This isn’t going to help the reputation of Apple Maps in any way, shape, or form. According to the Alaska Dispatch, people using Apple Maps in Fairbanks Alaska to get themselves to the local airport are being directed onto an airport runway:
At least twice in the past three weeks, drivers from out of town who followed the directions on their iPhones not only reached airport property, but also crossed the runway and drove to the airport ramp side of the passenger terminal.
“These folks drove past several signs. They even drove past a gate. None of that cued them that they did something inappropriate,” said Melissa Osborn, chief of operations at the Fairbanks airport.
Now some common sense should come into play here to say that going onto an active runway at an airport is a bad idea. However, Apple Maps should not be directing them onto the runway in the first place. Thus it’s a #fail for Apple Maps. What makes the situation worse is this:
The problem was supposed to have been fixed promptly, according to reports form the Apple legal department to the attorney general’s office and Department of Transportation and Public Facilities, but it hasn’t been, Spear and Osborn said.
“We asked them to disable the map for Fairbanks until they could correct it, thinking it would be better to have nothing show up than to take the chance that one more person would do this,” Osborn said.
A “lot of legal speak” ensued, Spear said.
On Sept. 20, it happened again. The airport has since closed the aircraft access route to Taxiway Bravo from the Float Pond Road.
A Notice to Airmen has been issued and new barricades are in place. Airport officials said they will not be removed until it is clear the maps are corrected. Spear and Osborn said that Apple officials have assured the state the problem will be fixed by Wednesday. As of Tuesday afternoon, the app continued to direct passengers to use Taxiway Bravo to access the airport.
Apple Maps hasn’t been on my radar screen for a while as it hasn’t done anything like this recently. But seeing as iOS 7 just appeared along with new iPhones, the timing for this sort of thing to happen isn’t exactly optimal for Apple. Hopefully they fix this today. Otherwise, this will be a story that stays in the news for reasons that are all bad for Apple.
Researcher Says “Backdoors” Closed In iOS 8…… Mostly
Posted in Commentary with tags Apple, iOS, Security on September 10, 2014 by itnerdYou might remember that security researcher Jonathan Zdziarski caused the planet to freak out because he found “backdoors” in iOS that could allow anyone to snoop on unsuspecting users. He then release a proof of concept video showing how easy they were to exploit and Apple’s response left most unimpressed.
Fast forward to today. Zdziarski has had a chance to look at iOS 8 and here’s what he had to say:
After some preliminary testing, it appears that a number of vulnerabilities reported in my recent research paper and subsequent talk at HOPE/X have been addressed by Apple in iOS 8. The research outlined a number of risks for wireless remote surveillance, deep logical forensics, and other types of potential privacy intrusions fitting certain threat models such as high profile diplomats or celebrities, targeted surveillance, or similar threats.
But before you celebrate, read this:
While closing off the file_relay service greatly improves the data security of the device, one mechanism that hasn’t been addressed adequately is the ability to obtain a handle to application sandboxes across a USB connection, even while the device is locked. This capability is used by iTunes to access application data, but also presents a vulnerability: commercial forensics tools can (and presently do) take advantage of this mechanism to dump the third party application data from a seized device, if they have access to (or can generate) a valid pairing record with the device. For example, if you are detained at an airport or arrested and both your laptop and your phone is seized, or if your phone is seized unlocked (without a laptop present), a number of forensics tools including those from Oxygen, Cellebrite, AccessData, Elcomsoft and others are capable of dumping third party application data across USB. It is not designed to be protected with a backup password either, putting the data at risk of being intercepted in cleartext. Because a pair record can unlock the data-protection encryption using the EscrowBag included in the record, this data can be dumped if the device has not been shut down or rebooted since it was last used. Still, because this information is only accessible with physical possession of the device (and no longer wirelessly), the risk is less than in prior versions of iOS.
If you’re an iOS user, you should read his entire post. It’s very enlightening. In the meantime, I wonder if Apple will have any comment on if and how they plan to address what he found.
Leave a comment »