Rayz2016
About
- Banned
- Username
- Rayz2016
- Joined
- Visits
- 457
- Last Active
- Roles
- member
- Points
- 18,421
- Badges
- 2
- Posts
- 6,957
Reactions
-
Only 4% of iOS users in US are opting in to ad tracking, report says
-
Glossy 'Apple Pencil 3' on display in video by new leaker
dewme said:jasonfj said:So what’s new with Apple Pencil 3..?Maybe they'll add eraser support with a sensor on the other end. Find My support? Tap gestures for copy & paste? Fingerprint reader for filling in password fields? Drawing record & playback? I wish Apple wasn't so enamored with the glossy thing, or at least offered a matte optional finish and maybe even the option of a colored pencil body, personalized engraving, etc.I've always thought that personalized engraving on iPads was a bad idea for trade-in purposes, but personalized engraving on an Apple Pencil is a no-brainer since they are easy to misplace and all look alike. -
UK NHS coronavirus app update blocked for breaking Apple, Google rules
neilm said:But, but...isn't location tracking pretty much a core function of any contact tracing app? -
Over 500M Facebook account records leaked on hacking forum
coolfactor said:... claiming to be able to scrape the phone numbers of millions of users. It appears that the data set collected by that bot was published to the forum for free, making it available for anyone to acquire at no cost.
If this bot did indeed "scrape" the information, then it wasn't a compromise of any of Facebook's systems or databases. This bot would have "built" its own database from the scraped data.
Computers (ie. bots) can work a LOT faster than humans, so this would be the equivalent of several humans trying to manually read profiles (some are public info!) and copy the information into a centralized database. The bot just did it a lot faster and without supervision.
if this is the case, Facebook can't be held directly responsible other than allowing the bot to do its work for an extended period of time.The data scraping happened due to a vulnerability that exposed personal details. Sounds like the bot triggered the vulnerability and then scraped the data once it became exposed. (My guess is that even though the data wasn’t shown on the screen, it was still being sent in the raw HTML)
Facebook patched bug in 2019, but not before the data breach.This wasn’t a particularly sophisticated attack; I’m surprised Facebook’s systems didn’t realise a bot was running. -
Man blames Apple for bitcoin theft by fake app in App Store
crowley said:gatorguy said:crowley said:How did the app change its purpose after getting into the store? And in a way that meant this guy was fooled into thinking it was a crypto wallet?
Something sounds fishy here. At the very least there’s a hole in Apples processes.
Though I have limited sympathy for anyone who has any involvement with Bitcoin or any crypto nonsense.jminnihan said:So here's the base problem. In any iOS or Android app, you have the capability to create what's known as a web view inside the mobile app. This web view could look like a standard mobile application, for example using mobile frameworks such as React-mobile, or Adobe's Cordova, App Guyver, etc. These web views use a url to access the display of the web site in a mobile look and feel matching that of the mobile app. Now here's the big kicker: anytime AFTER app approval by Apple, all the nefarious developer has to do, is change the purpose of that mobile application looking page at that url since its being hosted by their website.