It's an attack vector for which there will probably shortly be virii and worms. We've all had virii and worms before, I can't see why this one would be much worse. Heck, once in college the animation lab was infected with a virus that wiped out all the image files it found, including every texture file we had on our file server. That cost us days of work. This doesn't seem to have that much payload potential.
So... maybe it would make international calls, silently running up my phone bill? The telcoms would shut that down REAL fast when it starts to endanger scarce international bandwidth. There would be some class action suit filed immediately, the charges suspended until the suit settles, and ultimately dismissed.
It'd all go to arbitration per the cell phone contracts.
I'd be more concerned of the data that people have on their iphones that can be skimmed, and the fact that the conversations can be recorded.. than the running up international phone calls.
What would it do with recorded conversations? It couldn't upload them to a central server because the load of even a small percent of iPhones trying to simultaneously contact any single server would CRUSH the system. It would take a seriously distributed system (that's hard) or the resources of whole datacenters (that's also hard) to be able to do it. And mind you, again, you have only a short time window this is possible before the carriers shut down the connections to protect their own networks from the iPhone load
( ... )
I'm seeing numerous industrial espionage options. The ability to operate the camera and video capabilities of the new 3GS also is unnerving.
Remember, someone got into twitter's internal documents because someone else used the same password in more than one spot. Now imagine someone getting someone's saved passwords file from Safari.
Or their email.
You're thinking of this as if someone's going to do this to ALL the cellphones. Certainly that would create a LOT of data.
I'm thinking it would be a useful attack vector for identity theft..
Makes me rather glad that for serious stuff my personal-communicator-of-choice is still a Clansman series radio. The little PRiCK-320 in my 'office' does everything I need - and does not depend on cellular service-providers!
It's pretty crazy the stuff they can do. Which is why i like to keep a simple, dancing old cell phone that just stores some numbers. But still, pretty freaky that the ability is there for someone to take control of such a device in that way.
Comments 10
It's an attack vector for which there will probably shortly be virii and worms. We've all had virii and worms before, I can't see why this one would be much worse. Heck, once in college the animation lab was infected with a virus that wiped out all the image files it found, including every texture file we had on our file server. That cost us days of work. This doesn't seem to have that much payload potential.
So... maybe it would make international calls, silently running up my phone bill? The telcoms would shut that down REAL fast when it starts to endanger scarce international bandwidth. There would be some class action suit filed immediately, the charges suspended until the suit settles, and ultimately dismissed.
I, uh, have enemies worse than that. :)
Reply
It'd all go to arbitration per the cell phone contracts.
I'd be more concerned of the data that people have on their iphones that can be skimmed, and the fact that the conversations can be recorded.. than the running up international phone calls.
Reply
Reply
Remember, someone got into twitter's internal documents because someone else used the same password in more than one spot. Now imagine someone getting someone's saved passwords file from Safari.
Or their email.
You're thinking of this as if someone's going to do this to ALL the cellphones. Certainly that would create a LOT of data.
I'm thinking it would be a useful attack vector for identity theft..
Reply
Reply
Reply
Leave a comment