{"id":198909,"date":"2007-09-30T16:16:00","date_gmt":"2007-09-30T21:16:00","guid":{"rendered":"https:\/\/www.panix.com\/~msaroff\/40years\/2007\/09\/30\/geeky-tech-content-the-iphone-makes-windows-look-like-fort-knox\/"},"modified":"2007-09-30T16:16:00","modified_gmt":"2007-09-30T21:16:00","slug":"geeky-tech-content-the-iphone-makes-windows-look-like-fort-knox","status":"publish","type":"post","link":"https:\/\/www.panix.com\/~msaroff\/40years\/2007\/09\/30\/geeky-tech-content-the-iphone-makes-windows-look-like-fort-knox\/","title":{"rendered":"Geeky Tech Content:  The iPhone Makes Windows Look Like Fort Knox"},"content":{"rendered":"<p>OMFG!!!!  Apple\u00ae has come out with a system that is <a href=\"http:\/\/blog.metasploit.com\/2007\/09\/root-shell-in-my-pocket-and-maybe-yours.html\"><span style=\"font-variant: small-caps;\"><span style=\"font-size:130%;\"><span style=\"font-weight: bold;\">less<\/span><\/span> <\/span>secure than Windows<\/a>.<\/p>\n<p>The iPhone\u00ae, which runs an Apple\u00ae version of Unix\u00ae runs <span style=\"font-weight: bold;\">everything<\/span> as root.<\/p>\n<blockquote><p>1) Every process runs as root. MobileSafari, MobileMail, even the Calculator, all run with full root privileges. Any security flaw in any iPhone application can lead to a complete system compromise. A rootkit takes on a whole new meaning when the attacker has access to the camera, microphone, contact list, and phone hardware. Couple this with &#8220;always-on&#8221; internet access over EDGE and you have a perfect spying device.<\/p><\/blockquote>\n<p>So, unlike your home computer, this is more vulnerable, and it can be set to <span style=\"font-weight: bold;\">listen in and photograph you<\/span> with a remote compromise.<\/p>\n<p>This is the NSA&#8217;s wet dream, you&#8217;ve bugged yourself.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OMFG!!!! Apple\u00ae has come out with a system that is less secure than Windows. The iPhone\u00ae, which runs an Apple\u00ae version of Unix\u00ae runs everything as root. 1) Every process runs as root. MobileSafari, MobileMail, even the Calculator, all run with full root privileges. Any security flaw in any iPhone application can lead to a &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1067,1060,1066,989],"tags":[],"class_list":["post-198909","post","type-post","status-publish","format-standard","hentry","category-communications","category-computer","category-privacy","category-software"],"_links":{"self":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/198909"}],"collection":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/comments?post=198909"}],"version-history":[{"count":0,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/posts\/198909\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/media?parent=198909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/categories?post=198909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.panix.com\/~msaroff\/40years\/wp-json\/wp\/v2\/tags?post=198909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}