Security Market Segment LS
Friday, 21 March 2014 10:18

Fake Tor Browser finally removed from App Store Featured

By

Almost three months after being alerted to its presence, Apple has taken down from the App Store an allegedly fake Tor Browser containing adware and spyware.

Tor is a system designed to improve users' privacy and security by protecting their internet usage from traffic analysis. This is achieved by transmitting data packets through a random subset of the relays provided by Tor participants.

In addition, Tor browsers are normally configured to protect against browser fingerprinting, which can be used to identify an individual browser based on the information it sends to servers. (I just visited the EFF's Panopticlick site and found the configuration of the browser I used was unique among the nearly four million tested.)

Tor descends from the Onion Routing program at the US Naval Research Laboratory.

Back in December 2013, the Tor Project was notified by users that the Tor Browser iOS app in the App Store contained adware and spyware, so the Project lodged a complaint with Apple.

According to the Project's ticketing system, Apple responded saying the app's author was being given a chance to defend the allegation.

Despite additional approaches by the Project, Apple apparently did nothing further.

Then this week Tor Project leader Roger Dingledine noted in the ticketing system "I mailed Window Snyder [security and privacy product manager at Apple] and Jon Callas [CTO of Silent Circle and Blackphone, and a former senior scientist at Apple] to see if they can get us past the bureaucracy."

He added "Otherwise I guess plan C is to get high-profile people on Twitter to ask Apple why it likes harming people who care about privacy. (I hope plan B works.)"

Mr Dingledine did not mention who, if anyone, he approached, but a tweet from Runa A. Sandvik of the Center for Democracy and Technology - "Dear Apple, please take down the fake #Tor Browser Bundle you have in your App Store." - is being given implicit credit in some quarters. Ms Sandvik's message was retweeted around 100 times.

The app in question has now been taken down.

Last month a fake Tor app was spotted and removed from the Microsoft app store.

WEBINAR event: IT Alerting Best Practices 27 MAY 2PM AEST

LogicMonitor, the cloud-based IT infrastructure monitoring and intelligence platform, is hosting an online event at 2PM on May 27th aimed at educating IT administrators, managers and leaders about IT and network alerts.

This free webinar will share best practices for setting network alerts, negating alert fatigue, optimising an alerting strategy and proactive monitoring.

The event will start at 2pm AEST. Topics will include:

- Setting alert routing and thresholds

- Avoiding alert and email overload

- Learning from missed alerts

- Managing downtime effectively

The webinar will run for approximately one hour. Recordings will be made available to anyone who registers but cannot make the live event.

REGISTER HERE!

LAYER 1 ENCRYPTION A KEY TO CYBER-SECURITY SOLUTION

Security requirements such as confidentiality, integrity and authentication have become mandatory in most industries.

Data encryption methods previously used only by military and intelligence services have become common practice in all data transfer networks across all platforms, in all industries where information is sensitive and vital (financial and government institutions, critical infrastructure, data centres, and service providers).

Get the full details on Layer-1 encryption solutions straight from PacketLight’s optical networks experts.

This white paper titled, “When 1% of the Light Equals 100% of the Information” is a must read for anyone within the fiber optics, cybersecurity or related industry sectors.

To access click Download here.

DOWNLOAD!

Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.

VENDOR NEWS & WEBINARS

REVIEWS

Recent Comments