Jacob Applebaum, security researcher, has exposed the National Security Agency (NSA) program called DROPOUTJEEP which is the agency’s full control over Apple’s iPhone.
Applebaum spoke at the Chaos Communications Congress (CCC); a conference where hackers “get together”.
Using malware, the NSA has successfully compromised the iPhone beginning with easy access to ALL devices.
The NSA is in control over:
• iPhone camera
• searching contact lists
• retaining geolocation history
• intercepting text messages
• listening to voicemail
Applebaum stated that the NSA boasted about having 100% success rate using DROPOUTJEEP since the inception of the program in 2008.
Apple has issued a statement refuting their relationship with the NSA: “Apple has never worked with the NSA to create a backdoor in any of our products, including iPhone. Additionally, we have been unaware of this alleged NSA program targeting our products. We care deeply about our customers’ privacy and security. Our team is continuously working to make our products even more secure, and we make it easy for customers to keep their software up to date with the latest advancements. Whenever we hear about attempts to undermine Apple’s industry-leading security, we thoroughly investigate and take appropriate steps to protect our customers. We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who’s behind them.”
In 2013, hackers from the Chaos Computer Club (CCC) have proven Apple wrong when the corporation asserts that their new iPhone 5S fingerprint sensor is “a convenient and highly secure way to access your phone.”
CCC stated that it is as easy as stealing a fingerprint from a drinking glass – and anyone can do it.
According to the hacker group: “The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple’s TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID.”
Indeed, CCC stated: “First, the fingerprint of the enrolled user is photographed with 2400 dpi resolution. The resulting image is then cleaned up, inverted and laser printed with 1200 dpi onto transparent sheet with a thick toner setting. Finally, pink latex milk or white wood glue is smeared into the pattern created by the toner onto the transparent sheet. After it cures, the thin latex sheet is lifted from the sheet, breathed on to make it a tiny bit moist and then placed onto the sensor to unlock the phone. This process has been used with minor refinements and variations against the vast majority of fingerprint sensors on the market.”