Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Do you honestly believe that a malicious actor who can access data storage can also necessarily access a silent mechanism to affect the security internals of a given iPhone? And also the theoretical hacker wouldn't be able to just push said theoretical silent update to your device to just exfil the data anyway?

Really having a hard time understanding the detailed security implications of your scenario beyond this vague notion you're presenting that a theoretical hacker can use theoretical tools to silently pwn any Apple device collected to the internet at any time.



> that a malicious actor who can access data storage can also necessarily access a silent mechanism to affect the security internals of a given iPhone?

A malicious actor who can access _already encrypted_ data storage where you cannot even associate files with a given account ID _without_ having already put a backdoor in the corresponding code may be able to actually put such backdoor in the software that is distributed to iPhones? Yes, I believe that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: