You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

How to remove dropout jeep

How to remove Dropout jeep??

iPhone 5, iOS 7.0.4

Posted on Dec 31, 2013 12:25 AM

Reply
249 replies

Jan 3, 2014 6:01 AM in response to Kel.mgk

Kel.mgk wrote:


Meg St._Clair wrote:


Kel.mgk wrote:

Can you provide 100% proof that there is no method?


It's logically impossible to prove a negative proposition.


You seem 100% certain, to the point that my mere suggestion that there is an exploit you don't know of, has offended you and Meg above..

No, what offended me was your method of doing so.

oh please, I clearly stated I fixed his quote, and bolded my edit.


I'm sorry, but that's the most accurate way anyone can start or end any sentance in this thread ..

" as far as I know " unless they work for Apple or NSA , and even then, both are compartmentalized by design..


The fact that a jail break can exist shows a vulnerabilty, I don't care if its needs to be physically accessed or not, it's enough to show me there are holes in the system that apple was unaware of and these holes can exist in any interface


Bluetooth, wifi, sync, anything.. Just because "the public" is unaware of them does not mean they do not exist, so perhaps we should accept the fact that indeed, it is possible that more is going on than we know.


I imagine the ( all ) devices comes with access preinstalled anyway, and we're arguing over a moot point.


Message was edited by: Kel.mgk grammer - thanks guy below.


That's why I said:

There is no confirmed way to remotely modify or access an iOS device that is not jailbroken.


And, for some reason, you have a problem with that? I have to tell you that 'as far as I know'? That's implicit in any basic statement.

Jan 3, 2014 5:04 PM in response to TJBUSMC1973

TJBUSMC1973 wrote:


Kel.mgk wrote:


Meg St._Clair wrote:


Kel.mgk wrote:

Can you provide 100% proof that there is no method?


It's logically impossible to prove a negative proposition.


You seem 100% certain, to the point that my mere suggestion that there is an exploit you don't know of, has offended you and Meg above..

No, what offended me was your method of doing so.

oh please, I clearly stated I fixed his quote, and bolded my edit.


I'm sorry, but that's the most accurate way anyone can start or end any sentance in this thread ..

" as far as I know " unless they work for Apple or NSA , and even then, both are compartmentalized by design..


The fact that a jail break can exist shows a vulnerabilty, I don't care if its needs to be physically accessed or not, it's enough to show me there are holes in the system that apple was unaware of and these holes can exist in any interface


Bluetooth, wifi, sync, anything.. Just because "the public" is unaware of them does not mean they do not exist, so perhaps we should accept the fact that indeed, it is possible that more is going on than we know.


I imagine the ( all ) devices comes with access preinstalled anyway, and we're arguing over a moot point.


Message was edited by: Kel.mgk grammer - thanks guy below.


That's why I said:

There is no confirmed way to remotely modify or access an iOS device that is not jailbroken.



And, for some reason, you have a problem with that? I have to tell you that 'as far as I know'? That's implicit in any basic statement.


Why, do you feel it is relevant by what methods the malware can be installed? The support-question here is how to ensure that the malware is not installed on my private iPhone. Is it possible to go to the "Genius"-bar and get a "scan" and some sort of written guarantees or warranty that no trojans or malware exists on the phone?


Does Apple have any compensation plan if privacy is breached on the phone? If the protection of the file system of these devices are the responsibility of Apple and not the responsibility of the device-owner, then I assume Apple will have to have some sort of accountability if security is breached on my phone?

Jan 3, 2014 5:12 PM in response to Albatrosser

Albatrosser wrote:

Does Apple have any compensation plan if privacy is breached on the phone? If the protection of the file system of these devices are the responsibility of Apple and not the responsibility of the device-owner, then I assume Apple will have to have some sort of accountability if security is breached on my phone?

Read the EULA for the phone. That question is clearly answered there.

Jan 3, 2014 6:06 PM in response to Theraven1

Csound1 wrote:


There is no way to be 100 percent sure, and there is no compensation plan if there I s, try another brand (not that they offer any better security or any compensation either)


If you want to be sure that you can not be affected by electronic methods, write letters


Thank you for the answer. It's a pity though that the "solution" is to try another brand of phone :-(

How to remove dropout jeep

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.