Identifying back doors, attack points, surveillance mechanisms in iOS devices [pdf]