From: Vincenzo lozzo < Sent: Saturday, July 19, To: jeffrey E. Cc: Joi Ito Subject: iOS security (or not) Looks like the cat is out of the bag: =ttp://www.zdziarski.com/blog/wp- content/uploads/2014/07/iOS_Backdoors_Att=ck_Points_Surveillance_Mechanisms.pdf The TL;DR is: it's way easier(and cheaper) to extract SMS, address =ooks, apps data, etc etc from an iPhone/iPad/etc etc than most people =ealize. You both use i Phone and iPads, might be a good idea to either install =he application this guy wrote (see the last few slides) or change the =sage pattern of your devices. Hope this is useful, Vincenzo <?xml version=.0" encoding=TF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version=.0"> <dict> <key>conversation-id</key> <integer>296657</integer> <key>date-last-viewed</key> <integer>0</integer> <key>date-received</key> <integer>1405775005</integer> <key>flags</key> <integer>8590195713</integer> <key>gmail-label-ids</key> <array> <integer>6</integer> <integer>2</integer> </array> <key>remote-id</key> <string>424939</string> </dict> </plist> 1 EFTA_R1_01765296 EFTA02585633

