Forensic scientist identifies suspicious 'back doors' running on every iOS device
Summary:
During his talk at HOPE/X Jonathan Zdziarski detailed several
undocumented services (with names like 'lockdownd,' 'pcapd,'
'mobile.file_relay,' and 'house_arrest') that run in the background on
over 600 million iOS devices.
Undocumented iOS services exposed by Zdziarski (like "lockdownd,"
"pcapd" and "mobile.file_relay") can bypass encrypted backups and be
accessed via USB, wifi and "maybe cellular." What's most suspicious
about the undocumented services (and the data they collect) is that
they're not referenced in any Apple software, the data is personal in
nature (thus unlikely to be for debugging) and is stored in raw format,
making it impossible to restore to the device (making it useless to
carriers or during a trip to the Genius Bar). Zdziarski does a good job
of refuting most plausible explanations for the code.
No comments:
Post a Comment