Every profession or skill can be exploited for good or for evil. The same thing with hackers, and before you think that a hacker is a bad person, I want to remind you that there is a difference between a hacker and a hacker As we have already talked before And that the cracker is the one who steals programs, websites, and so on, but the hacker is a professional in discovering gaps in computer systems. Originally, this profession is used in securing systems against crackers. For example, if you own a company and you want to make sure that your system is protecting your data is safe against hacking, you use a hacker to reveal the system vulnerabilities for you, and then you address them. And many large companies such as Google and Facebook offer large sums to hackers if they discover flaws in their systems and inform them of them.
Now that we know that the hacker is just a professional developer using his skill for the benefit of others, then how can this knowledge be used for evil? Well, let me tell you the other bad side that some professional hackers may take, which may generate tens of thousands of dollars a month for them, and the return is "selling security holes to intelligence agencies."
The news may be shocking to some, but this is the truth, which I presented in detail Forbes website The famous. Recently, news spread that Google had paid $ 60 to two programmers who were able to find serious security flaws in the Google Chrome browser, and Google continuously provides updates to its famous browser and publishes a list of the amounts paid to people who have been able to find security holes in the browser. These amounts are paid as a reward for them to help them find these loopholes and then close them, but the usual amounts to see are 1000-2000 dollars, but the amounts reach 60 thousand dollars for two people, or 120 dollars for two gaps, this shows the seriousness of these loopholes and you can open the Google Chrome versions page and see the rewards paid For developers Via this link.
Getting a reward for finding a vulnerability is normal and welcome, no matter how large the amount is, but it does not stop at this point. Chaouki Bekrar, the owner of a company working in the field of security research, mentions that his company does not inform Google about the methods followed to find security holes, not even for the amount of 60 thousand Dollar He added: “We will not share these secrets with Google, not even the amount of a million dollars, and we will not tell them about ways to help them close security holes. We want to keep this matter only for our customers.” This means that they will inform other people about the security holes and ways to prevent them, but they will not tell Google itself. This means that these customers do not want Google to close these loopholes, otherwise they would allow the vulnerability to reach them. Do you know who these agents are? “They are the government security agencies.”
According to the report, hackers can earn an average of 2000-3000 dollars from the security vulnerability that they discover in an operating system, company website, or even a famous program, by informing the program owner of the existence of this vulnerability and obtaining the traditional reward. But he can win 10 times and maybe 100 times this amount from the police, security services, or even spies and enemies of the owner of this project in exchange for forcing them with this loophole and keeping it a secret from the owner of the program in order not to close it. One of the organizations that specializes in this field, called Vupen, said that its customers pay $ 100 annually to subscribe to a confidential vulnerability knowledge service. In other words, the company searches for gaps and makes packages "such as phone packages" and various parties participate in them with huge sums to obtain the loopholes secretly and without announcing them, and they do not ask from Vupen Corporation You tell them how to get the vulnerabilities, not even who else bought them, and all they want is to get the vulnerability and not publish it. As for what programs they find security flaws in and sell them to their customers, they mentioned, for example, Microsoft Word, Adobe Reader, Google Android, and finally the famous Apple iOS system, and the latter is the most expensive in price because it is the most prevalent and the most difficult to penetrate. Here is a list of vulnerability pricing, according to each operating system and application.
Of course, there are many factors that control the price, including the spread of the operating system, it means that the target group for the vulnerability is a large category, and also the novelty of the system, so the penetration of a modern system costs more because the vulnerabilities are still new and the company selling it will not imagine that it breaks so quickly, and we see in the list that the price of a system vulnerability Operating the Mac (which I am working on now) is worth 20-50 thousand dollars compared to 60-120 for the Windows operating system, which seems illogical to some because everyone thinks that the Mac system is the most secure, so its vulnerabilities will be the most expensive, but there is another factor which is that if you know For a strong Windows vulnerability, you target more than a billion devices around the world, and this number is twice as large as Mac users. But despite these huge sums that they get in exchange for the vulnerabilities, the Vupen Foundation does not sell the vulnerabilities exclusively to one buyer, but rather sells them to more than one buyer, and none of them will know that there are those who bought the same vulnerability like him and may sell it to more than one government agency and depends on that each buyer will not tell anyone He knows this loophole.
The Vupen Team at the popular Pwn2Own Hacker Conference
But there are some hackers who prefer to identify the buyers of the vulnerabilities of their own and to be major institutions or alliances such as NATO and its members and do not sell the vulnerabilities to any country outside NATO and they said that they check purchase orders and seek to prevent the information and loopholes they obtain from reaching non-democratic regimes because Dictatorial regimes will use loopholes against their own people, while democratic regimes will use them to protect their people from terrorists and others. But the problem, according to their saying, is that they do not guarantee that the loophole remains in the hands of the buyer only because if you sell a weapon to someone, you do not guarantee that this person will not sell the weapon to a third party or that this good and reliable buyer is just a middleman as happened according to their saying that they sold a security vulnerability to someone The Arab countries were surprised then that it is being used to monitor political activists by the Syrian regime. The report says that Vupen does not ask the user what he will do with this vulnerability or, more precisely, he does not care to know because all that matters to him is to get the agreed amount in his account only, but whether the vulnerability is improved or misused, this is not important to him.
The question that arises is how these loopholes are sold? You may be a professional in the field of computers and discover a vulnerability, but you are not a professional in marketing and estimating its price, nor can you even deal with the security services such as intelligence and others to sell the vulnerabilities to them. You are just a professional programmer and you do not know anything but programming. Here comes the role of mediators, including Grugq's, which is a kinetic name of course. He lives in the Thai capital, Bangkok, and works as a mediator. % Of these deals are commission. Do not you think that this percentage is small. According to him, last year he got more than a million dollars from deals, and this makes you imagine the size of the deals that he does? And his fame has spread around the world, which makes him now not dealing in simple loopholes and does not accept a deal if the target price of the loophole does not consist of at least 15 numbers, and it was mentioned that last December he sold a loophole to a government agency at a price of a quarter of a million dollars. If you think that this work is secret and this person does not know his truth, then this is not true, he works in public and this is his picture in a restaurant he works.
When asked what are the most profitable loopholes for him and the most expensive, he replied, "Of course iOS, even after the spread of Android, but Android is easy to penetrate, as for iOS requires breaching Apple's security barriers and its complex system, so it is the most difficult and expensive." Jailbreakme Which was just a web page that made a withdrawal and the jailbreak happened to him that there are organizations willing to pay more than a quarter of a million dollars in exchange for becoming exclusive to them because it will allow them to penetrate any device easily through the Safari browser. As for his most important client, he said that it is the US government, which, according to the statement, is the largest buyer of loopholes and the most high-paying party, and he gets 80% of his income from them. There are also other government agencies, including China, in which there are a large number of developers working to find the vulnerabilities and sell them to the Chinese government only. But the situation differs in the Middle East, where the market is considered weak for many reasons, including the widespread lack of widespread reliance on technology by governments and people in all directions of their lives.
And sometimes the hackers seek to publish videos to identify them and also be propaganda and prove power. In May 2011, Vupen published a video of a device hack with exploits in Chrome, but they did not give any information to Google about this vulnerability and refused to tell it how to close it. Google announced that they used a vulnerability in the flash in the browser to penetrate it, not the browser itself, and they issued an update to close this vulnerability, but Vupen responded to Google by saying that it deceives users and the vulnerability still exists and they also refused to help it, which prompted Google officials to describe the hackers as opportunistic and immoral and leave millions of users They are at risk only to prove strength.
Conclusion
- Some hackers find vulnerabilities and sell them to official companies to close them and get rewards. This is good and beneficial for the user and the companies.
- Some hackers sell these vulnerabilities to third parties who do not want these vulnerabilities to be closed so that they can use them for espionage. This is bad and it hurts everyone.
- Hackers do not guarantee how a buyer will use this vulnerability.
- There are some people who work as middlemen and get huge sums for it.
- The most lucrative vulnerabilities are iOS vulnerabilities because they are the most difficult.
- The hacker may discover system vulnerabilities such as iOS and do not use them in the jailbreak, but sell them to government agencies to penetrate users' devices and do not advertise them so that Apple does not close them.
An interesting topic that invites us to direct the attention of those we know from the two earths to the field of information security
A very important topic and
Information I know for the first time
God bless you
I have been praying for more than a month. My father, the program, you did not see, and when you say this
Legendary fighter and Shi Kalash Zain
An article the least that can be said about it is wonderful
Fabulous information we get from the program
Many thanks and waiting for more new ones
Top article on interest and touching reality.
I hope to bring up more useful scientific articles
Thank you Islam iPhone
Thank you for the valuable information, may God reward you well
Hi
My brother Ben Sami, I have a question. I have a jailbreak, is there a way to find out if someone hacked my device or not?
Kabir Bin Sami Bravo, you have your words, the words of an expert, and an understanding that I like
God willing, there is no power but with God ... Honesty Your topics are all enjoyable and show great understanding and awareness .. God bless you and may God reward you .. By the way, I am a new subscriber and a novice on the iPhone .. I bought an iPhone 4S and I want to know how to download the gailbreak
Thank you, iPhone Islam
The article is very nice, thanks
The Internet world is basically an open and insecure world for me as long as there is someone who can control it
And the loopholes are a cause for concern, yes
Thanks for the great article
A very wonderful article to Imam, mmmm
Thank you for bringing up such distinct topics .. There is no doubt that the hacker has benefits as well as disadvantages ..
Benefits Take advantage of them ..
Damages have preventive means.
And you must know the ways to prevent it before you learn to hack or crack you ..
Thanks for the helpful and new information, to keep everyone cautious in using the technology
I liked the part that says, “Democratic regimes use them to protect their people from terrorism.” Even in this regard, we find exploitation and abuse of people whose minds are already superficial. God forbid!
God bless you
The origin of the Muslims is, in order to protect themselves from espionage by Western countries, they must learn this field of science and master its art, but unfortunately our Arab and Muslim countries are the goal of loyalty to the West that sends them information about their people wholeheartedly.
In the name of God.
A wonderful article and values added to our aid balance great information.
Thank you, Yvonne Islam.
I have not put a comment before
But this article is wonderful
Thank you
Thank you for the wonderful topic, which opened my eyes to a world I knew little about.
Wonderful article .. very very wonderful.
God willing, developed articles in heart and in form and forward, always with success, God willing
one of the best I have ever read
Terrified
It means the IOS of those who penetrate it
Even if I am not a jailbreak worker
May God reward you, my brother Muhammad, and may God make a great effort in this matter, and thank you for clarifying matters.
Greetings and appreciation to the editor Bin Sami, your articles made me delete all applications similar to you, so you are the best 👍
Thank you for your opinion: D
May Allah reward you a thousand good for this article
And I would like to emphasize that all these smart devices are tools and means to spy on us and create a database about us that is used in a timely manner, especially for us Muslims.
I swear by God. This article is seriously advanced. You know if I am in your place and what should I do, I will publish the article after forty years, because simply our governments have made us backward. Congratulations to the liberated peoples.
I really enjoyed the article and my information improved greatly, ghali.
>
Please reply (and thank you for the important articles)
Creative brother
The rest of my relationship file is "No, and it is necessary for a bright green"
Ha-ha-ha
My problem is that I consider this program one of the successful programs and I thank all those in charge of this program. I have a question. I used to house iTunes on my laptop and paired it with my iPhone. All the programs that were on the iPhone moved to the iTunes. Unfortunately I sold my phone and worked a firman for the laptop. I lost iTunes and the iPhone because I bought an iPhone. XNUMXs And I downloaded iTunes, because all that was there will go, I mean, delete, so is there a way to return all to iTunes? Thank you, knowing that iTunes is in my name
The topic is important and serious more than we can imagine
Do you remember how the Americans planted a virus in the Iranian nuclear reactor? After this attack, Iran established a center whose mission is to uncover the vulnerabilities and respond to cyber attacks.
The question is: What do we Arabs do to defend ourselves, now on the ground, and for the future?
God willing, a very useful and rich article .. Oh heir, our countries are elevated just as this article has risen and keep pace with the times ..
Of course, the bad use of hackers and the vulnerability trade is somewhat frightening, but it is unfortunate that few of our nation find anyone who is proficient and creative in this field ..
O Allah, grant victory to Muslims everywhere .. Amen
Gives you wellness Islam Yvonne
All the best, Lord
Gives you wellness Islam Yvonne
Really nice topic
But I think in which key element this topic will be included
It was suggested that a major component of the site be placed under the name: science and technology or other designations
It's been placed in a news rating
Your suggestion is good, but difficult to implement because it will require that we go back to all similar articles and amend them, and this requires a lot of time and effort, and we are now very busy.
But your suggestion is good and when you update the site in the future, God willing, we may implement it
Hi
I would like to thank you, brother, for the useful information on the side of the gaps
I expect the hacker to spread greatly if he answers these huge sums. Thank you
The article is interesting, but I am impressed by the photo of Grugqs sitting in a public place with an open bag next to it and almost money flowing from it.
Wonderful, Iphone, Islam, a wonderful article, and a wonderful article preceded by it. May God help you to spread knowledge and thought
Yes, how can the American government, which is keen on its people, say we will not give you loopholes?
Note: Some companies set sums for anyone who breaks them
IPhone Islam, you are grateful for this tremendous effort and you deserve the follow-up from your fans who increase every day.
By God, there is a need to fear, our Lord, who knows what is wrong with him
I thank the author of the wonderful article, and I hope to continue this upscale presentation .. Imam Yvonne Islam 👍
Thank you for this useful information
Well, why aren't the intelligence agencies a buyer, Google with its head, or a company like Apple that is their way to enter every home, meaning that intelligence is the one who created the company to serve its interests
This is a fact
Let us also know that the entire web is the property of the US Department of Defense
Before it was made available to the world
A fault-tolerant point of view
Really interesting topic !! Thanks for your efforts
Your Lord is generous, and God conceals
Something blows, frankly
And your Lord Al-Hafiz
I mean, in Arabic, brothers, even the private photos and videos may be exposed ... in general, the topic is interesting and excellent, and thanks are extended to Apple Islam and the editor
If you want not to be targeted or hacked by hackers, you should not rely on technology and devices for the most accurate secrets, for no matter how safe they are - do not trust - there are CDs on which you can record what you want without the Internet and copy them, and that is the maximum you can do
A professional article that penetrates many minds. Good luck and always forward, I thank you my abundant brother for this wonderful article.
An important topic that deserves attention to know the truth
I hope you publish an article explaining exactly what a loophole is, because I think I initially understand it.
And your article is frankly beautiful
I thought the hacker had nothing but sabotage, but now it became clear to me the benefits that the hacker would get
Interesting article
Thanks to the program staff
The proverb says, "Walk in justice. Your enemy will be confused in you."
However, it is really a worrying thing.
If the espionage is from governments ..
Or companies compete with each other.
For me, “I have no problems” ..
But my problem is when it is used for personal purposes or just for sabotage ..
Very rich article ..
You are very friendly ..
The best thing is that Egypt does not have anything to hide
An article that enlightens the closed mind. Thank you, brother, the writer. I hope that the security aspect will be pursued more
My brother Raaboub Hacker. You are from Al-Ahsa. Glory be to God. This is the city. They are the ones who love and boast that some of them are hackers
The misfortune is the announcement of Emile's breakthrough
And he always hunted them with a wrong linguistic letter, which is the word "pitfalls" and "pitifulness". What is the apparent reason, bug. This is their money for tinkering with them to develop a complete software, especially Qatif
I hope you will not be upset, but this is his wealth, you have a solution
Wonderful ,, indeed, amazing ,,, Of the most wonderful things I have read ,, Oh God, hide us and secure us
The topic is beautiful and useful.
Thank you for the information, and may God grant everyone success
Interesting and dangerous topic
Peace be upon you. Every person is responsible for his actions. He who fears God will make a way out for him
Peace be upon you, who sells me a loophole on the site iPhone Islam? Hahaha, I am kidding, Yvonne Islam .. Gives you wellness for a very interesting article
Dangerous topic
God conceals them. Thank
One of my friends was harassed at the airport because of the jailbreak, where he was arrested for more than four hours, and according to my information from the person that jailbreaking is forbidden.
When I read about it, I felt I was watching a horror movie
But the article is great for what the word means
Thank you very much, and may God bless you, Professor Ben Sami
I ask God to help you for all good
This topic is very good and deserves to be reviewed once and twice
Thanks for the excellent information
A wonderful article of wonderful
Thank you so much
Peace, mercy and blessings of God
Very nice topic
But!!!!!!!!
️
Why do governments not have capable people?
On discovering loopholes
😁😁😁😁😁
They will save large sums of money instead of buying it
However, they will focus on what they want
And not on what is available and offered on this black market
😚😚😚😚😚
He was just asking, no more, no less
😊😊😊😊
Thank you very much for bringing up this topic
I read it from
Taq Taq)))) (✊ ((((()
to me
Peace be upon you))) (👋 ((()
May God grant you success to what he loves and satisfies him
There are distinguished Arab minds, but they cannot appear because they will fight hard and may be subjected to legal prosecution. Unfortunately, we leave the game due to the mental retardation of some governments that do not realize that thousands of technical battles are taking place daily while they do not think that there are battles except what they see of a real war
Time to call program
I discovered a loophole. I can call any mobile or fixed device for free, and with the number that he chose, if 0555555555, but unfortunately, the gap was discovered and the program spoke
Very very very interesting article
رائع
Very strange and very helpful info
A thousand thanks Yvonne Islam
Wonderful Professor Muhammad You were enchanted by beautiful and valuable information that I have always known some of them. Greetings to Professor Tariq
A tremendous topic with an Algerian accent. Thank you
Today we are thinking of what we are going to lunch with hate
May Allah succeed us, but
By God, I hated Facebook. I was playing a game and I was in an advanced stage, but Jay, I open my account on the day I throw myself bankrupt in the game, and everything is united, myself to be a Hummer :)
Wonderful article, I listened to read and it attracted me very much and every day your writings develop into tribalism and we wish you the best always.
Great to find my friends reading to me: D
Essay summit in creativity
Peace be upon you, Abu Sami
Thank you Yvonne Aslam
Your article is very interesting
Get me the bottle 😖
Nice article
New information on me ...
But this does not enrich the applied fear, but rather it may help us find some technology solutions.
Mufakin, and success of the dear writer.
A natural thing, and as a programmer, I know that there is no system without flaws and defects
We just have to develop ourselves and enter this exciting field
First of all, I thank you for this wonderful article that enriches the readership in this field. I like programming and hacking, and I hope to learn it better for you to teach me. Please refer me to the nation’s sites that teach me because I intend to pull the rug from the hacker who lives in Thailand. Greetings.
The next hacker is strong
All information has been translated and passed on to us in an aggregate form
And the Mac system is the furthest from hackers in the sense that there are no apple hackers only jailbreakers
Perhaps everyone is embarrassed about this issue.
Earlier I might have cared ... but with the acceleration of technology ...
The lack of familiarity with it ... I became less interested in it
And before this and that, relying on my Lord
He is keen to know the continuous variables in the systems that I use.
I do not deny that I was subjected to many hacking maneuvers.
Its aim is to discover weaknesses ... and fix them
And strengths ... and their enhancement
And God covers the world of Muslims .. ~
Very nice article, thank you for the information
Very nice article
Thank you for the information
Continue in your good articles, you deserve all the best
Very nice article
Thank you for the information
The first time I could read a topic of this length
A very interesting and special topic
Thank you
The topic is excellent ... Thank you ... I wish we could become more aware of this issue in order to be armed and ready to face the electronic war on which America pays blood in order to monopolize it and use it in its wars.
A special article and a serious topic, frankly, to be expected. Oko Haig Shi
Thank you Yvonne Islam for the topic
an important question
Does the XNUMXG of the new iPad not work on the XNUMXG in Egypt and the Arab world?
Please advise
The new iPad works on all networks 2G, 3G and 3.5G, and any network in Egypt will work on it
But the 4G is only for America, as mentioned above
There is no strength and no strength but with God, a special topic. Thank you, may God guide you
The topic is awesome 😍
👏👏👏👏👏 You have the best greetings on your topic
Why don't we look for Arab programmers and take advantage of them to close the vulnerabilities or at least tell us about the hacked programs
Thanks and this is the best of his decisions
Brother, the oppression, there is a black market for the gaps, and I don’t imagine that I discovered a loophole in ios and sent it to the hacker pod2g. I’m happy if I knew about this market, it was in my pocket at least half a million riyals in my pocket, and I took a new car and got married Haha
Are you really iOS vulnerabilities !!!
God is something that causes concern
Where is our site Hanna Arabs with its predecessors
Peace be upon you, the subject is very sweet, but I have a question
How is all this done, is it in a specific way or in specific programs?
Thank you, Yvonne Islam
Glory be to God you advance knowledge very much
Morals are first to advance with the advancement of science
thank you
God hides from the hackers
Thank you for the wonderful article
There is no power but from God
The topic is frank
P long, but I read the conclusion
It gives you wellness, but I wish you the next times you write the articles with disposition
This article is brief. If we had mentioned all the information that we got, it would have been double or triple this length
Thank you, Mohamed P, for the wonderful article, which must be read in focus
And the use of technology also in the service of Islam
According to what I said, “according to what they said, they sold a security vulnerability to an Arab country and were surprised after that that it is being used to monitor political activists by the Syrian regime.” This means that the state has no interest in hackers, developing their talents, and educating them about causing harm to the state and the Islamic people.
I repeat my thanks to you and I wish a group of people heading to the field of technology and its development
A special report gives you a thousand well-being
A thousand thanks my brother for the most wonderful article
Frankly, the article contains valuable information what you received
Anywhere, as for the question, of course concern
Just not on a personal level.
He has hackers, can I be a hacker
At this time, we expect everything. You live more, you see more
God is the helper.
I do not know why the fear of this article .. We, as regular users, will not be targeted by anyone .. Targeting is for companies from which the hacker can profit .. I mean, his time will not be wasted by hacking users except in the case of revenge on someone
Protecting devices is now the easiest one .. Take things slowly
And God is the best place for my regret
Thank you Yvonne Islam
Ok, I have a loophole for the site Yvonne Islam. I can sell it
Hahaha
A very special topic ...
Frankly, it is at the top of the magnificence. What must be done in the Middle East is not a few hackers
For the future, and God knows best
Thank you Yvonne Islam
Are there Saudi hackers ??
😄
Thank you very much for the kind effort. A very wonderful article, but a question for the editors of the iPhone page, Islam, do you have the dirty to discover loopholes in the iOS system? Are there professional Arab hackers in this very exciting field, and a question about why Arabs are lagging behind in this field, knowing that thousands are graduating from the fields of programming and computers Thank you
Because most of them work by land .. in the Arab countries, these fields are not widely required yet
A very valuable topic… Thank you Yvonne Islam
Of the best decisions, frankly, valuable information
Really interesting information, and whatever we expect and imagine, the black market for the gaps will not be of this degree !!
The strange thing about the matter is that the hacker Muhanna was harmful and not held accountable and punishable except when he used the vulnerability he discovered badly !!
May God help us just
God for the distinguished topic ,,, A thousand thanks Yvonne Islam
What I am thinking about now is what is missing from me in order to be a hand or a foot like them?
Of course, I only lack knowledge, so his mother did not benefit from her knowledge
Very very very cool topic
A special and wonderful topic that helped me a lot
God willing, they will not appreciate the money. 5.1
Dear brother, the word is written, God willing
Very special. Ok, do you want to learn the hacker method and do not see that it is something ridiculous and immoral, as Google described it, because it depends on the exploitation of others
Ha ha ha ha ha ha deleting the app
Hahaha, delete it as you wish, you see the one who lost
Technology and its spread is beneficial and harmful, for example, after long years and more than 10 years
I expect actual jobs to be squeezed out, due to technology and its proliferation
It is imperative to dispense with processes that can manage and function technically, instead of human management
Lighter, faster, and more accurate, it is considered harmful to humanity in this area not to mention hackers and how it works for good or evil
Your words are correct, my brother, and I agree with you on this point, even if we see its impact from now on a great deal.
Thank you, my brother Ben Sami, for the explanatory article on the most famous Arab website in the world of smartphones
A few weeks ago, I was discussing this issue with my uncle, and glory be to God, you are talking about this topic.
Really a topic worth publishing ..
Thank you really, my brother, a special and beautiful topic
I hope that you will multiply topics per day, at least two posts daily. Thank you
we will try
Right now there are a lot of things busy with it
But soon, God willing, we will return to two articles per day, God willing
We hope that you like our articles and benefit from them
If you would allow, I have a question: Has the What's App become not free? Because I tried to work, Donwold and he asks me to pay money? Gratefully
Peace be upon you. Please solve my problem. I bought an iPad XNUMX and the app store on the day I enter the categories. The language is Chinese or Japanese. I don’t know.
God, between you and me, I did not expect this thing
Really terrible topic .. But my question is the same as the question of many: Are regular iOS users at risk from this technology, to the extent of users who have equal jailbreak for their devices ??
Jailbreak doubles the risk
It is not strange in a world in which the strange development has become the matter of espionage and this is a matter in which even personal devices are questioned. Everything has a solution, but you have to pay in return in order to be safe ...!
My brother, the Syrian regime does not know how to use a mouse. It says a hacker in Syria. If you want to ask for a DSL modem, it will come after a month ?????? You will say, "Hacker," I am not defending the regime, but in order to correct the information
My dear brother, the government employee is really ignorant, but this Syrian intelligence employee is educated and equipped for this matter - I mean harm - God count us and yes, the agent in them
I think that they contribute to the ignorance of the people, but they benefit from the intelligence of countries that are friendly to them, such as Russia, China and Iran. What was hidden was greater.
I hope that I am a hacker 😍 and win millions 💰
I got with me. They hacked my Facebook account, they opened, but they did not change the clothes. Word, and when I entered my account, he told me that my account was opened somewhere I remember, but it was in a distant foreign country and after that I changed the dress, thank God
Crushed by the Syrian regime, wherever you go you see its hands stained with blood. May God help our brothers in Syria against this tyrannical regime
Peace be upon you. IPhone, Islam. Honestly, this topic is interesting and useful. I just wanted to know who does not jailbreak. Can hackers penetrate his system first? Thank you.
Every device can be compromised, but as we have indicated, one vulnerability in iOS may cost a quarter of a million dollars, because the system is very strong and Apple's security barriers must be breached.
As for the jailbreak, you broke the security protection and downloaded untrusted applications, so the risk here is diminishing.
Oh oh my horror, that's how i worried, but a sweet topic
I said I terrify you a little
I wrote the article and I said, who is watching me: D
We can only pray for you ;;
Frankly, strong and specialized topics at the same time indicate the power of research and knowledge, and all this in exchange for educating the promising Muslim generation ;;
May Allah reward you well on our behalf
Indeed, an article is more than wonderful, and this is what Arab governments and Arabs in general are missing
Your recent articles indicate a remarkable development in your writing
Continue, O Muhammad
Thank you, dear brother
Fabulous article
one of the best I have ever read
thank you
Creativity in writing and I will not respond just like this, but I will say that this does not bother me at all and it did not change anything
No God except Allah
I did not expect that the electronic loopholes will arrive
The importance of my beloved ones is Apple Islam
I follow you well and I hope to see such information
the value …. My respect to you, my dear ones, in God
Frankly, you have become something irresistible in recent times and very sweet articles and topics, and I have not missed a single letter from the article, and I especially thank my creative brother (Ben Sami). I wish you could add the feature of favorite articles in order to keep them.
Indeed, one of the most beautiful things I read on your site ... very important information
A very special topic ...
Subject fear to be honest
There is no power but from God
God protect us and you
I see it really disturbing
True and divine disturbing
By God, you write like this, and not by God
True, God bless you, thank you for the correction
We have in Egypt you say this colloquially
Wonderful article
شكرا لكم
And prepare for them what you can
What is our role, especially with e-governance?
And God is a weird thing, I would not have imagined that there is a market for gaps for this degree.
Thank you Yvonne Islam for the information
Because they love material for self dignity
Yes, I am very concerned because the hackers have spread to all parts of the earth, and you do not know who they are and how to deal with them, other than Antivirus, on their saying ^ ____ ^
Antivirus cannot close the gaps .. Otherwise, Apple would have put it in the iPhone :)
The world is awake and we are sleeping
From my point of view, the benefits of hackers are greater than their harm
Thank Yvonne Islam for the special topics always
I swear to God, I am worried if Arabs turn to technology in most of their fields
May God be with your help, Syria
There is no power but from God
I enjoyed reading the topic a lot.
The style makes the reader yearn for more.
I congratulate you
And wish you good luck.
Since I am the first to read the article honestly, I am one of the hackers or developers ,, I work silently. There is no system that does not have holes. All systems have holes, but whoever detects them needs a clean mind beyond the limits. For example, the ios5 system can only one hacker discover the hole because he used all his money Of his energy and this is very arduous, therefore he deserves to market the wealth with an amount and amount because it is his right, if I were in his place, he would not be subject to double the amount that was offered in exchange for this wealth
Mashallah Harkar Okay Farhan ?!
What is your job ha ha ha ha
May I ask a question
What programming language do you master?
O Abu Al-Sarahah, you are an Arab hacker, when you write incorrectly, loopholes, not pitfalls, do not write untidy hahahahahahahahahahahahahahahahahahahahahahahahahahahahahah for joking only
The topic of crazy frankness and useful and terrifying at the same time
Thanks for the wonderful topic ✨
Unlike the case, we have the one who first gets a hole in a government or sports website and he hated it and sat cursing
But, frankly, the best hacker so far is Omar who has gone crazy with Israel
In fact, these actions are unethical actions. As for the hacker, God guides them and leaves us in peace. But in fact it is important for me to jailbreak 5.1 that it exists these days an iPhone without it is not worth anything. Perhaps a cheap Chinese mobile for a single dollar is better than iPhone 5, which will soon
So you do not understand who the hacker is yet, my brother hacker is not saboteur. You should read about them well.
Something scary to be honest, the solution is that you remain without technology !!! And he lived in an age of ignorance, far from problems