Hacker Timesnew | past | comments | ask | show | jobs | submitlogin

> How could the APIs .. be abused?

The app is infected, calls a 0-day using an illegal parameter that’s normally rejected by app store filters, and gains a permanent beachhead in your Android system services list.

> access photos in the background

Unclear. Apps can show thumbnail galleries of your photos within their native UI, so it may well be possible for them to continue directly to reading photos.

> access the camera in the background

Unclear. Does FaceTime continue transmitting video when the phone screen is turned off? Is it possible to capture stills or video when the screen is off on a jailbroken phone?

> or spy on the user in a broader way

Android WhatsApp seeks permission to read your SMSes, so that would be almost certainly correct as well there.



Well I was thinking specifically about iOS :)

There's no possible way to read SMS messages programatically in iOS for example, the closest you get is reading one time passwords sent, and you can only do that when the user has the keyboard open when the SMS is received.

I know Android is slightly more lax in this (and some other) regards. I wonder if Android whatsapp users targeted by this exploit have had more data exposed than iOS users targeted by the same exploit?


All WhatsApp iOS users have an unpredictable set of permissions granted, whereas all WhatsApp Android users have all permissions granted.

If I were a nation state attacker, I would be thrilled to find that my target was Android.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: