You realize that "attack" is possible explicitly because the protocol is private, right?
Apple can't know that it's not a legitimate communication because they don't know who you are, what device is calling for help, and who the device owner is.
And if you want to use my phone to upload a few bytes/second while I'm passing by, as long as the data isn't being stolen from an air gapped system, be my guest.
macintux|4 years ago
Apple can't know that it's not a legitimate communication because they don't know who you are, what device is calling for help, and who the device owner is.
And if you want to use my phone to upload a few bytes/second while I'm passing by, as long as the data isn't being stolen from an air gapped system, be my guest.
bryan_w|4 years ago