Pages: [1]   Go Down
  Print  
Author Topic: iOS diagnostic services, their uses and protections, outline by Apple in response to 'backdoor' allegations  (Read 483 times)
HCK
Global Moderator
Hero Member
*****
Posts: 79425



« on: July 23, 2014, 09:00:24 pm »

iOS diagnostic services, their uses and protections, outline by Apple in response to 'backdoor' allegations

<div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><a href='http://www.imore.com/apple-outlines-ios-diagnostic-services-response-backdoor-allegations' title="iOS diagnostic services, their uses and protections, outline by Apple in response to 'backdoor' allegations"><img src='http://www.imore.com/sites/imore.com/files/styles/large_wm_blw/public/field/image/2014/06/iphone_5_lightning_cable_attached_hero.jpg?itok=13tz2Qay' />[/url]</p> <p>Earlier this week Apple reaffirmed to iMore that it had never worked with any government agency to create a backdoor in any product or service. That was in answer to questions raised by Jonathan Zdziarski concerning iOS privacy and security. Apple has now published a new support page titled iOS: About diagnostic capabilities which elaborates on the services Zdziarski called out as data leaks. It does not, however, address vulnerabilities in passcode, pairing keys, or trusted device, though Apple typically does not address those types of things until they've pushed out patches. Here's Apple's full support article on the services:<!--break--></p> <div class="pressrelease"> <h3>iOS offers the following diagnostic capabilities to help enterprise IT departments, developers, and AppleCare troubleshoot issues.</h3> <p>Each of these diagnostic capabilities requires the user to have unlocked their device and agreed to trust another computer. Any data transmitted between the iOS device and trusted computer is encrypted with keys not shared with Apple. For users who have enabled iTunes Wi-Fi Sync on a trusted computer, these services may also be accessed wirelessly by that computer.</p> <h4>1. com.apple.mobile.pcapd</h4> <p>pcapd supports diagnostic packet capture from an iOS device to a trusted computer. This is useful for troubleshooting and diagnosing issues with apps on the device as well as enterprise VPN connections. You can find more information at developer.apple.com/library/ios/qa/qa1176.</p> <h4>2. com.apple.mobile.file_relay</h4> <p>file_relay supports limited copying of diagnostic data from a device. This service is separate from user-generated backups, does not have access to all data on the device, and respects iOS Data Protection. Apple engineering uses file_relay on internal devices to qualify customer configurations. AppleCare, with user consent, can also use this tool to gather relevant diagnostic data from users' devices.</p> <h4>3. com.apple.mobile.house_arrest</h4> <p>house_arrest is used by iTunes to transfer documents to and from an iOS device for apps that support this functionality. This is also used by Xcode to assist in the transfer of test data to a device while an app is in development.</p> </div> <p>When Chinese TV called iOS a location tracker, Apple responded on the consumer facing portion of their Chinese website, and in much more direct-to-customer terms. It's interesting to see Apple address the specific services in Zdziarski claims, but to address them in a support document, and to address them in technical terms.</p> <p>Apple is already increasing the security in <a href="http://www.imore.com/ios-8" title="iOS 8 help, how-to, news, reviews">iOS 8[/url]. Hopefully diagnostics, pairing records, and any other newly discovered vectors will have their security increased as well, and soon.</p> <p>Source: Apple Support</p> </div></div></div><div id="comment-wrapper-nid-25885"></div><img width='1' height='1' src='http://tipb.com.feedsportal.com/c/33998/f/616881/s/3cc49545/sc/5/mf.gif' border='0'/><br clear='all'/>

<a href="http://da.feedsportal.com/r/199109794712/u/49/f/616881/c/33998/s/3cc49545/sc/5/rc/1/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/199109794712/u/49/f/616881/c/33998/s/3cc49545/sc/5/rc/1/rc.img" border="0"/>[/url]
<a href="http://da.feedsportal.com/r/199109794712/u/49/f/616881/c/33998/s/3cc49545/sc/5/rc/2/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/199109794712/u/49/f/616881/c/33998/s/3cc49545/sc/5/rc/2/rc.img" border="0"/>[/url]
<a href="http://da.feedsportal.com/r/199109794712/u/49/f/616881/c/33998/s/3cc49545/sc/5/rc/3/rc.htm" rel="nofollow"><img src="http://da.feedsportal.com/r/199109794712/u/49/f/616881/c/33998/s/3cc49545/sc/5/rc/3/rc.img" border="0"/>[/url]

<img src="[url]http://da.feedsportal.com/r/199109794712/u/49/f/616881/c/33998/s/3cc49545/sc/5/a2.img" border="0"/>[/url]<img width="1" height="1" src="http://pi.feedsportal.com/r/199109794712/u/49/f/616881/c/33998/s/3cc49545/sc/5/a2t.img" border="0"/><img src="http://feeds.feedburner.com/~r/TheIphoneBlog/~4/fFGugBQDWy8" height="1" width="1"/>

Source: iOS diagnostic services, their uses and protections, outline by Apple in response to 'backdoor' allegations
Logged
Pages: [1]   Go Up
  Print  
 
Jump to: