Your iPhone’s watching you. Should you care?

15
Vote


Researchers announced today that they found what look like secret files on the iPhone that track user location and store it on the device, without the permission of the device owner. It’s unclear what the data is used for and why Apple has been collecting it in iOS products that carry a 3G antenna for nearly a year now.

Alasdair Allan, senior research fellow in astronomy at the University of Exeter, and writer Pete Warden, who discovered the log file and created a tool that lets users see a visualization of that data, say there’s no evidence of that information being sent to Apple or anybody else. Even so, the pair note that the data is unencrypted, giving anyone with access to your phone or computer where backups may be stored a way to grab the data and extrapolate a person’s whereabouts and routines.

To help users understand more about the data that’s being collected, what the risks are, and what they can do about it, CNET has put together this FAQ.

Who are the researchers and how did they find this?

Warden, who used to work at Apple (though not on the iPhone), and Allan had been collaborating on some location data visualization projects, including a visualization of radiation levels over time in Japan after the earthquake, when Allan discovered the file on an iPhone. “After we dug further and visualized the extracted data, it became clear that there was a scary amount of detail on our movements,” they wrote in a blog post.

When did this start and what devices are tracking this data?

According to Allan and Warden, the tracking did not begin until iOS 4, which was released in late June 2010. This was the first version of iOS to drop support for devices like the original iPhone, with devices like the iPhone 3G and second-generation iPod Touch getting a more limited feature set. Along with iPhones, 3G-enabled iPads are also keeping track of the data, though it’s unclear if this is true for people who have 3G devices without active cellular subscriptions.

The tracking data itself was actually discovered last year. A tool by French programmer Paul Courbis, that’s similar to the one released by Allan and Warden, is able to plot up to 10,000 of these data points from the database file to a Google Map. The issue was known in forensics circles but not widely, Allan and Warden said in a news conference this afternoon at the Where 2.0 conference in Santa Clara, Calif. An application they released that allows people to see what data is on individual devices makes the abstract tracking concept more real.

Did they contact Apple on their findings?
The researchers said they had contacted Apple’s Product Security team, but hadn’t heard back.

Where is this data being stored?
The database of location information is stored primarily on your phone, though due to the iOS device backup system in iTunes, these files can also end up on your computer. When iTunes saves these backups, which are set by default to be stored every time you sync an iOS device, the data file goes along with it.
(Credit: Josh Lowensohn/CNET)

What’s curious is that this log can extend across multiple devices as long as those devices use the same restore point. Allan and Warden noted that the database used as part of the project spanned an iPhone 3GS and an iPhone 4, the latter of which had used a restore point.
The researchers have more technical details and the downloadable application to see a visualization of the data collected from your phone over time here. The application does not work with iPhones on Verizon, the researchers said.
What’s inside this data?
A database of cell tower coordinates and timestamps to indicate when your device was connecting with them. This includes what operator you’re on and the country code. The research also found that Apple was tracking data about what Wi-Fi networks you were connecting to, which also included slightly less accurate location information, but continued to track that data by time. The researchers’ visualization app shows large blue dots for frequent activity and smaller red or orange-colored dots for less frequent activity. However, it’s unclear exactly what is triggering the logging, they said.
Is there an easier way to see that information than a giant database form?
Yes, Allan and Warden created an open-source software program that is able to go through the data from the database file and turn it into a visualization of what towers your device connected to based on the dates and times. The pair say the application intentionally cuts down on the accuracy of this data to keep the software from being used for bad things. You’re also likely to see points in places you haven’t been, since the tracking tools within the iPhone make use of nearby cell towers to triangulate location. “As a data geek I was excited to have this data set, but I don’t want anyone else to have this data,” Allan said.
What is the harm with this data being collected and stored on the device?
“By passively logging your location without your permission, Apple [has] made it possible for anyone from a jealous spouse to a private investigator to get a detailed picture of your movements,” the researchers wrote in their FAQ.
While acknowledging that there is no need to panic, the researchers noted that if someone gets hold of the device, they can access the unencrypted data. “Your cell operator has this information,” they said in the news conference. Anyone who wants it has “to get a court order to get that from a provider. But now, all you have to do is lose your phone in a bar.”
Apps on the device cannot access the data, because it is “sandboxed,” the researchers said. However, it could be accessed by software on the computer that holds the backup, they said.
How do I protect this data from being seen by others?
The data file itself is completely unencrypted, meaning anyone who gets hold of it can access the data freely. On the iTunes side, there’s an option to encrypt your backups, which will keep someone who gets access to a backup file while rummaging through your hard drive from being able to dig through it and pull out the database file.
To enable that feature, click on the device icon when it’s plugged into iTunes, then check the “Encrypt iPhone Backup” item in the “Options” area. As for your iPhone, or iPad with 3G, your best bet is to keep someone else from getting it in the first place, and then using Apple’s free “Find My iPhone” app to do a remote wipe if it’s lost or stolen.


[Story Source] [Contest win Rs 1000-100,000 now]

This post was submitted by superblogger.

Related Posts
Wasn’t the Kindle supposed to be firewood?

Wasn’t the Kindle supposed to be firewood?

The second-quarter earnings that Amazon.com announced Thursday weren't quite up to par with what Wall Street had been hoping. But Wall Street had been hoping for good things, and the results were stil...
Apple’s Wearable Camera Patent Sends GoPro Stocks Tumbling

Apple’s Wearable Camera Patent Sends GoPro Stocks Tumbling

Shares of GoPro, whose cameras can be mounted on helmets, surf boards, bikes and dog harnesses, fell as much as 15 percent. Apple Inc has been granted a patent for a wearable camera that could ...
Google in Talks to Buy Mobile

Google in Talks to Buy Mobile

Google Inc is in talks to buy mobile-payments company Softcard, technology news website TechCrunch reported on Friday, citing people familiar with the matter.The deal could help pair Google with...
Apple takes control of iCloud.com domain

Apple takes control of iCloud.com domain

Apple today took administrative control of the iCloud.com domain less than a week before CEO Steve Jobs is to unveil his company's new cloud-based service.According to WHOIS searches Wednesday, Apple ...
 Google versus Apple

Google versus Apple

As I was completing my thesis on “rapid innovation“, one of the frequent comment was: “and you’re lucky to work in the digital industry because you can include in your case studies Google and A...
A Second Coming

A Second Coming

The iPad 2 is lighter, and it’s double the fun I can’t help but feel sorry for those who bought an iPad before April 29, the day the second generation tablet from Apple was launched in India. They m...

Leave a Reply

 
We will keep You Updated...
Get Free Email Newsletter from VoteUpIndia Sign up for our free email newsletter. (Help?)
Read latest headlines in your favorite news reader
Follow VoteUpIndia  on Twitter Become a VoteUpIndia Fan on Facebook Subscribe to VoteUpIndia in Google Reader Add VoteUpIndia  to My Yahoo Add VoteUpIndia  to Netvibes Subscribe to Free Techie Buzz RSS Feed
Sponsored Links
Advertisements
Featured Video
Amazon
Best Storytellers
Powered by Authors Widget
Recent Posts

McDonald's Suspends Employee, Probes Child's Eviction From Pune Outlet

PUNE: After reports emerged that an eight-year-old destitute child was thrown out of an outlet of...

Why Arjun Made a Humble Request to Cast Sonakshi in Tevar

It's all about wearing your Tevar, this new year. Arjun Kapoor looked dapper at the initial promotions...

5 things Modi needs to do ASAP, after Bihar loss

It's not correct to transpose the outcome from a state election as a referendum on the central government,...

Sehwag's half century in All Star tournament.

The first match has been really special. We thoroughly enjoyed being here. New York, you were brilliant....

Bihar Defeat May Lead to Silent Rebellion in BJP Against PM, Amit Shah: Arun Shourie to NDTV

NEW DELHI: In the aftermath of the BJP's debacle in Bihar, Arun Shourie, one time admirer of Narendra...

Court Refuses to Stop Gillette Razor Ad Starring Deepika Padukone

New Delhi: The Delhi High Court has refused to stop a Gillette razor advertisement starring Deepika...

Bigg Boss 9: Roopal Tyagi voted out of the house

TV actor Roopal Tyagi was evicted from reality show Bigg Boss on Sunday’s episode. Roopal is the...
Recent Comments
How i can submit my story...? and where i can see the staus of votes for this?
IFFI lose its art value,so it became lose it commercial value
Dear sir I am sending an article which is based on true story and needs your help to lime light such incidents which never come in
Thanks for the interesting article. Great Post. Keep it up
It is indeed heartening to learn that LSE, the world leader in higher education, will join hands with the most admired Reliance Foun
Tag Cloud