Sunday, July 27, 2014

A user typing its iPhone. – The New Spain

Personal information including text messages, contact lists and pictures can be drawn from the iPhone through techniques not previously disclosed by Apple employees, as recognized from the company. A system for device diagnostics would be responsible for access to that information.

The same techniques to circumvent the encryption of the backup could be used by the police or other people with access to computers ” confidence “that have been connected devices, according to security expert prompting confirmation Apple . The system allows you to store the contents of the iPhone users on computers certified as safe.

At a conference this week, researcher Jonathan Zdziarski has shown how you can access a surprising amount of data for smartphones Apple. The company explained that it is designed to access diagnostic services, designed to help engineers. After Zdziarsky present its findings at the conference ‘Hackers on Planer Earth’ has become to speculate Apple collaboration with National Security Agency (NSA).

However, Apple has denied that it created “backdoors” to collaborate with smart agents. “We designed iOS for its diagnostic features do not compromise user privacy and security, but that the necessary information is provided to enterprise IT departments, developers and Apple to solve Technical problems, “explained from Apple. “A user must have unlocked the device and agree to trust another computer before the computer is able to access these limited diagnostic data” have been added.

Apple has released its first descriptions of this tool diagnosis on your own web site and Zdziarski and other experts who have spoken to the company have said they expect some changes are made to the program in the future.

Zdziarski has stressed that does not consider this tool is aimed at spying. However, he commented that draws much more information than necessary and with little transparency about it. The security analyst Rich Mogull explained that the work of Zdziarski is oversized, but it is technically accurate. “They are collecting more than they should and the only way to achieve this is to endanger the safety,” said Mogull.

Mogull has also agreed to Zdziarski that this system exists, the authorities can use it in cases where confiscated or accessed computers users or employees. “They will take advantage of all legal tools that have and maybe more” stressed Mogull on the actions of the authorities.

No comments:

Post a Comment