Chapter 249: The Back Door
After successfully solving the problems caused by Apple's patent lawsuit, Duke did not return to the front line of research and development as usual, he was angered by Apple and the gang of people who took advantage of the fire, and the clay man was also angry, and Duke, who was originally ready to follow the rules and follow the right path, was angered by this patent war.
Duke, now full of rage, vows to take revenge on these guys who took advantage of the fire.
Conventional means are left to companies to execute, and Duke wants to teach these companies a profound lesson, of course, not just conventional means. Since he has leading technology, he doesn't take advantage of this foundation and comes back, how can Duke be willing, his brother is not powerful, and he is really a good baby.
Of course, Duke will not fully blossom, but will aim directly at Apple, from the product point of view, iOS is undoubtedly the most core part of Apple's products, so Duke's ultimate goal is directly aimed at iOS.
Duke believes that since it is an operating system, there must be vulnerabilities, and his goal is to find these vulnerabilities and then give attack methods to make the iOS vulnerabilities published in one of the sunshines, thereby discrediting Apple and clearing the way for the high-end products of the new Nokia Mobile.
Once the goal was so determined, after getting the complete iOS mobile phone operating system from the iphone, Duke began to ask Kerry to conduct a comprehensive analysis, good guys, under Kerry's initial scan, iOS was found to have N more vulnerabilities, of course, most of the vulnerabilities are not too serious.
Kerry can even analyze and optimize a large system like Craylinux, and in the face of iOS, although there is no source code for reference, it is somewhat difficult to analyze the binary execution code, but Kerry now only has to find out the execution logic and function of these codes, and then look for those things that may cause system crashes or data loss, or be controlled by people, which is much less difficult than decompiling this system.
According to this rule, under Kerry's analysis, the iOS vulnerabilities were not hidden, and more than a dozen flaws were soon found.
Through a simple app, Kerry has developed a simple way to copy and send everything from iPads and iPhones that use iOS, including pictures, music, videos, calendars, and other data.
But these are not big problems, there will always be such common vulnerabilities in the general mobile phone operating system here or anywhere, even Windows or Linux, you can do this by installing a Trojan on it.
However, these require an external application to be installed on it.
And Kerry found a hidden function service directly in the iOS kernel, this service program has been running like a sleep, basically doing nothing, just waiting for a special wake-up command in a loop.
Once awakened, the program has a high level of operational authority, such as starting the camera in the machine at any time and sending its data back to where it wants, or directly deleting the data in the machine completely, or causing the machine to be unusable.
The backdoor service that Kerry found hidden in iOS that can be woken up remotely is appalling enough. This means that Apple actually controls the hardware and software functions of any Internet iOS machine through the service anytime, anywhere.
This is a service program that is cleverly hidden in the connected APP application, and if it weren't for Kerry's complete iteration and analysis of all the features that iOS has, he wouldn't have found such a program at all, and the triggering of this program is quite skillful.
If it weren't for Kerry's super computing power to brute-force the crack, it would have taken at least many years for the average person to crack it with today's mainstream supercomputers, and it would have been necessary to know exactly what was going on and purposefully doing it.
This is definitely an explosive discovery, Duke has only now discovered that none of these giants are simple, and the rumors that caused an uproar in public opinion a few years ago are not groundless.
It's just that the plague to death system is too huge, and to analyze these things on the basis of no source code, even if Kerry is very good, it will take at least exponential times longer to analyze this system than to analyze iOS.
Besides, Plague to Death and Duke have not yet had such a blood feud, so although this problem has been discovered in iOS, Duke has not planned to move the idea of Plague to Death, which can be done after Duke and their own operating system come out, even if Microsoft is embarrassed now, there will not be much substantial benefit.
Such a unique and explosive thing, Duke got the analysis results, although it was not ecstatic, but it was really exciting, buddy finally grabbed your little tail, although this backdoor is not fatal for Apple, it is more of a blow to Apple's reputation.
Because of the backdoor of this system, Apple can justify it as a security flaw, and then they come out with a patch for iOS to fix this backdoor themselves, far from the point where they can knock him out.
But if this thing is operated well, Duke can still get a lot of benefits from it, such as a new product launch or a delicate time suddenly thrown out, so that Apple can play a huge role in making things worse.
Well, Duke closed his eyes and thought about it carefully for a while, and decided to put down an impulsive heart for the time being, ready to find someone to plan together at another time, and make the most of this card.
However, for some relatively ordinary vulnerabilities, Duke is not so polite, these things he is ready to slowly release through various forums and different people, even if they can't let Apple lose a layer of skin, but just let them keep issuing system patches, it is also a consumption of the opponent's research and development strength.
The most important thing is that once this thing forms a bad psychological hint in the minds of consumers, indicating that the iOS system is an insecure system, then Apple is far from being able to solve it with a patch to eliminate this effect.
What's more, with these foreshadowing, when the time is right, Duke will blow up the backdoor service program of iOS in one fell swoop, and consumers' trust in Apple's iOS will suddenly be reduced to a trough.
These are all system vulnerabilities that have been exploited by hackers, at least subjectively they can still be trusted.
But this backdoor program broke out, such a core sensitive thing, others can directly control your system without doing anything in iOS, who believes that it is not intentional?
This kind of trick is not costly, and the enraged Duke has no psychological pressure at all to do it now, and the so-called coming and not being rude. I can't break you, and it's cool to add to your blockage.
PS1: iOS built-in backdoor is a pure fiction fabrication, the plot is needed, Xiaofei doesn't know if it really exists; But this is not completely groundless, according to the rumors from the plague to the back door of the rivers and lakes in the past few years, fruit fans don't hack me
PS2: The second update,It's a little late today.,Because I didn't finish the code last night, I really couldn't stand the sleepiness.,Now take the time to code out.,Forgive me! Third, it is estimated that it will be about 6 points.