iPhone 5se comes with - Touch ID - enable the masses for ApplePay, may globally
I need to ask this (for the third time) to be definitely sure that the question is ignored on purpose
As a side question, who is the "we" that noticed this crime gang collecting broken iPhones in Europe?
Just in case, a "No comment." or "Cannot answer that question." statement would have been IMHO far more polite and appropriate.
jaclaz
I apologize for this
As expected
http//
Apple under pressure as lawyers pledge action over 'Error 53' codes
Lawyers ponder class action suit against tech giant over ‘reckless policy’ of permanently disabling iPhone 6 handsets after software upgrades
jaclaz
The Apple lawyers have foreseen this, board did approve this as a worthy price to pave the way that ANY iPhone 6/6 plus, 6S/6s plus and 5se will be able to applepay. The investment (cost) for strategically reaching the highly potential market of mobile payment is small in relation to market dominance and revenues (Apple earns money every ApplePay transaction is ruled, but took their
fingers out of the security chain as ApplePay is not running over AppleServers. Uniquely clever)
Apple fixed the 'Error 53' issue by providing (not OTA only by iTunes) a patched version of iOS 9.2.1 (13C20) in relation to former version of iOS 9.2.1 (13C15), released Jan 19th.
http//
During christmas shopping a curious case came in. Person was paying by Apple Pay with iPhone 7 Plus and on the EFT POS with Apple Watch 2. Both devices carry the NXP 67V04 in-body containing Secure Enclave. The purchase was authenticated with Touch ID new.
As the customer checked the purchase after an amount of 600 CHF higher than wanted was shown. The EFT POS display showed the correct higher amount, but by trust and busyness of
the customer it was not recognized at this time. Apple Pay at the time was running fine.
Based on this we assume a MITM attack berween iPhone and Watch.
Any other similar case known?
Very interesting case in front of us to investigate. Any technical hints appreciated, but pls PM if too sensitive as I state clearly Don't Feed Criminals! (DFC!)
The rolling key intervall is 15 minutes. Very short timeframe to intercept. We focus now on a purchase before at a Kiosk buying sweets.
iOS Security 9.3 white paper, p26 qoutes …When Apple Watch is not within Bluetooth range, Wi-Fi can be used instead.
Did anyone run the initial pairing by Wi-Fi before? Unfortunately by budget restraints, we don't have an Apple Watch 2 in-lab. Can you please Wireshark on the AP Access Point the pairing and put the .pcap here?
Who can help?
Did you change the title of the thread? ?
WHY? 😯
jaclaz