Home Business IT Security Fake Tor Browser finally removed from App Store
Fake Tor Browser finally removed from App Store Featured

Almost three months after being alerted to its presence, Apple has taken down from the App Store an allegedly fake Tor Browser containing adware and spyware.

Tor is a system designed to improve users' privacy and security by protecting their internet usage from traffic analysis. This is achieved by transmitting data packets through a random subset of the relays provided by Tor participants.

In addition, Tor browsers are normally configured to protect against browser fingerprinting, which can be used to identify an individual browser based on the information it sends to servers. (I just visited the EFF's Panopticlick site and found the configuration of the browser I used was unique among the nearly four million tested.)

Tor descends from the Onion Routing program at the US Naval Research Laboratory.

Back in December 2013, the Tor Project was notified by users that the Tor Browser iOS app in the App Store contained adware and spyware, so the Project lodged a complaint with Apple.

According to the Project's ticketing system, Apple responded saying the app's author was being given a chance to defend the allegation.

Despite additional approaches by the Project, Apple apparently did nothing further.

Then this week Tor Project leader Roger Dingledine noted in the ticketing system "I mailed Window Snyder [security and privacy product manager at Apple] and Jon Callas [CTO of Silent Circle and Blackphone, and a former senior scientist at Apple] to see if they can get us past the bureaucracy."

He added "Otherwise I guess plan C is to get high-profile people on Twitter to ask Apple why it likes harming people who care about privacy. (I hope plan B works.)"

Mr Dingledine did not mention who, if anyone, he approached, but a tweet from Runa A. Sandvik of the Center for Democracy and Technology - "Dear Apple, please take down the fake #Tor Browser Bundle you have in your App Store." - is being given implicit credit in some quarters. Ms Sandvik's message was retweeted around 100 times.

The app in question has now been taken down.

Last month a fake Tor app was spotted and removed from the Microsoft app store.

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect