Skype Acquisition and BFU iPhone Extraction

I found this interesting from the standpoint of whether or not considered ethical hacking or something more nefarious?

Take care, posts that have only a link without expressing an opinion about the topic are at risk of being deleted. I’ve been guilty of that myself! :sweat:

A note about how not to create new topics

That said, it is interesting how forensics firms will seize on the tiniest chink in a phone’s armour to lever their way in. Keeping your info private is difficult.

1 Like

Ah, thank you for providing that link to “how not to create new topics”. Guess because I previously earned a OneBox badge, it wasn’t necessary to add verbose. “This badge is granted the first time you post a link on a line by itself, which automatically expanded into a onebox with a summary, title, and (when available) picture.”

1 Like

From the blog post, there is nothing there that is ethical hacking.

The tool could be used for ethical hacking, or not. Most probably, and most often, not. This sounds like a tool for law enforcement and hackers, of the Non-ethical variety.

An ethical hacker has a closely defined remit to test the security of their client’s infrastructure. There would, generally, be little need for such a tool. Such attacks are known and the inclusion of them in a summary of vulnerabilities would be adequate in most cases, I would think. Unless the client specially wanted to see if users were lax with their company smartphones.