![]() |
|
![]() |
|
It doesn't take much to be a target. CIA spy maybe not, but the net is wide when it comes to surveillance. Infrastructure providers, higher education, research labs are all common targets.
|
![]() |
|
It could be that they’re related to a target. I’ve done a lot of hobby OSINT and sometimes finding a target is using off-center targeting to effectively triangulate or pivot.
|
![]() |
|
There's some significant geopolitical intrigue surrounding Cyprus -- probably the most obvious are its partition between between Turkey and Greece and its use as a tax haven by Russian oligarchs.
|
![]() |
|
A government that stoops to civil rights crimes but doesn't attach a good percentage of its fear to student movements is kind of oblivious to history as it pertains to its own miserable survival.
|
![]() |
|
Same goes for certain types of lead characters in things like American Psycho, Fight Club, Mad Men and Wolf of Wall St. These are seen as aspirational instead of cautionary tales.
|
![]() |
|
If you want to deify Tony Montana, there is one quote that is the John 3:16 of his proselytizing, and the world is yours is not that quote. I guess you can't put it in a restaurant.
|
![]() |
|
The tech company is right since this appears to be a reference to the Total Perspective Vortex from Hitchhiker's Guide, which notably didn't do anything bad when it was turned on.
|
![]() |
|
On the Apple Support page here: https://support.apple.com/en-in/102174 In the screenshot it says the threat notification was sent "via email and iMessage", so it would not be displayed in any different way on your phone, which I also find surprising. I definitely wouldn't expect to receive something like this as an Email, and I have turned off iMessage. |
![]() |
|
Apple specifically acknowledges this and has Lockdown Mode to address it. If you care about security you should enable it. Of course you’ll not be able to watch YouTube videos, but you’ll be safer.
|
![]() |
|
whats the point of carrying phone that doesn't even play youtube videos? If security is so important then they should probably carry nokia style 2000's phone where there is no chance of malaware?
|
![]() |
|
Apple advise whom to contact on their website for guidance, but they are of course not alone in dispensing this and similar advice. Apple: "If you have received an Apple threat notification We strongly suggest you enlist expert help, such as the rapid-response emergency security assistance provided by the Digital Security Helpline at the nonprofit Access Now. Apple threat notification recipients can contact the Digital Security Helpline 24 hours a day, seven days a week through their website. Outside organizations do not have any information about what caused Apple to send a threat notification, but they can assist targeted users with tailored security advice." https://support.apple.com/en-lamr/102174 Amnesty International: "The Access Now Helpline and other Security Lab civil society partners are also equipped to support individuals who have received these Apple notifications." https://securitylab.amnesty.org/latest/2024/04/apple-threat-... |
![]() |
|
At the end of the day, you want the data. Sure, it's much more convenient to get the data from a device, but if you had to get it somewhere else, the data is obtainable.
|
![]() |
|
Pretty much every computer virus, worm, etc ever has been due to engineering flaws in software products. All software ever made has bugs in it, including whatever you're using right now.
|
![]() |
|
Could this be illegal in some countries to notify users like this? I could see how revealing to some one they were the subject of a gov't targeting would be illegal in some countries.
|
![]() |
|
Note that "mercenary spyware" is the politically correct term Apple chose for "state-sponsored attacker" because Modi complained that Apple was exposing them for using illegal NSO Group spyware.
|
![]() |
|
The wording is technically correct since these attacks are often facilitated by private for-profit companies. It just glosses over who is paying them (state actors).
|
![]() |
|
That was my first thought as well, though on further consideration I assumed that it was some kind of paid/for-profit criminal organization performing these attacks on behalf of a nation-state.
|
![]() |
|
Very often it's not about "can't," and more about "cheaper." There's plenty of places to get metal nametags made in the U.S.A. But Delta chose to go the cheapest route to save a few pennies. |
![]() |
|
The metal nametags is a very poor example of the point being attempted since I would venture a guess that there are 1000s of companies or shops in the US that can make metal nametags.
|
![]() |
|
I'm not a lawyer and the proper answer is likely state-dependent, but why not? It's well established that with an appropriate warrant, LEO have always been able to come into your house without telling you and add hidden surveillance bugs to listen on your communications; they have always been allowed to physically modify or replace your phone (e.g. physical phone wiretaps a century ago); Electronic Communications Privacy Act reasserts that this applies also to electronic surveillance and digital communications; so (as a non-expert) I don't really see why that wouldn't apply to smartphone exploits as well. We do see exploits being applied to devices in LEO possession (e.g. https://www.theverge.com/2021/4/14/22383957/fbi-san-bernadin... for one random example) to recover evidence. The main restriction is the constitutional limits of 4th amendment which requires specific warrants for each case - which is a significant practical obstacle, so the circumstances in which warrantless wiretapping is permitted (e.g. by PATRIOT act) is a contentious issue; however, it's not relevant if a proper warrant is obtained. |
![]() |
|
The CFAA is the broadest and most relevant US statute regarding computer hacking. But yes, international computer hackers typically operate outside of the jurisdictional reach of their targets.
|
![]() |
|
I would describe this spyware's "illegal" status as colloquially true - despite the lack of a comprehensive, international, enforceable legal framework - at least in the USA [0]: > As part of this effort, the End-User Review Committee of the BIS decided to add four foreign entities, among them two Israeli companies, NSO Group and Candiru, to the Entity List. The U.S. Export Administration Regulations (‘EAR’) impose additional license requirements for exports to listed entities, and limits the exceptions for exports, reexports, and transfers to such entities. But they continue: > The existing international and national frameworks regulating the export of sensitive spyware technologies lack the teeth necessary to deal with contemporary issues relating to the abuse of these technologies and the growing need for their enhanced supervision. [0]: https://www.law.georgetown.edu/ctbl/blog/managing-risky-busi... |
![]() |
|
I'm not sure exactly what part of it you're trying to refute since your comment is kind of all over the place, but GP comment is correct. The reason it's called that is literally because of the Indian government. > Apple's removal of the term "state-sponsored" from its description of threat notifications comes after it repeatedly faced pressure from the Indian government on linking such breaches to state actors, said a source with direct knowledge. https://www.reuters.com/technology/cybersecurity/apple-warns... |
![]() |
|
The comment doesn't really say anything and the commenter is not saying they edited the comment to make it just non-substantive rather than non-substantive and inflammatory.
|
![]() |
|
Excellent point. Thank you! I would hope people aren't using flags for low-value comments, but you make a great point that it could have been edited to remove something that was deserving of a flag. |
![]() |
|
I suppose this is an alternative to security... Real 'Scroll to the bottom of the terms and click accept" vibes.. Is there any company as big as Apple with so many major security issues? |
![]() |
|
> Is there any company as big as Apple with so many major security issues? To be fair, does any Android device alert you to a compromise like this? |
![]() |
|
Android is more secure, especially in recent history. You can even see it in 0 day bounties. Don't pay attention to Samsung though, that company is probably the Apple equivalent of android. |
![]() |
|
The number of public bounties for a system seems orthogonal to the number of actual vulnerabilities in a system. Of course, vulnerabilities exist independent of the existence of a bounty for them.
|
![]() |
|
The bounties look like they have fairly comparable distribution, and just knowing the dollar figures doesn't really tell much about either supply or demand. Your inference requires that knowledge.
|
https://old.reddit.com/r/iphone/comments/1c10jai/i_have_rece...
The interesting thing IMO is they claim to just be some random college student. Which seems believable because if they were a real secret squirrel I guess they wouldn’t ask reddit about it, haha.
I wonder if the hackers are targeting people based on phone numbers or something. (I could imagine a college student recently getting a new number and ending up with one that’d been associated with a target—I guess? Although you’d hope there’d be a way to retire numbers that are known to be targets).