AGL 40.02 Decreased By ▼ -0.01 (-0.02%)
AIRLINK 127.99 Increased By ▲ 0.29 (0.23%)
BOP 6.66 Increased By ▲ 0.05 (0.76%)
CNERGY 4.44 Decreased By ▼ -0.16 (-3.48%)
DCL 8.75 Decreased By ▼ -0.04 (-0.46%)
DFML 41.24 Decreased By ▼ -0.34 (-0.82%)
DGKC 86.18 Increased By ▲ 0.39 (0.45%)
FCCL 32.40 Decreased By ▼ -0.09 (-0.28%)
FFBL 64.89 Increased By ▲ 0.86 (1.34%)
FFL 11.61 Increased By ▲ 1.06 (10.05%)
HUBC 112.51 Increased By ▲ 1.74 (1.57%)
HUMNL 14.75 Decreased By ▼ -0.32 (-2.12%)
KEL 5.08 Increased By ▲ 0.20 (4.1%)
KOSM 7.38 Decreased By ▼ -0.07 (-0.94%)
MLCF 40.44 Decreased By ▼ -0.08 (-0.2%)
NBP 61.00 Decreased By ▼ -0.05 (-0.08%)
OGDC 193.60 Decreased By ▼ -1.27 (-0.65%)
PAEL 26.88 Decreased By ▼ -0.63 (-2.29%)
PIBTL 7.31 Decreased By ▼ -0.50 (-6.4%)
PPL 152.25 Decreased By ▼ -0.28 (-0.18%)
PRL 26.20 Decreased By ▼ -0.38 (-1.43%)
PTC 16.11 Decreased By ▼ -0.15 (-0.92%)
SEARL 85.50 Increased By ▲ 1.36 (1.62%)
TELE 7.70 Decreased By ▼ -0.26 (-3.27%)
TOMCL 36.95 Increased By ▲ 0.35 (0.96%)
TPLP 8.77 Increased By ▲ 0.11 (1.27%)
TREET 16.80 Decreased By ▼ -0.86 (-4.87%)
TRG 62.20 Increased By ▲ 3.58 (6.11%)
UNITY 28.07 Increased By ▲ 1.21 (4.5%)
WTL 1.32 Decreased By ▼ -0.06 (-4.35%)
BR100 10,081 Increased By 80.6 (0.81%)
BR30 31,142 Increased By 139.8 (0.45%)
KSE100 94,764 Increased By 571.8 (0.61%)
KSE30 29,410 Increased By 209 (0.72%)

Personal data including text messages, contact lists and photos can be extracted from iPhones through previously unpublicised techniques by Apple Inc employees, the company acknowledged this week. The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the "trusted" computers to which the devices have been connected, according to the security expert who prompted Apple's admission.
In a conference presentation this week, researcher Jonathan Zdziarski showed how the services take a surprising amount of data for what Apple now says are diagnostic services meant to help engineers. Users are not notified that the services are running and cannot disable them, Zdziarski said. There is no way for iPhone users to know what computers have previously been granted trusted status via the backup process or block future connections.
"There's no way to `unpair' except to wipe your phone," he said in a video demonstration he posted Friday showing what he could extract from an unlocked phone through a trusted computer. As word spread about Zdziarski's initial presentation at the Hackers on Planet Earth conference, some cited it as evidence of Apple collaboration with the National Security Agency.
Apple denied creating any "back doors" for intelligence agencies. "We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues," Apple said. "A user must have unlocked their device and agreed to trust another computer before that computer is able to access this limited diagnostic data."
But Apple also posted its first descriptions of the tools on its own website, and Zdziarski and others who spoke with the company said they expected it to make at least some changes to the programs in the future. Zdziarski said he did not believe that the services were aimed at spies. But he said that they extracted much more information than was needed, with too little disclosure.

Copyright Reuters, 2014

Comments

Comments are closed.