September 25, 2012
In August there was a security story in the news about a vulnerability in the Apple iOS iMessage handling of SMS text messages. The vulnerability itself was not trivial, but there was more to the problem than just the vulnerability: It raised the issue of the opacity of Apple's protocol security.
If you use iMessage for a while on an iPhone you notice that it mixes actual SMS text messages and purely IP-based iMessage instant messages in the same message window. The vulnerability allowed the sender of an SMS text message to an iMessage user to spoof the name of the source. This might seem relatively minor, but it could be a major element of a larger, more sophisticated social engineering attack. Apple actually recommended that users use iMessage instant messages instead of SMS as a workaround, as if that's a solution for people who don't have iOS devices. But why should we trust iMessage? Just because Apple asserts that iMessage is a secure protocol? We can't trust that unless the protocol is documented and challenged. This approach is old news for Apple. In his keynote at the 2010 WWDC, Steve Jobs introduced FaceTime (that segment begins at 1:29:22). At 1:36:44, he talks about the standards used in FaceTime and declares, "We're going to take it all the way. We're going to the standards bodies starting tomorrow, and we're going to make FaceTime an open industry standard." Apple never followed through on this, nor has it been seriously challenged on it. FaceTime is an infamously-closed system, unavailable to other networks for interconnection. To open it up Apple would have to document at least some interfaces or conform to standards. That's not the Apple way. Cryptographer Matthew Green expressed these concerns well in a blog around the time of the iMessage vulnerability disclosure. The gist of his post is that iMessage is really important. Lots of people use it and rely on it and assume it's secure. But we don't know and we can't know. The same goes for FaceTime. The Apple Way, sad to say, seems to be to resist openness. One day this will likely blow up and users will suffer more than Apple.
About the Author(s)
You May Also Like
The New Frontier of Cyber Security: Securing the Network Edge
How to Develop an AI Governance Program
Responsible data use: Navigating privacy in the information lifecycle
The Definitive Guide to Understanding IP Addresses, VPNs and their Implications for Businesses
Three Ways Fortinet Hybrid Mesh Firewalls Secure Edge Networks