The Beijing institute developed the technique to crack an iPhone’s encrypted device log to identify the numbers and emails of senders who share AirDrop content, the city’s judicial bureau said in an online post. Police have identified multiple suspects via that method, the agency said, without disclosing if anyone was arrested. “It improves the efficiency and accuracy of case-solving and prevents the spread of inappropriate remarks as well as potential bad influences,” the bureau said.

Further read: https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html

  • hottari@lemmy.ml
    link
    fedilink
    arrow-up
    48
    arrow-down
    12
    ·
    1 year ago

    Apple has been taking massive Ls after Ls wrt the security of their iPhones in recent times. It’s almost as if magically branding your products “private and secure” doesn’t work.

    • ExLisper@linux.community
      link
      fedilink
      English
      arrow-up
      20
      arrow-down
      3
      ·
      1 year ago

      Finding an exploit created by state-level actor is not a massive L. They have shown in the past that they are able to hack air gaped systems, weaken commonly used security standards and implant vulnerabilities into commercial software. I don’t think you will find a company that is immune to this. Other than that, did they really have so many security issues recently?

      • hottari@lemmy.ml
        link
        fedilink
        arrow-up
        9
        arrow-down
        4
        ·
        edit-2
        1 year ago

        Read the article. The exploit was found by the state actors not created by them. Apple is ultimately responsible for the mishap due to the insecure design of the aforementioned feature.

        Even though China partially had a hand in the creation of this flaw according to the history of the feature.

        And yes, Apple has been a constant feature on the news for such privacy leaks of late. You just haven’t been paying attention.

        • ExLisper@linux.community
          link
          fedilink
          English
          arrow-up
          8
          arrow-down
          2
          ·
          1 year ago

          If state actor would create it it would be a backdoor. Exploits are by definition bugs/security issues that can be… well, exploited and state-level actors are really good at finding them. Still, if it takes resources of state actor to find an exploit I don’t think it’s a massive L. Yes, it’s totally possible they had some other serious security issues recently and I haven’t been paying attention. That’s why I’m asking.

      • redfellow@sopuli.xyz
        link
        fedilink
        arrow-up
        9
        arrow-down
        6
        ·
        edit-2
        1 year ago

        Ordering your hardware from China makes it a tad bit easier to shoehorn backdoors in it.