Skip navigation

How to remove dropout jeep

20033 Views 243 Replies Latest reply: Jan 5, 2014 5:54 PM by piersonk RSS Branched to a new discussion.
  • Albatrosser Calculating status...
    Currently Being Moderated
    Jan 1, 2014 6:05 PM (in response to Meg St._Clair)

    Meg St._Clair wrote:

     

    Albatrosser wrote:

     

    Sanity would be letting people access their phone they payed good money for and see for themselvs.

    Accessing the file system would require jailbreaking your phone. Of course, that would render it vulnerable to malware, including the stuff that actually exists.

    Not if it was done in a controlled  way supported by Apple and not uncontrolled by security flaws that could be expolited regardless of public jauilbreaks or not.

     

     

    <Edited by Host>

  • NSA Supervisor Calculating status...
    Currently Being Moderated
    Jan 1, 2014 6:00 PM (in response to Reinhard Kilmer)

    The program DROPOUT JEEP is irrelevant in the year 2013. The NSA has a data hub that was turned on this year in Utah, that gives them the ability to intercept, record, and store every phone call, voicemail, text message, or email that is sent or made in the US. So they dont need to hack into anyones devices. They went above and beyond any devices security measures. So as far as DROPOUT JEEP goes, I wouldnt even begin to worry about such a miniscule project. There are far bigger worries than software aimed at a single user device. Think about a data storage facility that is 40 football fields of square area.

  • Meg St._Clair Level 8 Level 8 (37,465 points)
    Currently Being Moderated
    Jan 1, 2014 6:05 PM (in response to Albatrosser)

    Albatrosser wrote:

     

    Meg St._Clair wrote:

     

    Albatrosser wrote:

     

    Sanity would be letting people access their phone they payed good money for and see for themselvs.

    Accessing the file system would require jailbreaking your phone. Of course, that would render it vulnerable to malware, including the stuff that actually exists.

    Not if it was done in a controlled  way supported by Apple and not uncontrolled by security flaws that could be expolited regardless of public jauilbreaks or not.

     

    “Ah! well a-day! what evil looks / Had I from old and young! / Instead of the cross, the Albatross / About my neck was hung.”

  • Lawrence Finch Level 7 Level 7 (24,500 points)
    Currently Being Moderated
    Jan 1, 2014 6:10 PM (in response to Meg St._Clair)

    Ah, that might be the first time I've heard Coleridge quoted in ASC! Thanks, Meg, and Happy New Year.

  • Meg St._Clair Level 8 Level 8 (37,465 points)
    Currently Being Moderated
    Jan 1, 2014 6:12 PM (in response to Lawrence Finch)

    I could not resist the Coleridge and am so pleased someone recognized it. Happy New Year to you, too and to the lovely lady!

  • Albatrosser Level 1 Level 1 (0 points)
    Currently Being Moderated
    Jan 1, 2014 7:12 PM (in response to Theraven1)

    Allan Eckert wrote:

     

    As long as it doesn't violate the TOU, it will not be deleted. It is that easy.

     

    Allan

    Many pro Apple responses here seems to be tolerated even though they clearly violate the TOU.

  • Allan Eckert Level 8 Level 8 (39,380 points)
    Currently Being Moderated
    Jan 1, 2014 7:14 PM (in response to Albatrosser)

    They may violate the TOU in your opinion but not in the opinion of the Hosts.

     

    Allan

  • Albatrosser Level 1 Level 1 (0 points)
    Currently Being Moderated
    Jan 1, 2014 7:20 PM (in response to Allan Eckert)

    Allan Eckert wrote:

     

    They may violate the TOU in your opinion but not in the opinion of the Hosts.

     

    Allan

     

    So the point being made is that offensive OT stuff are allowed as long as it is a pro-Apple message, even if it clearly violates the TOU.

  • Albatrosser Level 1 Level 1 (0 points)
    Currently Being Moderated
    Jan 1, 2014 7:27 PM (in response to Allan Eckert)

    Allan Eckert wrote:

     

    They may violate the TOU in your opinion but not in the opinion of the Hosts.

     

    Allan

     

    There is nothing mentioned about subjective opinions of the HOST in the TOU.

  • Albatrosser Level 1 Level 1 (0 points)
    Currently Being Moderated
    Jan 1, 2014 7:35 PM (in response to stedman1)

    stedman1 wrote:

     

    Oh dear Lord, I fear for the world if all people were this delusional.

     

    Please read the TOU and try to stay on topic about how to remove dropout JEEP malware.

  • Allan Eckert Level 8 Level 8 (39,380 points)
    Currently Being Moderated
    Jan 1, 2014 7:43 PM (in response to Albatrosser)

    As if you have ever stayed on topic.

     

    Allan

  • Albatrosser Level 1 Level 1 (0 points)
    Currently Being Moderated
    Jan 1, 2014 7:48 PM (in response to Allan Eckert)

    Allan Eckert wrote:

     

    As if you have ever stayed on topic.

     

    Allan

     

    Im definitvely trying to stay on the topic of possible ways of removing dropout JEEPER, but not the people with huge number of "points" here.

  • deggie Level 8 Level 8 (44,840 points)
    Currently Being Moderated
    Jan 1, 2014 7:49 PM (in response to Albatrosser)

    Apple is not going to put the security of iOS devices at risk by opening the file system on iDevices, the fact it is not accessible is part of the security system.

     

    There are 3rd party apps available that will allow you to use your computer and look at the files on the iPhone but you will not be able to manipulate them.

     

    You can put your iPhone in DFU mode and completely wipe the phone clean then download a fresh version of iOS and do not restore anything from your backup.

     

    You can jailbreak your iPhone and look for any software that doesn't seem to belong.

     

    Apple has made a public statement about this issue and said they had no knowledge of it and didn't cooperate with the NSA. The information made public does not detail how they put software on the phone so it is very possible they had to jailbreak it first. Despite the mistake by a New York Times reporter today saying they would have been addressing iOS 5 they were actually looking at iPhone OS 1.0 to 2.0. There have been many, many advances in security in iOS since then. The statement in the leak said the NSA was exploring a means of placing the software on an iPhone remotely, it in no way indicates they had any idea how to do so. If you've ever worked in a government bureaucracy you would recognize this as hyperbole designed to impress, or stave off, a supervisor and the budget people. In late 2008, as covered by leaks by Mr. Snowden, the NSA went in a different direction in intelligence gathering. My guess is this program withered on the vine and died for lack of funding.

  • Johnathan Burger Level 6 Level 6 (14,440 points)
    Currently Being Moderated
    Jan 1, 2014 7:52 PM (in response to deggie)

    Stop applying logic and common sense.

    They are trying to spread FUD.

  • deggie Level 8 Level 8 (44,840 points)
    Currently Being Moderated
    Jan 1, 2014 7:58 PM (in response to Johnathan Burger)

    My bad.

1 ... 4 5 6 7 8 ... 17 Previous Next

Actions

More Like This

  • Retrieving data ...

Bookmarked By (1)

Legend

  • This solved my question - 10 points
  • This helped me - 5 points
This site contains user submitted content, comments and opinions and is for informational purposes only. Apple disclaims any and all liability for the acts, omissions and conduct of any third parties in connection with or related to your use of the site. All postings and use of the content on this site are subject to the Apple Support Communities Terms of Use.