By entering the codes "1984" and "31337" in iRandomizer Numbers, you can create a sharable Internet connection using your iPhone.
The iOS app iRandomizer Numbers contains an unexpected function: It allows users who enter the undocumented codes to create a tethered Internet connection. Thereafter, other nearby computers can join an ad-hoc WiFi network and reach the Internet using the tethered iPhone's cellular data connection.
The app purports to be nothing more than a random number generation tool. But entering "1984" in the minimum field and "31337" in the maximum field--numbers of significance in the hacker community--and tapping the "generate" button reveals a tethering network configuration screen.
The inclusion of hidden or undocumented features in an iOS app is forbidden under Apple's App Store Review Guidelines.
Nick Kramer, CEO of Shmoopi, LLC, acknowledged in an email that his app supports tethering. "Reluctantly, I will admit that my application 'iRandomizer Numbers' does have a hidden tethering feature," he wrote. "I say reluctantly because I didn't plan on the feature being released. I designed the tethering functionality for my family and close friends not thinking it would be disseminated outside that circle. "
In a phone conversation, Kramer said he was aware that Apple had removed at least three other apps that supported tethering from its App Store. Handy Light, removed in 2010, was one such app.
He said that he was aware of a few other apps like this that have not been released.
Kramer suggested the $4.99 price tag--high for an app with so little apparent functionality--was intended to limit its distribution. Shmoopi, LLC, offers several other apps, which collectively have racked up over 300,000 downloads.
Kramer said he has no immediate plan to withdraw the app now that news of the feature has made it to online discussion boards. "The most I've seen happen to developers is that Apple takes their app down," he said. "But I'm afraid if I leave it, they could make an example of me."
Apple did not immediately respond to a request for comment.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.