Apple denies working with NSA on DROPOUTJEEP snoop program that claims to hack iPhones

Apple has reportedly denied working with NSA on the security agency’s DROPOUTJEEP snooping program that hacks Apple’s most famous device, iPhone. On Monday, a security researcher, named Jacob Appelbaum pointed out at Chaos Communications Congress (30C3) in Hamburg, Germany that NSA can access and hack all iPhones through its snooping program code called DROPOUTJEEP. He disclosed that this program code is capable of hacking iPhone devices and can then access the contact lists, text messages etc. as well as send and receive files through it, along with accessing the camera and microphone. 

Applebaum also said:

‘The NSA claims that anytime they target an iOS device, it will succeed, So either they have a huge collection of exploits against Apple products, meaning they are hoarding information about critical systems that American companies produce and sabotaging them, or Apple sabotaged it themselves.”

But on Tuesday, Apple denied having worked with NSA to access its devices by releasing the following statement:

Apple has never worked with the NSA to create a backdoor in any of our products, including iPhone. Additionally, we have been unaware of this alleged NSA program targeting our products. We care deeply about our customers’ privacy and security. Our team is continually working to make our products even more secure, and we make it easy for customers to keep their software up to date with the latest advancements. Whenever we hear about attempts to undermine Apple’s industry-leading security, we thoroughly investigate and take appropriate steps to protect our customers. We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who’s behind them.”


Apple is thus trying to come out clean saying that it would protect iPhone users from any kind of malicious intent and is unaware of such snooping codes. Moreover it has no association with NSA whatsoever in the implementation of such hacking programs.

Subscribe to our newsletter

To be updated with all the latest news

Subscribe to our newsletter

To be updated with all the latest news

Read More

Suggested Post