An attacker only needs to be on the same network as the person who is using the App Store. From there, they can intercept the communications between the device and the App Store and insert their own commands, achieving the desired trickery. In the case of stealing a person’s Apple ID password, the attacker would only need to insert a fake prompt for the password when the person boots up the App Store.

Autor: Gabriel Catalano - human being | (#IN).perfección®

Lo importante es el camino que recorremos, las metas son apenas el resultado de ese recorrido. Llegar generalmente significa volver a empezar!