{"id":44,"date":"2010-08-03T21:03:38","date_gmt":"2010-08-03T20:03:38","guid":{"rendered":"http:\/\/blogs.silicontechnix.com\/?p=44"},"modified":"2010-08-11T16:09:18","modified_gmt":"2010-08-11T15:09:18","slug":"how-insecure-iphone-is","status":"publish","type":"post","link":"https:\/\/blogs.silicontechnix.com\/?p=44","title":{"rendered":"How insecure iPhone is !!!"},"content":{"rendered":"<p>Got an iPhone? Launch Safari and visit Jailbreakme.com, then move the  slider to the right; congratulations, your phone is now jailbroken.<\/p>\n<p style=\"text-align: center;\"><a rel=\"attachment wp-att-45\" href=\"https:\/\/blogs.silicontechnix.com\/?attachment_id=45\"><img loading=\"lazy\" decoding=\"async\" title=\"iphone_4_nav\" src=\"https:\/\/blogs.silicontechnix.com\/wp-content\/uploads\/2010\/08\/iphone_4_nav.jpg\" alt=\"iPhone 4\" width=\"182\" height=\"74\" \/><\/a><\/p>\n<p>This allows you to do an end run around Apple&#8217;s restrictive app store policies. It also <a href=\"http:\/\/www.computerworld.com\/s\/article\/9180099\/iPhone_jailbreak_exploit_sweet_and_scary_says_researcher?taxonomyId=17&amp;pageNumber=1\" target=\"_blank\">lets malicious nogoodniks do an end run around the iPhone and Safari&#8217;s security restrictions<\/a>. Even better, it works on the iPod Touch, iPad, and any other Apple device running the iOS 4.0.1 or later.<\/p>\n<p><strong>Sources:-<\/strong><\/p>\n<address><a href=\"http:\/\/www.computerworld.com\/s\/article\/9180099\/iPhone_jailbreak_exploit_sweet_and_scary_says_researcher?taxonomyId=17&amp;pageNumber=2\">http:\/\/www.computerworld.com\/s\/article\/9180099\/iPhone_jailbreak_exploit_sweet_and_scary_says_researcher?taxonomyId=17&amp;pageNumber=2<\/a><\/address>\n<address><a href=\"http:\/\/www.itworld.com\/mobile-amp-wireless\/112204\/why-location-privacy-important\">http:\/\/www.itworld.com\/mobile-amp-wireless\/112204\/why-location-privacy-important<\/a><\/address>\n<address><a href=\"http:\/\/www.jailbreakme.com\/\">http:\/\/www.jailbreakme.com\/<\/a><\/address>\n","protected":false},"excerpt":{"rendered":"<p>Got an iPhone? Launch Safari and visit Jailbreakme.com, then move the slider to the right; congratulations, your phone is now jailbroken. This allows you to do an end run around Apple&#8217;s restrictive app store policies. It also lets malicious nogoodniks do an end run around the iPhone and Safari&#8217;s security restrictions. Even better, it works [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_s2mail":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[17],"tags":[30,25,27,28,29],"class_list":["post-44","post","type-post","status-publish","format-standard","hentry","category-security","tag-exploit","tag-geolocation","tag-iphone","tag-jailbreak","tag-tracking"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p12j6H-I","_links":{"self":[{"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=\/wp\/v2\/posts\/44","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=44"}],"version-history":[{"count":13,"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=\/wp\/v2\/posts\/44\/revisions"}],"predecessor-version":[{"id":48,"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=\/wp\/v2\/posts\/44\/revisions\/48"}],"wp:attachment":[{"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=44"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=44"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.silicontechnix.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=44"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}