Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices

Comments



from Hacker News http://bit.ly/1jKt9fF