Apple iPhones allow extraction of deep personal data, researcher finds

SAN FRANCISCO Fri Jul 25, 2014 9:00pm EDT

The exploded view of the home button which doubles as a fingerprint sensor is seen on an image of the new iPhone 5S at Apple Inc's media event in Cupertino, California September 10, 2013. REUTERS/Stephen Lam

The exploded view of the home button which doubles as a fingerprint sensor is seen on an image of the new iPhone 5S at Apple Inc's media event in Cupertino, California September 10, 2013.

Credit: Reuters/Stephen Lam

Related Topics

SAN FRANCISCO (Reuters) - Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week.

The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the "trusted" computers to which the devices have been connected, according to the security expert who prompted Apple's admission.

In a conference presentation this week, researcher Jonathan Zdziarski showed how the services take a surprising amount of data for what Apple now says are diagnostic services meant to help engineers.

Users are not notified that the services are running and cannot disable them, Zdziarski said. There is no way for iPhone users to know what computers have previously been granted trusted status via the backup process or block future connections.

“There’s no way to `unpair' except to wipe your phone,” he said in a video demonstration he posted Friday showing what he could extract from an unlocked phone through a trusted computer.

As word spread about Zdziarski’s initial presentation at the Hackers on Planet Earth conference, some cited it as evidence of Apple collaboration with the National Security Agency.

Apple denied creating any “back doors” for intelligence agencies.

“We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues,” Apple said. “A user must have unlocked their device and agreed to trust another computer before that computer is able to access this limited diagnostic data.”

But Apple also posted its first descriptions of the tools on its own website, and Zdziarski and others who spoke with the company said they expected it to make at least some changes to the programs in the future.

Zdziarski said he did not believe that the services were aimed at spies. But he said that they extracted much more information than was needed, with too little disclosure.

Security industry analyst Rich Mogull said Zdziarski’s work was overhyped but technically accurate.

“They are collecting more than they should be, and the only way to get it is to compromise security,” said Mogull, chief executive officer of Securosis.

Mogull also agreed with Zdziarski that since the tools exist, law enforcement will use them in cases where the desktop computers of targeted individuals can be confiscated, hacked or reached via their employers.

“They’ll take advantage of every legal tool that they have and maybe more,” Mogull said of government investigators.

Asked if Apple had used the tools to fulfill law enforcement requests, Apple did not immediately respond.

For all the attention to the previously unknown tools and other occasional bugs, Apple’s phones are widely considered more secure than those using Google Inc's rival Android operating system, in part because Google does not have the power to send software fixes directly to those devices.

(Reporting by Joseph Menn; Editing by Lisa Shumaker)

FILED UNDER:
We welcome comments that advance the story through relevant opinion, anecdotes, links and data. If you see a comment that you believe is irrelevant or inappropriate, you can flag it to our editors by using the report abuse links. Views expressed in the comments do not represent those of Reuters. For more information on our comment policy, see http://blogs.reuters.com/fulldisclosure/2010/09/27/toward-a-more-thoughtful-conversation-on-stories/
Comments (11)
phillip1 wrote:
It seems that every person who has a computer and or cell phone is automatically gives up all expectations of privacy on the date of purchase. Legally speaking there should be a large and prominent WARNING telling the user that everything on your machine is stored forever and can be accessed by multiple gov. agencies and
hackers and others. In Short, you give up your Constitutional rights when you purchase these things.

Jul 25, 2014 10:13pm EDT  --  Report as abuse
WJL wrote:
It is quite obvious that these companies and the internet have been in bed with the NSA for a long, long time.

Jul 25, 2014 11:26pm EDT  --  Report as abuse
keenObserver1 wrote:
I have known for some time that my devices upload information when they are supposedly downloading. Just waiting for alternatives, in the mean time the zombies can have a field day!

Jul 26, 2014 3:23am EDT  --  Report as abuse
This discussion is now closed. We welcome comments on our articles for a limited period after their publication.