How to remove dropout jeep
How to remove Dropout jeep??
iPhone 5, iOS 7.0.4
You can make a difference in the Apple Support Community!
When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.
When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.
How to remove Dropout jeep??
iPhone 5, iOS 7.0.4
5 minutes, or the full half hour?
Just the short version please.
http://m.youtube.com/watch?v=kQFKtI6gn9Y&desktop_uri=%2Fwatch%3Fv%3DkQFKtI6gn9Y
Why are you asking me that?
stedman1 wrote:
Just the short version please.
We're having a special on the full version, buy two, get one free.
steve359 wrote:
Why are you asking me that?
Because it was part of the Sketch you referred to.
🙂
No it wasn't. : P
stedman1 wrote:
Just the short version please.
We're having a special on the full version, buy two, get one free.
No you aren't!
steve359 wrote:
No it wasn't. : P
I'll see you in the lounge, no need to clutter this thread up any more than it is.
D'accord.
Kel.mgk wrote:
Meg St._Clair wrote:
Kel.mgk wrote:
Can you provide 100% proof that there is no method?
It's logically impossible to prove a negative proposition.
You seem 100% certain, to the point that my mere suggestion that there is an exploit you don't know of, has offended you and Meg above..
No, what offended me was your method of doing so.
oh please, I clearly stated I fixed his quote, and bolded my edit.
I'm sorry, but that's the most accurate way anyone can start or end any sentance in this thread ..
" as far as I know " unless they work for Apple or NSA , and even then, both are compartmentalized by design..
The fact that a jail break can exist shows a vulnerabilty, I don't care if its needs to be physically accessed or not, it's enough to show me there are holes in the system that apple was unaware of and these holes can exist in any interface
Bluetooth, wifi, sync, anything.. Just because "the public" is unaware of them does not mean they do not exist, so perhaps we should accept the fact that indeed, it is possible that more is going on than we know.
I imagine the ( all ) devices comes with access preinstalled anyway, and we're arguing over a moot point.
Message was edited by: Kel.mgk grammer - thanks guy below.
That's why I said:
There is no confirmed way to remotely modify or access an iOS device that is not jailbroken.
And, for some reason, you have a problem with that? I have to tell you that 'as far as I know'? That's implicit in any basic statement.
TJBUSMC1973 wrote:
Kel.mgk wrote:
Meg St._Clair wrote:
Kel.mgk wrote:
Can you provide 100% proof that there is no method?
It's logically impossible to prove a negative proposition.
You seem 100% certain, to the point that my mere suggestion that there is an exploit you don't know of, has offended you and Meg above..
No, what offended me was your method of doing so.
oh please, I clearly stated I fixed his quote, and bolded my edit.
I'm sorry, but that's the most accurate way anyone can start or end any sentance in this thread ..
" as far as I know " unless they work for Apple or NSA , and even then, both are compartmentalized by design..
The fact that a jail break can exist shows a vulnerabilty, I don't care if its needs to be physically accessed or not, it's enough to show me there are holes in the system that apple was unaware of and these holes can exist in any interface
Bluetooth, wifi, sync, anything.. Just because "the public" is unaware of them does not mean they do not exist, so perhaps we should accept the fact that indeed, it is possible that more is going on than we know.
I imagine the ( all ) devices comes with access preinstalled anyway, and we're arguing over a moot point.
Message was edited by: Kel.mgk grammer - thanks guy below.
That's why I said:
There is no confirmed way to remotely modify or access an iOS device that is not jailbroken.
And, for some reason, you have a problem with that? I have to tell you that 'as far as I know'? That's implicit in any basic statement.
Why, do you feel it is relevant by what methods the malware can be installed? The support-question here is how to ensure that the malware is not installed on my private iPhone. Is it possible to go to the "Genius"-bar and get a "scan" and some sort of written guarantees or warranty that no trojans or malware exists on the phone?
Does Apple have any compensation plan if privacy is breached on the phone? If the protection of the file system of these devices are the responsibility of Apple and not the responsibility of the device-owner, then I assume Apple will have to have some sort of accountability if security is breached on my phone?
Albatrosser wrote:
Does Apple have any compensation plan if privacy is breached on the phone? If the protection of the file system of these devices are the responsibility of Apple and not the responsibility of the device-owner, then I assume Apple will have to have some sort of accountability if security is breached on my phone?
Read the EULA for the phone. That question is clearly answered there.
There is no way to be 100 percent sure, and there is no compensation plan if there I s, try another brand (not that they offer any better security or any compensation either)
If you want to be sure that you can not be affected by electronic methods, write letters
Csound1 wrote:
There is no way to be 100 percent sure, and there is no compensation plan if there I s, try another brand (not that they offer any better security or any compensation either)
If you want to be sure that you can not be affected by electronic methods, write letters
Thank you for the answer. It's a pity though that the "solution" is to try another brand of phone :-(
Oh it's not a solution, you'll be just as insecure, if not more insecure with another brand. But you'll be posting on some other forum, which is an improvement as far as I am concerned.
How to remove dropout jeep