Ap­ple clos­ing iPhone se­cu­rity gap

En­cryp­tion to thwart po­lice

Arab Times - - FRONT PAGE -

SAN FRAN­CISCO, June 14, (Agen­cies): Ap­ple is clos­ing a se­cu­rity gap that al­lowed out­siders to pry per­sonal in­for­ma­tion from locked iPhones with­out a pass­word, a change that will thwart law en­force­ment agen­cies that have been ex­ploit­ing the vul­ner­a­bil­ity to col­lect ev­i­dence in crim­i­nal in­ves­ti­ga­tions.

The loop­hole will be shut down in a forth­com­ing up­date to Ap­ple’s iOS soft­ware, which pow­ers iPhones.

Once fixed, iPhones will no longer be vul­ner­a­ble to in­tru­sion via the Light­ning port used both to trans­fer data and to charge iPhones. The port will still func­tion af­ter the up­date, but will shut off data an hour af­ter a phone is locked if the cor­rect pass­word isn’t en­tered.

The cur­rent flaw has pro­vided a point of en­try for au­thor­i­ties across the US since the FBI paid an uniden­ti­fied third party in 2016 to un­lock an iPhone used by a mass killer in the San Bernardino shoot­ing a few months ear­lier. The FBI sought out­side help af­ter Ap­ple re­buffed the agency’s ef­forts to make the com­pany cre­ate a se­cu­rity back­door into iPhone tech­nol­ogy.

Ap­ple’s re­fusal to co­op­er­ate with the FBI at the time be­came a po­lit­i­cal hot potato pit­ting the rights of its cus­tomers against the broader in­ter­ests of pub­lic safety. While wag­ing his suc­cess­ful 2016 cam­paign, Pres­i­dent Don­ald Trump ripped Ap­ple for deny­ing FBI ac­cess to the San Bernardino killer’s locked iPhone.

In a Wed­nes­day state­ment, Ap­ple framed its de­ci­sion to tighten iPhone se­cu­rity even fur­ther as part of its cru­sade to pro­tect the highly per­sonal in­for­ma­tion that its cus­tomers store on their phones.

CEO Tim Cook has hailed pri­vacy as a “fun­da­men­tal” right of peo­ple and skew­ered both Face­book and one of Ap­ple’s big­gest ri­vals, Google, for vac­u­um­ing up vast amounts of per­sonal in­for­ma­tion about users of their free ser­vices to sell ad­ver­tis­ing based on their in­ter­ests. Dur­ing Ap­ple’s 2016 bat­tle with the FBI, he called the FBI’s ef­fort to make the com­pany al­ter its soft­ware a “dan­ger­ous prece­dent” in an open let­ter .

“We’re con­stantly strength­en­ing the se­cu­rity pro­tec­tions in ev­ery Ap­ple product to help cus­tomers de­fend against hack­ers, iden­tity thieves and in­tru­sions into their per­sonal data,” Ap­ple said. “We have the great­est re­spect for law en­force­ment, and we don’t de­sign our se­cu­rity im­prove­ments to frus­trate their ef­forts to do their jobs.”

It was first re­ported by var­i­ous new out­lets, in­clud­ing Reuters and The New York Times.

It’s un­clear what took Ap­ple so long to close an iPhone en­try­way that had be­come well-known among le­gal au­thor­i­ties and, pre­sum­ably, crim­i­nals as well.

It got to that point that two dif­fer­ent firms, Is­rael-based Cellebrite and US startup Grayshift, be­gan to sell their ser­vices to law en­force­ment agen­cies try­ing to hack into locked iPhones, ac­cord­ing to me­dia re­ports. Grayshift, founded by a for­mer Ap­ple en­gi­neer, even mar­kets a $15,000 de­vice de­signed to help po­lice to ex­ploit the se­cu­rity hole in the iPhone’s cur­rent soft­ware.

Face­book is in­stalling new con­trols it says will bet­ter in­form its mem­bers about the way com­pa­nies are tar­get­ing them with ad­ver­tis­ing, the lat­est step to quell a pub­lic out­cry over the com­pany’s mis­han­dling of user data.

Start­ing on July 2, Face­book Inc for the first time will re­quire ad­ver­tis­ers to tell its users if a so-called data bro­ker sup­plied in­for­ma­tion that led to them be­ing served with an ad. Data bro­kers are firms that col­lect per­sonal in­for­ma­tion about con­sumers and sell it to mar­keters and other busi­nesses.

Newspapers in English

Newspapers from Kuwait

© PressReader. All rights reserved.