Egypt, Russia discuss industrial zone, nuclear plant in high-level talks    Finance Ministry presents three new investor facilitation packages to PM to boost investment climate    Egypt, Bahrain explore deeper cooperation on water resource management    Egypt condemns Israeli offensive in Gaza City, warns of grave regional consequences    Cairo University, Roche Diagnostics inaugurate automated lab at Qasr El-Ainy    Egypt expands medical, humanitarian support for Gaza patients    Egypt investigates disappearance of ancient bracelet from Egyptian Museum in Tahrir    Egypt launches international architecture academy with UNESCO, European partners    African trade ministers meet in Cairo to push forward with AfCFTA    Egypt's President, Pakistan's PM condemn Israeli attack on Qatar    Egypt signs MoUs with 3 European universities to advance architecture, urban studies    Madrid trade talks focus on TikTok as US and China seek agreement    Egypt wins Aga Khan Award for Architecture for Esna revival project    Egypt's Sisi, Qatar's Emir condemn Israeli strikes, call for Gaza ceasefire    Egypt condemns terrorist attack in northwest Pakistan    Egypt advances plans to upgrade historic Cairo with Azbakeya, Ataba projects    Egyptian pound ends week lower against US dollar – CBE    Egypt hosts G20 meeting for 1st time outside member states    Egypt to tighten waste rules, cut rice straw fees to curb pollution    Egypt seeks Indian expertise to boost pharmaceutical industry    Egypt prepares unified stance ahead of COP30 in Brazil    Egypt harvests 315,000 cubic metres of rainwater in Sinai as part of flash flood protection measures    Al-Sisi says any party thinking Egypt will neglect water rights is 'completely mistaken'    Egyptian, Ugandan Presidents open business forum to boost trade    Egypt's Sisi, Uganda's Museveni discuss boosting ties    Egypt's Sisi warns against unilateral Nile measures, reaffirms Egypt's water security stance    Greco-Roman rock-cut tombs unearthed in Egypt's Aswan    Egypt reveals heritage e-training portal    Sisi launches new support initiative for families of war, terrorism victims    Egypt expands e-ticketing to 110 heritage sites, adds self-service kiosks at Saqqara    Palm Hills Squash Open debuts with 48 international stars, $250,000 prize pool    On Sport to broadcast Pan Arab Golf Championship for Juniors and Ladies in Egypt    Golf Festival in Cairo to mark Arab Golf Federation's 50th anniversary    Germany among EU's priciest labour markets – official data    Paris Olympic gold '24 medals hit record value    A minute of silence for Egyptian sports    Russia says it's in sync with US, China, Pakistan on Taliban    It's a bit frustrating to draw at home: Real Madrid keeper after Villarreal game    Shoukry reviews with Guterres Egypt's efforts to achieve SDGs, promote human rights    Sudan says countries must cooperate on vaccines    Johnson & Johnson: Second shot boosts antibodies and protection against COVID-19    Egypt to tax bloggers, YouTubers    Egypt's FM asserts importance of stability in Libya, holding elections as scheduled    We mustn't lose touch: Muller after Bayern win in Bundesliga    Egypt records 36 new deaths from Covid-19, highest since mid June    Egypt sells $3 bln US-dollar dominated eurobonds    Gamal Hanafy's ceramic exhibition at Gezira Arts Centre is a must go    Italian Institute Director Davide Scalmani presents activities of the Cairo Institute for ITALIANA.IT platform    







Thank you for reporting!
This image will be automatically disabled when it gets reported by several people.



Apple Iphones Allow Extraction Of Deep Personal Data, Researcher Finds
Published in Amwal Al Ghad on 26 - 07 - 2014

Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicized techniques by Apple Inc employees, the company acknowledged this week.
The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the "trusted" computers to which the devices have been connected, according to the security expert who prompted Apple's admission.
In a conference presentation this week, researcher Jonathan Zdziarski showed how the services take a surprising amount of data for what Apple now says are diagnostic services meant to help engineers.
Users are not notified that the services are running and cannot disable them, Zdziarski said. There is no way for iPhone users to know what computers have previously been granted trusted status via the backup process or block future connections.
"There's no way to `unpair' except to wipe your phone," he said in a video demonstration he posted Friday showing what he could extract from an unlocked phone through a trusted computer.
As word spread about Zdziarski's initial presentation at the Hackers on Planet Earth conference, some cited it as evidence of Apple collaboration with the National Security Agency.
Apple denied creating any "back doors" for intelligence agencies.
"We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues," Apple said. "A user must have unlocked their device and agreed to trust another computer before that computer is able to access this limited diagnostic data."
But Apple also posted its first descriptions of the tools on its own website, and Zdziarski and others who spoke with the company said they expected it to make at least some changes to the programs in the future.
Zdziarski said he did not believe that the services were aimed at spies. But he said that they extracted much more information than was needed, with too little disclosure.
Security industry analyst Rich Mogull said Zdziarski's work was overhyped but technically accurate.
"They are collecting more than they should be, and the only way to get it is to compromise security," said Mogull, chief executive officer of Securosis.
Mogull also agreed with Zdziarski that since the tools exist, law enforcement will use them in cases where the desktop computers of targeted individuals can be confiscated, hacked or reached via their employers.
"They'll take advantage of every legal tool that they have and maybe more," Mogull said of government investigators.
Asked if Apple had used the tools to fulfill law enforcement requests, Apple did not immediately respond.
For all the attention to the previously unknown tools and other occasional bugs, Apple's phones are widely considered more secure than those using Google Inc's rival Android operating system, in part because Google does not have the power to send software fixes directly to those devices.
Source : Reuters


Clic here to read the story from its source.