Identifying back doors, attack points, surveillance mechanisms in iOS devices [pdf] zdziarski.com 3 points by midnightGhost 5 years ago · 1 comment Reader PiP Save newbamboo 5 years ago 2014