{"id":959,"date":"2009-07-02T13:46:14","date_gmt":"2009-07-02T12:46:14","guid":{"rendered":"http:\/\/blog.intego.com\/?p=959"},"modified":"2012-12-12T13:49:04","modified_gmt":"2012-12-12T21:49:04","slug":"jailbroken-iphones-are-weak-on-security","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/","title":{"rendered":"Jailbroken iPhones are Weak on Security"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\"><\/p>\n<p>Hacker Charlie Miller, who <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-scrambling-to-patch-sms-flaw-in-iphone\/\">just discovered an SMS vulnerability that affects the iPhone<\/a>, <a href=\"http:\/\/www.infoworld.com\/d\/mobilize\/jailbroken-iphones-leave-users-more-vulnerable-936\">suggests that it is very unsafe to use a jailbroken iPhone<\/a>. Jailbreaking is when a user removes Apple&#8217;s barriers to installing third-party applications, allowing users to install software that is not distributed via the iTunes Store, as well as cracked software. It also allows users to use the iPhone with carriers other than the exclusive carrier in their country. (iPhones without carrier limitations are sold in a handful of countries, but currently not in the US, for example.)<\/p>\n<p>At the SyScan security conference in Singapore, Miller said, &#8220;If you care about security, don&#8217;t use a jailbroken iPhone.&#8221; He said that jailbreaking removes about 80 percent of the security protections built into the iPhone software, leaving users open to a wide variety of attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacker Charlie Miller, who just discovered an SMS vulnerability that affects the iPhone, suggests that it is very unsafe to use a jailbroken iPhone. Jailbreaking is when a user removes Apple&#8217;s barriers to installing third-party applications, allowing users to install software that is not distributed via the iTunes Store, as well as cracked software. It [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Hacker Charlie Miller, who just discovered an SMS vulnerability that affects the iPhone, suggests that it is very unsafe to use a jailbroken iPhone.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Jailbroken iPhones are Weak on Security  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Hacker Charlie Miller, who just discovered an SMS vulnerability that affects the iPhone, suggests that it is very unsafe to use a jailbroken iPhone.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-07-02T12:46:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-12T21:49:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/\",\"name\":\"Jailbroken iPhones are Weak on Security - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#primaryimage\"},\"datePublished\":\"2009-07-02T12:46:14+00:00\",\"dateModified\":\"2012-12-12T21:49:04+00:00\",\"description\":\"Hacker Charlie Miller, who just discovered an SMS vulnerability that affects the iPhone, suggests that it is very unsafe to use a jailbroken iPhone.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Jailbroken iPhones are Weak on Security\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Jailbroken iPhones are Weak on Security\",\"datePublished\":\"2009-07-02T12:46:14+00:00\",\"dateModified\":\"2012-12-12T21:49:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#webpage\"},\"wordCount\":141,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg\",\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Hacker Charlie Miller, who just discovered an SMS vulnerability that affects the iPhone, suggests that it is very unsafe to use a jailbroken iPhone.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/","og_locale":"en_US","og_type":"article","og_title":"Jailbroken iPhones are Weak on Security  - The Mac Security Blog","og_description":"Hacker Charlie Miller, who just discovered an SMS vulnerability that affects the iPhone, suggests that it is very unsafe to use a jailbroken iPhone.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-07-02T12:46:14+00:00","article_modified_time":"2012-12-12T21:49:04+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/","name":"Jailbroken iPhones are Weak on Security - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#primaryimage"},"datePublished":"2009-07-02T12:46:14+00:00","dateModified":"2012-12-12T21:49:04+00:00","description":"Hacker Charlie Miller, who just discovered an SMS vulnerability that affects the iPhone, suggests that it is very unsafe to use a jailbroken iPhone.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Jailbroken iPhones are Weak on Security"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Jailbroken iPhones are Weak on Security","datePublished":"2009-07-02T12:46:14+00:00","dateModified":"2012-12-12T21:49:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#webpage"},"wordCount":141,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jailbroken-iphones-are-weak-on-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/iphone.jpg","articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ft","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/959"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=959"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/959\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=959"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=959"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}