Apple's Unique Device Identifier, or UDID, is an alphanumeric string uniquely identifying each Apple iOS device. According to SecurityLearn.net, the UDID is calculated based on unique hardware properties:
UDID = SHA1(Serial Number + ECID + LOWERCASE(WiFi Address) + LOWERCASE(Bluetooth Address))
As discussed in a paper by Eric Smith, hardware-locked device identifiers can be used to "track" a user across various sites and services. They are therefore considered a bad idea.
Apple deprecated developer access to UDIDs in iOS 5, and is removing access in iOS 6.
On September 4, 2012, the hacker group AntiSec released a file containing UDIDs, APNS keys, and device names for 1,000,001 iOS devices. AntiSec says these were liberated from an FBI laptop, and the original file contained around 12 million devices and personal information. (TheNextWeb has a tool for checking if your device is in the leaked list.)
Most of you are probably aware the security concerns about Viber (and WhatsApp, and who knows what else), regarding contacts and call logs (e.g. this and this). But regardless of this, users love these apps, and honestly, I installed it too on my iPhone when it came out earlier.
The question is simple: how do you prevent your users using these apps, without completely blocking the whole AppStore on their devices? Because, as far as I know, it is not possible to prevent the user to install any single app, it is only possible to turn off the whole AppStore via the restriction profiles. I don't think they would like that, and their rage would be completely understandable.
Our MDM solution raises alerts about blacklisted apps on iOS (and it even blocks them on android), but by the time you call the user and ask them to uninstall Viber - because do you have any other choice? - it will have already uploaded all the data you wanted to prevent to be uploaded.
Any solution or idea would be appreciated.
According to the brief release notes:
- Fixes an issue that could prevent Apple Configurator v1.1.1 from opening.
Download the update from the Mac App Store.
We would like to deploy some Apple TVs in our building for meetings and presentations. First, only in top managers' meeting rooms, but later maybe in much more meeting rooms.
Honestly, we did not find a good solution how to solve the access to them. As you probably now, if an Apple TV is not password protected and is available on the network, anybody can connect to it, kicking out the previous presenter. If multiple users know the password, they also can kick out each other. We came up with multiple ideas, but each of them has it's own issues.
- If we simply leave them freely available on the main network/wifi, then anybody can connect to any of them from anywhere, which is problematic at least, even if assume that the users are benign, ie. they will only connect if they are presenting, since they might select the wrong one. Also problematic, if you have to select the right one from 30 Apple TVs.
- If we would create a separate network for them, then the users would have to connect to a different wifi every time, and most probably, they would forget to connect back to the main one, so that we are back at the first solution.
- If we make the AppleTVs available on the main network, but protect them with a password, then it would only protect them until some users save those passwords in their devices, than we are again almost back to the first solution.
- Creating a separate network for each of the Apple TVs is rather a lot of work, might require some infrastructure investments too (since our APs already provide a lot of SSIDs), and there is the problem again with switching wifi before connecting to the Apple TV.
Any better idea than these? (It might be relevant that we do not use Macs officially, only some users did buy them, but we do have more and more iOs devices.)
iPad-based teleprescence by Double Robotics. Bring your own iPad. (Sold out through 2013.)
I am looking into the details of the enterprise iOS developer program and was wondering if anyone has any experience with it here.
What I am interested in learning about, for the moment, is the distribution of in-house apps. Specifically, what procedures do you follow to vet the apps that go into your in-house app store? Are there any good, public, resources out there that discuss this topic as to what tests / procedures to follow to make sure an app being placed in the App Store, for example, doesn't use any private APIs, does not send data when it also claims it won't, etc...?
I do not understand one parameter in mdm comparison list. iOS5 features – sandboxed email.
I can not find on any mdm (except Goods, Excitor that offer sandboxed solutions) site info about such a feature. Probably I misunderstand this feature due to my lack of knowledge of iOS. Could somebody explain me what is ment by sandboxed email?
Apple has updated Configurator to version 1.1.1. Apple Configurator is Apple's tool for mass configuration and deployment of iPhones and iPads.
The release notes mention only one change:
Fixes additional issues with importing Volume Purchase Program spreadsheets and installing paid store apps
Read more about Apple Configurator in our wiki.
On technologyreview.com, Simson L. Garfinkel has posted a look at the cryptographic features built into iOS. Over the last few years, Apple has successfully introduced strong encryption to the general public, causing all sorts of bellyaches for forensic analysts.
Now, with Apple's more sophisticated approach to encryption, investigators who want to examine data on a phone have to try every possible PIN. Examiners perform these so-called brute-force attacks with special software, because the iPhone can be programmed to wipe itself if the wrong PIN is provided more than 10 times in a row. This software must be run on the iPhone itself, limiting the guessing speed to 80 milliseconds per PIN. Trying all four-digit PINs therefore requires no more than 800 seconds, a little more than 13 minutes. However, if the user chooses a six-digit PIN, the maximum time required would be 22 hours; a nine-digit PIN would require 2.5 years, and a 10-digit pin would take 25 years. That's good enough for most corporate secrets—and probably good enough for most criminals as well.
This is a good time to remind you that with Mobile Device Management, you can set policies for minimum PIN length and complexity.
Thinking about letting employees sign into their personal itunes accounts on Company Issued iPads as a fringe benefit. I use NotifyMDM and each employee has their own company itunes account (created by me). I don't see any conflict, in theory, however there may be issues that I am not predicting (like would Find my iphone still work?) Anyone do this? I am trying to gather information from real world experiences.
I'm currently using Mobileiron as my MDM solution and have deployed to about 200 iPad users. The most annoying thing is when users go ahead and uninstall the the MI agent then I get notified and have to contact them to get their iOS device back in compliance. I thought to myself that there has to be a way to lock this down which sounds simple especially since coming from the BES environment which allowed you to do so. Looking deeper into this, a profile pushed via MDM, cannot be locked. Apple's thinking here is that if you have the device in your possession, the user must have given you permission to install a locked profile, so it's allowed. In the MDM scenario, the user has no warning that a locked profile will be installed, and Apple is concerned a user will be locked-into a behavior which they cannot opt-out of. So removing MDM profile with password is not option in our environment since we are using MDM certificate. The configuration profile created in the iPhone Configuration Utility which is pushed to the device over USB, can be locked so that it cannot be removed. Any thoughts? Anyone running into the same situation?
In a sign of the changing times, Apple's head of platform security, Dallas De Atley, is scheduled to speak at the Black Hat USA security conference this Thursday. His topic is on "key security technologies in iOS."
Apple has never before presented at this conference, which has sometimes exposed embarrassing flaws in Apple's systems. This year's talk is bookended by presentatiions titled "iOS Kernel Heap Armageddon Revisited" and "The Dark Art Of iOS Application Hacking."
Should be fun.
(via Ars Technica.)
About This Site
- Comparison of MDM Providers (623,478)
- Complete List of iOS User-Agent Strings (257,921)
- How to get remote viewing/control of the IPAD screen via internet or preferably 3G? (170,751)
- Apple Configurator vs. MDM (122,175)
- Mobile Device Management (81,503)
- Apple Profile Manager (70,803)
- AirWatch (66,020)
- Gartner Magic Quadrant for MDM (2014, 2012, 2011) (65,728)
- Batch Apple ID Creator (65,185)
- iOS Devices (62,624)
Comparison of MDM Providers
Story comment by raja234 1 day ago
Forum topic added by enbtechnology 2 days ago
Forum topic added by amesgryson 4 days ago
Forum topic comment by duffjay 4 days ago
Forum topic comment by kepgnar 4 days ago
Forum topic comment by kepgnar 4 days ago
Forum topic added by 960Design 5 days ago
Forum topic comment by benneta 5 days ago
Forum topic comment by Greg G 1 week ago
Forum topic comment by zerocool 1 week ago
Forum topic added by Rosquillas 1 week ago
Forum topic comment by jbourdon 1 week ago
Mobile Management Provider changed by unwired360 1 week ago
Mobile Management Provider changed by Frank Klotz 1 week ago
Forum topic comment by iCydiaOS 1 week ago
Forum topic comment by jabbajawz 2 weeks ago
Forum topic comment by BryceR 2 weeks ago
Forum topic added by firstname.lastname@example.org 2 weeks ago
Forum topic comment by janeitzey 2 weeks ago
Story added by Aaron Freimark 2 weeks ago