Apple’s iCloud protocols cracked and analyzed

http://www.net-security.org/images/articles/icloud-2.jpg

Smartphones carry a lot of sensitive data that in theory should be accessible only to their owners. In practice, a lot of it can be exfiltrated from the devices and from the backups either stored on the device or in the cloud by employing different forensic methods.

Read more: Apple’s iCloud protocols cracked and analyzed

Story added 18. October 2013, content source with full text you can find at link above.