The Chinese iPhone will not be different from the original



[ad_1]

Sign up to our FB page

Manufacturers of a fake iPhone from China, apparently noticing that the three SIM cards and the TV antenna do not add their products similar to the original, have revised their device design policy. How to know Motherboard, the Chinese copies of the iPhone have changed so much that it is not easy to distinguish them from the real ones.

A few months ago, the editor of the editorial board bought a fake iPhone X for only $ 100. To his surprise, the smartphone was almost a complete copy of the original, if you ignored frames and slots a little thicker than the Chinese masters wanted to implement by software.

Chinese iPhone X

  1iphox.1480w_derived.jpg (97 KB)

How to turn Android into iOS

The most surprising thing was the look of the system's interface. ; operating. Inclusion, desktop, application icons and drawing of individual elements – everything looks exactly like a real iPhone X. There is even a face recognition support, which works on the basis of. software algorithms, but that is completely able to recognize your face.

  2iphox1 .1480w_derived.jpg (106 KB)

Utopia is over, the program will be launched. It turned out that, instead of the App Store, it is planned to pre-install the Google Play catalog instead of the podcast – YouTube, and instead of Health, it's not clear that something from third-party developers. But the "Settings" and "Mail" apps were as close as possible to their counterparts on iOS.

  3ios.1480w_derived.jpg (85 KB)

Security

Despite the obvious hints of the presence on board the Android OS smartphone it was decided to give him a check of experts in the field of the cyber-security of Trail of Bits, who were surprised at the accuracy of the imitation of the iOS interface. But what awaited them for a deeper analysis of the software platform, no less impressed them.

According to Chris Evans, a researcher at Trail of Bits, the device was first-rate filled with malware and backdoor. Many custom programs such as Compass, Shares or Hours have permission to access the correspondence, while the fake Safari browser uses a backdoor that allows you to remotely execute harmful code on your device.

iCloud

In addition, the device collects iCloud user identification information by giving them access to all programs that in turn redirect them to remote servers. How exactly this information will be used in the future, it remains only to guess and hope the best if you were unwise to log on to the device.

[ad_2]
Source link