Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with HTTPS or Subversion.

Download ZIP
This project shows the kind of data a rogue iPhone application can collect.
tree: 9a39967207

Fetching latest commit…

Cannot retrieve the latest commit at this time

Failed to load latest commit information.
Classes
SpyPhone.xcodeproj
AddressBook.png
Default.png
Email.png
Icon.png
Keyboard.png
Location.png
MainWindow.xib
Phone.png
Photos.png
README.markdown
SPCell.xib
SPEmailReportVC.xib
SPImageVC.xib
SPMapVC.xib
SPSourceTVC.xib
SPWebViewVC.xib
Safari.png
Sources.xib
SpyPhone-Info.plist
SpyPhone_Prefix.pch
Wifi.png
YouTube.png
data.png
email_mask.png
gpl-2.0.txt
main.m
report.png
white_hat.png
white_hat_mask.png

README.markdown

On December 2nd, 2009, I talked in Geneva on iPhone Privacy. I called the following Apple claim into question:

Applications on the device are "sandboxed" so they cannot access data stored by other applications.

In addition, system files, resources, and the kernel are shielded from the user's application space.

Source: iPhone in Business - Security Overview

SpyPhone demoes it is not exactly true. It shows the kind of data a rogue application can collect in a non jailbroken iPhone.

These data do certainly interest marketers, spammers, thieves, competitors and law enforcement officials.

See http://seriot.ch/blog.php?article=20091203 for more informations.

Something went wrong with that request. Please try again.