With a relatively low investment. Has answers to those individuals who would use the Internet to launch an attack. PRLog Dec. A lot of criticism has been bundled about recently regarding the state of the UK’s social care industry. “If the attacker was successful and gets a match by guessing passwords against Find my iPhone, they would be able to, in theory, use this to log into iCloud and sync the iCloud Photo Stream with another Mac or iPhone in a few minutes, again, without the attacked user’s knowledge. We can’t be sure that this is related to the leaked photos, but the timing suggests a possible correlation.”.