The producers of fake iPhone from China, obviously, realizing that the three SIM card and antenna for the TV not added their products resemblance to the original, has revised its policy design devices. How did you find a Motherboard, the Chinese copies of the iPhone has changed so much, that distinguish them from the real thing is not so simple.

Several months ago the correspondent of a Motherboard on an assignment purchased a fake iPhone X for only $ 100. To his surprise the smartphone is almost a complete copy of the original, except slightly thicker part and a recess in the display, which the Chinese craftsmen prefer to implement in software.

Chinese iPhone X

How to turn Android into iOS

Most amazing of all was the looks of the interface of the operating system. Enable, desktop, application icons and drawing the individual elements — it looks exactly like a real iPhone X. there is even a support Face ID, which, though works based on software algorithms, but quite bearable recognizes your face.

Utopia ended when running applications. As it turned out, instead of the App Store on the device, expected to preloaded Google Play, instead of “Podcast” — YouTube, and instead of “Health” — something incomprehensible from third-party developers. But the application “Settings” and “Mail” was as close as possible to their counterparts on iOS.

Security

Despite obvious allusions to the presence on Board of the smartphone Android OS, it was decided to give it for review to experts in the field of cyber security company Trail of Bits, who were surprised by the accuracy of the simulation of the iOS interface. But what was waiting for them with a more thorough analysis of the software platform, impressed them no less.

According to Chris Evans, researcher, Trail of Bits, the device was filled up with malicious applications and baccarani. A regular app like “Compass”, “Stock” or “Hours” you have permission to access correspondence and fake Safari browser uses a backdoor that allows you to remotely execute on the device is malicious code.

iCloud

Furthermore, the device collects the credentials of iCloud users, providing access to all applications, which in turn forward them to remote servers. How exactly this information will be used in the future, we can only guess and hope for the best, if you had the temerity to log on the device.

LEAVE A REPLY

Please enter your comment!
Please enter your name here