Pages: [1]   Go Down
  Print  
Author Topic: How to prevent unauthorized pairing with your iPhone or iPad using Apple Configurator  (Read 656 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: July 21, 2014, 09:00:26 pm »

How to prevent unauthorized pairing with your iPhone or iPad using Apple Configurator

<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><a href='http://www.imore.com/how-prevent-unauthorized-pairing-your-iphone-or-ipad-using-apple-configurator' title="How to prevent unauthorized pairing with your iPhone or iPad using Apple Configurator"><img src='http://www.imore.com/sites/imore.com/files/styles/large/public/field/image/2014/07/how_to_apple_configurator_macbook_pro_hero.jpg?itok=AEz1bIf9' />[/url]</p> <p>When you connect your iPhone or iPad to iTunes on Mac or Windows, and choose to trust that computer, a pairing record is created that maintains that trust for future connections. There's a report going around that claims that if someone takes physical possession of your device and your computer, they can steal those pairing records and use them to retrieve your personal information and/or enable remote logging. If they don't have your computer, it's also claimed they can try and generate a pairing record by tricking you into connecting to a compromised accessory (juice jacking), like a dock, and/or by using mobile device management (MDM) tools intended for enterprise to get around safeguards like Apple's Trusted Device requestor. So, how can you protect yourself?<!--break--></p> <p>*Important note:** Security is at perpetual odds with convenience. This process will make your iPhone and iPad more secure but less convenient. It should only be used if a) even the potential for a privacy breach is untenable for you, and b) you really, absolutely can function without connecting your iPhone or iPad to other devices.</p> <p>If someone has physical access to your devices, there are all sorts of things that can be done depending on their skill level, resources, and the value of your data to them. The information here is not meant to make anyone stressed or paranoid, simply to provide a specific option for a specific vulnerability in a vacuum.</p> <h2>Apple Configurator</h2> <p>Apple Configurator is a free tool from Apple meant to help schools, businesses, and institutions set up and manage large amounts of iPhones and iPads. With it, you can prevent your device from pairing with other computers or accessories, which prevents it generating pairing records, which prevents those records from being used to access your iPhone or iPad without your consent.</p> <ul><li>Free - <a href="https://itunes.apple.com/us/app/apple-configurator/id434433123?mt=12&amp;at=10l3Vy&amp;ct=d_im" title="" rel="nofollow">Download now[/url] app, available for free from Apple on the Mac App Store.</li> </ul><h2>How to use the Apple Configurator to secure your iPhone or iPad against unauthorized pairing</h2> <ol><li>Launch <strong>Apple Configurator</strong></li> <li>Click on <strong>Prepare</strong> at the top</li> <li>Name the settings anything you like (e.g. Supervised Device)</li> <li>Click on <strong>Supervision</strong> to toggle it to <strong>on</strong>.</li> <li><strong>Uncheck</strong> the box next to <strong>Allow devices to connect to other Macs</strong></li> <li>Click on the <strong>+</strong> sign at the bottom</li> <li>Select <strong>Create New Profile</strong> from the popup</li> <li>Name the new profile anything you like (e.g. Pairing Profile)</li> <li>Click on <strong>Restrictions</strong></li> <li>Click on <strong>Configure</strong></li> <li>Scroll down to <strong>Allow pairing with non-Configurator hosts</strong> and <strong>uncheck</strong> its box.</li> <li>Click <strong>Save</strong></li> <li><strong>Check</strong> the box next to the new profile </li> <li>Click <strong>Prepare</strong> at the bottom</li> <li>Fill in the information you want displayed in the profile. (It doesn't have to be accurate, you can use 555-555-5555 for a phone number if you want to.)</li> <li>Click <strong>Apply</strong></li> <li>Connect your iPhone, iPod touch, and/or iPad to apply the new settings</li> </ol><p><a href='http://www.imore.com/how-prevent-unauthorized-pairing-your-iphone-or-ipad-using-apple-configurator' title="How to prevent unauthorized pairing with your iPhone or iPad using Apple Configurator"><img src='http://www.imore.com/sites/imore.com/files/styles/large/public/field/image/2014/07/how_to_apple_configurator_pairing_screens.jpg?itok=0lr9zDEW' />[/url]</p> <h2>Additional security and privacy precautions</h2> <p>It should be noted that all the Apple Configurator does is prevent new pairing records from being generated, it does not delete existing records, nor does it protect against other types of hacking.</p> <p>Apple doesn't currently provide a front end for deleting old or existing pairing records, either on OS X or iOS, which means you'll need to manually search for and try to remove them on your own (/var/db/lockdown or ~/Library/Lockdown on Mac or C:\Program Data\Apple\iTunes\Lockdown on Windows).</p> <p>Someone else having physical access to your device or devices is in and of itself a massive security problem. However, there are some things you do to make it more difficult or time consuming for someone with your device to try and get to your data, including using a long, strong alphanumeric password instead of a passcode or Touch ID, and turning off Lock screen access for Control Center, Notification Center, Siri, Passbook, etc,. To prevent other types of remote access, you can enable two-step verification on your accounts and use unique passwords in conjunction with a password manager.</p> <ul><li>5 ways to increase security and privacy on iPhone and iPad</li> <li>http://www.imore.com/how-protect-your-mac-using-filevault-2-encryption</li> </ul></div></div></div><div id="comment-wrapper-nid-25837"></div><img width='1' height='1' src='http://tipb.com.feedsportal.com/c/33998/f/616881/s/3cb6b5a9/sc/4/mf.gif' border='0'/><br clear='all'/>

<a href="http://da.feedsportal.com/r/199109735656/u/49/f/616881/c/33998/s/3cb6b5a9/sc/4/rc/1/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/199109735656/u/49/f/616881/c/33998/s/3cb6b5a9/sc/4/rc/1/rc.img" border="0"/>[/url]
<a href="http://da.feedsportal.com/r/199109735656/u/49/f/616881/c/33998/s/3cb6b5a9/sc/4/rc/2/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/199109735656/u/49/f/616881/c/33998/s/3cb6b5a9/sc/4/rc/2/rc.img" border="0"/>[/url]
<a href="http://da.feedsportal.com/r/199109735656/u/49/f/616881/c/33998/s/3cb6b5a9/sc/4/rc/3/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/199109735656/u/49/f/616881/c/33998/s/3cb6b5a9/sc/4/rc/3/rc.img" border="0"/>[/url]

<img src="[url]http://da.feedsportal.com/r/199109735656/u/49/f/616881/c/33998/s/3cb6b5a9/sc/4/a2.img" border="0"/>[/url]<img width="1" height="1" src="http://pi.feedsportal.com/r/199109735656/u/49/f/616881/c/33998/s/3cb6b5a9/sc/4/a2t.img" border="0"/><img src="http://feeds.feedburner.com/~r/TheIphoneBlog/~4/55CKxw-2fGY" height="1" width="1"/>

Source: How to prevent unauthorized pairing with your iPhone or iPad using Apple Configurator
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: