Attention

The opinions expressed by columnists are their own and do not represent our advertisers

Tuesday, January 27, 2015

Edward Snowden: Apple iPhone with Secret iFeature Allows Government to Spy on You

Apple's iPhone has "special software" that authorities can activate remotely

Edward Snowden, the infamous former contractor for the National Security Agency who leaked thousands of pages of previously classified NSA intelligence documents, reportedly thinks that Apple’s iPhone has “special software” that authorities can activate remotely to be able to gather information about the user.

“Edward never uses an iPhone; he’s got a simple phone,” said the lawyer of Snowden, Anatoly Kucherena, in an interview with the Russian media company RIA Novosti.

“The iPhone has special software that can activate itself without the owner having to press a button and gather information about him; that’s why on security grounds he refused to have this phone,” Kucherena added.

It is not clear if the “special software” being referred to in the interview is made up of standard diagnostic tools, or if the NSA whistleblower thinks intelligence agencies from the United States have found a way to compromise the mobile operating system developed by Apple.

Full article here

4 comments:

Anonymous said...

But understand that in order to stay in Putin's good graces Snowden must continue to demonize the US.He is probably correct,but there are times when his claims are over the top & far fetched.

Anonymous said...

I think we all kind of knew that, ever watch a spy movie, what is the first thing the runner does when eluding the bad guys? Ditch the smart phone of course. Same advice for the average sheeple, when you’re going to make a bad comment on the corrupt government, put it in a metal box and/or leave it somewhere else for a while. What used to be called paranoia is now called awareness.

Anonymous said...

An earlier statement he made about "key words" alerting the human monitors must be true.There are too many millions of these devices for all of them to be equally accessed without key word discretion.

Anonymous said...

4:47 True that, part of the "prism" survallience process.