📄 Extracted Text (124 words)
From: Vincenzo lozzo <
Sent: Saturday, July 19,
To: jeffrey E.
Cc: Joi Ito
Subject: iOS security (or not)
Looks like the cat is out of the bag: =ttp://www.zdziarski.com/blog/wp-
content/uploads/2014/07/iOS_Backdoors_Att=ck_Points_Surveillance_Mechanisms.pdf
The TL;DR is: it's way easier(and cheaper) to extract SMS, address =ooks, apps data, etc etc from an iPhone/iPad/etc etc
than most people =ealize.
You both use iPhone and iPads, might be a good idea to either install =he application this guy wrote (see the last few
slides) or change the =sage pattern of your devices.
Hope this is useful,
Vincenzo
<?xml version=.0" encoding=TF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version=.0">
<dict>
<key>conversation-id</key>
<integer>296657</integer>
<key>date-last-viewed</key>
<integer>0</integer>
<key>date-received</key>
<integer>1405775005</integer>
<key>flags</key>
<integer>8590195713</integer>
<key>gmail-label-ids</key>
<array>
<integer>6</integer>
<integer>2</integer>
</array>
<key>remote-id</key>
<string>424939</string>
</dict>
</plist>
1
EFTA_R1_01765296
EFTA02585633
ℹ️ Document Details
SHA-256
135e57399939c8d2e8a8fe93fa3c33fa084cd4f3ddbfc2028983a88cad616347
Bates Number
EFTA02585633
Dataset
DataSet-11
Document Type
document
Pages
1
Comments 0