The vulnerabilities were uncovered by 
			security expert Jonathan Zdziarski, who presented an
			academic paper (Identifying 
			Back Doors, Attack Points, and Surveillance Mechanisms in iOS 
			Devices) on the subject at a 
			hacker conference in New York last Friday.
			 
			
			Apple has issued a statement in response 
			to the allegations saying that the company's,
			
				
				"diagnostic functions do not 
				compromise user privacy and security," but Zdziarski has
				
				responded by noting that these 
				services "dish out data" regardless of whether the user has 
				agreed to diagnostics.
				 
				
				"There is no way to disable these 
				mechanisms," Zdziarski writes on his personal blog. "This makes 
				it much harder to believe that Apple is actually telling the 
				truth here."
			
			
			The backdoors reportedly cover a range 
			of hidden tools and protocols that activate with "paired" computers 
			- machines connected to an iPhone or iPad via USB that the user has 
			granted security access to.
			 
			
			Apple says that this allows individuals 
			and businesses to manage their devices, but Zdziarski has pointed 
			out that the system offers unecrypted access to users' online 
			log-ins, contacts and web history and could be compromised by anyone 
			with access to the same Wi-Fi network.
			
				
				"Pairing records can be stolen a 
				number of different ways, ranging from a shared coffee shop 
				computer to an ex-lover whose computer you used to trust," 
				writes Zdziarski.
			
			
			Technology site 
			
			The Register speculates that 
			the protocols are there to conform with America's 1994 
			Communications Assistance for Law Enforcement Act - legislation that 
			requires technology companies to maintain backdoors for the benefit 
			of law enforcement agencies. 
			 
			
			Zdziarski, however, told the site that 
			the level of access Apple provides "exceeds anything that law 
			requires."
			 
			
			The allegations could be especially 
			damaging for Apple in China, where the national broadcaster CCTV 
			recently suggested that the iPhone's ‘Frequent Locations' feature 
			was
			
			a threat to national security.
			 
			 
			 
			
			Video: 
			Apple refutes Chinese security claims
			 
	
			 
			 
			 
			 
			
			Apple has responded by repeating that it 
			has,
			
				
				"never worked with any government 
				agency from any country to create a backdoor in any of our 
				products or services".
			
			
			Zdziarski has since repeated his 
			assertions that the amount of information offered by these backdoors 
			is unprecedented: 
			
				
				"These services break the promise 
				that Apple makes with the consumer when they enter a backup 
				password; that the data on their device will only come off the 
				phone encrypted.
				 
				
				"The consumer is also not aware of 
				these mechanisms, nor are they prompted in any way by the 
				device. There is simply no way to justify the massive leak of 
				data as a result of these services, and without any explicit 
				consent by the user."
			
			
			He adds that he is in no way accusing 
			Apple of working directly with security agencies but that he 
			suspects that,
			
				
				"some of these services may have 
				been used by [the] NSA to collect data".