>" Moore posted to the site an exploit that would allow a hacker to insert >malicious code onto someone's iPhone to access the device's data
This is the hack that was being used for several months now to get a non-Apple application into the iPhone. eWeek says that it only works on iPhones that have been tinkered with to add bin/sh. This does not exist on the iPhone as delivered by Apple. So I am less excited about this than you are. After all if you have to modify the iPhone to make it susceptible to an attack it is hardly something you can blame Apple for. Maybe Apple is right to brick any iPhone that has been tampered with. eweek.com/article2/0,1895,2197476,00.asp ************************************************************************ * ==> QUICK LIST-COMMAND REFERENCE - Put the following commands in <== * ==> the body of an email & send 'em to: [EMAIL PROTECTED] <== * Join the list: SUBSCRIBE COMPUTERGUYS-L Your Name * Too much mail? Try Daily Digests command: SET COMPUTERGUYS-L DIGEST * Tired of the List? Unsubscribe command: SIGNOFF COMPUTERGUYS-L * New address? From OLD address send: CHANGE COMPUTERGUYS-L YourNewAddress * Need more help? Send mail to: [EMAIL PROTECTED] ************************************************************************ * List archive at www.mail-archive.com/[email protected]/ * RSS at www.mail-archive.com/[email protected]/maillist.xml * Messages bearing the header "X-No-Archive: yes" will not be archived ************************************************************************
