Skip to Content
2-09-2010 @ 6:52AM
I think most are aware that iPhones and the like are computers, and "hackable" in the sense that you can break their security when you have physical access to the device.That's not the same as you can invade any iPhone from across the internet at your leisure, extract people's authenticator serials and forge bogus login codes. That's completely unrealistic.A: iPhone apps are sandboxed, meaning they're essentially isolated from the phone itself, other apps on the phone, the internet and so on, except through authorized channels that Apple allows (by using the iPhone OS APIs). There's no way of knowing, or telling that there's an authenticator applet installed on any random iPhone.B: in fact, there's no way of telling that any random device connected to the internet is an iPhone, so how could hackers target them specifically? This is just paranoia.C: even if people COULD target iPhones, and COULD hack them to extract authenticator codes, there's no way of linking any random iPhone and its authenticator codes to any specific WoW account!D: even if you have hacked the iPhone authenticator and can tell which account the codes belong to (perhaps through telepathy), you still need the account name and password, none of which are entered into the iPhone applet. Again, you need to resort to telepathy to gather these.SO IN CONCLUSION, we can reliably conclude that the iPhone authenticator is QUITE SAFE AND SECURE. Howver, any solution is only as safe and secure as the person who uses it, which leads us back to PEBKAC. IE, if you have poor habits, leave your iPhone where others can access it, don't keep your login details, CD serials etc secret, then people can concievably access your account even with the authenticator. It's not the authenticator's fault it isn't idiot proof; it's you who is being an idiot. :)
First time? A confirmation email will be sent to you after submitting.
Members enter your username and password.
Enter your AOL or AIM screenname and password.
Please keep your comments relevant to this blog entry. Email addresses are never displayed, but they are required to confirm your comments.
When you enter your name and email address, you'll be sent a link to confirm your comment, and a password. To leave another comment, just use that password.
To create a live link, simply type the URL (including http://) or email address and we will make it a live link for you. You can put up to 3 URLs in your comments. Line breaks and paragraphs are automatically converted — no need to use <p> or <br /> tags.