
{"id":2481,"date":"2014-07-22T09:11:19","date_gmt":"2014-07-22T12:11:19","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=2481"},"modified":"2014-07-24T09:32:50","modified_gmt":"2014-07-24T12:32:50","slug":"funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/","title":{"rendered":"Funciones no documentadas para evadir el cifrado de seguridad iOS en 600 millones de dispositivos de Apple"},"content":{"rendered":"<p><span id=\"result_box\" lang=\"es\"><span class=\"hps\">Un hacker<\/span> <span class=\"hps\">iPhone<\/span> <span class=\"hps\">conocido y<\/span> <span class=\"hps\">cient\u00edfico forense<\/span> <span class=\"hps\">ha<\/span> <span class=\"hps\">descubierto<\/span> <span class=\"hps\">una serie de<\/span> <span class=\"hps\">funciones <\/span><span class=\"hps\">ocultas en<\/span> <span class=\"hps\">el sistema operativo m\u00f3vil<\/span> <span class=\"hps\">de Apple<\/span> <span class=\"hps\">iOS<\/span> <span class=\"hps\">que<\/span> <span class=\"hps\">hacen posible que<\/span> <span class=\"hps\">un hacker pueda<\/span> <span class=\"hps\">eludir<\/span> <span class=\"hps\">por completo el<\/span> <span class=\"hps\">cifrado de la<\/span> <span class=\"hps\">copia de seguridad<\/span> <span class=\"hps\">en los dispositivos iOS<\/span> <span class=\"hps\">y puede<\/span> <span class=\"hps\">robar grandes<\/span> <span class=\"hps\">cantidades de datos<\/span> <span class=\"hps\">personales<\/span> <span class=\"hps\">de los usuarios sin<\/span> <span class=\"hps\">introducir contrase\u00f1as<\/span> <span class=\"hps\">o n\u00fameros de identificaci\u00f3n<\/span> <span class=\"hps\">personal.<\/span><\/span><\/p>\n<p><span class=\"hps\">Jonathan<\/span> <span class=\"hps\">Zdziarski<\/span> <span class=\"hps\">ha publicado<\/span>\u00a0una\u00a0<span class=\"hps\">diapositiva<\/span>\u00a0<span class=\"hps atn\">(<\/span><a href=\"http:\/\/www.zdziarski.com\/blog\/wp-content\/uploads\/2014\/07\/iOS_Backdoors_Attack_Points_Surveillance_Mechanisms.pdf\">PDF<\/a>) <span class=\"hps\">titulada<\/span>\u00a0<span class=\"hps atn\">&#8220;<\/span>Identificaci\u00f3n de <span class=\"hps\">Puertas traseras<\/span>, <span class=\"hps\">Puntos<\/span> <span class=\"hps\">de ataque<\/span> <span class=\"hps\">y<\/span> Mecanismos de\u00a0<span class=\"hps\">vigilancia<\/span> \u00a0<span class=\"hps\">en<\/span> <span class=\"hps\">Dispositivos iOS<\/span>&#8221; <span class=\"hps\">que muestran<\/span> <span class=\"hps\">sus<\/span> <span class=\"hps\">resultados.<\/span><\/p>\n<p><span class=\"hps\">Los resultados de<\/span> <span class=\"hps\">su investigaci\u00f3n<\/span> <span class=\"hps\">en general<\/span> <span class=\"hps\">en los dispositivos<\/span> <span class=\"hps\">iOS,<\/span> <span class=\"hps\">indican<\/span> <span class=\"hps\">una puerta trasera en<\/span> <span class=\"hps\">el dispositivo<\/span> <span class=\"hps\">del sistema operativo<\/span> <span class=\"hps\">iOS<\/span><span class=\"hps\">.<\/span><\/p>\n<p><span class=\"hps\">Puede<\/span> obtener\u00a0<span class=\"hps\">la configuraci\u00f3n<\/span> <span class=\"hps\">de dispositivos<\/span> <span class=\"hps\">iOS<\/span>, Mensajes, <span class=\"hps\">C\u00e1mara<\/span>, documentos, <span class=\"hps\">partidas guardadas<\/span>, <span class=\"hps\">cuenta de correo electr\u00f3nico<\/span>, contrase\u00f1as de <span class=\"hps\">Wi<\/span>-Fi <span class=\"hps\">y las contrase\u00f1as<\/span> <span class=\"hps\">que se introducen en<\/span> <span class=\"hps\">sitios web,<\/span> <span class=\"hps\">utilizando la funci\u00f3n de<\/span> <span class=\"hps\">copia de seguridad de<\/span> <span class=\"hps\">iTunes.<\/span><\/p>\n<p><span class=\"hps\">LA\u00a0INFORMACI\u00d3N<\/span> <span class=\"hps\">DE<\/span> <span class=\"hps\">LOS USUARIOS<\/span> <span class=\"hps\">iOS<\/span> <span class=\"hps\">EST\u00c1 EN RIESGO<\/span><\/p>\n<p><span class=\"hps\">Investig\u00f3<\/span> <span class=\"hps\">acerca de las capacidades<\/span> <span class=\"hps\">y servicios disponibles<\/span> <span class=\"hps\">en<\/span> <span class=\"hps\">iOS para<\/span> <span class=\"hps\">la adquisici\u00f3n de datos<\/span> <span class=\"hps\">y encontr\u00f3 que<\/span> <span class=\"hps\">m\u00e1s de 600<\/span> <span class=\"hps\">millones de dispositivos<\/span> <span class=\"hps\">iOS<\/span> <span class=\"hps\">personales<\/span>, en particular en l<span class=\"hps\">a \u00faltima<\/span> <span class=\"hps\">versi\u00f3n de<\/span> <span class=\"hps\">iOS<\/span> <span class=\"hps\">7<\/span>, <span class=\"hps\">cuentan con herramientas<\/span> <span class=\"hps\">de descubrimiento de datos<\/span> <span class=\"hps\">secretos o<\/span> <span class=\"hps\">&#8220;caracter\u00edsticas<\/span> <span class=\"hps\">indocumentados<\/span> <span class=\"hps\">que tienen la capacidad<\/span> <span class=\"hps\">de pasar por alto<\/span> <span class=\"hps\">el<\/span> <span class=\"hps\">cifrado iOS<\/span> <span class=\"hps\">de copia de seguridad<\/span>, <span class=\"hps\">pero s\u00f3lo bajo ciertas<\/span> <span class=\"hps\">circunstancias<\/span>.<\/p>\n<p><span class=\"hps\">Cuando<\/span> <span class=\"hps\">se cifra<\/span> <span class=\"hps\">la copia de seguridad<\/span>, tendr\u00e1 <span class=\"hps\">que introducir la contrase\u00f1a<\/span> <span class=\"hps\">al habilitar o deshabilitar<\/span> <span class=\"hps\">el cifrado o<\/span> <span class=\"hps\">al restaurar desde<\/span> <span class=\"hps\">la copia de seguridad<\/span>, <span class=\"hps\">pero <\/span><span class=\"hps\">hay un servicio de<\/span> <span class=\"hps\">iOS<\/span> <span class=\"hps\">llamada<\/span> <span class=\"hps\">file_relay<\/span> <span class=\"hps\">m\u00f3vil, en el que se<\/span><span class=\"hps\">\u00a0puede acceder<\/span> <span class=\"hps\">de forma remota<\/span> <span class=\"hps\">o por medio de<\/span> <span class=\"hps\">una conexi\u00f3n<\/span> <span class=\"hps\">USB<\/span>.<\/p>\n<p><span class=\"hps\">Esta<\/span> <span class=\"hps\">cantidad asombrosa de<\/span> <span class=\"hps\">datos incluye una<\/span> <span class=\"hps\">copia completa de<\/span> <span class=\"hps\">la libreta de direcciones<\/span> <span class=\"hps\">del<\/span> <span class=\"hps\">usuario, incluyendo<\/span> <span class=\"hps\">entradas eliminadas<\/span>, <span class=\"hps\">las fotos almacenadas<\/span>, <span class=\"hps\">la base de datos<\/span> <span class=\"hps\">de correo de voz<\/span> <span class=\"hps\">y archivos de audio<\/span>, <span class=\"hps\">los datos<\/span> <span class=\"hps\">de cuenta configurada<\/span> <span class=\"hps\">en el<\/span> <span class=\"hps\">dispositivo, como<\/span> <span class=\"hps\">iCloud<\/span>, correo electr\u00f3nico, <span class=\"hps\">Facebook<\/span>, Twitter y <span class=\"hps\">otros servicios, el<\/span> <span class=\"hps\">cach\u00e9 de usuario<\/span> <span class=\"hps\">de<\/span> <span class=\"hps\">capturas de pantalla,<\/span> <span class=\"hps\">pulsaciones de teclado y<\/span> <span class=\"hps\">portapapeles del<\/span> <span class=\"hps\">dispositivo<\/span>, los datos, todo <span class=\"hps\">sin necesidad de una<\/span> <span class=\"hps\">contrase\u00f1a de seguridad<\/span> <span class=\"hps\">para<\/span> <span class=\"hps\">ser introducido<\/span> <span class=\"hps\">GPS.<\/span><\/p>\n<p><span class=\"hps\">&#8220;Entre<\/span> <span class=\"hps\">esta herramienta y<\/span> <span class=\"hps\">otros servicios<\/span>, se puede <span class=\"hps\">conseguir casi<\/span> <span class=\"hps\">la misma<\/span> <span class=\"hps\">informaci\u00f3n que<\/span> <span class=\"hps\">podr\u00eda obtener de<\/span> <span class=\"hps\">una copia de seguridad<\/span> <span class=\"hps\">completa<\/span>,&#8221; <span class=\"hps\">dijo<\/span> <span class=\"hps\">Zdziarski<\/span> <span class=\"hps\">en una entrevista.<\/span> <span class=\"hps\">&#8220;Lo<\/span> <span class=\"hps\">que m\u00e1s me preocupa<\/span> <span class=\"hps\">es que<\/span> <span class=\"hps\">todo esto<\/span> <span class=\"hps\">no pasa por el<\/span> <span class=\"hps\">cifrado de<\/span> <span class=\"hps\">la copia de seguridad<\/span> <span class=\"hps\">de los usuarios.<\/span> <span class=\"hps\">Al hacer clic en<\/span> <span class=\"hps\">ese bot\u00f3n<\/span> <span class=\"hps\">para cifrar<\/span> <span class=\"hps\">la copia de seguridad<\/span>, Apple <span class=\"hps\">ha hecho una promesa<\/span> <span class=\"hps\">de que los datos<\/span> <span class=\"hps\">que se desprende<\/span> <span class=\"hps\">que el dispositivo<\/span> <span class=\"hps\">estar\u00e1 cifrada<\/span> <span class=\"hps atn\">&#8220;<\/span>.<\/p>\n<p><span class=\"hps\">Aparte de esto<\/span>, hay otros <span class=\"hps\">dos servicios<\/span>, <span class=\"hps\">un<\/span> <span class=\"hps\">analizador de paquetes<\/span> <span class=\"hps\">com.apple.pcapd<\/span>\u00a0 <span class=\"hps\">y la otra<\/span> <span class=\"hps\">com.apple.mobile.house_arrest<\/span> <span class=\"hps\">en el dispositivo<\/span> <span class=\"hps\">que puede tener<\/span> <span class=\"hps\">usos leg\u00edtimos<\/span> <span class=\"hps\">para los usuarios y<\/span> <span class=\"hps\">desarrolladores de aplicaciones<\/span>, pero <span class=\"hps\">tambi\u00e9n<\/span> <span class=\"hps\">se puede utilizar para<\/span> <span class=\"hps\">espiar a los usuarios<\/span> <span class=\"hps\">por las<\/span> <span class=\"hps\">agencias de inteligencia<\/span> <span class=\"hps\">del gobierno y<\/span> <span class=\"hps\">malos actores<\/span>.<\/p>\n<p><span class=\"hps\">Los s<\/span><span class=\"hps\">ervicios<\/span> <span class=\"hps\">pcapd<\/span> <span class=\"hps\">sin<\/span> <span class=\"hps\">notificar a los propietarios<\/span> <span class=\"hps\">del dispositivo<\/span> <span class=\"hps\">iOS<\/span>\u00a0que<span class=\"hps\">\u00a0permite<\/span> <span class=\"hps\">a un atacante<\/span> <span class=\"hps\">controlar<\/span> <span class=\"hps\">de forma remota<\/span> <span class=\"hps\">todo el tr\u00e1fico de<\/span> <span class=\"hps\">red<\/span> <span class=\"hps\">que viaja<\/span> <span class=\"hps\">hacia y desde<\/span> <span class=\"hps\">el dispositivo<\/span> <span class=\"hps\">a trav\u00e9s de Wi<\/span>-Fi<span class=\"hps\">.<\/span><\/p>\n<p><span class=\"hps\">El servicio<\/span> <span class=\"hps\">House_arrest<\/span>, por otro <span class=\"hps\">lado<\/span>, <span class=\"hps\">permite a<\/span> <span class=\"hps\">iTunes<\/span> <span class=\"hps\">para copiar<\/span> <span class=\"hps\">archivos y documentos<\/span> <span class=\"hps\">confidenciales de<\/span> <span class=\"hps\">las aplicaciones de terceros<\/span>, tales como <span class=\"hps\">Twitter<\/span>, Facebook y <span class=\"hps\">otros datos almacenados en<\/span> <span class=\"hps atn\">&#8220;<\/span>b\u00f3vedas&#8221;, y mucho m\u00e1s.<\/p>\n<p><span class=\"hps\">PAPEL DE LA<\/span> <span class=\"hps\">NSA<\/span><\/p>\n<p><span class=\"hps\">Un n\u00famero de servicios<\/span>\u00a0y\u00a0<span class=\"hps\">caracter\u00edsticas en<\/span> <span class=\"hps\">el mapa<\/span> <span class=\"hps\">iOS<\/span> <span class=\"hps\">est\u00e1n<\/span> <span class=\"hps\">bastante cerca de<\/span> <span class=\"hps\">las capacidades de<\/span> <span class=\"hps\">las herramientas de<\/span> <span class=\"hps\">algunos<\/span> <span class=\"hps\">actores no estatales<\/span>, <span class=\"hps\">DROPOUTJEEP<\/span> <span class=\"hps\">espec\u00edficamente<\/span> <span class=\"hps\">herramienta de hacking<\/span>, que es un <span class=\"hps\">implante<\/span> <span class=\"hps\">de<\/span> <span class=\"hps\">dispositivos<\/span> <span class=\"hps\">iOS de Apple<\/span> <span class=\"hps\">que<\/span> <span class=\"hps\">permite a<\/span> <span class=\"hps\">la NSA<\/span>\u00a0c<span class=\"hps\">ontrolar<\/span> <span class=\"hps\">de forma remota<\/span> <span class=\"hps\">casi<\/span> <span class=\"hps\">todas las caracter\u00edsticas de<\/span> <span class=\"hps\">un iPhone<\/span>, incluyendo mensajes de texto, Geo-Location, <span class=\"hps\">micr\u00f3fono y<\/span> <span class=\"hps\">la<\/span> <span class=\"hps\">c\u00e1mara,<\/span> <span class=\"hps\">que fue revelado<\/span> <span class=\"hps\">por<\/span> <span class=\"hps\">los documentos<\/span> <span class=\"hps\">filtrados por<\/span> <span class=\"hps\">Edward<\/span> <span class=\"hps\">Snowden<\/span>.<\/p>\n<p>Fuente: http:\/\/thehackernews.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un hacker iPhone conocido y cient\u00edfico forense ha descubierto una serie de funciones ocultas en el sistema operativo m\u00f3vil de Apple iOS que hacen posible que un hacker pueda eludir por completo el cifrado de la copia de seguridad en los dispositivos iOS y puede robar grandes cantidades de datos personales de los usuarios sin [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-2481","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Funciones no documentadas para evadir el cifrado de seguridad iOS en 600 millones de dispositivos de Apple<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Funciones no documentadas para evadir el cifrado de seguridad iOS en 600 millones de dispositivos de Apple\",\"datePublished\":\"2014-07-22T12:11:19+00:00\",\"dateModified\":\"2014-07-24T12:32:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/\"},\"wordCount\":696,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Funciones no documentadas para evadir el cifrado de seguridad iOS en 600 millones de dispositivos de Apple\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2014-07-22T12:11:19+00:00\",\"dateModified\":\"2014-07-24T12:32:50+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Funciones no documentadas para evadir el cifrado de seguridad iOS en 600 millones de dispositivos de Apple","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Funciones no documentadas para evadir el cifrado de seguridad iOS en 600 millones de dispositivos de Apple","datePublished":"2014-07-22T12:11:19+00:00","dateModified":"2014-07-24T12:32:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/"},"wordCount":696,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/","url":"https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Funciones no documentadas para evadir el cifrado de seguridad iOS en 600 millones de dispositivos de Apple","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2014-07-22T12:11:19+00:00","dateModified":"2014-07-24T12:32:50+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/funcion-documentada-para-evadir-el-cifrado-de-seguridad-ios-en-600-millones-de-dispositivos-de-apple\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2481","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=2481"}],"version-history":[{"count":6,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2481\/revisions"}],"predecessor-version":[{"id":2489,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2481\/revisions\/2489"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=2481"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=2481"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=2481"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}