Jump to content

Apple reaffirms it has never worked with any government agency to create a backdoor in any...


Recommended Posts

Guest Rene Ritchie
Posted

2ebad12d74780051dcd80a5c5d6aa635.jpg

 

On July 18, Jonathan Zdziarski, a former iOS jailbreaker and current iOS forensic scientist and law enforcement consultant, gave a talk at the HOPE X conference in New York City. Zdziarski's talk was on backdoors, attack points and surveillance mechanisms in iOS. In the talk he alleged that there are a number of ways for government agencies, including law-enforcement, to get at the personal data you store on your iPhone, iPod touch, and/or iPad. Zdziarski posted slides from the talk, based on an earlier journal publishing, on his website a couple of days ago. They've since been shared via other websites and social networks, and a lot of confusion and concern has arisen.

 

When reached for comment, Apple reiterated to iMore that it has never worked with any government agency to create a backdoor in any product or service:

 

"We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues," Apple told iMore. "A user must have unlocked their device and agreed to trust another computer before that computer is able to access this limited diagnostic data. The user must agree to share this information, and data is never transferred without their consent."

 

As we have said before, Apple has never worked with any government agency from any country to create a backdoor in any of our products or services."

 

So, what's going on here?

 

When you connect your iPhone or iPad to iTunes on Mac or Windows — and choose to trust that computer — a pairing record is created that maintains that trust for future connections. Zdziarski claimed that if someone takes physical possession of that computer, they can steal those pairing records, connect to your device, and retrieve your personal information and/or enable remote logging. If they don't have your computer, Zdziarski claimed they can try and generate a pairing record by tricking you into connecting to a compromised accessory, like a dock (juice jacking), and/or by using mobile device management (MDM) tools intended for enterprise to get around safeguards like Apple's Trusted Device requestor.

 

Because the NSA surveillance controversy is still fresh in many people's minds, Zdziarski added a "don't panic" statement on his blog, emphasizing that he wasn't accusing Apple of working with the NSA, but does suspect that the NSA might be using the techniques he outlined to collect data.

 

Zdziarski also praised iOS 7 security, saying that Apple has hardened its devices against typical attacks, including making changes that have shut down a "number of privately used spyware apps." However, he'd like to see them strengthen it further with asymmetric encryption of incoming messages and media, the file system equivalent to "session keys," a boot password, and a backup password.

 

Apple is rolling out new security and privacy protections as part of its upcoming iOS 8 software update, scheduled for release this fall. These improved features include MAC address randomization to prevent stores from tracking you as you walk around to shop, "while-in-use" rather than "always-on" location permissions to prevent apps from tracking you when they don't need to, better privacy controls for your contacts, always-on VPN to secure your connections, and more.

 

Bottom line, security is constant vigilance, and companies are only ever as good as the speed and efficacy of their last patch. Following Zdziarski's presentation, there'll be a lot more attention paid to just these kinds of data leaks, and that's good for all of us. Until then, if you're concerned about privacy and security, Apple provides several tools and features you can use to further lock down your iPhone, iPod touch, and/or iPad:

 

dfd1eadbfbf83ffbda933d5f59243763.gif

 

 

4d4c5f5958d53bf08f5cf3ab5f0f35b1._.png

45cde5eb04ebfb3094cf9f48b7db148c._.png

50f8f4c792e80aae1564da9d7e37ef82._.png

 

2ca573a2f044b6d4737b9f850906ff04._.gif8183dd98ed25f90b82f965abea217f33._.gif1347b00dde5c366f66576508eb439524._.gif

 

Continue reading...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...