Security researchers presenting at the Where 2.0 conference have revealed a hidden, secret iOS file that keeps a record of everywhere you've been. The record is synched to your PC and subsequently resynched to your other mobile devices. The file is not transmitted to Apple, but constitutes a substantial privacy breach if your PC or mobile device are lost or seized. The researchers, Alasdair Allan and Pete Warden, have released a free/open application called "iPhone Tracker" that allows you to retrieve the location data on your iOS device and examine it. They did not discover a comparable file on Android devices.
The file contains the latitude and longitude of the phone's recorded coordinates along with a timestamp, meaning that anyone who stole the phone or the computer could discover details about the owner's movements using a simple program.
For some phones, there could be almost a year's worth of data stored, as the recording of data seems to have started with Apple's iOS 4 update to the phone's operating system, released in June 2010.
"Apple has made it possible for almost anybody - a jealous spouse, a private detective - with access to your phone or computer to get detailed information about where you've been," said Pete Warden, one of the researchers.
The office I work in is full of things old people buy to make themselves feel young again. I can honestly say that our awesome new toy, The Swagtron T3 Hoverboard, makes me feel very, very old. I’ll explain why later. Swagtron T3 Pros There’s no way to overcharge the battery and that means no […]
One thing that’s consistent among amateur pool players is that they unknowingly stand up during their shots. Just as in golf, pool players need to keep their heads down and stay still after they shoot in order to hit straight. The DIGICUE helps keep shots consistent by letting you know every time you’ve had extra […]
A leaked memo from Apple CEO Tim Cook to his staff explaining why he met with Donald Trump — a guy who called Apple traitors for refusing to defeat their own security — explains the rationale: “tax reform.”
Using my iPhone while it’s charging is always a hassle. With tucked-away outlets and the meager length of included lightning cables, comfortable scrolling while plugged in is annoying. These 10-Ft MFi-Certified Lightning Cables are super convenient and probably the best iPhone accessory purchase I’ve made.At over three times the length of normal cables, these reach anywhere you […]
With countless applications for modern life, artificial intelligence (AI) is one of the most in-demand fields of study in tech. Beyond modelling human decision making processes and learning abilities, AI can be used to analyze massive volumes of data and create complex interactive systems.This Machine Learning & AI for Business Bundle made mastering these concepts possible for […]
Computer hacking isn’t just something happening to the DNC. Major software companies need white-hat hackers to ensure the security of their products and users, and I came across a Computer Hacker Professional Certification Package that conveniently teaches those advanced IT techniques online.This course package will prepare you for various computer security certification exams with over 60 hours […]