According to a study by Talal Haj Bakry and Tommy Mysk, some iOS applications request access to the clipboard every time they start without user permission, and then copy the data. Where they are sent further is unknown. And most often, the clipboard contains useless information, but there are also passwords from social networks and […]