In message
<30885475.795631319120810579.JavaMail.defaultUser@defaultHost>, at
15:26:50 on Thu, 20 Oct 2011, Ian Welton <[log in to unmask]> writes
>When the target opens the Spoofed SMS, the connection between the
>target phone and our Main Server is established. You are now connected
>to the target phone and you have every functionality that the target
>has and even more. You now have access to stored data and even Deleted
>Data from the target phone.
This is potentially an example (which I'm looking for in a project I'm
involved with) of drive-by spyware allowing someone to take control of a
phone without the phone owner having in any sense to "give permission".
I don't regard opening an SMS as giving a third party any permission.
--
Roland Perry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
All archives of messages are stored permanently and are
available to the world wide web community at large at
http://www.jiscmail.ac.uk/lists/data-protection.html
If you wish to leave this list please send the command
leave data-protection to [log in to unmask]
All user commands can be found at http://www.jiscmail.ac.uk/help/commandref.htm
Any queries about sending or receiving messages please send to the list owner
[log in to unmask]
Full help Desk - please email [log in to unmask] describing your needs
To receive these emails in HTML format send the command:
SET data-protection HTML to [log in to unmask]
(all commands go to [log in to unmask] not the list please)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|