You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

How to remove dropout jeep

How to remove Dropout jeep??

iPhone 5, iOS 7.0.4

Posted on Dec 31, 2013 12:25 AM

Reply
249 replies

Jan 5, 2014 9:01 AM in response to Lawrence Finch

Lawrence Finch wrote:


Csound1 wrote:



Correct, that is not evidence of infection or spying, merely of a plan.

Note that should be " there was a plan 6 years ago." We have no way of knowing if that plan was ever followed up. I suspect it wasn't, because if it was the Snowden papers would have had later references to it.

Yes! Suspect is a good point.

Jan 5, 2014 9:45 AM in response to piersonk

to say such a thing doesnt exist is inaccurate, as noted in your FinFisher example.


To imply that something does exist, without any evidence at all, isn't reasonable. There are some very good reasons to believe that a remote access hack does not exist, such as the iOS security model and the close scrutiny of numerous security companies.


PS: I wouldnt hang up to much on the physical access point either. That is the most speculative point being made.


Not at all. It's pretty much a given that physical access can compromise an iOS device - or any other kind of device - completely. The speculative part is that physical access is not required. There's no evidence at all for that.

Jan 5, 2014 10:42 AM in response to thomas_r.

thomas_r. wrote:


to say such a thing doesnt exist is inaccurate, as noted in your FinFisher example.


To imply that something does exist, without any evidence at all, isn't reasonable. There are some very good reasons to believe that a remote access hack does not exist, such as the iOS security model and the close scrutiny of numerous security companies.


PS: I wouldnt hang up to much on the physical access point either. That is the most speculative point being made.


Not at all. It's pretty much a given that physical access can compromise an iOS device - or any other kind of device - completely. The speculative part is that physical access is not required. There's no evidence at all for that.


Your point with FinFinder was that it does exist. Im not implying it exists, you are.


You know what, you guys are right. What am I thinking? This is ludicrous.


Do you guys have any room in the sand for my head too or are all the head holes taken?

Jul 25, 2014 8:27 PM in response to codyf115

codyf115 wrote:


It seems all the tech companies Google, Apple, Microsoft publicly are clear that they don't support illegal access to our data. But what companies have backed up these words with actions? If Microsoft actually kicked and fought the NSA I would consider, as painful as it would be switching from Mac to PC.

And what, exactly, is it you expect them to do? They don't provide back doors. Apple is using warrant canaries. Do you expect them to break the law? Stages protest? Write their congressman (they've probably done that)?

Jul 26, 2014 3:39 AM in response to codyf115

codyf115 wrote:


But what companies have backed up these words with actions?


Apple has, as much as they are allowed to by law. For example, consider that they are the only company that I know of to boldly go right up against the edge of the law and issue transparency reports that contain "warrant canaries."


https://www.eff.org/deeplinks/2013/11/apples-first-transparency-report-gets-warr ant-canaries-right

How to remove dropout jeep

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.