Home  ›  News  ›

Apple Releases iOS 8.1 with Apple Pay

Article Comments  

all discussions

show all 5 replies

We can't even protect your iCloud pictures, now trust us your money!

Doom Wolf

Oct 21, 2014, 1:25 PM
Apple must be crazy after all the celebrity nude's that went out after the iCloud security was fooled.
...
haggard2.0

Oct 21, 2014, 1:38 PM
Perhaps jenniferlawrence@gmail.com and password1 weren't the most ideal options. However, Apple did fix the security issue where it would allow the attacker to guess the password an infinite amount of times.

This is a lot more trickier or impossible as they would need to have my phone and thumbprint to authorize the purchase. The unique tokens for the cards are also tied to the device so they cannot be used on any other phone.
...
Doom Wolf

Oct 21, 2014, 2:08 PM
Still, the account @iCloud.com was hacked, the hackers didn't needed the user's direct device to access the account and get access to all files and personal data, so the fingerprint scanner on the device means nothing when threatening the account, not the device.
...
haggard2.0

Oct 22, 2014, 3:06 PM
The service wasn't hacked, the celebrity logins were breached and not the service as a whole. There's a huge difference between what you're saying and what actually happened. From what the hackers did, once they gained access to their iCloud, they performed a restore on their phone and copied the photos and such from their phone.

In terms of how Apple Pay works, yes, the fingerprint does actually mean everything, as well as the phone having NFC. Only the 6 and 6 Plus offer NFC. The iPads will have Apple Pay where you can authorize payments with your fingerprint that is registered on your phone through any application. Those details cannot be viewed or altered on the device in any way as you need a passcode to use the finger print scanner...
(continues)
...
T Bone

Oct 21, 2014, 3:38 PM
We don;t actually know just how the iCloud security was breached, unless you are approaching the issue with an irrational pro-Apple bias we cannot make the blanket assumption that it was the fault of the users.
...
haggard2.0

Oct 22, 2014, 2:35 PM
Apple (along with the hackers)came out about the issue and they were using bruteforce attacks which allowed the hacker to attempt to login as many times as they wanted. The hackers said they were using a top 500 word list to gain access to the account once they got their email address that is associated with the account.
...

This forum is closed.

Please log in to report a message to the moderator.

This forum is closed.


all discussions

Subscribe to Phone Scoop News with RSS Follow @phonescoop on Twitter Phone Scoop on Facebook Subscribe to Phone Scoop on YouTube Follow on Instagram

 

All content Copyright 2001-2019 Phone Factor, LLC. All Rights Reserved.
Content on this site may not be copied or republished without formal permission.