Page 3 of 3 FirstFirst 123
Results 31 to 34 of 34
  1. #31

    vansmith's Avatar
    Member Since
    Oct 19, 2008
    Location
    Toronto
    Posts
    19,782
    Specs:
    2012 13" MBP (2.5 i5, 8GB)
    Quote Originally Posted by lifeisabeach View Post
    I know what jailbreaks are. And it took, what, nearly a year to find a combination of vulnerabilities to crack iOS 6?
    It took 0 days to exploit a vulnerability in iOS 6.

    Does it matter though? I'm making an argument about their very existence, nothing more. I'm not trying to suggest that the software is of a bad quality (I even implied this above). In fact, I think iOS is of good quality from a security standpoint. That said, I'm not going to hide my head in the sand and think it's somehow immune to the inherent truth of software development - if it can be made, it can be (and likely will be) exploited.
    Important Links: Community Guidelines : Use the reputation system if you've been helped.
    M-F Blog :: Write for the blog
    Writing a Quality Post

  2. #32


    Member Since
    Jul 16, 2012
    Posts
    95
    Quote Originally Posted by vansmith View Post
    It took 0 days to exploit a vulnerability in iOS 6.

    Does it matter though? I'm making an argument about their very existence, nothing more. I'm not trying to suggest that the software is of a bad quality (I even implied this above). In fact, I think iOS is of good quality from a security standpoint. That said, I'm not going to hide my head in the sand and think it's somehow immune to the inherent truth of software development - if it can be made, it can be (and likely will be) exploited.
    But nobody has claimed it cant be. Just that with the mentioned security features its very hard to exploit it.

  3. #33

    MacInWin's Avatar
    Member Since
    Jul 07, 2008
    Location
    Winchester, VA
    Posts
    6,341
    Specs:
    2015 rMBP, 2008 iMac, iPhone 6, iPad mini, 13" MBP, AppleTV and two MacMinis
    Quote Originally Posted by danny842003 View Post
    But nobody has claimed it cant be. Just that with the mentioned security features its very hard to exploit it.
    I wouldn't even say "very hard," just harder than not having it. Remember, I don't need to outrun the bear that's chasing us, I just have to be faster than you. Same in security. Nothing's perfect, it just needs to be somewhat better.

  4. #34


    Member Since
    Sep 27, 2013
    Posts
    11
    The method that was used to hack the fingerprint id recognition is impractical because to get the thumb or finger impression of any person you will have to cut is finger or may be ask him to give you the impression which is much like stealing and has nothing to do with hacking or code hacking in person.

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. The touch screen ipod nano has been hacked
    By the8thark in forum Apple Rumors and Reports
    Replies: 7
    Last Post: 01-01-2011, 05:53 AM
  2. Fake or not ? Asphalt for iphone multiplayer video
    By nospam in forum iOS and Apps
    Replies: 0
    Last Post: 07-29-2008, 05:25 AM
  3. Macbook Touch (Fake But Beautiful)
    By Bruki in forum Apple Rumors and Reports
    Replies: 27
    Last Post: 01-15-2008, 01:43 AM
  4. Replies: 1
    Last Post: 10-29-2007, 01:34 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •