[HS General] Fwd: Identifying back doors, attack points, and surveillance mechanisms in iOS devices