tag:blogger.com,1999:blog-37798047.post6327956163135335763..comments2024-01-16T05:48:33.523-05:00Comments on Errata Security: No, the NSA can't spy on arbitrary smartphone dataDavid Maynorhttp://www.blogger.com/profile/09921229607193067441noreply@blogger.comBlogger7125tag:blogger.com,1999:blog-37798047.post-42123723035637034492014-06-02T09:57:10.115-04:002014-06-02T09:57:10.115-04:00What about a phone connected to a home wifi networ...What about a phone connected to a home wifi network? Could they gain remote access to one of the computers and then plant bugging software on the iphone through the compromised wifi network? If they could, could they then monitor your calls or only applications/data usage?<br /><br />Thanks.Benhttps://www.blogger.com/profile/04395998113414521505noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-85637429932860840082013-09-12T18:36:02.921-04:002013-09-12T18:36:02.921-04:00Some facts and other informative points given here...Some facts and other informative points given here are quite considerable and would be better to look for more of these kind for your field of business.<br /><br /><a href="http://www.probusinesstools.com/probusinesstoolswebsite/service-management-software.aspx" rel="nofollow">Field Service Management Software</a>John Michlehttps://www.blogger.com/profile/00600203166264674677noreply@blogger.comtag:blogger.com,1999:blog-37798047.post-32686555592258468452013-09-09T13:18:05.771-04:002013-09-09T13:18:05.771-04:00I'll add that schneier has seem the Snowden do...I'll add that schneier has seem the Snowden documents...Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-37798047.post-50409828594179888322013-09-09T13:16:39.023-04:002013-09-09T13:16:39.023-04:00Last week Bruce Schneier seemed to say that he tho...Last week Bruce Schneier seemed to say that he thought NSA would be technically able to intercept a download request on the fly from say Sourceforge and substitute their own version of a software package (a MITM) pretty easily. If that is the case, I don't see any really high bar to them being able to do that with any updates which go to your phone either. Keys, you say? Validation? Schneier also seems to be of the opinion that any need signing keys could be stolen pretty easily.<br /><br />Opinions?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-37798047.post-55318552011096380002013-09-09T08:42:39.424-04:002013-09-09T08:42:39.424-04:00Thanks for pointing out the lazy journalism of Der...Thanks for pointing out the lazy journalism of Der Spiegel regarding the "NSA pwns all ur smartphones" article. However, you say that getting the cooperation of carriers is "almost impossible". That's totally not true, and is one of the most important lessons of the Snowden leaks: the carriers and service providers will almost always bend over backwards to comply with government requests.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-37798047.post-77643552621762149932013-09-08T21:35:58.203-04:002013-09-08T21:35:58.203-04:00I don't pretend to be an expert in phone netwo...I don't pretend to be an expert in phone networking but haven't they already been exposed as putting back doors in iphones? Pretty basic to grab a phone for these guys.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-37798047.post-70442568140702426272013-09-08T17:01:19.423-04:002013-09-08T17:01:19.423-04:00Well... sure they can. With the 0days they buy.Well... sure they can. With the 0days they buy.Anonymousnoreply@blogger.com