As part of a legal battle against the Electronic Frontier Foundation, Apple submitted comments that claim jailbroken iPhones can lead to denial of service attacks and, furthermore, be used to take out cellular towers and the associated base stations. Pure FUD.
As part of a legal battle against the Electronic Frontier Foundation, Apple submitted comments that claim jailbroken iPhones can lead to denial of service attacks and, furthermore, be used to take out cellular towers and the associated base stations. Pure FUD.Apparently the Electronic Frontier Foundation has requested the U.S. Copyright Office to legalize the jailbreaking of iPhones. Jailbreaking iPhones allows users to install software on the device that is not approved by Apple, as well as use it on wireless networks other than AT&T (in the U.S.).
First, Apple says that jailbreaking violates the end user agreement of the iPhone, and is a breach of copyright. Before the iPhone can be activated, end users must agree to its terms of service. Specifically, it notes, users may not "modify, or create derivative works of the iPhone Software." As for the copyright claim, "Because jailbreaking involves unauthorized modifications to Apple's copyrighted bootloader and OS programs, it is a violation."
That may all be the truth as Apple sees, it, but what's really interesting is how Apple goes on to claim that hackers can perform amazing destructive feats with jailbroken iPhones. It says, "a local or international hacker could potentially initiate commands (such as a denial of service attack) that could crash the tower software, rendering the tower entirely inoperable to process calls or transmit data. Taking control of the BBP (baseband processor) software would be much the equivalent of getting inside the firewall of a corporate computer - to potentially catastrophic result. The technological protection measures were designed into the iPhone precisely to prevent these kinds of pernicious activities, and if granted, the jailbreaking exemption would open the door to them."
What? Really? Does AT&T know about this? I mean, cell towers aren't cheap, and I am sure AT&T doesn't want hackers to take any of its precious assets out just by modifying their iPhones.
The iPhone has been a target for hackers from day one, and was recently called out for having such poor security. But can an iPhone really take down a cell tower? I suppose anything is possible, but it's a pretty crazy claim for Apple to make in order to protect its own product.
The real story here is that Apple doesn't want the EFF or anyone else snooping around in its code. It wants to retain control of the iPhone and the iPhone ecosystem. This argument demonstrates just how far Apple is willing to go to protect its investments.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.