How they watch you from the secure iPhone

Apple iPhone is generally considered safe and the company from Cupertino does not miss the opportunity to highlight how secure its users are.

However, according to a Google employee, this is not entirely true, as the of the iPhone can be used for spying by simply hijacking the apps that have access to the device's camera. iPhoneFelix Krause published one detailed analysis as well as a PoC video revealing how the attack works. As you will see, hackers would not only be able to access front and rear cameras, but they can also record every user's move even when the hijacked application is running.

In addition, hackers can use the bug to transmit live from the iPhone to the Internet, but also run even more advanced features to crawl the user, see if they are in front of the camera or run the software face recognition.

The Google expert says that Apple has already been informed of the error and as explained in its in-depth analysis, Cupertino could add an LED to the iPhone's cameras to alert users of any suspicious activity.

In the meantime, and until Apple does something to fix the problem, users can protect themselves by either buying covers that block the camera when not in use, or by revoking camera access from all who use it.

Apple has not released any official statement about the issue, and may never do it, as it wont do it, even if it is preparing some software update.

According to the Google researcher, however, this specific problem is somewhat difficult to solve with a simple one software, that's why he proposed the pro of some Led.

Watch the video

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).