What if I told you that I can know all the contacts you have on your phone, and I can know all the text messages that you have sent to whom and when, and I can know the places where you have been, so what do you say? You will say the damn jailbreak! It was decided to delete it. I will reply to you without jailbreak. Isn't that amazing?
But my dear brother, why so surprised? Isn't everything you do recorded on your device? Are not the contacts registered on your device? And are not the messages saved on your device? Do you not use GPS programs that know your location? It is normal for all of this to be on your device. The problem is that if you made a backup using the iTunes program and this file was without a password and not encrypted, then all your information is on your computer and it will be available to any hacker or to the FBI if they search your device.
Let me tell you something else, did you know that when you are anywhere, your phone calls the towers of the communication service, and these towers are in certain and well-known places, simply communication companies can know your location at any time of course roughly and not exactly, and also the FBI is able to take this information Contact companies.
Another thing every time you make a connection via the Internet, the service provider company can know where you are and can know anything you wrote on the Internet and any pictures you saw or uploaded in case the site did not encode that, and often only the financial information is encrypted, or the rest of the sites that Enter it, the communication company knows about it and keeps it in records, and the FBI can get it.
If you are a terrorist who is looking for you by the FBI, then you are not safe and we advise you not to use technology because it is very dangerous for you, and you must be careful and seek the help of experts to perform your terrorist acts smoothly and safely :)
But if you are a normal user like us, you must have technical awareness just to maintain your privacy even though you are not afraid of anything or fear of the FBI, so you set strong passwords, and encrypt your phone's address file through the iTunes settings, and do not upload your family photos Through the Internet or keeping it in your device without a program dedicated to encrypting images because your device is in the end subject to loss ... and so some simple information and you are in safety and your privacy is preserved in natural conditions as a normal person.
Now back to the main topic, is Apple spying on us? Does Apple monitor the movements of its users? As they tell ...
These days, a new topic has come back to us on the surface, or some think it is new, which is the discovery of the House of Wardin, who previously worked at Apple, that Apple monitors the movements of users of its devices such as the iPhone and the iPad and has proven this topic with the evidence, and even made a program that enables you to view this hidden data Whether on the iPhone or the computer to which you connect your phone.
Pete Warden was asked these questions
How does the program you have programmed work?
If you are using the Mac OSX operating system, which you use to connect an iPhone or iPad and a subscriber to the Internet, the program will perform a comprehensive scan of the backup files that are made automatically, looking for a hidden file that contains your site! If this file is found, it will display a record of the places you have been on the map.
How can I detect files without running the program?
These files are located in the following path / Users / / Library / Application Support / MobileSync / Backups. Every time you do a Sync for an iPhone or iPad, the files will be stored there. Most of them will be randomly named but there are basic files with fixed names such as Info.plist and Manifest.mbdb. Find the folder that contains the most recent backup copies by arranging the display in modified dates, then open the Info.plist file through any text editor to see which device follows this file (in case you are using more than one device such as an iPad or iPhone The same device to connect them). You should see the device name. Make sure it belongs to your device.
The files Manifest.mbdb and Manifest.mbdx contain a list of the files' real names represented as random numbers and letters. Luckily Alessandre has figured out how to turn it around Find it here
Does the program share this information with anyone?
No, all data remains on your computer. The code that was used in the implementation of the program has been made available to everyone so that anyone can check it and make sure that he is not spying on you or developing it if you are a developer.
- What can I do to remove this data?
The database is stored of your whereabouts on your iPhone, as well as in any of the automatic backups that are made when Sync works with iTunes. One thing that you can do that will help you choose encrypted backups. Doing so will prevent other users or programs on your device from viewing the data, but there will still be a copy on the device.
This is not clear. It is guesswork that they may have in mind some new features that require your sites' history, but this is pure speculation. The fact that its transmission across devices is evidence of data collection, which cannot be considered a coincidence.
Does Apple store this information elsewhere?
There is no evidence that it is being moved outside the device and any machines synchronized with it (for example, computers via iTunes).
What is the worst thing about it?
The most urgent problem is that this data is stored in an easy-to-read format on your device. Any other program or any user can access these files and information. And the most fundamental problem is that Apple is never collecting this information. A cell phone inevitably collects almost identical data as part of their operations, but this information remains behind their firewall. It usually requires a court order to access it, while this is available to anyone who can get a phone or computer. By secretly registering your location without your consent, it is possible for a jealous husband or a private investigator to obtain a detailed picture of your movements.
Why is the open source program not making this problem worse?
We hesitated a lot to know what is the right thing to do in this situation, but when it became clear that “individuals are aware of what is happening, as Ryan Neal says, at least one other person tried to alert the audience, but it seems that the issue failed to be clear about What happens. To make it less useful to hackers, the location and time accuracy of the data for the program was less intentional. You can only follow week after week even if the data timing is present in the second, and if you zoom in, you will see the map bound pointing to a grid, so that your exact location is not revealed. The source database located on the computer or iPhone has no such restrictions, unfortunately.
Why do some points indicate places I have not visited?
As far as we can tell, the location is determined by the nearest cell phone towers. This is not as accurate as GPS, but it assumes that it consumes less energy. In some cases, it can get incorrect locations and you are several miles away from the actual site, but these tend to have some glitches and happen only intermittently.
How was this discovered?
The cooperation has taken place in several projects related to the imaging and processing of site data, for example this map from Radiation levels in Japan While we were discussing some ideas for similar projects to conceptualize mobile site data, and while Al Sider was looking at what was available, he discovered this file. At first we were not sure about the amount of data that this file contains, but after we delved into the subject matter, we visualized the data. Abstracted, it became clear that there was a frightening amount of detail on our movements. It also became clear that at least some other people knew everything about him, but he never announced that he was going.
What is your relationship with Apple?
I worked for Apple for five years, and since that time, three years ago, I have had a good relationship with them. And when I worked for Apple, I had nothing to do with the iPhone. I was working on desktop software and did not get any help or information from inside the company while researching this issue. We are fans and fans of Apple and its products, and we find no joy in uncovering this issue.
You say the data is not publishing, but why do I see a web connection when I launch the app?
Visualization is performed by displaying it on a web page using the OpenHeatMap JQuery plugin. This means that these resources are taken from the Internet:
OpenStreetMap background tiles
The jQuery main script file hosted on Google
The OpenHeatMap script and CSS files
All of these files are static and downloaded from the internet, and none of your data leaves your computer. We still recommend inspecting the source code if you are a developer, or even relying solely on inspecting the database using traditional tools.
Now, let's leave Pete Warden and explain to you what the issue is. Pete Warden discovered that there is a file stored in the device and thus it is transferred with the backbase file to the computer. If you are synchronizing with the iTunes program, this file contains the coordinate numbers of some places of network towers and Wi-Fi networks that you have connected to and some of them Not detailed GPS coordinates. This issue is not new and a senator has done it in America before Send a message to Apple She is asked why this file is in the device, and Apple has responded at length This is a copy of it. What is useful is that this information is not related to the name of a person or any information about him or his device, and its purpose is to improve location-based services such as the Find my iPhone service or to know the locations of Wi-Fi networks so that you can find the location of the device without the presence of GPS service.
You can close all this by shutting down the Location Services service from the device's restore and also encrypting the backend file from the iTunes replays so that your wife does not exit the computer as mentioned by Pete Warden and know where you were, as well as knowing all your contacts :)
In the end, and as information, the restriction imposed by Apple on its devices and the great security in the software store programs, despite this huge number of programs, makes the iPhone one of the most secure devices for specialists if you do not jailbreak it. However, Apple devices, through the free (Find my iPhone) service, which we talked about before here, enable you to delete your data remotely and through some programs in the software store, you can encrypt most of your data. This security is one of its defects that restricts the freedom that some hate, and freedom has a price, for example in Android devices, and because of its open code, even without (Root) jailbreak, Google admitted that there are dozens of hacking and spyware programs in its store.
As we mentioned, do not be afraid of anything, there is no one watching or spying on you, and Apple will not lose its reputation for the sake of espionage or cooperation with intelligence, and if anyone wants to monitor you, it is very easy even if you own a Nokia of 100 riyals, there are communication and internet companies and everything has technology in Your life can be easily monitored ... Just as we mentioned, be careful because we as Muslims have sanctities, do not let your women send their pictures to you via mail, and you, my sister, do not put your photos on the phone or send them to your friends or upload them to Facebook even if they are not available to everyone and in particular, and we always make words The secret is strong and we encrypt everything that can be encrypted. Again, this is not to prevent surveillance, but only to some privacy.
Question:
Do you use your information in retrieving an old back up?
Because I really need it, I searched the device for Info.plist and did not find it.
Please wait for the response, if necessary ...
After peace
I mean, I understand from you if I don’t have a jailbreak in fear of being spied on
What is the way to delete my data and privacy from iTunes !!
Thank you for the information!
But if you please, is it possible to change the password for the device ?!
Because after the jailbreak there is no doubt or any fear!
And another thing about the images in the device,
What is the solution to prevent spying?
If I change the device’s password, it is enough ?? Do you not be exposed to espionage?
Thanks ^^
So if I entered the Internet, they know everything is good, there is no way to prevent it, and even our movements know it. We would be observing. If on his way, explain it in detail. What is the matter? But thank you, right. I don’t have anything, but I don’t like something called being monitored
So if I entered the Internet, they know everything is good, there is no way to prevent it, and even our movements know it. We would be observing. If on his way, explain it in detail. What is the problem? Just thank you
Praise be to God, I do not have anything to be afraid of
But I hope that someone selling the iPhone will follow it, because I noticed a note that I bought the device from my friend, and before the phone did not give me a restor and gave it to me
On the day I took the device, I downloaded I installed the IFile, and I am in my habit of exploring, meaning the iPhone is my right. Every barbecue is being destroyed a lot. I don't feel in any file. For those who entered the file and entered strange folders, I found a picture of the person who is my friend with him and his daughter and wife also
The second thing is that I worked for two restore devices, and after I installed the programs, I opened the P messenger program. I saw that my information and the added people returned as they were concerned, a worker for him is a Restore.
I prefer that I do not sell my device because you do not know when we are at this time we made the mobile in it all our work and our privacy, this is not if the mobile is stolen or lost
Especially girls. We, as men, would be very sad if we heard that only her cell phone was lost and it contained her pictures and the pictures of her family because she is our sister and we are jealous of her as we are jealous of our family and sisters
And God covers us from this world and the hereafter, keeps problems away from us, forgives us, heals us, and enables us to do all that is good
Thanks for the offering
Hi
I used to protect my password for a while back in the back .. and then I forgot it
I tried all the possible numbers, but I did not know him
How can I get rid of it? !!
Knowing that the back-up does not matter to me ... and I don't know my device as a new one
My father is the name of the spy money program
We are waiting for the way and the explanation in Sowour
Thank you, Yvonne Islam, for your efforts in spreading awareness among users. God does not deprive us of your useful article
important information
A thousand thanks and a thousand greetings
Hi
As for the news, I searched for a solution for it and found a program called Untrackerd
Do you think that this program is really useful or not ??
Thank you for the useful news and so forth
Good luck
Steve Jobs said: “They are, yes. As for us, we do not pursue anyone. The information published is false.
When the anxiety
I reached a base myself that I was not sure of, and today she is convinced, and with her, that the one who is most feared and protected from disease is the doctor, and you find the specialist is always afraid of his specialty because he is aware of his entrances and exits.
I frankly criticize Yvonne Islam for publishing such things and thank them at the same time, but there is no need to exaggerate things and spread panic and fear in the hearts of people and confuse them. The Most Generous, the best of prayers and peace be upon him, when he said: ((Good tidings and do not repel ... Hadith))
In conclusion, I say to everyone who is afraid, what do you have to do if you are afraid once, delete the jailbreak, and rest and be safe, and I know that Apple is responsible for you and your files, with millions of people other than you, not free for anyone. It is a capitalist company whose first and last concern is the collection of money. These are rumors from competing companies, and this indicates something that indicates their success, so God give us their good and dispense their evil from us. And turn away evil from us, whatever it is
I do a jailbreak, how do I protect myself that intruders can photograph me from the front cam? How do I disable the front cam? Basically I don't need it?
Where do I get this one? The settings I did not see when the cache was wiping. What would you stop? Teach us. You see beginners calculate the reward in us, so that you will help protect your sisters in God.
Thank God, I never take pictures of myself or my family. I only take pictures of children or my brothers, I mean only men.
Hi
I have certainty from the articles and reviews I have seen
On this delicate topic
Smart phones, including ours, are primarily intended
Espionage and surveillance
Also, the manufacturers have an ethics with their customers if there is a stronger party than them
Sir, please explain in simplicity to Mr. Gilbrick, because we know what things are grateful for, and what are the benefits of him.
How to change the root number, and what is the benefit of the root in the subject?
My brothers, do not be afraid of people, they are not obsessed with the limit. This is just a technique to increase sales only. And no one is obliged to enter Valblawi. Everyone pays attention to himself and the problem is resolved. And advice to God, the forbidden thing, do not get involved.
May Allah reward you for the valuable and useful information
I have an important question if I took pictures or videos on the device and then deleted it, can anyone access it !!! Can I delete it permanently .. !!
May God give you well
Tricks assured me
But for the galbrik, frankly, it is wonderful, and I am in the same mind
Just hesitating !!
In the name of God the Merciful
Please respond to my inquiries and do not delete them, as I am a beginner and my fear began to increase with the increase in these rumors
What is the meaning of the baptist?
XNUMX Does this spying or process apply to the iPod touch XNUMXg version XNUMX?
We are not accusing the FBI, but rather the fear that anyone or anyone might hack my private information, movements, and pictures.
fraternal..
Backup is a backup copy of the things on the device..whether it is programs..notes..pics ..
For example, if you reset your device to reset it and return as if it was new.
Thank you for the useful topic, but you can explain to us in words and pictures how all files and images are encrypted with a password and thank you
The call is not that Apple detects us, we send, or we talk and spy on us
Millions of users, just data stored while you need to be a terrorist
And with our data, I do not think that this is important, except that the fact that you keep your secret numbers for the financial accounts is what you are afraid of.
Yes, just stick it because Apple will not see it completely Hahahahahahahahahahahahahahahahahahahaa
Heal you
We believed you, my brother, by God, but I liked the article and what it said, thank you a lot
Thank you very much, may God reward you with good for this charitable work, it gives you a thousand well-being '-'
Hi
I really liked the article, especially the way it was formatted and presented
My answer: Yes, I am a rookie terrorist, so I have to take your advice to hide !!
Haha
The problem is that the author of the article did not explain the topic more and transfer the whole defect to the jailbreak, although he knows that the jailbreak itself is safe, but with programs such as Terminal and FTP control programs that can solve problems and in certain cases also, such as staying on the default password for these programs without changing it, unfortunately. The article spread unfounded fear in the hearts of those who read the article.
O people, there is no reason to be afraid. We are simple people, and by our leadership, they will work with the information we have. They want needs greater than that.
Ok, entering the bank account, paying bills, transferring ... etc
Via iPhone
Is it safe ?? With a jailbreak
My brother, there is no need for the security striker to afflict us with obsessive thoughts, and whoever wants more safety must remove the jailbirk
Thanks for the topic, and we await the way to encode the images in detail ...
Please release the article on file protection as soon as possible
May Allah bless you
I add my voice to the brothers who say let them watch with their hands and feet. Praise be to God. We do not have anything to be afraid of
And whoever wants to watch me, God bless him
Can I give him the username and password
Turn me on Find My iPhone
Generally thanks to the owner of the blog for the great explanation
I thank you, iPhone Islam, for the clarification.
Of course, a side news that I wish all companies implement!
Aramco, represented by the Information Technology Department, intends to conduct an awareness campaign on secure computing.
Among them, it will create an awareness section for owners of iPhone, iPad and Blackberry, in addition to other devices. And how to encrypt your files with it and protect your privacy.
May Allah reward you
(Amazed! Was my response deleted to (Lamis) or did it not arrive! And if it was deleted, why? Because I advised her a sister's advice to her sister not to put his personal photos !!)
I hope I am not disappointed in you, and that I have misunderstood
Hi
Thank you Yvonne Islam, is awesome
Ummm
Does this talk apply to the iPod touch?
Please reply
Thank you
It applies to all models that carry the iOS system
You do not expect that the topic will make you feel similar to that, sponsor of this topic
Give yourself rest, just
Blog administrator
Possible name of a free encryption program
I also have the same question, iPhone Islam
Is it possible for the people around us to hack the device or talk to the company itself ..
If only the company has no problem, the important issue is
Are the people around us who do not have penetration ??
Please answer my question !! Thank you .
No one can hack your device, unless you have a jailbreak, and whoever breaks into your device must be a professional and connected to the same network that your phone is connected to.
In short, there is no concern
Ok, can he be able to hack the files at the company and thus find my files are there?!
Kindly inform me
No files. Do not send to the company. Just apply my work to your computer
I mean, now my device is being monitored !!
My device has nothing but good, but is it true !!!!
And how was it banned !!!
Please Yvonne Islam to provide us with an article on iPhone protection
May Allah reward you well.
Peace
all thanks
Woody is the oldest thing
It is important to keep backup data.
But for security and safety, I think encryption to focus on a dedicated computer with a secret account encrypted with a special word is better, and if there is a risk, the password must be changed every period of time
In the end, I am not comfortable with how he does not use the iPhone and please do not feel obsessive and obsessive
Peace be upon you..
May God reward you with the best reward for this clarification, to take caution and caution.
I have a question, God bless you..Do they have the ability to spy or keep a record of video calls through video chat programs such as Tango and FaceTime?
May the peace, mercy and blessings of God be upon you. I ask God to help me with the correct answer for amateurs of electronic devices and for new people who have entered this field through my studies, experience, and my modest knowledge of this technology. I advise my brothers and sisters not to put complete privacy because no matter how much protection you use, you cannot prevent anyone from accessing it, and I will give an example Simple and God willing, we will be aware, when making a backup for the iPhone, the GPS files are installed in iTunes in order to make it easier for Apple programs to find the coordinates of the location of the towers for communications. This is the first reason and is available from the first version 3.1, but with the diversity and development of the programs Apple has developed this file in order to save the movements of the iPhone From the first version to 4.3.2, including security reasons, for example when the device was stolen, including the accuracy of determining the coordinates, and here there is no spying from the parent company Apple, but spying occurs from the beginning of the Internet from the eighties to the present and this is normal because when sending conversations, videos and photos via the internet, whether 3g Or DSL, these files are transmitted through the servers. This company means the butter of the subject. A messenger and even the mobile phone companies keep the audio files, and now the MSM and MSM files because they are saved in the company's servers, I mean, nothing new.
Who are the owners of spyware = the owners of companies providing Internet and communications services + when saving files on the hacked computer.
Advice for the sake of God, I ask everyone not to send pictures, videos and private matters via the Internet or save them to the computer. I ask gifts and concealment for my Muslim brothers. I ask those who read my message to invite me and the parents.
For the iPod? I use the iPod and it has a jailbreak. Someone can spy on me or not
Thank you, by God, you will not be short of Islam
A wonderful topic, but it brought me depression. I mean, if Apple keeps data and privacy, or the FBI wants to see what's wrong with them, there's nothing to be afraid of, but if any user can access my device, that is, a hacker, and see my photos, or use my data, or the numbers that I have, here's the problem. I mean, the person doesn't put anything on his device. It's normal guys for you, but what can we do? I'm worried and my mind is busy..
Good evening
My brothers, I asked if I was a photo scanner from my device, and after this, Swain Sync. Do the scanned images appear in the thing you say, and no salvation has effect
Information is very important, but you gave us the medicine and forgot the medicine .. How can I create an encryption for your backup?
Gives you a wellness..
Hatta, the back, you know, what is the news? This is what I mean, I mean, my device is all people are able to see, and my Lord my eyes went out, and after that, the mother told me to see me and my equipment.
Ali, they need several million and an employee to follow up on the topic and a hard disk as big as a house for pictures. You see, people, this is exaggerated.
IPhone Islam is still not objective in dealing with this topic
First, in his response to Al-Jazeera, and secondly, in flattening this news through this article
Please note that iPhone Islam, although a rich and pioneering website, is not the only source for the Arab reader.
And the issue of collecting data, whether from Apple or elsewhere, is not subject to denial
And Al-Jazeera was never lost .. and the illogical things that it said that it was, according to Al-Jazeera’s statement, that Apple will do it
And thanks to Yvonne Islam
It is up to you to use or leave any technology. If we publish something, I know that this is the result of our humble effort and experience. Certainly, we may have made a mistake, but if we publish it, I know that we are convinced of it and we are convinced that it is the right thing to do.
Do not forget that we are already specialists and know the secrets of the device, and if you follow us, you will know that we are the ones who did FaceTime for the XNUMXG phones and from the Arabs of the device when there was no Arabization.
In the end, there is no need for disagreement, because as I mentioned we are not the only source. It is up to you to believe whoever you want to believe
Thank you for this topic and frankly, I did not know Yvonne Islam except for a month, but I really understood the technology more with you. May God reward you well and God willing, I see Evon Islam, one of the largest companies in the world in this field
But I have a question for you: if you encrypted the backup and delete the old backup, will they reach it? Or if you delete it, it means we are done
I sweetened jailbreak and hesitated, but I think I updated the device and brought it back as it was
Frankly, an excellent topic and for my brothers who feared privacy, the publisher proposed the idea of avoiding the loss of your data, but the important thing is that Apple does not download the data, and this is very reassuring and does not raise your mind.
Peace be upon you. This is the response of one of the participants in the electronic newspaper Sabq. I hope that iPhone Islam experts will confirm this, and I have quoted this person’s response (For the information of all iPhone and iPad users.. I own a programming, repair and sales shop and have long experience in mobile devices.. The problem is not in taking pictures or anything else, the problem is in your email that you open through these devices, it is stored and remains open in the control center in Apple, and the proof is to create a new email for yourself and open it through the iPhone, for example, then cancel this email, you will notice that it is not canceled, but rather remains in working condition and receives messages, unlike emails that were not opened by Apple devices... Another piece of information, especially the iPhone 4, the camera works 6 times a month at a rate of a minute and a half completely without control over it, and it records directly and sends to the Apple center.. The disaster is not here, brothers, and by God, I am one of your advisors. I have no camel or lamb in Apple, but there are those who were able to hack Apple systems, especially hackers, whether in Kuwait, Morocco, Spain, China and other professional hackers, and they committed major thefts For pictures and videos, God knows what their intention is to harm their owners... The iPhone is safe in one case only, which is to put a black sticker on the screen and stay away from the transparent stickers that they claim protect the screen and make the device only for calls and reception without multimedia messages. In this case, the device is safe, and of course not everyone will be satisfied and say what is the benefit of it). I hope that iPhone Islam experts will inform us about the validity of this talk from their own perspective.
Quote “If you are a terrorist who is looking for you by the FBI, then you are not safe and we advise you not to use technology because it is very dangerous for you, and you must be careful and seek the help of experts to perform your terrorist acts smoothly and safely.”
This full explanation will benefit the terrorists and make them think a thousand times before they use the iPhone
They will switch to BlackBerry devices
Ha-ha-ha-ha-ha-ha-ha
Thank you iPhone Islam for this valuable information ...
O group, maybe some people like my words, but why do we not feel that the issue is nothing but noise, but once there are people looking at us through the iPhone and spying on them and we worked for them to account for what he says by God, if one of us sensed that God sees him with every step he would settle it, he would not have dared to God and we were good servants ...
May God reward you well and guide your steps, because you hope that we will, after God, glory be to Him, for good knowledge of this new technology
Gives you well p information
I would like to download the encryption method for us
Thank you iPhone Islam
Oh, praise be to God, in any case, and what they want to arrive, they are foreigners who see the elderly, we have not separated them Haha.
I have a question. The question says that the pictures that I put on Skype, for example, are with them, or rather, they see them as long as they are being monitored. You can say yes, but here the important thing is the video. If I open a video and my family and I talk to someone or something else, is this video among what they know about spying, or is it something I upload like on Facebook, etc.? Thank you.
Thank you iPhone Islam
We hope to write an article about the protection details that you can inform us about to protect files and create a new password for the root
How do we turn our internet connection into an encrypted connection that preserves the privacy of our private files
Peace be upon you.. My brothers in iPhone Islam, thank you for this serious topic.. But since you opened this door, I hope to see an urgent explanation of the way to prevent and protect, because in the world of technology, you will soon be happy until something comes along that will make you miserable..
My question is, how do I do the program that detects these files on the pc and not on the Mac
And how do we encrypt the back up on us, and can you tell us previous articles about this topic? Also, is it possible to transfer the backup file and keep it in an external place like an external hard disk
How about a program
Untrackerd in Cydia, doesn't it stop the registration process? As for the monitoring process, it has become very well known that all social networking sites and emails are monitored since their creation. Please shed light on the Untrackerd program and others like it to know how effective they are. Thank you.
Dear Blogger Manager
In one of the responses it says the change of the passes followed the root
My question, how do I change the password following the root?
Thank you
I just have a simple request
You can download an article on privacy for beginners with an explanation of the steps to be taken according to the type of file
Yvonne Islam, how do I put a password on my messaging right ??
And thank you for the great topic
Some people are terribly obsessed.
Your account numbers contain billions
Can you inquire how do I know I have Facebook on the iPhone or not? I bought the device and I don’t know it exists or not and I don’t see it
Praise be to God, the issue of espionage is always troubling to everyone - I am with the iPhone XNUMX, and I have a jailbreak and I don’t download it because I have heard words really related to protection in the version of this version of the iPhone - God knows, caution, safer
Why do we always think about hiding and staying away from reality? I don’t know what made us think about equipping ourselves with technology that benefits us.
Thank you
Before I proceed to complete the wonderful article
I said to myself I will go back to Abu Kashaf
But as long as they are looking for terrorism, let them enter my device
From the widest of its doors
I thank Yvonne Islam and my thanks go out to the owner of the blog
Thank you for the wonderful information ..
What is this jailbreak, and when I want to delete it, I see that I do not know anything new on the iPhone. These are the things that you say about it. Where is it?
I mean, what is his court for doing this espionage from Apple ...!
<< Is the purpose of this for example ... or curiosity at a minimum ?!
And did you know that this limits the confidence that its users give it, or rather its lovers ?!
<< Grarraibah, Apple .. !!
Hi everyone
Despite the distinction of your articles, my brothers Islam iPhone, in general ... However, this time I did not find your article as strong as your previous articles !!
I don’t know, I did not feel that you were fair .. I did not feel that you relied on scientific investigations and based on expert opinions ..
Perhaps privacy does not mean much to you .. But there are those who do not want that even if he does not have privacy or secret moves ..
But once it is known that the movement’s locations are stored and synchronized without the user’s knowledge .. it is very sad and deeply disappointing.
Hey group previously tracked and know your location, your information and your data, what is new. Any specialized party can penetrate your devices at any time, and the word encrypting data on iTunes or the device is useful even if it has a thousand passwords. Of course, as I said by specialized bodies such as the FBI or the CIA ... etc. And when they want that. But you, as a normal user, have what they have from you, and they do not care about you, nor are they empty watching millions of people. But if they want you to get you, where would you be using the technology?
But as they say, because when a regular hacker chose you randomly, you would be exposed to blackmail and intrusion, so you protect your situation by encrypting your data.
Al-Jazeera’s statement is correct about collecting information, as Apple admitted, but what they said, “in the event of intentionality or intent to observe you”.
The same situation happened with Google when it collected Wi-Fi data while covering the streets of Germany for the purposes of the Street View service
And the talk goes on, but what we add to you and conclude by saying that you are a normal person. Do not be afraid, but be careful
I have the Cydia program, which means that you can now hack my device. We need to learn how to give us privacy in terms of photos and conversations, and how to block them so that no one can access me. By God, since I bought it, I have always covered my camera. Thank you for the information. Go ahead, Apple.
Brother Muhammad, it is strange that you consider saving the places I frequent on my mobile phone as normal or natural, and it is strange that you do not acknowledge that Apple has absolute access to your device from transferring data to shutting down the device itself and you consider this normal or natural. I am not being hounded by the FBI, but I am a person with my own privacy. Apple now holds my credit card number and refuses any intermediary and holds all my data and also knows my location and follows me. Is this its right?
On the worst case, and it has already happened in the event that the iTunes Store is hacked and a hacker gets all these machines for thousands of users, you have already put millions of lives at risk.
Please show us pictures ... in the balance of your good deeds, God willing
My brothers, may God bless you, I tried to search in iTunes for setting
Because I want to delete the backup because there are only pictures
I did not know from where, I wanted someone to teach me
I also wanted to ask, I deleted the pictures from my iPhone and also
There is no jailbreak. If you sell it, you can return the pictures
May God help you
Sowal for Professor Tariq
Can you access system files without having ssh open
Or do I need to change the password just by doing the jailbreak?
I think my question is clear. I hope you will answer me, please
But my dear brother, the jailbreak in itself is a disaster, I could go to the Cafe Shop and hack all those who download the iPhone jailbreak in a few seconds, of course this is for everyone who did not change the root password
Brother and dear director of the blog, why do you scare us like this!
We did not install the jailbreak except for its many benefits, and you know them from us.
Help us with the knowledge and information you have on avoiding penetration of our assembly devices, with the ROOT settings!
And don't throw out the scary information, please
After the aforementioned Madame, those who are spying on us are governments that are not on us because they are looking for politicians and we are talking about our trivial things in their view
Excuse me
You said that the jailbreak makes the iPhone easy to hack anywhere, even in cafes
And I have a necessary question that I know the answer to
If you delete the jailbreak, will it remain hacked or return to its safe state?
Please answer because I was asked a question before this and there was no response
Do not fear my dear brother!
Leave the jailbreak on your device! But ! Change the password for the root !!
So that no one breaks it!
Thank you Yvonne Islam for this very interesting and useful topic
May God grant you success
The saying goes: don't be anxious, don't be afraid
As long as your affairs are in the right place, let them spy from today until tomorrow, and the second thing is that people will be scandalous and pictures of girls like ours, the Arabs.
Thanks for the valuable information, is it true that this file is transferred to Apple every XNUMX hours?
What is the benefit of encryption if Apple is from setting. Al-Baraj means that it can decode and know the password by virtue of its possession of all the iPhone programs !!!!
Hi
Always and forever, iPhone Islam offers everything that is useful to us as beginners
May Allah reward you with good
..
I previously worked Jailbreak for my device without any prior awareness of its harm to girls
And now I am really afraid of this problem
According to my understanding, if I did a restore, the device would be switched off, especially since I bought it from Mobily-Saudi Arabia
Is this information correct? And if it is correct, would you please tell me about the best solution?
Please oh people of specialization, do not neglect my response
May Allah reward you with satisfaction and paradise
By God, this is a lesson for girls who put their pictures on or on the computer ... Thank you, Yvonne Islam
I swear by God, ignorance in some matters
Our life is a good time without this terrifying technology
God protect us and cover the children and daughters of Muslims, Lord
It gives you well, but I have a question if possible
If I took pictures or videos from the iPhone camera and erased them before, I don’t do anything wrong with Backup Pinzle and iTunes.
Why don't you encrypt the backend file via iTunes settings?
We mentioned the method in the comments and we will make a special article for that, God willing
Also, why fear? Your computer is definitely more than a phone on it, and there is no one who penetrates it and you did not care before. You have grown up as if there is a hacker in every home. My brothers, the information above is only to raise awareness, not to make you fear
Regarding this topic, how to change the root password, I hope you will benefit us in order to avoid some dangers in the future
Worthwhile topic. I think raising this issue has more negative than positive aspects, and it may harm the iPhone's reputation for those who did not understand the goal of raising it.
I am with my modest experience with the device, but I do not think of acquiring something like it for one of my family members.
I bought an iPhone XNUMX and sold the rich I had, and the first time I arrived immediately on the laptop I noticed the return of old pictures and the return of contacts so that some contacts I myself forgot about them ,,, for people who are afraid of spying first, you see a normal person, whatever your job They are what they care about spying on you or on their concern to monitor the wanted internationally and the people to whatever are just walking. As for the photos and videos, these are stored in the servers of God, I know their capacity is very, very large. About myself, I see this is a positive move because you can check your device and it has important information on it. So what you have to do is buy a new device and connect it to the laptop and some of your information will be returned ,,, and as for FaceTime it is monitored, but it is monitored by the computer, I mean, there are no people spying on you, but if they want someone wanted they put The imprint of his voice or his appearance while he is looking diligently even the owner of the fingerprint of the voice or that he is not meeting him and you see someone saying this is the spying of telecommunications companies in the whole science by spying on their customers, but in the same way the spy who spies on us is present among us who is the computer with suspicion For a year, I hope I have reached the idea ...
But my dear brother, the jailbreak in itself is a disaster, I could go to the Cafe Shop and hack all those who download the iPhone jailbreak in a few seconds, of course this is for everyone who did not change the root password
How do I do this password because I level a jailbreak. I do not know what the story is, but we know what is required
Ok, how do I set up a password for the back-up?
How do I transfer photos from the iPhone to the laptop itself, not to iTunes?
And thanks Yvonne Islam
Peace be upon you, my dear brothers. My iPhone was stolen. Can I know where it is or who used it? Can they access my data and photos? Note that it has a screen passcode. Please help. May God have mercy on your parents and make it a part of your good deeds. To contact me via email:
Pardon me, I uploaded the jailbreak, unfortunately, if I delete it, salvation, they will not see or hack my pictures ????
Very useful information, but I wish you would be aware of the spelling mistakes
My brothers, if you are afraid that someone will find out your secrets, know that God sees you in the dark of night, and you do not have any device, camera, or eavesdropping device that records everything you do, so fear God in good times and in public.
All thanks and appreciation to the site, which is of widespread benefit to all, and I hope to put a topic for the beginners
Peace be upon you
I am new to the device and have already done more than synchronized with iTunes and would like to know how and where to find my information from iTunes and also how to create a password for it
And the other thing I did once was done by himself, and I don't understand what happened and what benefit from it, how do I open my files from it, and how do I delete it?
I wish you could help me and thank you very much
The most beautiful and cool topic I read on iPhone Islam
Frankly, all that you wrote has applied and found it to be true
Because of all the American development, he has worked with intelligence and security, in order to terrorize them. May God terrorize their hearts, both worldly and hereafter
No, my dear brother, we do not say about you a terrorist, and we do not say that to ourselves. The word terrorist is not for Muslims, but rather for terrorists, whether they are Muslims, Jews or Buddhists
Young people, it is clear that he is joking about terrorism.
Do you not, brothers, Yvonne, Islam, you know that there are people you wish?
Whatever he saw for you or anything on you to tarnish your reputation
And you know what I mean. I mean your words about terrorism. I mean, if someone has just been involved in your service and you have connected this message, what do you say?
On the whole, I wish you all success and repayment for what God loves
Greetings and my passions
A few days ago, a German official touched on such a topic with regard to Apple's knowledge of other people's privacy and websites, and asked the company a question through the media, is this safe and is this true and currently we are awaiting a response about this news and its repercussions ;-)
By God, if my doubts were in order?
Isn't it reasonable that a company like Apple develops quickly and solves the problems of its devices with such speed .... It must have a way to know the advantages and disadvantages of the product device and the desired software from the consumer?
Whether it was by spying on him or by writing to the company's website?
I sweetened to sync it with iTunes on the laptop and on the iPhone in privacy, when the iPhone synchronized with the laptop, meaning everything from my privacy and information, it had a copy of the Paytons Lab ??
And the laptop has been ruined, and I am afraid I will fix it by land and have something to move from the iPhone to the father
May Allah help the girls
I wish I was born
I do not think that you will go with your device to a person who is not trustworthy and does not fear God, and at the same time the iPhone genius will know how to decompress the backup files. Just take care of you next times ... that's why we write these articles not to be worried and obsessed with you, but to be careful.
A very useful and unique article, which is especially useful for hackers, to be honest ... You helped me in a way that you would not expect, thanks iPhone Islam :)
God covers Muslims and Muslim women
Thank you for the topic
By God, it's a problem because I took a picture of my three-month-old daughter on my iPhone, hahahaha. May God bless you, Egon Islam.
There is a great controversy surrounding the activities of mobile phone companies, and a spokesman for the German Ministry of Agriculture and Consumer Protection said that Apple should clarify a series of open questions about the user data that the iPhone, iPad and other tools store.
The request follows a similar request by US Senator Al Franken, who cited a report by security researchers alleging that the company's iPhone 4 operating system secretly collects subscribers' location data in a hidden file.
Ministry spokesman Holger Eschle said: Apple must disclose the location, period of time, for what purpose the data is saved, who has the right to access it, and how to protect it from unauthorized access to it. He added that the secret collection and storage of smartphone location data would be a major breach of privacy
Source: Emirates Newspaper
This is an old dialogue and Apple's response was included in the article and closed this topic.
I wish you could help me how to enter the iTunes settings
He will be afraid of God, but he will assign everything that has increased
Technology increased fear …… ..
Please accept the comment and thank you, Yvonne Islam
He will be afraid of God, but he will assign everything that has increased
Technology increased fear …… ..
This topic is dangerous
It gives you wellness, and this is a confirmation of the Al-Jazeera channel. You said it was a report that was not true ??
There is an answer to your question in one of the previous comments
Thank you, and you didn’t fail, but the case of the wife knows about the husband, where is he going, and where is his position.
But no surrender and we will not insult them
Thank you for this good information, may God grant you success, brothers.
Why all this anxiety, brothers?
No one will know my location, information, or anything else except God Almighty! Why ?
Because I downloaded a tool from Cydia called Untrackerd !! This tool wipes all stored data, like the one mentioned by our beloved brother Muhammad Jalal!
Note :
When you download the tool, its icon will not appear either on the surface of the iPhone or in the settings!
And, God willing, I will be of good use to you, even if by a little
And thank you very much iPhone Islam for their creativity
And may God reward you well and may God bless you
But my dear brother, the jailbreak in itself is a disaster, I could go to the Cafe Shop and hack all those who download the iPhone jailbreak in a few seconds, of course this is for everyone who did not change the root password
Fortunately, I changed the password to root :)
In your article, I was stopped by a situation that happened to me a while ago. I wanted to register with a doctor, and before you register with him, this doctor has to sit with you to see you and then do a simple test. After the session, he asked for my name and mobile number and said, “I will respond to you later.”
The strange thing is that the response was quick, and when I asked him about the reason, I discovered that he had entered my Facebook account to find out who I am? My brothers, the topic is happening simpler than we imagine .. With the click of a button, it is now possible to know you and know your preferences, interests, what you love and what you hate .. and it happens from us with all our will !!
But how do we change the password?
You know what I like about Yvonne Islam's articles some times, regardless of the interest, constant commenting with young people :)
What does it mean to change the Roooooooooooooooot password, and how to penetrate one if not
Well brother, we will write an article about that soon, God willing
How do I put a device that is not my device on iTunes until it is not allowed
Transfer my data to the second device
Thanks for the great article
Since I am a beginner in the iPhone world, I am waiting for your article on how to encrypt all of what I do on the iPhone.
Accept my appreciation, Yvonne Islam
Praise be to God, I do not have anything to be afraid of
And the door from which a wind is drawn, blocked it and rested
I wish you permanent development, O Yvonne Islam. The inspiration of the glory of Islam, you
You got yourself into trouble, Yvonne Islam
The most common problem is that he does not know the technique, and he is Abu Al-Arif
Take, for example, the car shuts down if the speed proves and it dies
Do not drink water from the side of the electrophoresis and other follies that you always hear
Sorry, but this is my opinion
Yvonne Islam = creativity
A question to the administrator, how do I create a password for the programs ??
If the user deletes a picture from the iPhone, does the device keep that picture in the memory? Can the owners of telecommunications stores return them using programs or otherwise? ... Please advise and thank you very much.
I say to those who want to watch our devices, God knows that the day I think about is hated. A thousand thanks for your efforts.
I mean, do I understand from your words that the one who made it easy to penetrate his device? !!!
If the answer is yes
Is it possible to remove the jailbreak or is it too late and the device has been hacked?
Have you tested iPhone protection that is irreversible?
It is normal. We are a terrorist. We are afraid. But the most important thing is that there is no ordinary person who can penetrate my iPhone. This is the most important thing for me. Please teach me. I mean someone other than Apple. I mean someone who is bully or curious.
May God strengthen you, members of the iPhone. Islam Honestly, we are proud of us like you, Arabs.
God strengthens you, members of the iPhone. Islam honestly, we are proud of your likes, Arabs
Wonderful and beautiful words. Frankly, thank you for it. This is what is happening in the world of technology. New and useful information for me.
Accept my sincere cordiality and respect
Very beautiful, a wonderful step to add to your previous steps towards creativity
You found in advising your brothers and informing them of their concerns
God bless you wherever you go
I am a terrorist and I am not a terrorist ... but there is no personal freedom and privacy, even our landline phones and tours have become monitored and notice the tunes that you hear on the landline telephones are all American servers..I decided to abandon the iPhone and use Abu Kashaf's mobile and live in a tent just to preserve my privacy ... May God reward you well, Director
The question I asked myself a thousand times
Why is a game app asking me to specify the location, for example
If you go to the settings == >> General == >> Location services
You get more than 20 applications that ask for location, and most of them are illogical
Do we really need to know how to encrypt data?
And we create a strong password so that no one can know anything about me
Here, I do not have anything, but I am obligated
Thank you iPhone Islam
Yvonne Islam, how do I put a password on my photos?
And thank you for the great topic
There is a program in the software store like PictureSafe
Frank girls get involved !!!
I advise you to homing pigeons
The topic is about privacy and you are talking about hacking !!
She walked bright and walked Morocco - a difference between Mashreqin and Maghribi
But personally, for me, I cannot guarantee that Apple, or at the very least those behind Apple, will take a copy of the backup for every sync.
Thank you, and may Allah reward you
Enquiry ?
If I delete the backup file, can I return the information in the future, even though I delete the backup file ???
No, of course, the purpose of the backup file is to save everything in your computer, so that if it is corrupt, you can restore it as it was
God bless you
And await the topic of data encryption
I wish if it could be a comprehensive topic for data encryption and protection programs, I mean protecting device files such as photos, videos, and so on
I notice that any topic is written here
It is intended to be of interest only .. but I find many are afraid
It may even invalidate the purchase of the device with its large!
Why all this fear ??
See any mobile in the world where what happens on the iPhone will happen
If you are afraid of determining your location, then the company that deals with it
Know your location even if your mobile phone Abu Kashaf!
So we stop enlarging the topic, bigger than its size!
Islam + Apple iPhone = a world full of surprises
Thank you and forward :)
What is the previous encryption and pickup? And I don't know what.
Ok, i'm msui jilbrick I mean, my device is hacked.
What is useful encryption?
Nor how.
How do I know hacking programs.
And the programs that protect my device.
Do hacking programs exist on the Father Store?
Not only in the jailbreak.
Life now in general, Live means everything that is monitored and watched, because cameras are everywhere, even with three-year-olds ..
As for me, I have no objection to seeing my iPhone, as I have nothing to fear for, nor to fear ...
Dear Yvonne Islam, on the subject of the terrorist follows in
The article doubts one of us, for example
And thank you for the security dose is an important topic
This is just a joke. And I know that many on the site do not accept joking, but we always throw phrases at them so that we can make them comment with us on the article :)
Peace, one time. If he installs the jailbreak, is the penetration easy and does not require anything to hack the iPhone?
Allah is the helper. This is a necessary evil, but be careful, my sisters, and do not underestimate technology or take it lightly. May Allah protect every Muslim man and woman.
May God grant you wellness for the splendor of your style and spread awareness among technology users in general .. My sincere appreciation and gratitude to you
Advice for a Yippi who encrypts his data and puts the word in Arabic. Because the encryption in English can be deciphered, and I have a program that can decipher it if the length of the word is XNUMX characters, but Arabic can never be able to decipher it if it is two letters. A piece of information I liked to add to you while I tried it. Thank you Yvonne Islam for the great news.
Lol I didn't read the article, but I got scared, but if the company itself that spied it, no problem
The most important thing may be from the people around us with the same device
This is my question, can someone see my messages and pictures through his device?
In the beginning, I thank Islam iPhone and thank all the brothers who are responsible for it, and this is my first post
As for the subject, this deepening into it is somewhat thorny, but if it is correct, this is a big problem even in your device.
God bless you on the interesting and useful topic !!!
Can you give me a simple explanation of how to encrypt images? Thank you, iPhone Islam.
Thank you, may Allah reward you. I have questions
XNUMX // How do I encrypt the file ??
XNUMX // I sweetened my jailbreak device, and many times I knew that downloading programs with the crack is forbidden according to Sharia and frankly, if there is no use for me, I am for jailbreaking because in fact I do not need and do not know to use it at all, it just makes me vulnerable to penetration, so how can I return the device as it was without losing my programs and information Stored in it ??
XNUMX // The process of returning the device (removing the jailbreak) Do you need professional people? Or can I do it myself ?? ((For your information, my device is an iPod Touch))
Sorry for the prolongation, I hope you will answer my inquiry
Can you tell me how to make a password for the back-up?
Secondly, when I am traveling, for example, and talking to my family through FaceTime, Skype, Yahoo, or Tango, is there a problem?
Third, my wife's device is jailbroken, so is this a risk or not for penetration
Fourth, please reply because I really need the answer from you
My love and appreciation to you, Yvonne Islam
Thanks for the great article that provided the correct answer to my question
Everything has its tax
And technical tax space less than privacy
I don't think Apple is (empty) watching and tracking every single person
Rather, it is part of the technology and features and is present in its electronic system, if you will
And we have nothing to hide;)
And I suspect if we hadn't kept pictures of our sisters and daughters on devices
If we lose anything, our honor will be safe from the hands of intruders
It is not necessary, then, that we save these images in the devices
As for tracking whereabouts, callers list, and messages, let them view them as much as they like
Thank you for the valuable information, and I ask God Almighty to forgive us, bypass us and forgive us, and to make our use of these devices satisfactory in terms of publishing things that benefit all Muslims
Men, let them see who would want to, by God, if we build nuclear reactors on the iPhone hahahaha
Well, I am, who might be Apple spying on me
Hahaha
But the one, if you have anything special, the flash memory and the hard disk, the money of the country, go, let one, and relax
Butter
We need a topic for beginners on how to encode the topic
Thank you
It is not about its predecessors selling or not one does not guarantee the world
In short, my sister, do not transfer Tire via the internet at all
I don’t know if the albums in Sojaj can be spied on or not
But the best is what you can imagine, like the whole
My maceration
I have an important question for you, and I hope for an answer from you, Islam Fone
Can they look at us through FaceTime, for example?
If I do FaceTime with my parents, can they see the connection with them or record this call?
I hope you will help me. For the fact that I and others from FaceTime are very keen. And other programs such as Teaming or. Neem Buzz. And Skype. And others and thanks
I address the question to the blogger manager and others with experience in this field
I want to ask you a question !
How many users of these programs in the world?
Is it if what you fear is real ..
Will they watch you alone from among millions or billions?
If the answer is simply these programs or even FaceTime
She does not watch you and does not see what she sees ..
As what was mentioned in the article, all of it is that it keeps the aforementioned things in the back apple file only
No other than the things that I mentioned ..
Do not be afraid ..
There is no such thing!
And live your life as you want it ^^
I know, my dear brother, that any code must be opened, and any communication can be monitored, and this is a fact. Even if you upload a program to the software store and this program works on encryption, you must give Apple how the encryption works. But this is only available to the governments. As for companies, they do not have the ability to monitor and if they are followed by succession.
I share my opinion with my brother Aboudi, and we really do not have anything but all good knowledge
And thank you for this valuable information
Can an explanation of how to encrypt the file please?
We will write an article about that, God willing, with pictures, and the topic is simple in iTunes. Just choose the Encrypt iPhone Backup option
You will find this option in the list with the Restore and Update button, and your phone information
We thank the family of Yvonne Islam for their keenness to provide us with information in all fields. Please, the family of Yvonne Islam, advise us on how to update the maps on the iPhone 4, may God reward you all the best.
Oh my God, I mean, forbidden, forbidden, forbidden, for me, for personal needs on the mobile phone.
IPhone phones are a warning, especially girls, not to sell your phones as long as they contain personal things
No sister, you can do a restore before selling your device. And if you keep pictures on your computer, use one of the photo encryption programs, which does not allow anyone to see the pictures except with a password.
The subject only needs awareness and this will not reduce your freedom
Something that intrigues me as a girl
And from too much, I became attached to the front world
No longer guarantee Yvonne frankly
:) I do not think so far ... Just make sure that your phone does not have a jailbreak and therefore will not enter any hacking programs for it
Blog Director .. Mr. Tariq, I hope you are in good health
As for what you said that jailbreaking is the danger in itself, I have a simple comment.
As long as the device is in a specific operating system, I broke its protection and used the jailbreak, this indicates that the system has a loophole that has been exploited to make the jailbreak, and this we do not disagree about
So the system without a jailbreak has a loophole.!
This vulnerability can be exploited to make (Backdor) or reverse communication
It is wrong to attribute the risks of hacking to jailbreaking only. The risks lie in the IOS operating system.
As long as Apple has not issued an update to patch the gap, the system is still (not safe) ..
Thank you for reading what you wrote ..
Your brother
Yes, you are right, but in order for someone to exploit this vulnerability, he must get the device in his hand and have enough time and a computer to jailbreak.
Either you yourself breach your device, this facilitates the hacking process, but if you are a professional and you jailbreak and change the password of the device, your device will be safe.
But you are still right. The device has gaps, and this is the case with all technology
Hello,,
Thank you, brothers, for this valuable information.
But there is no reason to be afraid, as all cellular devices in the world are monitored, not from Apple only, but from all the investigations FBI CSI, and so on, and this is a normal thing in my opinion, I have nothing to fear :)
Thanks for the helpful information $$
Thank you, Yvonne Islam, for the information
(There is a noticeable improvement on iPhone Islam)
Ahead and we invite you
(Company) iPhone Islam.!
Lord hears you and becomes a giant company that competes with Apple!
Ok, brothers, if you delete iTunes from my computer, what happens with regard to espionage or information transfer ???
:) Brother, no one is spying on you, and if you want to delete the backup files, you do not need to delete all iTunes.
Thank you for this valuable information
Yes, you are honest, Al Jazeera.
With her news three or four years ago
I ask why do you delete my question about the promotion? Is it because I wrote it out of place, or is there no room for help?
Dear brother, please write any comment or inquiry on the same topic of the article, and thank you
Hahahahahaha we've had it, all this is happening. Okay, so the first thing I care about is whether they hack or not. Until now I won't care, as long as I don't have privacy.
This is, even if the messages came to me, just feelings and his emotions were written as long as I have a Nokia device. Here, I appreciate my privacy in it.
Thanks Evooon Aslam
And this is why you assured me, may God be pleased with you. Whatever you fear, by God
I have an important question for you, and I hope for an answer from you, Islam Fone
Can they look at us through FaceTime, for example?
If I make a FaceTime call with my family, can they see the call or record it?
I hope you can help me. Because I and others are very careful about FaceTime. And other programs such as Fring, Name Buzz, Skype, and others. Thank you.
I hope that time will return again
We live in tents, no development, espionage, or permanence. I care for the sheep and sit in any part of the earth, neither for temptation nor for sins, and the days are calm
Believe me, sometimes I think like you. I feel that these technologies have stolen the blessing or have disrupted our lives.
By God, it is true for your tongue, otherwise the words of your hand who wrote. By God, when I visit the family in the desert, I see that they are people who are innocent, and their souls are calm, and their hearts are relieved. As if they were the owners of the world in their own hands. But you also see the old Nokia as a factor with them.
Honestly, the idea was the height of magnificence, except that the clip of not owning an iPhone came in the imagination, I could not bear this imagination, and I woke up from it and praised my God for everything, including my own iPhone
And I have this idea, especially when I am looking forward to his trip outside of Medina, and I remember the wish of the people of hadith (my uncle’s house and a high attribution)
Thank you, Yvonne Islam
Believe me, Mr. Hazar, I regret the years I spent herding sheep, and as much of the suffering and responsibility it was entrusted to a child, but it was the most beautiful year of my life and there is no mountain except for me with inscriptions and souvenirs and when I find the simplest opportunity I go to those places and cry over the ruins, my brother, what is the complication that has become Our life is for God’s sake and our work is a proxy. Honestly, you knocked on a very sensitive chord, as if you were speaking about what is in my heart
Masha Allah for this valuable information. May Allah reward you well.
Hahahahahahahhahahmakkoor, by God, from the time this article was reviewed
Soussa and Shakk = a life of concern ... .. Thank you, Yvonne Islam.
I swear by God I did not shorten the wonderful information from my scent because I was afraid that my data was coming out.
But any fon Islam does not shorten.
A generous shower, and we deserve it
Two days ago, I posted this post here for the benefit of our brothers, and it was deleted. I did not want to steal the spotlight, but the intention was to advise, but unfortunately the topic was removed and it bothered me a lot.
This should not bother you, for in these matters we must collect all the data and verify what is actually happening and is the matter dangerous or just a fleeting matter. As I saw the article has a lot of information and a great article. If we do a study of the matter, it is better to write as others write.
I swear by God I did not shorten the wonderful information I was very comfortable with, because I was afraid that my data was going out and I got rumors after
Thank you, by God, I did not know
After this news, I am ready to buy an iPhone XNUMX for XNUMX Saudi riyals
Free of all this ...
Does this mean that Al Jazeera has wronged you in the past, iPhone Islam?
No ... what Al-Jazeera said is pure science fiction, it said that the phone measures your heartbeat and takes pictures of you, it was deficient to say and drink tea with you :)
What we are saying today is that your phone holds your information and this makes sense for all phones. The problem: If you do a backup or sync your phone with iTunes, that will move to the iTunes program, so all you have to do is encrypt this file with a password.
Excuse me, but this is not science fiction. But they don't show what they discovered, meaning they don't want us to know the progress they have achieved so that we don't get ahead of them. I will give you proof that one time, while I was sitting on the television watching a cultural film about airplanes, they did not bring a spy plane whose technology was amazing. I thought it was new, and I was not shocked that they invented it in the 1990s. It has also been out of service for a long time
A subject that fears God conceals only
Wonderful article
God bless you
It is normal, what do they want to bring to him, I mean
Praise be to God, for every case we have, except for all knowledge of Ghanem
شكرا لكم
Thank you, brothers, for the valuable information, and I wish you more progress