Apple’s Failure to Block Stolen iOS

Apple has always remained fast in removing hacked content and applications from its portal. Be it applications or internal malicious software Apple has remained on the top of its league, being the most difficult to penetrate into and so it’s quite interesting to view Apple’s constant efforts in trying to remove an application that lets Apple users to download applications and its content free of cost rather than paying for it.ios-platform-20111012.jpg (350×343)
Unlike Android and Windows software Apple is difficult to hack into. Android users download paid applications from internet portals such as 4shared and File Crop but that didn’t work for Apple users as Apple’s security remained stable but that statement is a little off-track now as Apple’s jumped into the league of un-paid application download as well. Although Apple’s security caretakers are trying their utmost to remove this hack they’re failing miserably and the service is operating perfectly with its creators enjoying the prospective behind the wall.
Internal Apple employees have said that this application relies on a custom DNS server that catches requests from iOS devices. All the packet data intercepted from those purchases are then copied and that’s how applications are provided to users free of cost. Although Apple security providers tried to take measures in stabilizing this by blocking the server IP the measure failed. There is also a YouTube video that gives Apple’s users instructions about the hack and how it use to benefit your situation but Apple has claimed a copyright claim and since then the video has been removed from YouTube.
These situations might be amusing and beneficial for iOS users but for Apple it’s an internal disaster. According to Apple’s internal resources the Apple App Store has been used to download app-content more than 30,000 times the usual and this is quite a problem.
Although Apple has discovered the mind behind this hack as a Russian programmer known as Alexey V. Borodin, more commonly known as ZonD80 but they still haven’t been able to do much about it. Alexey Borodin is still continuing his efforts in providing iOS users with free applications and the host is still picking up whatever applications are being purchased on the App store. Apple’s security finders have even found out about the location of the DNS and say that it’s somewhere in Panama but even after their promising and serious tries they haven’t been able to back Borodin’s success down.
Apple has tried to cope up with the situation by providing a new version of the iOS known as the beta 3 but again this hasn’t helped cope up the situations with ZonD80’s amusing creation. Borodin has pushed himself a bit too far, he’s amused himself by providing a certain terms of service for the hack by saying that any possible damages won’t be accountable and the service doesn’t have a warranty time so user’s are supposed to use it on their charge and their responsibility.
Apple’s users are amused by this creation, this “new” App Store asks iOS user’s for their App Store passwords but they’re indulged to provide a completely random and fake one. According to Borodin this store is for everyone, free of cost.
The traffic on Borodin’s service is quite heavy with users pooling from everywhere to access their favorite applications free of cost. Although the service might run a little slow due to the intense load on the server Borodin wishes for money to buy a new machine with more bandwidth. His comical statements might be amusing for iOS users who are bundling their tablets and smart-phones with free applications, the internal employees of Apple are spending sleepless nights.
Author Bio:Stella Rebecca’s major effort has revolved around latest gadgets. Recently she’s been playing with the many Track Blackberry that are diverting the interest of the new generation. Readers can find out more about what’s most recent and happening in the Blackberry Tracking Software world..

Read more: Apple’s Failure to Block Stolen iOS

Story added 25. July 2012, content source with full text you can find at link above.