Research that shows it is possible to hack an iPhone when it is turned off and drive off in your Tesla – UPDATED 18 May 2022 with real world examples of Bluetooth vulnerabilities

This is theoretical research that shows it may be possible to run malware on an iPhone that is still active even when the phone is powered off, by abusing a lack of authentication in the Bluetooth system and the fact that the Bluetooth is used in the Apple “find my…” …

Has Apple given us a false sense of security when it comes to their App Tracking Transparency

There was a lot of publicity – including the regular use in iPhone advertising – of Apple’s new stance on privacy. Apple has imposed new rules on vendors of iOS (and iPadOS) through its “walled garden” App Store that enhances our privacy. App Tracking Transparency (ATT) is a cornerstone of …