Identifying Attack Points and Surveillance Mechanisms in iOS Devices [pdf]

Comments



from Hacker News http://bit.ly/1k1bOiS