The Beijing institute developed the technique to crack an iPhone’s encrypted device log to identify the numbers and emails of senders who share AirDrop content, the city’s judicial bureau said in an online post. Police have identified multiple suspects via that method, the agency said, without disclosing if anyone was arrested. “It improves the efficiency and accuracy of case-solving and prevents the spread of inappropriate remarks as well as potential bad influences,” the bureau said.

Further read: https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html

  • ExLisper@linux.community
    link
    fedilink
    English
    arrow-up
    20
    arrow-down
    3
    ·
    10 months ago

    Finding an exploit created by state-level actor is not a massive L. They have shown in the past that they are able to hack air gaped systems, weaken commonly used security standards and implant vulnerabilities into commercial software. I don’t think you will find a company that is immune to this. Other than that, did they really have so many security issues recently?

    • redfellow@sopuli.xyz
      link
      fedilink
      arrow-up
      9
      arrow-down
      4
      ·
      edit-2
      10 months ago

      Ordering your hardware from China makes it a tad bit easier to shoehorn backdoors in it.

    • hottari@lemmy.ml
      link
      fedilink
      arrow-up
      9
      arrow-down
      4
      ·
      edit-2
      10 months ago

      Read the article. The exploit was found by the state actors not created by them. Apple is ultimately responsible for the mishap due to the insecure design of the aforementioned feature.

      Even though China partially had a hand in the creation of this flaw according to the history of the feature.

      And yes, Apple has been a constant feature on the news for such privacy leaks of late. You just haven’t been paying attention.

      • ExLisper@linux.community
        link
        fedilink
        English
        arrow-up
        8
        arrow-down
        2
        ·
        10 months ago

        If state actor would create it it would be a backdoor. Exploits are by definition bugs/security issues that can be… well, exploited and state-level actors are really good at finding them. Still, if it takes resources of state actor to find an exploit I don’t think it’s a massive L. Yes, it’s totally possible they had some other serious security issues recently and I haven’t been paying attention. That’s why I’m asking.