The Spiegel article perhaps contains a key to this capability:
"In the internal documents, experts boast about successful access to
iPhone data in instances where the NSA is able to infiltrate the
computer a person uses to sync their iPhone."

I have not seen security measures such as requiring a password from
the connected computer to a phone in order to access data such as
contact lists, SMS history, ..

This is probably done simply in order to provide maximum convenience
to end users.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Reply via email to