Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Ubuntu Lucid Lynx 10.04 can read your iPhone's secrets
ZDNet ^ | May 27, 2010 | Adrian Kingsley-Hughes

Posted on 06/25/2010 12:17:10 PM PDT by PugetSoundSoldier

Do you have a PIN code on your iPhone? Well, while that might protect you from someone making a call or fiddling with your apps, it doesn’t prevent access to your data … as long as the person doing the snooping around is using Ubuntu “Lucid Lynx” 10.04.

Security experts Bernd Marienfeldt and Jim Herbeck discovered something really interesting when they hooked up a non-jailbroken, fully up-to-date iPhone 3GS to a PC running Lucid Lynx …

I uncovered a data protection vulnerability [9], which I could reproduce on 3 other non jail broken 3GS iPhones (MC 131B, MC132B) with different iPhone OS versions installed (3.1.3-7E18 modem firmware 05.12.01 and version 3.1.2 -7D11, modem 05.11.07) , all PIN code protected which means the vulnerability bypasses authentication for various data where people most likely rely on data protection through encryption and do not expect that authentication is not in place.

(Excerpt) Read more at zdnet.com ...


TOPICS: Business/Economy; Computers/Internet; Music/Entertainment
KEYWORDS: apple; fail; ilovebillgates; iphone; iwanthim; iwanthimbad; microsoftfanboys; secure
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 221-229 next last
Most interesting. The PIN does lock your phone, unless you happen to plug it in to a computer running the latest release of Ubuntu. Then it's just wide-open, for you to copy all the data off as you desire, and crunch through it later.

Pretty major security hole, especially for any business users who require confidentiality/security.

1 posted on 06/25/2010 12:17:16 PM PDT by PugetSoundSoldier
[ Post Reply | Private Reply | View Replies]

To: for-q-clinton; driftdiver

Ping!


2 posted on 06/25/2010 12:17:54 PM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PugetSoundSoldier

Any Android vulnerabilities?


3 posted on 06/25/2010 12:25:14 PM PDT by P8riot (I carry a gun because I can't carry a cop.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PugetSoundSoldier

Man this has to stop. If this keeps up Apple may be seen as not secure.

We can’t have that now can we. Maybe if they were a little less successful in sales then this exploit wouldn’t have been made widely known. You know like the Mac security.


4 posted on 06/25/2010 12:28:23 PM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 1 | View Replies]

To: PugetSoundSoldier

bump


5 posted on 06/25/2010 12:34:13 PM PDT by dangerdoc
[ Post Reply | Private Reply | To 1 | View Replies]

To: PugetSoundSoldier
Uh... yeah. I look at porn most of the day on my iphone. I've got a lot of the sites listed under fake names in my Favorites>Blogs folder.

What's so secret about that?

6 posted on 06/25/2010 12:43:54 PM PDT by End Times Sentinel (In Memory of my Dear Friend Henry Lee II)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Owl_Eagle
Uh... yeah. I look at porn most of the day on my iphone. I've got a lot of the sites listed under fake names in my Favorites>Blogs folder.

What's so secret about that?

Nothing now - you've outed that info yourself, so you're no longer a target of porn-blackmailing hackers!

And remind me to NEVER handle your iPhone!

Unless, of course, I'm wearing the new iPhone 4 accessory:


7 posted on 06/25/2010 12:46:25 PM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 6 | View Replies]

To: PugetSoundSoldier

So someone would have to steal my phone and then physically connect it to a computer running a specific version of Ubuntu Linux.....OK, is that a security hole? Yes. Will it affect anyone? 99.999% chance that it will affect absolutely no one. Moving on.


8 posted on 06/25/2010 12:48:29 PM PDT by brent13a (You're a Great American! NO you're a Great American! NO NO NO YOU'RE a Great American! Nooo.....WTF?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: P8riot
Any Android vulnerabilities?

I know there are many, but in this case, when you lock your Android (or WinMo, or BB, or Symbian) phone it doesn't automount as a device when you plug it into a computer.

9 posted on 06/25/2010 12:48:51 PM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 3 | View Replies]

To: PugetSoundSoldier

For some reason I find mixing discussion of porn and that picture troubling.


10 posted on 06/25/2010 12:49:50 PM PDT by dangerdoc
[ Post Reply | Private Reply | To 7 | View Replies]

To: for-q-clinton
Man this has to stop. If this keeps up Apple may be seen as not secure.

Can't be. I've been told by many on FR that iOS and OSX are invulnerable because they're designed and written differently. They cannot be hacked or infected.

And I guess, in this case, they're right. No software or hacking needed, unless you count the act of physically plugging a USB cable into a computer a hack...;)

11 posted on 06/25/2010 12:50:27 PM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 4 | View Replies]

To: PugetSoundSoldier
Unless, of course, I'm wearing the new iPhone 4 accessory:

About a year ago, a buddy asked me if the iphone could get viruses like a home computer can.

Well, if you can, I'm sure I will, the sites I go to...

12 posted on 06/25/2010 12:50:33 PM PDT by End Times Sentinel (In Memory of my Dear Friend Henry Lee II)
[ Post Reply | Private Reply | To 7 | View Replies]

To: PugetSoundSoldier

Physical access required. For an iPhone user this could be useful. For someone that loses their phone, bad.


13 posted on 06/25/2010 12:51:49 PM PDT by AFreeBird
[ Post Reply | Private Reply | To 1 | View Replies]

To: PugetSoundSoldier

So that is why I have to manually mount the drive when I plug in the phone. I always considered it a PIA, apparently there was a reason after all.


14 posted on 06/25/2010 12:51:51 PM PDT by dangerdoc
[ Post Reply | Private Reply | To 9 | View Replies]

To: brent13a

Leave your iPhone at your desk when you run to the bathroom. I walk over, plug it into my laptop (dual-boot with Ubuntu), take 30 seconds to copy the entire contents, then leave.

I now have ever bit of data you have on your phone. Didn’t have to do anything except plug a cable in. Instant access to everything, and I just drag-and-drop to my hard disk.

So, unless you trust everyone around with every bit of information you may keep on your phone, you should never leave your iPhone laying around. Ever. Not at the office, not at a friend’s party, not even in your hotel room when you go down to take a swim.

A cable and a few seconds. That’s all it takes to copy all your data. So much for a PIN protecting you!


15 posted on 06/25/2010 12:53:46 PM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 8 | View Replies]

To: dangerdoc
Maybe this will help:


16 posted on 06/25/2010 12:55:20 PM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 10 | View Replies]

To: AFreeBird

Or even leaves the phone unattended for 2-3 minutes at a business meeting...


17 posted on 06/25/2010 12:56:28 PM PDT by PugetSoundSoldier (Indignation over the Sting of Truth is the defense of the indefensible)
[ Post Reply | Private Reply | To 13 | View Replies]

To: PugetSoundSoldier

Fair enough. It doesn’t bother me because I don’t keep anything important on my phone and I rarely leave it laying anywhere. I don’t work in a traditional office setting so I don’t have to worry about my co-workers. 98% of the time my iphone is in my pocket if I’m not using it. Plus, if I found out a co-worker was fingering my things my fist would have a discussion with their face.


18 posted on 06/25/2010 1:00:43 PM PDT by brent13a (You're a Great American! NO you're a Great American! NO NO NO YOU'RE a Great American! Nooo.....WTF?)
[ Post Reply | Private Reply | To 15 | View Replies]

To: PugetSoundSoldier

I have been to a few meetings where personal phones had to be surrendered before entry into the room was allowed. That would be a good time to “gather” the competitors data. Just a little in-house espionage.


19 posted on 06/25/2010 1:03:13 PM PDT by B4Ranch (Remember, guys, the enemy is to the left.)
[ Post Reply | Private Reply | To 17 | View Replies]

To: PugetSoundSoldier

Physical access required. For an iPhone user this could be useful. For someone that loses their phone, bad.


20 posted on 06/25/2010 1:03:41 PM PDT by AFreeBird
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-80 ... 221-229 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson