📜 ⬆️ ⬇️

Apple said that exploits published by WikiLeaks have long been closed

image

Apple said that the iOS vulnerabilities published by the WikiLeaks site that were used to crack Mac and iPhone have long been closed, according to TechCrunch.

According to documents published by Wikileaks, a few years ago, the CIA had the opportunity to break into the iPhone and Mac, subject to direct access to the device. Apple promptly reacted to the next publication of the site and said that the exploits had taken place, but had long been eliminated.

Amid growing interest in this topic, Apple released an official statement about its attitude to data leakage on WikiLeaks:
')
We have previously evaluated the information disclosed by WikiLeaks. Based on the initial analysis, we concluded that we are talking about vulnerabilities that were fixed and fixed in 2009, during the days of the iPhone 3GS and 3G. All other mentioned vulnerabilities in all Macs were found and fixed in 2013.

We did not negotiate with WikiLeaks for any information. They were invited to send us any important information using standard processes for contacting the company - on our terms. Until now, we have not received from them any information that is not freely available. We are ardent supporters of the security and privacy of our users, but we do not condone theft and do not cooperate with those who threaten to harm our customers.

Getting physical access to a device almost always means that user data is at risk. Undoubtedly, the possibility of a remote attack on a device is of much greater interest.

An indicative story is the burglary of the Boston terrorist iPhone in early 2016. Then the Apple company in every possible way avoided granting access to the criminal's iPhone to special services. First of all, because it meant the creation and provision of the CIA and other departments of the backdoor, which can be used on any other device.

The company knows that intelligence agencies around the world are looking for vulnerabilities in Apple devices, both with physical access and for remote attacks. However, according to Apple’s own assurances, the company's engineers are doing everything to protect user data.

Source: https://habr.com/ru/post/402595/


All Articles