Süddeutsche.de to set as home page Note Do not show Close
display
‘) / /]]>
2 January 2014 07:37
display
‘) / /]]>
With the implant called “Dropoutjeep” the NSA could intercept the communications of iPhone users. Has Apple the intelligence built a back door? The Group objects.
The electronics giant Apple has rejected allegations, after which he had the U.S. NSA helped with the spying of its customers. The news magazine Der Spiegel and activist Jacob Appelbaum had seen a corresponding NSA document.
It describes the secret a built-in module for iPhones. With the implant called “Dropoutjeep” could be intercepted communication of the user. According to the document, the NSA took it initially physical access to the device itself, but wanted to work on methods for accessing remotely.
Therefore, the suspicion stirs that Apple needs to have the secret service enables access to devices prior to their sale. Appelbaum had on Monday raised the question during the presentation of the document to the Conference Chaos Communications Congress in Hamburg, if Apple worked with the NSA.
Involuntary helper of the NSA?
display
‘) / /]]>
“Apple has never cooperated with the NSA, in order to create a back door in any of our products, the iPhone included,” it said in a statement the group. In 2008 was the very first generation iPhone on the market. The company Apple has until now nothing has been known by a NSA program, which was specifically Apple products in their sights. Apple said in his response also, you will continue to use the company’s resources in order to protect users against “malicious hackers” – no matter who those. According to previous reports, the NSA revelation also took smartphones with Android and BlackBerry software targeted.
As the mirror further reported on the basis of Snowden documents, the software giant Microsoft had become an involuntary helpers of the NSA. There is a special unit of the secret service, called “Tailored Access Operations”, short TAO, which consists entirely of hackers. This unit is specialized to take special target persons targeted, if it were a few hundred cases per year.
The unit should include the use crash reports, get to see the Windows users in a system crash and are frequently transferred to Microsoft. TAO start from these reports and conclude on the weaknesses in the computers of the target population. In a second step, the NSA hacker could then use this knowledge to infiltrate the computer. So Microsoft finally deliver them unknowingly guide to Microsoft customers can spy. However, this technique is only one of many methods of NSA hackers troops.
- sending
- Discuss
- feedback to editors
- copy short URL sz.de/1.1854294 http://sz.de/1.1854294
URL is copied to the clipboard
- copy short URL
Please copy the URL manually.
sz.de/1.1854294
© 2014 copyright rules …
source and Editor: SZ from 02.01.2014/ratz
No comments:
Post a Comment