by James Vincent
22 July 2014

from TheIndependent Website

 


 


 


Apple says its diagnostic tools "do not compromise user privacy"

but researchers say the un-publicized tools give access to 'excessive' data

 

 

Apple has been accused of intentionally installing security backdoors in some 600 million iOS devices that offer surveillance-level access to data including photos, browsing history and GPS locations.

The vulnerabilities were uncovered by security expert Jonathan Zdziarski, who presented an academic paper (Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Devices) on the subject at a hacker conference in New York last Friday.

 

Apple has issued a statement in response to the allegations saying that the company's,

"diagnostic functions do not compromise user privacy and security," but Zdziarski has responded by noting that these services "dish out data" regardless of whether the user has agreed to diagnostics.

 

"There is no way to disable these mechanisms," Zdziarski writes on his personal blog. "This makes it much harder to believe that Apple is actually telling the truth here."

The backdoors reportedly cover a range of hidden tools and protocols that activate with "paired" computers - machines connected to an iPhone or iPad via USB that the user has granted security access to.

 

Apple says that this allows individuals and businesses to manage their devices, but Zdziarski has pointed out that the system offers unecrypted access to users' online log-ins, contacts and web history and could be compromised by anyone with access to the same Wi-Fi network.

"Pairing records can be stolen a number of different ways, ranging from a shared coffee shop computer to an ex-lover whose computer you used to trust," writes Zdziarski.

Technology site The Register speculates that the protocols are there to conform with America's 1994 Communications Assistance for Law Enforcement Act - legislation that requires technology companies to maintain backdoors for the benefit of law enforcement agencies.

 

Zdziarski, however, told the site that the level of access Apple provides "exceeds anything that law requires."

 

The allegations could be especially damaging for Apple in China, where the national broadcaster CCTV recently suggested that the iPhone's ‘Frequent Locations' feature was a threat to national security.

 

 

 

Video: Apple refutes Chinese security claims
 

 

 

 

 

 

Apple has responded by repeating that it has,

"never worked with any government agency from any country to create a backdoor in any of our products or services".

Zdziarski has since repeated his assertions that the amount of information offered by these backdoors is unprecedented:

"These services break the promise that Apple makes with the consumer when they enter a backup password; that the data on their device will only come off the phone encrypted.

 

"The consumer is also not aware of these mechanisms, nor are they prompted in any way by the device. There is simply no way to justify the massive leak of data as a result of these services, and without any explicit consent by the user."

He adds that he is in no way accusing Apple of working directly with security agencies but that he suspects that,

"some of these services may have been used by [the] NSA to collect data".