iPhone backdoor: Apple denies claims

Comment on this story


IOL pic sep10 apple iphone preview

Associated Press

Apple says people spent more than $10 billion in its app store last year, on apps such as "Minecraft," "Angry Birds Star Wars" and "Sleep Cycle" alarm clock.

San Francisco - Apple has never worked with the US National Security Agency and is unaware of efforts to target its smartphones, the company said in response to reports that the spy agency had developed a system to hack into and monitor iPhones.

Germany's Der Spiegel reported this week that a secretive unit of the NSA, which is under fire for the extent and depth of its spying programs around the world, makes specialised gear and software to infiltrate and monitor a plethora of computing devices, including mobile phones.

The report included an NSA graphic dated 2008 that outlined a system in development called DROPOUTJEEP, described as a “software implant” that allows infiltrators to push and pull and retrieve data from iPhones such as contact lists. Der Spiegel referred to it as a “trojan,” or malware that helps hackers get into protected systems.

The report, which surfaced on Sunday, did not suggest that Apple had cooperated with the US spying agency on so-called backdoors.

In a statement, the NSA did not comment on any specific allegations but said that its interest “in any given technology is driven by the use of that technology by foreign intelligence targets.”

“The United States pursues its intelligence mission with care to ensure that innocent users of those same technologies are not affected,” the agency added.

The iPhone was a relatively innovative gadget in 2008. It hit the market in 2007 and proceeded to help revolutionize the mobile phone industry.

“Apple has never worked with the NSA to create a backdoor in any of our products, including iPhone. Additionally, we have been unaware of this alleged NSA program targeting our products,” the company said in a statement.

“We will continue to use our resources to stay ahead of malicious hackers and defend our customers from security attacks, regardless of who's behind them.” - Reuters

Hungry for more scitech news? Sign up for our daily newsletter


sign up
 
 

Comment Guidelines



  1. Please read our comment guidelines.
  2. Login and register, if you haven’ t already.
  3. Write your comment in the block below and click (Post As)
  4. Has a comment offended you? Hover your mouse over the comment and wait until a small triangle appears on the right-hand side. Click triangle () and select "Flag as inappropriate". Our moderators will take action if need be.

     

Join us on

IOL-Social networks IOL-Social networks IOL-Social networks IOL-Social networks