Skip to main content
Skip to content
Case File
efta-02585633DOJ Data Set 11Other

EFTA02585633

Date
Unknown
Source
DOJ Data Set 11
Reference
efta-02585633
Pages
1
Persons
0
Integrity

Summary

Ask AI About This Document

0Share
PostReddit

Extracted Text (OCR)

EFTA Disclosure
Text extracted via OCR from the original document. May contain errors from the scanning process.
From: Vincenzo lozzo < Sent: Saturday, July 19, To: jeffrey E. Cc: Joi Ito Subject: iOS security (or not) Looks like the cat is out of the bag: =ttp://www.zdziarski.com/blog/wp- content/uploads/2014/07/iOS_Backdoors_Att=ck_Points_Surveillance_Mechanisms.pdf The TL;DR is: it's way easier(and cheaper) to extract SMS, address =ooks, apps data, etc etc from an iPhone/iPad/etc etc than most people =ealize. You both use i Phone and iPads, might be a good idea to either install =he application this guy wrote (see the last few slides) or change the =sage pattern of your devices. Hope this is useful, Vincenzo <?xml version=.0" encoding=TF-8"?> <!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"> <plist version=.0"> <dict> <key>conversation-id</key> <integer>296657</integer> <key>date-last-viewed</key> <integer>0</integer> <key>date-received</key> <integer>1405775005</integer> <key>flags</key> <integer>8590195713</integer> <key>gmail-label-ids</key> <array> <integer>6</integer> <integer>2</integer> </array> <key>remote-id</key> <string>424939</string> </dict> </plist> 1 EFTA_R1_01765296 EFTA02585633

Technical Artifacts (4)

View in Artifacts Browser

Email addresses, URLs, phone numbers, and other technical indicators extracted from this document.

Domainwww.zdziarski.com
Phone2585633
Phone5775005
URLhttp://www.apple.com/DTDs/PropertyList-1.0.dtd

Forum Discussions

This document was digitized, indexed, and cross-referenced with 1,400+ persons in the Epstein files. 100% free, ad-free, and independent.

Annotations powered by Hypothesis. Select any text on this page to annotate or highlight it.