Re: Identifying back doors, attack points, and surveillance mechanisms in iOS devices