{"id":28789,"date":"2015-01-25T06:48:04","date_gmt":"2015-01-25T11:48:04","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/nsa-leaker-edward-snowden-refuses-to-use-apples-iphone.php"},"modified":"2015-01-25T06:48:04","modified_gmt":"2015-01-25T11:48:04","slug":"nsa-leaker-edward-snowden-refuses-to-use-apples-iphone","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/nsa-leaker-edward-snowden-refuses-to-use-apples-iphone.php","title":{"rendered":"NSA leaker Edward Snowden refuses to use Apple&#8217;s iPhone &#8230;"},"content":{"rendered":"<p><p>    By AppleInsider    Staff    Wednesday, January 21, 2015, 08:03 am PT    (11:03 am ET)  <\/p>\n<p>    \"Edward never uses an iPhone, he's got a simple phone,\"    Snowden's lawyer said in a recent interview, as noted    by Sputnik. \"The iPhone has special software that    can activate itself without the owner, having to press a button    and gather information about him, that's why on security    grounds he refused to have this phone.\"  <\/p>\n<p>    It is unclear whether the \"special software\" referred to    consists of standard diagnostic tools, or if Snowden believes    U.S. intelligence agencies have compromised Apple's mobile    operating system.  <\/p>\n<p>    Apple was one of the first companies     accused of participation in the NSA's PRISM data mining    initiative, following Snowden's release of hundreds of    classified NSA documents. The PRISM project is said to have    involved the extraction of \"audio, video, photographs, e-mails,    documents and connection logs that enable analysts to track a    person's movements and contacts over time.\"  <\/p>\n<p>    Apple immediately denied the accusation, saying at the time    that they \"have never heard of PRISM\" and that they \"do not    provide any government agency with direct access to our    servers.\"  <\/p>\n<p>    Later leaks     revealed that the NSA had created spyware targeted at the    iPhone, which would have given intelligence services access to    SMS messages, on-board data, live microphone feeds, and    positioning information. It remains unclear how successful that    program was, and Apple again denied involvement.  <\/p>\n<p>    \"Apple has never worked with the NSA to create a backdoor in    any of our products, including iPhone,\" the     company said following news of the project. \"Additionally,    we have been unaware of this alleged NSA program targeting our    products. We care deeply about our customers' privacy and    security.\"<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<br \/>\n<a target=\"_blank\" href=\"http:\/\/appleinsider.com\/articles\/15\/01\/21\/nsa-leaker-edward-snowden-refuses-to-use-apples-iphone-over-spying-concerns---report\" title=\"NSA leaker Edward Snowden refuses to use Apple's iPhone ...\">NSA leaker Edward Snowden refuses to use Apple's iPhone ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> By AppleInsider Staff Wednesday, January 21, 2015, 08:03 am PT (11:03 am ET) \"Edward never uses an iPhone, he's got a simple phone,\" Snowden's lawyer said in a recent interview, as noted by Sputnik. \"The iPhone has special software that can activate itself without the owner, having to press a button and gather information about him, that's why on security grounds he refused to have this phone.\" It is unclear whether the \"special software\" referred to consists of standard diagnostic tools, or if Snowden believes U.S. intelligence agencies have compromised Apple's mobile operating system<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-28789","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28789"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=28789"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28789\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=28789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=28789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=28789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}