Skip navigation

How to remove dropout jeep

20118 Views 243 Replies Latest reply: Jan 5, 2014 5:54 PM by piersonk RSS Branched to a new discussion.
  • Johnathan Burger Level 6 Level 6 (14,455 points)
    Currently Being Moderated
    Jan 1, 2014 7:59 PM (in response to Johnathan Burger)

    For the non-trolls , the ones not doing their best to run around screaming the sky is falling, read this:

    http://www.forbes.com/sites/timworstall/2013/12/31/appelbaums-extraordinarily-di singenuous-claims-about-nsa-penetration-of-apples-iphones/

  • Jesusv87 Calculating status...
    Currently Being Moderated
    Jan 1, 2014 8:01 PM (in response to Theraven1)

    The NSA has always been out there watching and listening. Why is any of this a big surprise?  If you are doing illegal things then you should avoid the internet and phones. I know people worry about their privacy but what do you have to hide?  If the government wants to see my rear end when I'm in the bathroom with my phone then so be it. I don't care.

  • Albatrosser Calculating status...
    Currently Being Moderated
    Jan 1, 2014 8:08 PM (in response to deggie)

    deggie wrote:

     

    Apple is not going to put the security of iOS devices at risk by opening the file system on iDevices, the fact it is not accessible is part of the security system.

     

    There are 3rd party apps available that will allow you to use your computer and look at the files on the iPhone but you will not be able to manipulate them.

     

    You can put your iPhone in DFU mode and completely wipe the phone clean then download a fresh version of iOS and do not restore anything from your backup.

     

    You can jailbreak your iPhone and look for any software that doesn't seem to belong.

     

    Apple has made a public statement about this issue and said they had no knowledge of it and didn't cooperate with the NSA. The information made public does not detail how they put software on the phone so it is very possible they had to jailbreak it first. Despite the mistake by a New York Times reporter today saying they would have been addressing iOS 5 they were actually looking at iPhone OS 1.0 to 2.0. There have been many, many advances in security in iOS since then. The statement in the leak said the NSA was exploring a means of placing the software on an iPhone remotely, it in no way indicates they had any idea how to do so. If you've ever worked in a government bureaucracy you would recognize this as hyperbole designed to impress, or stave off, a supervisor and the budget people. In late 2008, as covered by leaks by Mr. Snowden, the NSA went in a different direction in intelligence gathering. My guess is this program withered on the vine and died for lack of funding.

     

    But Apple already have put the iPhone at risk.Otherwise there would be no dropout JEEP and other possibilities for goverments to spy on iPhone users.

     

    There will always be bugs, and there will always be goverments or competing corporations that may want install code onto our device. To not provide the user with access to his filesystem seems to be just like to Bury your head in the sand like the Ostrich.

     

    <Edited by Host>

  • deggie Level 8 Level 8 (44,870 points)
    Currently Being Moderated
    Jan 1, 2014 8:08 PM (in response to Albatrosser)

    The phone might have had a security hold available 5 years ago with iPhone OS 1.x, but that is a long time in mobile OS terms and it is gone.

     

    From the beginning the file system was designed to be inaccessible, when apps were added they had to be sandboxed, etc. which is all part of the totality of the security of the OS. If Apple were to do a rewrite and allow the file system to be accessed by anyone they would LOWER the overall security of the OS. Why would they do that? And do you really want it so you can look or are you trying to open it so you can release malware?

     

    Your argument is not very logical. COMPLETELY WIPE THE PHONE USING DFU MODE. This will remove all software from your iPhone. All of it.

  • Albatrosser Level 1 Level 1 (0 points)
    Currently Being Moderated
    Jan 1, 2014 8:21 PM (in response to deggie)

    deggie wrote:

     

    The phone might have had a security hold available 5 years ago with iPhone OS 1.x, but that is a long time in mobile OS terms and it is gone.

     

    From the beginning the file system was designed to be inaccessible, when apps were added they had to be sandboxed, etc. which is all part of the totality of the security of the OS. If Apple were to do a rewrite and allow the file system to be accessed by anyone they would LOWER the overall security of the OS. Why would they do that? And do you really want it so you can look or are you trying to open it so you can release malware?

     

    Your argument is not very logical. COMPLETELY WIPE THE PHONE USING DFU MODE. This will remove all software from your iPhone. All of it.

     

    I see no basis in your claim. I am sure NSA have computer system with operating systems featuring accessible filesystems that are far more secure than an easilly jailbreakable iPhone with a file system not accessible to the owner. The file system is obviuosly available for jailbreakers and for NSA hijackers, and for Apple, but not for the owner of the device. That is a false sense of security.

  • Meg St._Clair Level 8 Level 8 (37,475 points)
    Currently Being Moderated
    Jan 1, 2014 8:22 PM (in response to Albatrosser)

    Albatrosser wrote:

     

    I see no basis in your claim. I am sure NSA have computer system with operating systems featuring accessible filesystems that are far more secure than an easilly jailbreakable iPhone with a file system not accessible to the owner.

    Any you base your claim on.....? Do you have any data or is this just more fear and supposition and sheer argumentativeness?

  • deggie Level 8 Level 8 (44,870 points)
    Currently Being Moderated
    Jan 1, 2014 8:23 PM (in response to Albatrosser)

    Don't use an iPhone. Buy an Android phone. It has a open OS. Of course the Guardian claims that 50% of them have malware on them.

     

    You are totally illogical. There is no point in discussing anything further with you.

  • Meg St._Clair Level 8 Level 8 (37,475 points)
    Currently Being Moderated
    Jan 1, 2014 8:23 PM (in response to Albatrosser)

    Albatrosser wrote:

     

    Im definitvely trying to stay on the topic of possible ways of removing dropout JEEPER, but not the people with huge number of "points" here.

    How can we discuss removing something that doesn't even seem to exist?

  • Albatrosser Level 1 Level 1 (0 points)
    Currently Being Moderated
    Jan 1, 2014 8:41 PM (in response to Meg St._Clair)

    Meg St._Clair wrote:

     

    Albatrosser wrote:

    Im definitvely trying to stay on the topic of possible ways of removing dropout JEEPER, but not the people with huge number of "points" here.

    How can we discuss removing something that doesn't even seem to exist?

    I do not see any way of verifying that it does not run on the system if Apple prevents visibility for me as an owner into the files of my phone.

  • Albatrosser Level 1 Level 1 (0 points)
    Currently Being Moderated
    Jan 1, 2014 9:02 PM (in response to deggie)

    deggie wrote:

     

    Don't use an iPhone. Buy an Android phone. It has a open OS. Of course the Guardian claims that 50% of them have malware on them.

     

    You are totally illogical. There is no point in discussing anything further with you.

    Personally I feel you are going OT, make flamable false claims, and not honoring the TOU.

  • stevejobsfan0123 Level 7 Level 7 (30,500 points)
    Currently Being Moderated
    Jan 1, 2014 9:13 PM (in response to Albatrosser)

    Wow, look what I find in my email notifications when I've been out for a while. Thanks for the good laughs, now to unsubscribe.

  • Johnathan Burger Level 6 Level 6 (14,455 points)
    Currently Being Moderated
    Jan 1, 2014 9:27 PM (in response to deggie)

    Android is not really open source either.

    Parts of it are not released to anyone.

    I don't even think Google has released any of the newer code.

  • Albatrosser Level 1 Level 1 (0 points)
    Currently Being Moderated
    Jan 1, 2014 9:34 PM (in response to Meg St._Clair)

    Meg St._Clair wrote:

     

    Albatrosser wrote:

     

    I see no basis in your claim. I am sure NSA have computer system with operating systems featuring accessible filesystems that are far more secure than an easilly jailbreakable iPhone with a file system not accessible to the owner.

    Any you base your claim on.....? Do you have any data or is this just more fear and supposition and sheer argumentativeness?

     

    I am not the one claiming that the system is 100% secure. I simply ask to get access to my own device in order to verify that NSA or other organizations aren't spying on my phone with assistance from Apple, volountarily or by force.

  • Meg St._Clair Level 8 Level 8 (37,475 points)
    Currently Being Moderated
    Jan 1, 2014 9:41 PM (in response to Albatrosser)

    Albatrosser wrote:

     

    I am not the one claiming that the system is 100% secure. I simply ask to get access to my own device in order to verify that NSA or other organizations aren't spying on my phone with assistance from Apple, volountarily or by force.

    No one here has ever said that it was 100% secure. What we have been saying is that there is no evidence that this particular exploit actually exists. It has been explalined to repeatedly how you can check your phone for malware. it is becoming apparent that you'd rather argue than actually try any of them.

  • Chris CA Level 9 Level 9 (73,410 points)
    Currently Being Moderated
    Jan 1, 2014 9:42 PM (in response to Albatrosser)

    Albatrosser wrote:

    I am not the one claiming that the system is 100% secure. I simply ask to get access to my own device

    You don't have access to your own device?

    Did you lose it?

    in order to verify that NSA or other organizations aren't spying on my phone with assistance from Apple, volountarily or by force.

    How would you verify this?

    You don't seem to even have access to your own device.

1 ... 5 6 7 8 9 ... 17 Previous Next

Actions

More Like This

  • Retrieving data ...

Bookmarked By (1)

Legend

  • This solved my question - 10 points
  • This helped me - 5 points
This site contains user submitted content, comments and opinions and is for informational purposes only. Apple disclaims any and all liability for the acts, omissions and conduct of any third parties in connection with or related to your use of the site. All postings and use of the content on this site are subject to the Apple Support Communities Terms of Use.