
and Dutch police authorities.
The app ceased to exist in 2020. I
Am 30.06.23 um 12:45 schrieb Carlos E.R.:
«The encrypted communications application EncroChat, widely used by
organized crime, has so far resulted in 6,558 arrests worldwide, 197 of
whom were considered "high-value targets", according to the first report
on EncroChat that was presented yesterday in Lille, France, by German
and Dutch police authorities.
The app ceased to exist in 2020. I
Do good things and talk about it.
This is a recent report of an old story that unfolded over several
years. For tactical reasons we hear about it just now.
On 2023-07-01 08:39, Joerg Lorenz wrote:
Am 30.06.23 um 12:45 schrieb Carlos E.R.:
«The encrypted communications application EncroChat, widely used by
organized crime, has so far resulted in 6,558 arrests worldwide, 197 of
whom were considered "high-value targets", according to the first report >>> on EncroChat that was presented yesterday in Lille, France, by German
and Dutch police authorities.
The app ceased to exist in 2020. I
Do good things and talk about it.
This is a recent report of an old story that unfolded over several
years. For tactical reasons we hear about it just now.
We hear about it now because French and German police released a report
now, telling how many criminals they have arrested till this moment.
Am 01.07.23 um 13:45 schrieb Carlos E.R.:
On 2023-07-01 08:39, Joerg Lorenz wrote:
Am 30.06.23 um 12:45 schrieb Carlos E.R.:
«The encrypted communications application EncroChat, widely used by
organized crime, has so far resulted in 6,558 arrests worldwide, 197 of >>>> whom were considered "high-value targets", according to the first report >>>> on EncroChat that was presented yesterday in Lille, France, by German
and Dutch police authorities.
The app ceased to exist in 2020. I
Do good things and talk about it.
This is a recent report of an old story that unfolded over several
years. For tactical reasons we hear about it just now.
We hear about it now because French and German police released a report
now, telling how many criminals they have arrested till this moment.
Exactly.
For me it is not clear why "professional criminals" are using things
that are outdated and not developed anymore.
They should have known about it.
My message was to let people know that whatever security they are using, is >> already broken, whether or not we know it - as it's highly unlikely
(probably not even likely in the least) that our free encryption is secure.
It depends on the use case.
It is not the same encryption for a crook or a spy, than common usage
for people that just want to thwart snoopers.
You constantly say that every update sent out to every iOS device is a full build.
can't back up anything he says with evidence
On Fri, 30 Jun 2023 12:39:59 +0200, Carlos E.R. wrote:
My message was to let people know that whatever security they are using, is >>> already broken, whether or not we know it - as it's highly unlikelyIt depends on the use case.
(probably not even likely in the least) that our free encryption is secure. >>
It is not the same encryption for a crook or a spy, than common usage
for people that just want to thwart snoopers.
Many people think Apple's messaging encryption isn't compromised.
It is.
But as you said, most people don't care that Apple's messaging is hacked.
The ones who care aren't the ones who would dare use Apple's messaging.
Since the iPhone is so hacked, hackers stopped taking zero-days long ago.
Even the iOS kernel is repeatedly hacked about a dozen times a year by NSO. Meanwhile, the Android kernel has NEVER been reported to be hacked by NSO.
Quible. It's not about how the phone is hacked by NSO. It's that it's hacked by NSO.
https://web.archive.org/web/20191204173115/https://www.kaspersky.com/blog/pegasus-spyware/14604/
Of course high profile targets (important people) tend to use iPhone
more than Android.
On Sun, 2 Jul 2023 10:34:26 -0400, Alan Browne wrote:
Quible. It's not about how the phone is hacked by NSO. It's that it's
hacked by NSO.
https://web.archive.org/web/20191204173115/https://www.kaspersky.com/blog/pegasus-spyware/14604/
Of course high profile targets (important people) tend to use iPhone
more than Android.
The crooks who use an iPhone get caught quickly as a direct result.
Because the two most exploited components of iOS are the kernel & webkit.
- but there are plenty of
other ways they can hack any phone.
It should tell you something that these crooks didn't use the iPhone
because they knew the iPhone is already compromised completely through.
On Fri, 30 Jun 2023 12:39:59 +0200, Carlos E.R. wrote:
My message was to let people know that whatever security they are using, is >>> already broken, whether or not we know it - as it's highly unlikelyIt depends on the use case.
(probably not even likely in the least) that our free encryption is secure. >>
It is not the same encryption for a crook or a spy, than common usage
for people that just want to thwart snoopers.
Many people think Apple's messaging encryption isn't compromised.
It is.
On Sun, 2 Jul 2023 11:21:06 -0400, Alan Browne wrote:
The crooks who use an iPhone get caught quickly as a direct result.NSO is not about catching crooks. It is mainly nation states using it
Because the two most exploited components of iOS are the kernel & webkit. >>
to spy on individuals. These could be legitimate security targets. But
in many cases, countries are spying on journalists and political opposition.
NSO has well known exploits of the iPhone webkit & kernel (many 0 clicks!). If you're not aware of that well known fact, then you need to read more.
There are no known NSO exploits of the Android 'webkit' or kernel
(webkit not existing of course on Android so that hole is only on iOS).
- but there are plenty of
other ways they can hack any phone.
Right - which means your bloviation, generally, is a waste of everyone's
bandwidth and time.
It's clear the criminals chose Android over the iPhone and they know more than you do. That they got caught took 3 years of concentrated FBI hacking.
It's also clear the FBI stopped asking for back doors to the iPhone.
What you need to look up is the glut of iPhone zero-click zero-day holes.
There's no need for an iPhone back door when the iPhone front door is open.
It should tell you something that these crooks didn't use the iPhone
because they knew the iPhone is already compromised completely through.
ROFL. You'll twist anything to fit your narrative - see below.
It's not "my" narrative. It's what is in the news every day of the month.
Why don't you open up a newspaper and read about the iOS zero-day holes? There's about one a week, and certainly a few iOS zero days a month.
If you don't know this, then how can you know anything about the iPhone? These criminals all used Android because they knew the iPhone is hacked.
The crooks who use an iPhone get caught quickly as a direct result.
Because the two most exploited components of iOS are the kernel & webkit.
NSO is not about catching crooks. It is mainly nation states using it
to spy on individuals. These could be legitimate security targets. But
in many cases, countries are spying on journalists and political opposition.
- but there are plenty of
other ways they can hack any phone.
Right - which means your bloviation, generally, is a waste of everyone's bandwidth and time.
It should tell you something that these crooks didn't use the iPhone
because they knew the iPhone is already compromised completely through.
ROFL. You'll twist anything to fit your narrative - see below.
Many people think Apple's messaging encryption isn't compromised.
It is.
Nope.
On 02/07/23 18:06, Jolly Roger wrote:
Many people think Apple's messaging encryption isn't compromised.
It is.
Nope.
If the iPhone messenger app isn't compromised then why are so many of those well publicized NSO zero-day zero-click iOS exploits using that messenger?
NSO's client's targets are not everyday users of cell phones (iOS or
Android) - but both platforms are targets according to the
There are no known NSO exploits of the Android 'webkit' or kernel
(webkit not existing of course on Android so that hole is only on iOS).
Which is completely irrelevant. Just convenient to you (if in fact it
is such....)
It's also clear the FBI stopped asking for back doors to the iPhone.
What you need to look up is the glut of iPhone zero-click zero-day holes.
The glut that is 1/2 of Google 0-day holes?
There's no need for an iPhone back door when the iPhone front door is open.
Suuuuuuuurrrrrre. In your fantasy world of uber cherry picked factoids
that avoid objectity;
What I know is that you are a foolish dis-information monger with a mission.
Except that everything I said is well known and in the news every month.
On Fri, 30 Jun 2023 12:39:59 +0200, Carlos E.R. wrote:
My message was to let people know that whatever security they are using, is >>> already broken, whether or not we know it - as it's highly unlikelyIt depends on the use case.
(probably not even likely in the least) that our free encryption is secure. >>
It is not the same encryption for a crook or a spy, than common usage
for people that just want to thwart snoopers.
Many people think Apple's messaging encryption isn't compromised.
It is.
But as you said, most people don't care that Apple's messaging is hacked.
The ones who care aren't the ones who would dare use Apple's messaging.
Since the iPhone is so hacked, hackers stopped taking zero-days long ago.
Even the iOS kernel is repeatedly hacked about a dozen times a year by NSO. Meanwhile, the Android kernel has NEVER been reported to be hacked by NSO.
On 02/07/23 18:06, Jolly Roger wrote:
Many people think Apple's messaging encryption isn't compromised.
It is.
Nope.
If the iPhone messenger app isn't compromised then why are so many of
those well publicized NSO zero-day zero-click iOS exploits using that messenger?
On Sun, 2 Jul 2023 11:21:06 -0400, Alan Browne wrote:
The crooks who use an iPhone get caught quickly as a direct result.
Because the two most exploited components of iOS are the kernel &
webkit.
NSO is not about catching crooks. It is mainly nation states using
it to spy on individuals. These could be legitimate security
targets. But in many cases, countries are spying on journalists and
political opposition.
NSO has well known exploits of the iPhone webkit & kernel (many 0
clicks!).
On 6/30/23 4:05 PM, Jolly Roger wrote:
can't back up anything he says with evidence
Not a single one of you iOS morons has any clue how iOS is built.
None of you undestand that NOBODY builds an OS like Apple builds iOS.
For a single line of code, Apple has to release an ENTIRE NEW RELEASE!
You constantly say that every update sent out to every iOS device is a
full build.
On Sun, 2 Jul 2023 13:08:04 -0400, Alan Browne wrote:
NSO's client's targets are not everyday users of cell phones (iOS or
Android) - but both platforms are targets according to the
Doesn't matter when the exploits are published and when Apple doesn't
fix them in time
quicksilver <invalid@spam.invalid> wrote:
Except that everything I said is well known and in the news every
month.
Then you will have no trouble posting a link that supports your claim.
Except that you ALWAYS have trouble posting a link that supports your
claim. You post a link to an opinion piece that is the same as your opinion. Which of course proves nothing. Or you post a link where
the headline appears to support your absurd claims, but when you read
the entire article it either does not support you, or it in fact
disproves your absurd claim.
Come on, Arlen. Keep your record at 100%. Post yet ANOTHER link
that does not say what you think it says.
Except that everything I said is well known and in the news every month.
Then you will have no trouble posting a link that supports your claim.
Except that you ALWAYS have trouble posting a link that supports your
claim. You post a link to an opinion piece that is the same as your opinion. Which of course proves nothing. Or you post a link where the headline appears to support your absurd claims, but when you read the
entire article it either does not support you, or it in fact disproves your absurd claim.
Then you will have no trouble posting a link that supports your claim.
He'll post unrelated articles, and won't be able to pinpoint specific
NSO exploits that have not been patched.
Doesn't matter when the exploits are published and when Apple doesn't
fix them in time
Which specific NSO exploits haven't been patched by Apple, according to
you? Put up or shut up.
What -was- compromised: NSO's zero click vector to install a trojan on iPhones (and Android phones). In the Android case they also have
"social engineering" version.
What - is not - compromised: me sending you a message over iMessage
(iOS phone to iOS phone) while both are logged into Apple's server
(AppleID).
Which of those zero days is currently unpatched, smart guy?
On 2 Jul 2023 18:43:45 GMT, Jolly Roger wrote:
Doesn't matter when the exploits are published and when Apple doesn't
fix them in time
Which specific NSO exploits haven't been patched by Apple, according to
you? Put up or shut up.
What's always your playbook reaction to explain why only iOS has its kernel completely holed by NSO is to claim that Apple never finds their bugs, but, Apple usually (after super long delays) fixes those kernel bugs eventually.
Meanwhile, this huge delay that only iOS incurs due to the monolithic build structure, is WHY iOS is always the most actively exploited smartphone OS.
On 6/30/23 12:01 PM, Jolly Roger wrote:
What really matters is how slow Apple is to patch known iOS bugs.
Another bullshit claim without evidence
None of you Apple idiot morons has any clue how Apple builds iOS.
This Jolly Roger is a moron. He has no idea how iOS is built.
This Jolly Roger is an idiot. He doesn't know how iOS is patched.
You're all idiots.
This Jolly Roger has never even once realized that Apple patches iOS as a monolith - which is completely different than all other OS's are patched.
These idiot Apple posters have NEVER read any news about Apple in their
lives since the reason Apple has more exploited zero-day bugs than any
other operating system is _because_ Apple has to build that monolith.
If a few lines of code are changed in _every_ other operating system, they patch just those small modules in every operating system other than iOS.
With iOS, Apple has to build an entire new behemoth monolithic iOS version.
It's too complicated to even bother to explain that only in iOS 16 did
Apple finally _start_ to create a non-monolithic patch release.
What never changes is how incredibly stupid _all_ these idiot Apple posters are, in that they have absolutely no idea how iOS is built & patched.
They can only whine & complain that iOS is the most exploited OS on earth (because Apple has to _build_ an entire monolithic OS for every bug fix!)
Nobody else patches an operating system that stupidly except for Apple.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 297 |
Nodes: | 16 (2 / 14) |
Uptime: | 09:39:30 |
Calls: | 6,666 |
Files: | 12,213 |
Messages: | 5,336,274 |