Tuesday, 28 October 2014 18:35

Apple sacrifices data privacy for convenience

By

Did Apple tell you that OS X 10.10 was sending unsaved documents to the cloud?

When I first heard about Jeffrey Paul's claim [NSFW] that OS X 10.10 Yosemite was leaking data to Apple's servers, my first reaction was "yeah, yeah - that's the way autosave is supposed to work."

But I was wrong.

Yes, some people that have upgraded to Yosemite directly from Snow Leopard are being caught out by the way autosave works, something that the rest of us have got used to.

A typical scenario is that such a user opens a file, makes some changes, does a Save As, and then reopens the original, only to find that the changes have been recorded in that file too.

The idea that users shouldn't have to worry about whether they've saved a document or not is exploited by Handoff, the Yosemite Continuity feature that lets you move almost seamlessly between working on a iCloud Drive document on a Mac or an iOS device.

That wasn't what Paul was talking about.

What he discovered is that Yosemite sends the current document state to iCloud Drive.

From Lion to Mavericks, 'unsaved' data remained on the Mac's local file system (in a folder called Saved Application State, which was located in the user's hidden Library folder).

According to Paul, Yosemite's blabbing applies to all applications that save their state. Furthermore, the list of recently used email addresses is also sent "silently" to Apple.

As he pointed out, this can be "useful" (e.g., in conjunction with Handoff) but it means "Any open and yet-unsaved document within an app is now silently and automatically uploaded to iCloud Drive, and, by extension, the government."

According to a traffic log collected by Landon Fuller, the contents of the files are actually sent to Amazon's S3 storage service.

Fuller previously pointed out that "In Yosemite, all Safari web searches are sent to not only the search engine you've selected (e.g., Google, DuckDuckGo), but *also* to Apple, even if you've disabled 'Spotlight Suggestions'."

He has also drawn attention to the fact that while Apple uses anonymous session IDs for Spotlight queries sent to the web, "the query URLs are server-supplied, [so] they can be modified to include a permanent identifier without triggering any visible client behaviour."

At a certain level, you have to trust the organisations that provide your software or you simply wouldn't use it.

(I'd remind open source fans of the the Heartbleed debacle where a serious vulnerability went undiscovered for years, and in any case very few of us have the time or expertise to examine source code or network traffic logs.)

But when companies like Apple make questionable decisions, it makes it harder to trust them next time.

Would it have been that much less convenient if Apple had continued to store application state locally, at least until the user made the decision to save the document in iCloud Drive?

There's always a tradeoff between convenience and security or privacy, but aren't users entitled to think that their data is stored locally until such time as they explicitly save or copy it to a cloud server? I believe they are.

Image: Composite based on the work of Thunderbolt.wiki [CC BY-SA 3.0] via Wikimedia Commons, and Nemo [public domain] via Pixabay

Read 7604 times

Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

SONICWALL 2022 CYBER THREAT REPORT

The past year has seen a meteoric rise in ransomware incidents worldwide.

Over the past 12 months, SonicWall Capture Labs threat researchers have diligently tracked the meteoric rise in cyberattacks, as well as trends and activity across all threat vectors, including:

Ransomware
Cryptojacking
Encrypted threats
IoT malware
Zero-day attacks and more

These exclusive findings are now available via the 2022 SonicWall Cyber Threat Report, which ensures SMBs, government agencies, enterprises and other organizations have the actionable threat intelligence needed to combat the rising tide of cybercrime.

Click the button below to get the report.

GET REPORT!

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

BACK TO HOME PAGE
Stephen Withers

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

Share News tips for the iTWire Journalists? Your tip will be anonymous

VENDOR NEWS