{"id":12252,"date":"2014-09-07T09:00:14","date_gmt":"2014-09-07T16:00:14","guid":{"rendered":"http:\/\/lifeboat.com\/blog\/?p=12252"},"modified":"2017-06-04T12:05:22","modified_gmt":"2017-06-04T19:05:22","slug":"the-police-tool-that-pervs-use-to-steal-nude-pics-from-apples-icloud","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2014\/09\/the-police-tool-that-pervs-use-to-steal-nude-pics-from-apples-icloud","title":{"rendered":"The Police Tool That Pervs Use to Steal Nude Pics From Apple\u2019s iCloud"},"content":{"rendered":"<p>By <a href=\"http:\/\/www.wired.com\/author\/andygreenberg\/\" rel=\"author\">Andy Greenberg<\/a> \u2014 Wired<\/p>\n<p><\/p>\n<p>As nude celebrity photos <a href=\"http:\/\/www.wired.com\/2014\/09\/the-celebrity-photo-hacks-couldnt-have-come-at-a-worse-time-for-apple\/\">spilled onto the web over the weekend<\/a>, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims\u2019 iCloud passwords to Apple, whose security flaws may have made that cracking exploit possible in the first place. But one step in the hackers\u2019 sext-stealing playbook has been ignored\u2014a piece of software designed to let cops and spies siphon data from iPhones, but is instead being used by pervy criminals themselves.<\/p>\n<p><a href=\"http:\/\/www.wired.com\/2014\/09\/eppb-icloud\/?mbid=nl_090314_Weekly&amp;CNDID=%%CUST_ID%%\" target=\"_blank\">Read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Andy Greenberg \u2014 Wired As nude celebrity photos spilled onto the web over the weekend, blame for the scandal has rotated from the scumbag hackers who stole the images to a researcher who released a tool used to crack victims\u2019 iCloud passwords to Apple, whose security flaws may have made that cracking exploit possible [\u2026]<\/p>\n","protected":false},"author":76,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-12252","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/12252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/76"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=12252"}],"version-history":[{"count":2,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/12252\/revisions"}],"predecessor-version":[{"id":64914,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/12252\/revisions\/64914"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=12252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=12252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=12252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}