According to CCTV, a senior information security researcher from Google has found a major loophole in devices such as Apple’s mobile phone: you can get all the information without touching your mobile phone, CCTV reported.
According to the researchers, the key to the vulnerability is Apple’s awdl network protocol.
Currently, apple mobile phones, tablets, watches and other devices are using this network protocol. For example, Apple users can transfer photos and files to other apple devices through airdrop.
Taking advantage of the protocol, Google researchers successfully controlled an Apple phone in the next room for six months. It takes only about 2 minutes to access all the data on the mobile phone, including browsing information, downloading photos, and even opening the camera and microphone for monitoring and monitoring.
Not only does the intruder not have to touch the device, the researchers say, but he may never have seen the device he is invading.
What’s more, even if users turn off the awdl protocol, hackers still have a way to reopen it. It’s not just Apple phones, but other apple devices that can be controlled in this way.
The researchers said that although it took him half a year to make a successful invasion, the user could not take it lightly. The process would be much easier for a hacker team.
At present, Apple has fixed this vulnerability in the new system in May this year. But Google researchers said that even if Apple fixed it, it did not inform users of the vulnerability, and users were completely unaware of the whole process.