Apple is in trouble again!

Recently, the website and several foreign science and technology websites reported that a senior information security researcher from Google found a major loophole in devices such as apple mobile phone, so you can get all your information without touching your mobile phone. < / P > < p > according to the researcher, the key to this vulnerability is Apple’s awdl network protocol. At present, apple mobile phones, tablets, watches and other devices are using this network protocol. For example, Apple users can easily transfer photos and files to other apple devices through airdrop, which is based on this awdl protocol. < / P > < p > using this vulnerability, Google researchers successfully controlled an Apple phone in the next room for six months. It takes only about 2 minutes to access all the data on the mobile phone, including browsing information, downloading photos, and even opening the camera and microphone for monitoring and monitoring. < / P > < p > the researchers say that not only does the intruder not have to touch the device, it may never have seen the device he is invading. What’s more, even if users turn off the awdl protocol, hackers still have a way to reopen it. It’s not just Apple phones, but other apple devices that can be “controlled” in this way. < / P > < p > the researchers said that although it took him half a year alone to succeed in the invasion. But users can’t take it lightly. This process is much easier for a hacker team. At present, Apple has fixed this vulnerability in the new system in May this year. But Google researchers said that apple did not inform users of the vulnerability even after it was fixed, and users were completely unaware of the whole process. Continue ReadingVideo Number assistant internal test online! Four functions let you send 1g video on the computer