How they watch you from the secure iPhone

Apple iPhone is generally considered safe and the company from Cupertino does not miss the opportunity to highlight how secure its users are.

However, according to a Google employee, this is not entirely true, as the iPhone's camera can be used for spying with a simple of apps that have access to the device's camera. iPhoneFelix Krause published one detailed analysis as well as a PoC video revealing how the attack works. As you will see hackers could not only access front and rear cameras, but they can also record every of the user even when the hijacked application is running.

In addition, hackers can use the bug to transmit live from the iPhone to the Internet, but also run even more advanced features to crawl the user, see if they are in front of the camera or run the software face recognition.

The Google expert says that Apple has already been informed of the error and as explained in its in-depth analysis, Cupertino could add an LED to the iPhone's cameras to alert users of any suspicious activity.

Meanwhile, and until Apple does something to solve the problem, users can protect themselves either by buying covers that block the camera when they are not being used or to revoke camera access from all the applications that use it.

Apple hasn't released an official statement on the matter, and may never do so, as it tends to do, even if it does prepare an updated one. .

According to the Google researcher, however, this problem is somewhat difficult to solve with a simple software update, so he suggested adding a Led.

Watch the video

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).