The secret of the iPhone that you deny is linked to Chinese piracy

Photo of author

By [email protected]


All this will be a serious threat to national security. Except, it is strange that Apple categorically denies that this happened. “We disagree with the allegations of the targeted attack against our users,” wrote Evan Kirstetic, President of Apple Engineering, Ivan Kirstetic, in a statement. Apple corrected the problem, highlighted by Iverify in its report, causing iPhone to break in some cases when the messenger sender changed their title and photographing symbolism. But it is called these incidents as a result of the “traditional software error”, and not evidence of the targeted exploitation. (The blanket’s rejection of this definitely is not the usual Apple response to the definite penetration of iPhone. For example, the company filed a lawsuit against NSO Group to target Apple customers.)

The result is that what might be a four-pond fire in the anti-espionage world has been reduced-at the present time-to a very disturbing puzzle.

According to what was reported, a 22 -year -old former trainee was appointed to the Heritage Foundation without any experience in national security in a major role in the Ministry of Internal Security that supervises a major program designed to combat local terrorism.

According to PROPUBLICA, Thomas Fugate took the leadership of the Program and Partnerships Center (CP3), the Office of the Ministry of National Security in charge of financing efforts at the country level to prevent violence with political motives – including school shootings and other forms of local terrorism.

Fujet, a graduate of the University of Texas in 2024 in San Antonio, former CP3 director, Bill Branif, a veterans in the army with 20 years of national security experience resigned in March after the employee discounts ordered by the Trump administration.

According to the latest CP3 report to Congress, the office funded more than 1,100 initiatives aimed at disrupting violent extremism. In recent months, the United States has seen a series of high -level targeted attacks, including a California car bombing and shooting at two Israeli embassy in Washington, DC. The $ 18 million grant program is said to be designed to support local protection efforts, now under the supervision of Fugate.

The names of the hacker group have always been Absurd In the cyber security industry. Each threat intelligence company, in an attempt that can be scientifically defended because it does not assume that it follows the same infiltrators as another company, comes in the name of their code for any group they notice. The result is a somewhat ridiculous abundance of intertwined naming systems on the basis of elements, weather and zoology. Now, many of the main Intelligence playground, including Google, Microsoft, Crowdstrike, Palo Alto Networks, finally, are finally enough of their internal research to agree to a radio confirming that they refer to the same entities. Companies did no, However, it agrees to enhance their label systems in one classification. So this agreement does not mean the end of the sentences in security reports such as “The Hacker Group Sandworm, also known as Telebots, Voodoo Bear, Hades, Iron Viking, Electrum, or Seashell Blzezard.” This means only that we are Cybarian security reporters who can write this sentence with a little more confidence.

Chris Wad, founder of Corellium, founder of Corellium, in 2005, in 2005, had criminal charges of empowering RAM by providing them by proxy, and agreed to secret work to enforce law while avoiding prison. Then in 2020, in mysterious circumstances he pardoned President Donald Trump. He also settled a lawsuit for the main copyright of Apple. Now, his company, which creates virtual images of Android and iOS devices so that customers can find ways to storm them, by Cellebrite, a major law enforcement contractor, for $ 200 million-an important payment for the infiltrator who found himself on both sides of the law.



https://media.wired.com/photos/68433d1d3ef3d890b9d618a7/191:100/w_1280,c_limit/Security-Roundup-iPhone-Hack-Harris-Campaign-Security-2182531010.jpg

Source link

Leave a Comment