Welcome to ECCIE, become a part of the fastest growing adult community. Take a minute & sign up!

Welcome to ECCIE - Sign up today!

Become a part of one of the fastest growing adult communities online. We have something for you, whether you’re a male member seeking out new friends or a new lady on the scene looking to take advantage of our many opportunities to network, make new friends, or connect with people. Join today & take part in lively discussions, take advantage of all the great features that attract hundreds of new daily members!

Go Premium

Go Back   ECCIE Worldwide > General Interest > Security Matters
test
Security Matters Personal security is of the utmost priority. Discussions regarding every aspect of personal security within the hobby can be found here.

Most Favorited Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Most Liked Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Top Reviewers
cockalatte 649
MoneyManMatt 490
Still Looking 399
samcruz 399
Jon Bon 397
Harley Diablo 377
honest_abe 362
DFW_Ladies_Man 313
Chung Tran 288
lupegarland 287
nicemusic 285
Starscream66 281
You&Me 281
George Spelvin 270
sharkman29 256
Top Posters
DallasRain70817
biomed163509
Yssup Rider61157
gman4453310
LexusLover51038
offshoredrilling48769
WTF48267
pyramider46370
bambino43013
The_Waco_Kid37301
CryptKicker37225
Mokoa36497
Chung Tran36100
Still Looking35944
Mojojo33117

Reply
 
Thread Tools
Old 02-20-2018, 05:40 PM   #1
bladtinzu
Valued Poster
 
bladtinzu's Avatar
 
Join Date: Feb 5, 2012
Location: The Sticks
Posts: 3,966
Encounters: 29
Default Iphone question

I quit using Apple years ago but had someone tell me he can pay a "hacker" $400 and get remote access to any iphone as long as said "hacker" has the phone number associated with the iphone in question. I do not believe this is possible but I am no tech guy by any means. And didn't the FBI fork over big bucks to get into that one phone a few years back?
bladtinzu is offline   Quote
Old 02-22-2018, 12:27 PM   #2
peabody
Valued Poster
 
Join Date: Aug 25, 2011
Location: houston, tx
Posts: 730
Encounters: 10
Default

There are many different "hacks". Breaking an encrypted password is much different than embedding a trojan key stroker that records all key strokes and allows you to retrieve it or cloning a phone so you receive calls and texts of a phone number or gaining access to a phones mic and camera so you can see and hear every thing remotely. All these hacks are possible to some degree with or with out physical access to the phone. . But I would be weary IOS is very difficult to hack but not impossible. Oh yeah this is all illegal if its not your phone and your not doing it for entertainment purposes and then it may still be illegal.
peabody is offline   Quote
Old 02-22-2018, 08:11 PM   #3
ck1942
Meet & Greet Organizer
 
ck1942's Avatar
 
Join Date: Dec 17, 2009
Location: "Hobbyverse"
Posts: 7,112
Encounters: 181
Default

Obviously we are talking here about smartphones, not analogs.

A would be hacker must first have the number on the hardware to start "prospecting."

Android or iphone or doesn't matter.

Usual routine would be to send a text to entice unwitting cooperation. Or a photo. Or a link. etc. Malware can be embedded in the message. And if the victim's phone number is also a mail box obviously the email can contain malware, too.

Opening your email on an iphone or android phone or tablet can also compromise that hardware.

If the intended victim opens any of the above, there is some malware, not all, that can automatically start embedding.

Otherwise, the victim must open the message link to start the process.

Apple claims its operating systems are malware proof, but plenty of well regarded anti-malware software providers out there. Ditto for Android os phones.

imo, any device that uses software operating systems can be targeted. Indeed, the most recent malware discoveries have been of internal device firmware and chip vulnerabilities.
ck1942 is offline   Quote
Old 02-26-2018, 09:38 AM   #4
Repairman-Jack
Valued Poster
 
Repairman-Jack's Avatar
 
Join Date: Nov 14, 2010
Location: Pittsburgh
Posts: 120
Encounters: 22
Default

It was reported that the fbi paid a one time fee of $900,000 to a hacker group to gain access after Apple refused to code a backdoor for them. Supposedly the exploit the hacker group used to gain access only worked on the 5c version of the phone running ios 9
Repairman-Jack is offline   Quote
Old 02-28-2018, 06:10 PM   #5
The Eternal Bachelor
Photographer
 
Join Date: May 10, 2012
Location: Texas
Posts: 295
Encounters: 2
Default

This just came out yesterday, Cellebrite claims to have hacked any iOS device running iOS 5 to iOS 11 as well as many Google Android devices.

https://siliconangle.com/blog/2018/0...e-hack-ios-11/
The Eternal Bachelor is offline   Quote
Reply



AMPReviews.net
Find Ladies
Hot Women

Powered by vBulletin®
Copyright © 2009 - 2016, ECCIE Worldwide, All Rights Reserved