Thanks for posting something entirely unrelated to my post. :thumbsup:
I don't have the source code for them and you had to know that! Also, the referenced link indicates that the NSA has hooks into iOS.
You can play whatever game you wish but I merely pointed out that there is info that points to the NSA and GCHQ having access to several systems including Android and iOS and that the NSA has spent a good deal of money to major tech companies (unnamed) to make sure they had access.
In summary:
1. The NSA has apparently paid major tech companies to make sure they could get into Android, iOS etc.
2. That the NSA has provided guidance and assistance to develop encryption and security standards and that they have worked to make sure they were not so strong that they couldn't get in.
"Leading technologists said they felt betrayed that the NSA, which has contributed to some important security standards, was trying to ensure they stayed weak enough that the agency could break them. Some said they were stunned that the government would value its monitoring ability so much that it was willing to reduce everyone's security." (Reuters)
3. That they have inserted vulnerabilities to give them access.
"Documents provided to The Guardian, the New York Times and others by Snowden and published on Thursday show that the agency worked to insert vulnerabilities in commercial encryption gear, covertly influence other designs to allow for future entry, and weaken industry-wide standards to the agency's benefit."
So how do they insert vulnerabilities? Isn't an intentional vulnerability just another name for back-door?
Finally, you don't need source code to reverse engineer what code does. Back when the IBM PC came out the clone makers needed a copy of the BIOS but they couldn't just copy it so they had two teams of software engineers review it. One team poured over the code (not source but machine) and then described what each section did so that the second team, the virgins, would green code from the supplied descriptions from the first team. You don't need source code to do this.
Brian