12 April 2016 - 14:29,
by ,
in
News,
No comments
At the height of the Apple-FBI battle, researchers at Johns Hopkins University tunneled their way through the encryption protocol protecting iMessage to get at content sent via the Apple application Last week, a decidedly less complicated approach surfaced. Rather than having to learn crypto, inject malware or establish a man-in-the-middle position on the network, a...