Meg St._Clair wrote:
desertsquirrel wrote:
"Access to the core functions of the phone necessary to do so would itself require compromising the security of the phone.", when in reality it would not compromise the security of the phone. The core functions would be accessed, but the phone would remain secure.
That makes absolutely no sense. Access to the core functions of the phone would most definitely compromise security. I'm not sure what universe you live in where that would not be the case. Your faith in these theoretical companies that could be trusted with this access is touching, though.
Android phones, which do allow such access, have revealed a number of serious vulnerabilities recently. Start your reading here:
http://www.symantec.com/connect/blogs/android-vulnerability-allows-app-hijacking
It would compromise security if used for that purpose yes. Just like if someone takes your phone with malicious purposes, say steal your credit card information, instead of a family member or friend borrowing it to show you a funny video. Your sarcasm is unseeded and misplaced. These, "theoretical companies", are actually real companies. With these companies, "there has not been any abuses of privileges on Mac, PC, or Android devices. You think the companies would all of a sudden decide to abuse the iPhone when they could have done so already with other operating systems?
You missed a very important part in the article that you posted. "We have added detection logic for the vulnerable condition to our backend Norton Mobile Insight systems and, out of four million applications, have not yet discovered malicious usage of the vulnerability." Bring it up again if there is ever anything that is actually happening, instead of just the possibility of something being breached. It looks like you would have bought into Symantec's ploy to sell you their product.