Backdoors and surveillance mechanisms in iOS devices

Jonathan Zdziarski‘s paper about backdoors, attack points and surveillance mechanisms built into iOS is quite, quite interesting.

recent revelations exposed the use (or abuse) of operating system features in the surveillance of targeted individuals by the National Security Agency (NSA), of whom some subjects appear to be American citizens. This paper identifies the most probable techniques that were used, based on the descriptions provided by the media, and today’s possible techniques that could be exploited in the future, based on what may be back doors, bypass switches, general weaknesses, or surveillance mechanisms intended for enterprise use in current release versions of iOS. More importantly, I will identify several services and mechanisms that can be abused by a government agency or malicious party to extract intelligence on a subject, including services that may in fact be back doors introduced by the manufacturer. A number of techniques will also be examined in order to harden the operating system against attempted espionage, including counter-forensics techniques.

This paper is actually half a year old – give or take – but it’s gotten a lot of attention recently due to, well, the fact that he has uploaded a PowerPoint from a talk about these matters, which is obviously a little bit more accessible than a proper scientific journal article.

For instance, despite Apple’s claims of not being able to read your encrypted iMessages, there’s this:

In October 2013, Quarkslab exposed design flaws in Apple’s iMessage protocol demonstrating that Apple does, despite its vehement denial, have the technical capability to intercept private iMessage traffic if they so desired, or were coerced to under a court order. The iMessage protocol is touted to use end-to-end encryption, however Quarkslab revealed in their research that the asymmetric keys generated to perform this encryption are exchanged through key directory servers centrally managed by Apple, which allow for substitute keys to be injected to allow eavesdropping to be performed. Similarly, the group revealed that certificate pinning, a very common and easy-to-implement certificate chain security mechanism, was not implemented in iMessage, potentially allowing malicious parties to perform MiTM attacks against iMessage in the same fashion.

There are also several services in iOS that facilitate organisations like the NSA, yet these features have no reason to be there. They are not referenced by any (known) Apple software, do not require developer mode (so they’re not debugging tools or anything), and are available on every single iOS device.

One example of these services is a packet sniffer, com.apple.pcapd, which “dumps network traffic and HTTP request/response data traveling into and out of the device” and “can be targeted via WiFi for remote monitoring”. It runs on every iOS device. Then there’s com.apple.mobile.file_relay, which “completely bypasses Apple’s backup encryption for end-user security”, “has evolved considerably, even in iOS 7, to expose much personal data”, and is “very intentionally placed and intended to dump data from the device by request”.

This second one, especially, only gave relatively limited access in iOS 2.x, but in iOS 7 has grown to give access to pretty much everything, down to “a complete metadata disk sparseimage of the iOS file system, sans actual content”, meaning time stamps, file names, names of all installed applications and their documents, configured email accounts, and lot more. As you can see, the exposed information goes quite deep.

Apple is a company that continuously claims it cares about security and your privacy, but yet they actively make it easy to get to all your personal data. There’s a massive contradiction between Apple’s marketing fluff on the one hand, and the reality of the access iOS provides to your personal data on the other – down to outright lies about Apple not being able to read your iMessages.

Those of us who aren’t corporate cheerleaders are not surprised by this in the slightest – Apple, Microsoft, Google, they’re all the same – but I still encounter people online every day who seem to believe the marketing nonsense Apple puts out. People, it doesn’t get much clearer than this: Apple does not care about your privacy any more or less than its competitors.

60 Comments

  1. 2014-07-19 7:21 pm
    • 2014-07-20 12:07 am
      • 2014-07-20 5:15 am
        • 2014-07-20 12:45 pm
          • 2014-07-21 8:18 am
          • 2014-07-21 8:57 am
      • 2014-07-20 6:59 pm
        • 2014-07-21 1:47 am
    • 2014-07-21 10:52 pm
  2. 2014-07-19 7:23 pm
    • 2014-07-19 7:40 pm
      • 2014-07-19 7:56 pm
        • 2014-07-19 8:06 pm
          • 2014-07-19 8:09 pm
        • 2014-07-19 8:12 pm
          • 2014-07-19 8:16 pm
          • 2014-07-19 8:18 pm
          • 2014-07-19 8:21 pm
          • 2014-07-19 8:21 pm
          • 2014-07-19 8:22 pm
          • 2014-07-19 8:27 pm
          • 2014-07-19 8:29 pm
          • 2014-07-19 8:32 pm
          • 2014-07-19 8:37 pm
          • 2014-07-19 8:57 pm
          • 2014-07-19 9:03 pm
          • 2014-07-19 9:07 pm
          • 2014-07-19 9:13 pm
          • 2014-07-19 11:09 pm
          • 2014-07-19 11:50 pm
          • 2014-07-20 1:07 am
          • 2014-07-20 7:33 am
  3. 2014-07-20 12:06 am
  4. 2014-07-20 1:42 am
  5. 2014-07-20 5:28 am
  6. 2014-07-20 9:09 pm
    • 2014-07-20 11:17 pm
      • 2014-07-20 11:32 pm
        • 2014-07-21 12:07 am
          • 2014-07-21 3:37 pm
      • 2014-07-21 4:01 am
        • 2014-07-21 8:35 am
          • 2014-07-21 10:33 am
          • 2014-07-21 3:11 pm
          • 2014-07-22 5:17 am
          • 2014-07-22 11:27 am
          • 2014-07-22 12:21 pm
          • 2014-07-23 4:30 am
          • 2014-07-23 7:22 am
          • 2014-07-23 7:29 am
    • 2014-07-21 2:33 am
      • 2014-07-21 3:58 am
        • 2014-07-21 5:06 am
          • 2014-07-21 10:30 am
          • 2014-07-22 5:19 am
      • 2014-07-21 4:03 am
        • 2014-07-21 5:14 am
        • 2014-07-21 3:15 pm
  7. 2014-07-21 7:37 pm
  8. 2014-07-21 10:50 pm