{"id":714,"date":"2014-07-23T15:44:32","date_gmt":"2014-07-23T19:44:32","guid":{"rendered":"http:\/\/www.ccrepairservices.com\/blog\/?p=714"},"modified":"2014-07-23T15:48:16","modified_gmt":"2014-07-23T19:48:16","slug":"ispy-researcher-exposes-backdoor-in-iphones-and-ipads","status":"publish","type":"post","link":"https:\/\/www.ccrepairservices.com\/blog\/computer-news\/ispy-researcher-exposes-backdoor-in-iphones-and-ipads\/","title":{"rendered":"iSpy? Researcher exposes backdoor in iPhones and iPads"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/s1.ibtimes.com\/sites\/www.ibtimes.com\/files\/styles\/v2_article_large\/public\/2013\/07\/18\/iphone-5s.jpg\" alt=\"\" width=\"770\" height=\"549\" \/><\/p>\n<p>How much of your personal data on your iPhone or iPad would you be willing to bet law enforcement or a hacker can grab\u00a0from your device, even if you&#8217;ve encrypted it?<\/p>\n<p>How about all of it?<\/p>\n<p>A &#8220;backdoor&#8221; that Apple built into iOS for developers can be used to spy on iPhones and iPads by governments, law enforcement, or cyber criminals,\u00a0according to forensics researcher <span style=\"color: #00ccff;\">Jonathan Zdziarski<\/span>.<\/p>\n<p>For the backdoor to be exploited by a spy, your iDevice needs to be synced to another computer via a feature called <em>iOS pairing<\/em>.<\/p>\n<p>Once your iDevice is paired\u00a0to your PC or Mac, they exchange encryption keys and certificates to establish an encrypted SSL tunnel, and the keys are never deleted unless the iPhone or iPad is wiped with a factory reset.<\/p>\n<p>That means a hacker could insert spyware on your computer to steal the pairing keys, which allows them to locate and\u00a0<a title=\"Your iPhone may be rigged to spy on you\" href=\"https:\/\/www.foxnews.com\/tech\/2014\/07\/22\/your-iphone-may-be-rigged-to-spy-on\/\">connect to your device via Wi-Fi<\/a>.<\/p>\n<p>Because iPhones and iPads <a title=\"Has Apple killed off location analytics with this simple privacy enhancement?\" href=\"https:\/\/nakedsecurity.sophos.com\/2014\/06\/12\/apples-ios-8-will-help-keep-out-wi-fi-marketers-and-snoops-but-not-totally\/\">automatically connect to Wi-Fi networks<\/a> with names they recognize, an attacker could then\u00a0set up a hotspot\u00a0using a spoofed network\u00a0name to get your device to connect, and grab all your data.<\/p>\n<p>Zdziarski used his talk at the HOPE X hacker conference on 18 July to state that Apple&#8217;s backdoors give access to personal data that&#8217;s beyond what developers or Apple itself need.<\/p>\n<p>In mentioning that the Snowden leaks revealed the National Security Agency (NSA) had used backdoors in iPhone, Android and BlackBerry, Zdziarski also implied that the NSA may have used Apple&#8217;s backdoors for easy access to iPhones and iPads.<\/p>\n<p><span style=\"color: #ff6600;\">Apple issued a statement <\/span>to reporters, acknowledging the access through pairing.<\/p>\n<p>But what Zdziarski described as a backdoor, Apple calls &#8220;diagnostic functions&#8221; &#8211; Apple said developers and IT departments need them for &#8220;troubleshooting.&#8221;<\/p>\n<p>Apple&#8217;s statement also flatly denies any cooperation with the NSA, or government agencies &#8220;from any country.&#8221;<\/p>\n<blockquote><p><tt>We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues. <\/tt><\/p>\n<p><tt>A user must have unlocked their device and agreed to trust another computer before that computer is able to access this limited diagnostic data. The user must agree to share this information, and data is never transferred without their consent.<\/tt><\/p>\n<p><tt>As we have said before, Apple has never worked with any government agency from any country to create a backdoor in any of our products or services.<\/tt><\/blockquote>\n<p>Zdziarski said:<\/p>\n<blockquote><p><tt>Apple\u2019s seeming admission to having these back doors, however legitimate a use they serve Apple, unfortunately have opened up some serious privacy weaknesses as well.<\/tt><\/p>\n<p><tt>I think at the very least, this warrants an explanation and disclosure to the some 600 million customers out there running iOS devices.<\/tt><\/blockquote>\n<p>The\u00a0lack of disclosure of these security loopholes is a bit puzzling, but Apple seems to have, at least, done the disclosing part now.<\/p>\n<p>Will Apple back down?<\/p>\n<p>Will the programmers in Cupertino be instructed to remove the libraries, or perhaps limit their use to developers debugging their apps?<\/p>\n<p>Chances are that&#8217;s not going to happen, not least because Apple obviously went to some trouble to get all this stuff working in the first place.<\/p>\n<div style=\"text-align: justify;\">\n<h2 style=\"text-align: center;\"><span style=\"color: #00ff00;\">Please Visit our <a href=\"https:\/\/www.ccrepairservices.com\">Computer News Website and Blog<\/a><\/span><\/h2>\n<h1 style=\"text-align: center;\"><span style=\"color: #ff6600;\"> for latest computer repair and online news.<\/span><\/h1>\n<h2 style=\"text-align: center;\"><span style=\"color: #993300;\">Local and Online Virus removal and computer repairs anytime, anywhere<\/span><\/h2>\n<p style=\"text-align: center;\">Fort Lauderdale, Miami, Boca Raton, Boynton Beach and all South Florida<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>How much of your personal data on your iPhone or iPad would you be willing to bet law enforcement or a hacker can grab\u00a0from your device, even if you&#8217;ve encrypted it? How about all of it? A &#8220;backdoor&#8221; that Apple built into iOS for developers can be used to spy on iPhones and iPads by governments, law enforcement, or cyber criminals,\u00a0according to forensics researcher Jonathan Zdziarski. For the backdoor to be exploited by a spy, your iDevice needs to be synced to another computer via a feature called iOS pairing. Once your iDevice is paired\u00a0to your PC or Mac, they exchange encryption keys and certificates to establish an encrypted SSL tunnel, and the keys are never deleted unless the iPhone or iPad is wiped with a factory reset. That means a hacker could insert spyware on your computer to steal the pairing keys, which allows them to locate and\u00a0connect to your device via Wi-Fi. Because iPhones and iPads automatically connect to Wi-Fi networks with names they recognize, an attacker could then\u00a0set up a hotspot\u00a0using a spoofed network\u00a0name to get your device to connect, and grab all your data. Zdziarski used his talk at the HOPE X hacker conference on 18 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[168,1033,1036,32,1031,1032,1034,1035,486,628,33,451],"class_list":["post-714","post","type-post","status-publish","format-standard","hentry","category-computer-news","tag-apple","tag-apple-backdoor","tag-coputer-news","tag-fort-lauderdale","tag-iphone","tag-iphone-backdoor","tag-iphone-hacker-access","tag-iphone-security-hole","tag-latest-news","tag-local-news","tag-miami","tag-online-news"],"_links":{"self":[{"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/posts\/714","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/comments?post=714"}],"version-history":[{"count":2,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/posts\/714\/revisions"}],"predecessor-version":[{"id":716,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/posts\/714\/revisions\/716"}],"wp:attachment":[{"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/media?parent=714"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/categories?post=714"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/tags?post=714"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}