Video: The founder of WikiLeaks claims that the iPhone can be used as a monitoring tool by governments

[youtube]http://www.youtube.com/watch?v=B5cLqY6_2X8[/youtube]

   After the scandal regarding the monitoring of users using the system Carrier IQ, today we learn that iTunes can be used as a means of monitoring any user. WikiLeaks founder Julien Assange says that iTunes is vulnerable to a dangerous trojan that allows certain companies to gain access to our computers and phones. Using this vulnerability, anyone can infect a computer and a mobile phone so that they can gain full access to the information on the computer and on the iPhone.

They are selling Trojans so if you go to some website or if someone sends you an email and bang, it infects your phone with a Trojan and it records what you're saying in the room even when the phone doesn't appear to be active . Some firms are selling to states secretly equipment to record everyone's mobile telephone location to within 50 meters for an entire city and keep that information permanently. They are selling Trojans so if you go to some website or if someone sends you an email and bang, it infects your phone with a Trojan and it records what you're saying in the room even when the phone doesn't appear to be active .

   Assange claims that as soon as the Trojan is transferred to the iPhone, it allows anyone to monitor the conversations, to see what applications we use, what sites we access, what emails we read/send, what SMSes we receive and of course what calls we make. Moreover, he claims that the iPhone can be used to monitor conversations even when the terminal is apparently closed. It is not the first time that such monitoring tactics are discussed, but it is the first time that an iPhone terminal is presented as a means of doing this.

  Of course, neither the BlackBerry terminals nor the Gmail service are safe, but we are interested in the iPhone. It seems that only iTunes for Windows is vulnerable to this Trojan, so be very careful what you put in iTunes or what you install on your computer. Now you probably all know that we are being monitored in one way or another but since the warnings come from Assange it means that there is a very elaborate system developed in some countries.