Apple Inc denies 'backdoor' NSA access to iPhones

Apple iPhoneApple Inc said it 'has never worked with the NSA to create a backdoor in any of its products, including iPhone'.

Apple Inc said it had no "backdoor" in its products after a security researcher and a leaked document suggested the US National Security Agency had unfettered access to the iPhone.

Apple said that it "has never worked with the NSA to create a backdoor in any of our products, including iPhone."

The statement added that " we have been unaware of this alleged NSA program targeting our products."

Security researcher Jacob Applebaum described the NSA program based on a purportedly leaked document about NSA access to the iPhone, in comments made in Germany.

Apple said it "is continuously working to make our products even more secure, and we make it easy for customers to keep their software up to date with the latest advancements... and will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who's behind them."

Applebaum told a security conference in Germany that the program called DROPOUTJEEP allowed the NSA to intercept SMS messages, access contact lists, locate a phone using cell tower data, access voice mail or activate an iPhone's microphone and camera.

He described it as "an iPhone backdoor" that allowed the NSA to access any iPhone.

The documents were also described in the German newspaper Der Spiegel.

Security researcher Graham Cluley said in a blog post that Applebaum's presentation and the documents show a "broader range of tools that the NSA apparently deploys against other technology companies and products, including HP (Hewlett-Packard) servers, Cisco firewalls, Huawei routers, and so on."

But Cluley said the document "does not mean that the NSA has complete control of your iPhone" because physical access to the device would be needed.

"It may be that they have since found unpatched vulnerabilities in iOS to install the spyware onto targeted devices remotely... but that's not what the leaked documents say," Cluley said.

... contd.

Please read our terms of use before posting comments
TERMS OF USE: The views, opinions and comments posted are your, and are not endorsed by this website. You shall be solely responsible for the comment posted here. The website reserves the right to delete, reject, or otherwise remove any views, opinions and comments posted or part thereof. You shall ensure that the comment is not inflammatory, abusive, derogatory, defamatory &/or obscene, or contain pornographic matter and/or does not constitute hate mail, or violate privacy of any person (s) or breach confidentiality or otherwise is illegal, immoral or contrary to public policy. Nor should it contain anything infringing copyright &/or intellectual property rights of any person(s).
comments powered by Disqus