Jump to content

iOS diagnostic services, their uses and protections, outline by Apple in response to...


Recommended Posts

Guest Rene Ritchie
Posted

8b8f0252da2800b82a33b26c71ffcb9c.jpg

 

Earlier this week Apple reaffirmed to iMore that it had never worked with any government agency to create a backdoor in any product or service. That was in answer to questions raised by Jonathan Zdziarski concerning iOS privacy and security. Apple has now published a new support page titled iOS: About diagnostic capabilities which elaborates on the services Zdziarski called out as data leaks. It does not, however, address vulnerabilities in passcode, pairing keys, or trusted device, though Apple typically does not address those types of things until they've pushed out patches. Here's Apple's full support article on the services:

 

iOS offers the following diagnostic capabilities to help enterprise IT departments, developers, and AppleCare troubleshoot issues.

 

 

Each of these diagnostic capabilities requires the user to have unlocked their device and agreed to trust another computer. Any data transmitted between the iOS device and trusted computer is encrypted with keys not shared with Apple. For users who have enabled iTunes Wi-Fi Sync on a trusted computer, these services may also be accessed wirelessly by that computer.

 

1. com.apple.mobile.pcapd

 

 

pcapd supports diagnostic packet capture from an iOS device to a trusted computer. This is useful for troubleshooting and diagnosing issues with apps on the device as well as enterprise VPN connections. You can find more information at developer.apple.com/library/ios/qa/qa1176.

 

2. com.apple.mobile.file_relay

 

 

file_relay supports limited copying of diagnostic data from a device. This service is separate from user-generated backups, does not have access to all data on the device, and respects iOS Data Protection. Apple engineering uses file_relay on internal devices to qualify customer configurations. AppleCare, with user consent, can also use this tool to gather relevant diagnostic data from users' devices.

 

3. com.apple.mobile.house_arrest

 

 

house_arrest is used by iTunes to transfer documents to and from an iOS device for apps that support this functionality. This is also used by Xcode to assist in the transfer of test data to a device while an app is in development.

 

 

When Chinese TV called iOS a location tracker, Apple responded on the consumer facing portion of their Chinese website, and in much more direct-to-customer terms. It's interesting to see Apple address the specific services in Zdziarski claims, but to address them in a support document, and to address them in technical terms.

 

Apple is already increasing the security in iOS 8. Hopefully diagnostics, pairing records, and any other newly discovered vectors will have their security increased as well, and soon.

 

Source: Apple Support

 

422658fc8053925a4411346d5c9606ed.gif

 

 

969bab941549cd33cf7a84bfb24b13c5._.png

dfa354af8f1dcc0d0e9f38838d663910._.png

53110282c54dd0f181246c2d3d9082f3._.png

 

de7a5e12eba1cfdc826061630adb205d._.gif9c07644b1220c1d6a623350949f06d8f._.giff36c13accd78bd5b5c69272df6fba0f6._.gif

 

Continue reading...

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...