Apple's iMessage had a few security holes in and that potentially leaked photos and contacts, respectively. Though quickly patched, they are a reminder that the company faces a never-ending arms race to shore up its security to keep malicious hackers and government out.
Don't use plagiarized sources. Get Your Custom Essay on
Apple Logs Your iMessage Contacts and Could Share Them With Police
just from $13,9 / page
When an iOS user types in a phone number to begin a text conversation, their device pings servers to determine whether the new contact uses iMessage. If not, texts are sent over SMS and appear in green bubbles, while Apple's proprietary data messages appear in blue ones. Allegedly, they log all of these unseen network requests.
But those also include time and date stamps along with the user's IP address, identifying your location to some degree, according to The Intercept. Like the phone logs of yore, investigators could legally request these records and Apple would be obliged to comply. While the company that iMessage was end-to-end in 2013, securing user messages even if law enforcement got access, Apple said nothing about metadata.
Apple confirmed to The Intercept that it does comply with subpoenas and other legal requests for these exact logs, but maintained that message content is still kept private. Its commitment to user security isn't really undermined by these illuminations -- phone companies have been giving this information to law enforcement for decades -- but it does illustrate what they can and cannot protect
Remember. This is just a sample.
You can get your custom paper from our expert writers
Cite this page
Not Finding What You Need?
Search for essay samples now