Apple said that exploits published by WikiLeaks have long been closed
Apple said that iOS vulnerabilities published by the WikiLeaks site that were used to crack Mac and iPhone have long been closed, according to TechCrunch.
According to documents published by Wikileaks, a few years ago, the CIA had the opportunity to break into the iPhone and Mac, subject to direct access to the device. Apple promptly reacted to the next publication of the site and said that the exploits had taken place, but had long been eliminated.
Amid growing interest in this topic, Apple released an official statement about its attitude to data leakage on WikiLeaks:
We have previously evaluated the information disclosed by WikiLeaks. Based on the initial analysis, we concluded that we are talking about vulnerabilities that were fixed and fixed in 2009, during the days of the iPhone 3GS and 3G. All other mentioned vulnerabilities in all Macs were found and fixed in 2013.
We did not negotiate with WikiLeaks for any information. They were invited to send us any important information using standard processes for contacting the company - on our terms. Until now, we have not received from them any information that is not freely available. We are ardent supporters of the security and privacy of our users, but we do not condone theft and do not cooperate with those who threaten to harm our customers.
Getting physical access to a device almost always means that user data is at risk. There is no doubt that the possibility of a remote attack on a device is of much greater interest.
An indicative story of the hacking of a Boston terrorist iPhone in early 2016. Then the Apple company in every possible way avoided granting access to the criminal's iPhone to the special services. First of all, because it meant the creation and provision of the CIA and other departments of the backdoor, which can be used on any other device.
The company knows that intelligence agencies around the world are looking for vulnerabilities in Apple devices, both with physical access and for remote attacks. However, according to Apple itself, the company's engineers are doing everything to protect user data.