Security expert details multiple undocumented services running on all iOS devices

Shawn Knight

Posts: 15,285   +192
Staff member

forensic ios apple hacking security spying law enforcement hacker back door

During a recent hacker conference, forensic scientist and iPhone jailbreaking expert Jonathan Zdziarski outlined a number of undocumented high-value forensic services running on every iOS device. He also found suspicious design omissions in iOS that make data collection easier according to a report from ZDNet.

Zdziarski notes that while Apple has worked hard to make iOS devices reasonably secure against typical attackers, they've also put a lot of time and planning into making devices accessible on their end on behalf of law enforcement.

forensic ios apple hacking security spying law enforcement hacker back door

The hacker also found that screen-locking an iPhone doesn't encrypt its data. The only real way to do this is to shut down / power off the handset. What's more, some of the undocumented services are able to bypass backups and can be accessed using USB, Wi-Fi or perhaps even cellular.

Using commercially available forensics tools, for example, law enforcement could gain access to a device during a routine traffic stop or during an arrest before a suspect is able to power the phone off.

forensic ios apple hacking security spying law enforcement hacker back door

Zdziarski finds it suspicious that none of these services ("lockdownd," "pcapd" or "mobile.file_relay") are referenced in any Apple software. The data they collect is personal in nature thus unlikely to be used for debugging purposes and is stored in raw format to make it useless to wireless carriers or during a trip to a Genius Bar.

All said and done, Zdziarski is left with more questions than answers.

Permalink to story.

 
Very interesting development. It just doesn't surprise me though. I would expect Apple to legally disclose this in the fine print of an agreement in the future.
 
Pcapd = Packet capture driver = capture your internet traffic including logins, cookies, etc.
mobile.file_relay = remote file access
lockdownd = encryption bypass or actually secure lockdown.

Now that word is out on this, it will be found what these things do for sure. Pretty stupid to name them like that though.
 
But what is wrong with law enforcement being able to access the device? As long as law enforcement is indeed law enforcement, and not some paranoid dream of a thought police from 1984, it is a good thing that police can intercept mobile phone conversations or data streams of criminals and terrorists.
 
@Guest: Because, even if we assume that all law enforcement are nice guys and gals working hard to protect us from the bad people, what's to stop hackers accessing these services and taking all the data from iOS devices?

If a door exists, hackers will get through it. The door shouldn't exist in the first place.
 
Back