Perhaps mittu can summarize his or her experience in networking, particularly securing networking in light of the fact that each post s/he makes is the complete opposite of what is well known by every professional in the field?
Because as far as the OP goes, combined with Mittu’s #9 (mittu, please re-read #9), every single post is a moving of the goalposts. No details needed, just theory, apple does this, apple does that, if there is a flaw, blah blah blah not a word of it supported by empirical evidence after 59 posts.
Readers, please use your best judgment when considering mittu’s advice on your own networks. Ask yourself if you think Apple has not only invented the very first device that is immune from acting as a normal device on a network was, and also somehow keeping that remarkable claim off of the internet.
Ask yourself why mittu keeps demanding info from me, but has not responded to a single question posted to him or her?
Ask yourself, how do you really know your what your apps are doing?
And ask yourself if someone didn’t want apple to see network traffic, why they wouldn’t simply code the program so that there was no network traffic until after a certain date or other indicator that the approval process is done?
Mittu’s claims are getting stretched thin, while you have two people who have described as clearly as possible without running afoul of board rules why any device inside a firewall, iphones NOT excepted, are a risk to other devices on the network.
And oh yeah, the bridge program does not need to scan the network to see what services are running, it only needs a list of known exploits that may or may not work, and as another poster indicated, that is trivial to include in a program. That’s it. You don’t need to know what services are on a mchine, or if there are any services at all. You don’t need to know what ports are open.
It is like this: My car has a remote control door key. If I drop it in a parking lot, whoever finds it does not need to know which car it might go to, they only need to push th button and see what happens. If the car is there, it will respond. If the car is somewhere else (maybe someone else drove me there) then nothing will happen, and the finder can try in another parking lot until they find my car or give up. the point is, the car doesn’t know or care who is using the key, only that the signal was properly sent and received.
Similarly for hacks - the bridge program we have described gives a way for an outsider to “press the key” for doors that might open on the PC.
Mittu’s claim earlier was that such programs are not possible on Apple, but he was shown example programs that Apple has approved.
Now s/he sort if seems to be speculating that Apple would somehow know if such a program had bad intent, but hasn’t offered a shred of a clue how Apple would infer that. I for one would be very interested in Mittu’s or anyone’s explanation of how Apple can force a program to behave the same way during approval as it would later. If one can’t even show this, then the approval process is not the place to look for network security. And if this can be shown, then we can have a discussion about how the process works in real life.
Because in real life, that would be different from every other programmable networking device, and Apple would surely be spinning this highly desirable and valuable technology off if they had it. It would be a very fundamental breakthrough indeed.
Yet mittu and others act as though it is a given. It is not.
Caveat emptor is the bottom line. It’s your phone, your PC, your data. You decide the risk you can take.