Jump to content

How to prevent unauthorized pairing with your iPhone or iPad using Apple Configurator


Recommended Posts

Guest Rene Ritchie
Posted

97662d3f102df1a41754d41ac310abd6.jpg

 

When you connect your iPhone or iPad to iTunes on Mac or Windows, and choose to trust that computer, a pairing record is created that maintains that trust for future connections. There's a report going around that claims that if someone takes physical possession of your device and your computer, they can steal those pairing records and use them to retrieve your personal information and/or enable remote logging. If they don't have your computer, it's also claimed they can try and generate a pairing record by tricking you into connecting to a compromised accessory (juice jacking), like a dock, and/or by using mobile device management (MDM) tools intended for enterprise to get around safeguards like Apple's Trusted Device requestor. So, how can you protect yourself?

 

*Important note:** Security is at perpetual odds with convenience. This process will make your iPhone and iPad more secure but less convenient. It should only be used if a) even the potential for a privacy breach is untenable for you, and b) you really, absolutely can function without connecting your iPhone or iPad to other devices.

 

If someone has physical access to your devices, there are all sorts of things that can be done depending on their skill level, resources, and the value of your data to them. The information here is not meant to make anyone stressed or paranoid, simply to provide a specific option for a specific vulnerability in a vacuum.

 

Apple Configurator

 

 

Apple Configurator is a free tool from Apple meant to help schools, businesses, and institutions set up and manage large amounts of iPhones and iPads. With it, you can prevent your device from pairing with other computers or accessories, which prevents it generating pairing records, which prevents those records from being used to access your iPhone or iPad without your consent.

 

  • Free - Download now app, available for free from Apple on the Mac App Store.

How to use the Apple Configurator to secure your iPhone or iPad against unauthorized pairing

 

  1. Launch Apple Configurator
  2. Click on Prepare at the top
  3. Name the settings anything you like (e.g. Supervised Device)
  4. Click on Supervision to toggle it to on.
  5. Uncheck the box next to Allow devices to connect to other Macs
  6. Click on the + sign at the bottom
  7. Select Create New Profile from the popup
  8. Name the new profile anything you like (e.g. Pairing Profile)
  9. Click on Restrictions
  10. Click on Configure
  11. Scroll down to Allow pairing with non-Configurator hosts and uncheck its box.
  12. Click Save
  13. Check the box next to the new profile
  14. Click Prepare at the bottom
  15. Fill in the information you want displayed in the profile. (It doesn't have to be accurate, you can use 555-555-5555 for a phone number if you want to.)
  16. Click Apply
  17. Connect your iPhone, iPod touch, and/or iPad to apply the new settings

 

18ff036da64149dacef4417508807a5a.jpg

 

Additional security and privacy precautions

 

 

It should be noted that all the Apple Configurator does is prevent new pairing records from being generated, it does not delete existing records, nor does it protect against other types of hacking.

 

Apple doesn't currently provide a front end for deleting old or existing pairing records, either on OS X or iOS, which means you'll need to manually search for and try to remove them on your own (/var/db/lockdown or ~/Library/Lockdown on Mac or C:\Program Data\Apple\iTunes\Lockdown on Windows).

 

Someone else having physical access to your device or devices is in and of itself a massive security problem. However, there are some things you do to make it more difficult or time consuming for someone with your device to try and get to your data, including using a long, strong alphanumeric password instead of a passcode or Touch ID, and turning off Lock screen access for Control Center, Notification Center, Siri, Passbook, etc,. To prevent other types of remote access, you can enable two-step verification on your accounts and use unique passwords in conjunction with a password manager.

 

315a6c468af2a757efa5e2001bf5513f.gif

 

 

d57248428fd5485dfa5090e6479de43f._.png

e263223b0123ade289fc71be6ee507ce._.png

82475bf5600278f9abff7fa648de2509._.png

 

3267e1112867c04bdfd99325928e8912._.gif3e6190c58fbffac23db8c477d43e58a4._.gif17ba800f0951006c802e26185a7e877d._.gif

 

Continue reading...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...