What's new
Carding forum - Trusted Carding Forum - ATN card the World - Carding Forums - Carders Forums - Dread Forums.-

Welcome to legitcarding.net, your premier destination for all things carding! Dive into the world's top legit carding community, offering worldwide transfers via PayPal, Cashapp, Venmo, Western Union, and beyond. Gain access to credit card fullz, CC dumps, bank logs, and an array of premium services. Plus, enjoy complimentary gift cards and exclusive bonuses. Don't wait—unlock instant access now to scripts, carding guides, and more! Join us today and elevate your carding experience to new heights

Drake Carder

Verified & Certified Pro Forum Carder♛
Staff member
Premium User
Support Staff
Verified Seller
♛ Forum Elite ♛
Registered
Joined
Feb 28, 2024
Messages
2,752
Reaction score
280
Points
1,013
Awards
9
What did Apple's thirst for control lead to?

Researchers Talal Haj Bakri and Tommy Misk studied how Apple integrates third-party app stores on its devices. During the audit, vulnerabilities were found that put the security and confidentiality of user data at risk.

An innovation in the iOS 17.4 operating system allows users in the European Union to install applications via alternative platforms using a special URI scheme-marketplace-kit:. This scheme allows websites to embed a button that, when activated in the Safari browser, starts the MarketplaceKit process on the device. The process initiates communication with the selected store's servers to complete the app installation.

Absolutely any site can initiate a marketplace-kit: request. After that, on devices running iOS 17.4, the universal ID is sent to the servers of the approved store. Thus, a potential attacker can get information about the sites visited by the user, even if the browser is in private browsing mode.

So, Bakri and Misk identified three key flaws in the implementation of Apple's URI scheme:

  1. Lack of verification of the request source, which opens up opportunities for tracking user activity across different sites.
  2. Insufficient validation of the JSON Web Token (JWT) used in requests, which increases the risk of attacks by injecting malicious code.
  3. Lack of certificate binding, which increases the likelihood of man-in-the-middle attacks.

It is obvious that the vulnerabilities arose due to Apple's desire to control the interaction process between stores and customers. Apparently, this is necessary for statistics and calculating commission fees.

Bakri and Misk recommend that Europeans use the Brave browser, which includes verification of the source of websites, thus minimizing the risks of unwanted cross-site tracking.
It's important to note that these issues call into question Apple's ability to protect our privacy. After all, security depends not only on how well third-party stores provide protection, but also on how much they are interested in it.
 
Back
Top