Skip to main content

Why that iOS ‘backdoor’ isn’t really a threat unless Big Brother is after you

ios backdoor isnt really a threat iphone 5s fingerprint scanner
Image used with permission by copyright holder
Last week, forensic scientist and iOS hacker Jonathan Zdziarski revealed what appears to be a backdoor in iOS at the Hackers On Planet Earth conference in New York. Shortly thereafter, his report flooded the Internet, alerting iOS users to the danger.

Zdziarski stated that the backdoor could be used by hackers, the NSA, or other government agencies to spy on unsuspecting iOS users. Apple stated that no backdoor was intentionally built into iOS and that it works with no government surveillance programs whatsoever. The company also said that the feature is used to diagnose problems with iPhones and iPads only. In response, Zdziarski cautioned iOS users against overreacting to his report, but encouraged Apple to solve the issue.

Recommended Videos

However, Zdziarski did not address the main question that iPhone and iPad users want answered: Is the backdoor in iOS and immediate and likely threat to my iOS devices?

Based on Zdziarski’s report, the answer is no. But before we get to that, let’s take a closer look at his report.

What info does the backdoor reveal?

When exploited, the backdoor Zdziarski found in iOS would allow hackers access to all the metadata stored on your iPhone, your GPS location data, calendar and contacts, photos, and recent messages. The backdoor could easily be used to surveil a person once the device is compromised. Zziarski stated that the features could be used by high-level hackers, the NSA, or other government agencies.

Zdziarski added that although he doesn’t think it’s a “grand conspiracy” by Apple, “there are some services running in iOS that shouldn’t be there, that were intentionally added by Apple as part of the firmware and that bypass backup encryption while copying more of your personal data than ever should come off the phone for the average consumer.”

In a statement to Financial Times writer Tim Bradshaw, Apple countered that iOS is designed “so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues,” adding that “a user must have unlocked their device and agreed to trust another computer before that computer is able to access this limited diagnostic data. The user must agree to share this information, and data is never transferred without their consent.”

Apple (once again) did deny creating the backdoor to give governments easy access to user data.

How would a hacker access the information?

Zdziarski’s report revealed that hackers can access the backdoor  only when the iPhone or iPad is paired via USB with a Mac or PC. During the pairing process, a pairing file is created and stored on both the PC/Mac and the iOS device. If a hacker retrieves this file, he can access all the user information listed above. The hacker could then surveil the user from the device itself, after using a few tools built into iOS itself.

  • Using the lockdownd feature, the com.apple.mobile.installation_proxy service lets any person with an Apple enterprise license to download malware to the iOS device.
  • Hackers could exploit the com.apple.mobile.house_arrest feature to view databases and personal data from third-party apps. The tool also includes a packet sniffer, which can record every action the user takes on the iOS device from then on.
  • Another tool called file relay could let hackers copy all your metadata, GPS location, calendar, contacts, photos, and recent messages typed on the screen.

However, in order to access all these malicious backdoor features in iOS, hackers must go through several key steps with specific information on hand. First, the hacker has to know where your iOS device is located, what Wi-Fi network its on, and the pairing codes used by your PC or Mac and iOS device during USB pairing. The iOS device must also be unlocked, connected to Wi-Fi, and paired to an infected computer.

Is it easy to exploit the features and will it happen to me?

Apple quickly pointed out that it is highly unlikely that the average hacker will have all that highly detailed information about you and your iOS device. Essentially, the hacker would have to know where you live, have access to your personal computer, and be very stealthy to exploit these features.

Based on Zdziarski’s report, it appears that unless your brother is a hacker or Big Brother is watching you, the backdoor is no threat to you or your personal data.

Nonetheless, the fact that the NSA or other government agencies could take advantage of these features is concerning and Apple should fix the issue immediately.

Malarie Gokey
Former Digital Trends Contributor
As DT's Mobile Editor, Malarie runs the Mobile and Wearables sections, which cover smartphones, tablets, smartwatches, and…
Here’s how iOS 18 will make iMessage better than ever
Close-up photo of the Messages app on an iPhone.

We can't wait for Apple's Worldwide Developers Conference (WWDC 2024) keynote on Monday, June 10. During that event, Apple will undoubtedly introduce iOS 18 for iPhones, including the iPhone 15 Pro. The rumor mill has long suggested that iOS 18 may be a giant iPhone update.

Now, Bloomberg's Mark Gurman has given us a peek at what changes could be coming to iMessage in the upcoming software update.

Read more
Here’s how iOS 18 is going to overhaul your iPhone’s email app
An iPhone showing the home screen in someone's hand.

We're just days away from Apple's Worldwide Developers Conference (WWDC 2024), which means we're about to get our first look at iOS 18. The new iPhone operating system is expected to get RCS texting in the iMessage app, more customization options for the home screen, and maybe a significant design change overall. Now comes word that changes will be made to the native Mail app.

According to AppleInsider, the Mail app is about to undergo a significant transformation. It's getting a powerful new search tool, Smart Replies, automatic sorting for different email types, and more. But the real excitement lies in the app's expected integration of AI functionality, a feature becoming a hallmark of iOS 18.

Read more
The OnePlus 13 is coming on January 7 — along with a surprise
The OnePlus logo on the back of the OnePlus Open Apex Edition.

It's official: the OnePlus 13 will launch on January 7, 2025. Preempting the anticipated event by several weeks, OnePlus has officially confirmed the date we’ll see its next major smartphone release outside of China. Additionally, it has revealed some key features and news of a surprise new launch to go along with the phone.

OnePlus will release the OnePlus 13 in three different colors — Black Eclipse, Arctic Dawn, and Midnight Ocean. It’s the latter that is likely to be the model to have, as it is wrapped in a material called micro-fiber vegan leather, which is apparently corrosion and scratch-resistant but still luxurious to the touch. For the Arctic Dawn phone, the glass will have a special coating to give it a silky-smooth finish. It’s likely these are the same colors offered in China, where the phone has already been announced, just with different names.

Read more