The iPhone creates a screen shot of everything, or almost everything you do, and temporarily stores it on the internal memory and then deletes it. Here is the last of the secrets (?) Of the Apple phone discovered and illustrated by a hacker and security expert who spoke of the matter in a webcast by O’Really, a publishing house specialized in technical and computer science books.
Jonathan Zdziarski, this is the name of the hacker, discovered the function during the dissection of the iPhone software architecture. The reason the phone records a screenshot, says Zdziarski, "of everything that is done" purely aesthetic. In practice it is the system with which the zoom effect is generated when the home button is pressed; to show the screen that disappears towards the bottom, in short, the firmware "takes" an image of what you see on the screen and gradually reduces it to produce the graphic effect. The image, Zdziarsky says, is most likely deleted immediately afterwards, but this does not prevent a hacker or someone really determined to know what has been done on the iPhone or read on the iPhone from going to recover it by exploiting the persistence of the files in the memory.
Even if this is the case, it is already a matter of concern for privacy pasdarans that it is difficult to see anything more serious or worrying in this function than what happens every day on any hard disk. Even in the case of computers when you create something and then delete it, it is impossible to completely eliminate it; unless you have recourse to specific programs and ad hoc precautions, every file that is practically always recoverable: text documents, email messages, audio, video, spreadsheets. Not to mention everything that is recorded by the operating system in terms of operation, the browser cache, the dates and times of power on, things that are very difficult and in some cases impossible for a common user to get out of the way. On the other hand, even an average experienced user knows that everything done on a computer device, not a computer (therefore any mobile phone) other than the iPhone, can be analyzed, read and screened with the necessary tools. The only difference for iPhone lies in the fact that iPhone stores what passes on the screen in image files, but that this is more insidious for privacy than reading, just to give an example, the email addresses or the content of a file in PDF, we take the liberty of doubting it.
Despite this you can safely bet that some days, say two or three, those necessary for the news to pass from the specialized channels to the generalist press that will chew and digest it to make it tastier for your palate, we will have new titles screamed on the iPhone that violates the privacy and abundance of columns with some commentators who will brush up on the metaphor of the big brother, the same evoked a month ago by the well-known story of the iPhone that spies on the applications.
Ready to bet that everything will be seasoned with the mention of the second "scandalous" iPhone security hole discovered by the ineffable Zdzdiarsky, the violation of the iPhone at the password hack. It is of little importance that the expert on duty with an unpronounceable surname took more than an hour, used Pwanage to create an ad hoc firmware bundle which he then modified using arcane methods. Obviously having in hand the phone, a deep knowledge of its firmware and behind twenty years of experience in the sector. All this will be forgotten (or perhaps it will not be understood, as often happens) and the title will be: the iPhone photographs everything you do and the password is not needed. Obviously implying that somewhere in Cupertino there is someone who spends the days to see your shots, including, while we're at it, those taken with the digital camera integrated into the iPhone that the cell phone will dutifully send to California. Obviously making you pay the bill.
We look forward to it.