Apple has installed security backdoors on 600m iPhones and iPads, claims security researcher

Apple says its diagnostic tools "do not compromise user privacy" but researchers say the un-publicised tools give access to 'excessive' data

James Vincent
Tuesday 22 July 2014 18:45 BST
Comments

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

Apple has been accused of intentionally installing security backdoors in some 600 million iOS devices that offer surveillance-level access to data including photos, browsing history and GPS locations.

The vulnerabilities were uncovered by security expert Jonathan Zdziarski, who presented an academic paper on the subject at a hacker conference in New York last Friday.

Apple has issued a statement in response to the allegations saying that the company’s “diagnostic functions do not compromise user privacy and security,” but Zdziarski has responded by noting that these services “dish out data” regardless of whether the user has agreed to diagnostics.

“There is no way to disable these mechanisms,” Zdziarski writes on his personal blog. “This makes it much harder to believe that Apple is actually telling the truth here.”

The backdoors reportedly cover a range of hidden tools and protocols that activate with “paired” computers – machines connected to an iPhone or iPad via USB that the user has granted security access to.

Apple says that this allows individuals and businesses to manage their devices, but Zdziarski has pointed out that the system offers unecrypted access to users' online log-ins, contacts and web history and could be compromised by anyone with access to the same Wi-Fi network.

"Pairing records can be stolen a number of different ways, ranging from a shared coffee shop computer to an ex-lover whose computer you used to trust," writes Zdziarski.

Technology site The Register speculates that the protocols are there to conform with America’s 1994 Communications Assistance for Law Enforcement Act - legislation that requires technology companies to maintain backdoors for the benefit of law enforcement agencies. Zdziarski, however, told the site that the level of access Apple provides “exceeds anything that law requires.”

The allegations could be especially damaging for Apple in China, where the national broadcaster CCTV recently suggested that the iPhone’s ‘Frequent Locations’ feature was a threat to national security.

Apple has responded by repeating that it has “never worked with any government agency from any country to create a backdoor in any of our products or services”.

Zdziarski has since repeated his assertions that the amount of information offered by these backdoors is unprecedented: “These services break the promise that Apple makes with the consumer when they enter a backup password; that the data on their device will only come off the phone encrypted.

“The consumer is also not aware of these mechanisms, nor are they prompted in any way by the device. There is simply no way to justify the massive leak of data as a result of these services, and without any explicit consent by the user.”

He adds that he is in no way accusing Apple of working directly with security agencies but that he suspects that "some of these services may have been used by [the] NSA to collect data".

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in