The CIA has been trying to hack the iPhone for almost a decade

TECHi's Author Connor Livingston
Opposing Author Thehackernews Read Source Article
Last Updated
TECHi's Take
Connor Livingston
Connor Livingston
  • Words 83
  • Estimated Read 1 min

A new report has surfaced which claims that the CIA and its British counterparts have been trying to break into the “layers of encryption” that Apple uses to protect the iPhone from spying. The report, which sources documents leaked by Edward Snowden, doesn’t say how successful the agencies have been but made it clear that breaking into the iPhone is an incredibly high-priority mission and even suggests that similar efforts have been made to break into the Mac as well. 

Thehackernews

Thehackernews

  • Words 186
  • Estimated Read 1 min
Read Article

Researchers working with the Central Intelligence Agency have conducted a multi-year, sustained effort to break the security of Apple’s iPhones and iPads, according to top-secret documents obtained by The Intercept. The security researchers presented their latest tactics and achievements at a secret annual gathering, called the “Jamboree,” where attendees discussed strategies for exploiting security flaws in household and commercial electronics. The conferences have spanned nearly a decade, with the first CIA-sponsored meeting taking place a year before the first iPhone was released. By targeting essential security keys used to encrypt data stored on Apple’s devices, the researchers have sought to thwart the company’s attempts to provide mobile security to hundreds of millions of Apple customers across the globe. Studying both “physical” and “non-invasive” techniques, U.S. government-sponsored research has been aimed at discovering ways to decrypt and ultimately penetrate Apple’s encrypted firmware. This could enable spies to plant malicious code on Apple devices and seek out potential vulnerabilities in other parts of the iPhone and iPad currently masked by encryption. The CIA declined to comment for this story.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Thehackernews

Google will now verify Android developers in four countries to curb malicious apps
Google will now verify Android developers in four countries to curb malicious apps

Confirming all the Android developers in Brazil, Indonesia, Singapore, and Thailand is a substantial change to how applications will be…

WhatsApp opens an invite window for its voice-calling feature
WhatsApp opens an invite window for its voice-calling feature

WhatsApp's voice-calling feature has been highly anticipated since rumors of it popped up a few months ago and especially after…

Lenovo apologizes for pre-installing dangerous adware on its computers
Lenovo apologizes for pre-installing dangerous adware on its computers

Adware is an incredibly annoying part of buying a pre-built computer from company's like Lenovo but in some cases it…

This portable smart charger reminds you to charge your phone
This portable smart charger reminds you to charge your phone

A portable charger can save your butt on days when your smartphone never seems to leave your hand, but only…