The latest update to Apple's iPhone software and developer tools removes a security feature that was put there just six months ago.
Apple has used its constant software updates to push back against those who jailbreak their iPhones. It June, it added a host of enterprise features to iOS 4.0, including a new API that could be used to detect when an iPhone was jailbroken. The API was made available mostly for security reasons, as it allowed third-party device management companies such as Sybase to help its own customers secure their corporate data.
When Apple introduced iOS 4.2.1 in November, the API was removed.
Speaking to NetworkWorld, Joe Owen, vice president of engineering at Sybase, said, "We used it when it was available, but as an adjunct. I'm not sure what motivated their removing that....I've not had anyone [at enterprise customer sites] talk to me about this API being present or being removed." Sybase provides businesses with a mobile device management platform called Afaria.
The API worked by asking the operating system of it had been compromised. In order to jailbreak an iPhone, the software tools that do it make a number of changes to the operating system. The API could be used to examine a set of these vital system files to see if they'd been changed.
"It's an interesting concept -- asking the OS to tell you if it has been compromised," Owen said to NetworkWorld. "Because a smart attacker might first change that very part of the OS. Jailbreaks often get better and better at disguising the fact that anything has been compromised."
Companies such as Sybase had developed their own tools to detect jailbreaks, but the jailbreak detection API made it a lot easier by giving enterprise device management developers direct access to the necessary parts of the operating system.
Once a jailbreak was detected, businesses using software such as Sybase's Afaria could employ a number of resources, such as clamming up the phone, disabling it, sending alerts to IT and so on. The threat, of course, is that jailbroken iPhones are more susceptible to malware.
Apple declined to comment on why the API was removed.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.