Risk
3/27/2012
01:09 PM
50%
50%

Apple Rejects Apps Over Privacy Concerns

Escalating crackdown begins on apps that use UDID numbers to try and identify unique devices.

10 Top iOS 5 Apps
10 Top iOS 5 Apps
(click image for larger view and for slideshow)
Apple has begun rejecting iOS apps that use the unique identifier built into each iPhone, iPad, or iPod Touch to track the device.

The move appears to have caught some developers by surprise. "Everyone's scrambling to get something into place," Victor Rubba, chief executive of Canadian developer Fluik--publisher of such games as Office Jerk and Plumber Crack--told TechCrunch, which first reported the crackdown by Apple. "We're trying to be proactive and we've already moved to an alternative scheme," he said.

According to TechCrunch, two out of Apple's 10 iOS review teams last week began rejecting any app that used UDID (which stands for "unique device identifier," which is a random, alphanumeric string assigned to every iOS device). "Next week, that will rise to four ... teams, and keep escalating until all 10 teams are turning down apps that are still using UDIDs," it reported.

[ The government is getting more involved in consumer privacy and security issues. Read FTC Calls For Data Privacy Laws. ]

Playhaven, which helps about 1,200 iOS developers monetize their apps, confirmed that some of the developers that it works with first started getting app updates rejected last week by Apple over the use of UDID. As a result, the company's CEO said that there's a scramble now to find an alternative system. While there are many options, such as using a device's Wi-Fi Mac address--which also poses privacy challenges--or adopting OpenUDID, an open source, single-sign-on system that users would opt into, developers have yet to agree on a single new standard.

While the UDID crackdown may make life difficult for the lucrative iOS advertising and gaming ecosystems, it didn't happen overnight. Indeed, Apple first warned in August 2011 that developers should cease tracking users by their device IDs. As of October 2011, with the official release of iOS 5.0, meanwhile, Apple officially said that using UDID to identify individual devices would become depreciated, meaning that it "has been superseded and may become unsupported in the future." Instead, it told developers that they should "create a unique identifier specific to your app."

Pressure on Apple to improve iOS app privacy practices has been steadily growing. Thursday, two ranking members of the House, Henry A. Waxman (D-Calif.) and G. K. Butterfield (D-N.C.), sent letters to 34 businesses that develop social iOS applications, including Facebook, Foursquare, and Twitter, asking them for details about their apps' information-collection practices.

"Following recent reports that apps could collect address book information and photos without notice and consent from users of Apple's mobile devices, the members are seeking to better understand what, if any, information these particular apps gather, what they do with it, and what notice they provide to app users," read the letter. "The members want the information to begin building a fact-based understanding of the privacy and security practices in the app marketplace."

This isn't the first time Apple has faced questions over UDID-related practices. In 2010, privacy advocates began warning that developers could use the UDID to track individual users. Or as a research paper released at the time by Eric Smith, assistant director of information security and networking at Bucknell University, put it: "Privacy and security advocates, personal iPhone owners, and corporate iPhone administrators should be concerned that it would be feasible--and technically, quite simple--for their browsing patterns, app usage, and physical location collected and sold to unintended customers such as advertisers, spouses, divorce lawyers, debt collectors, or industrial spies."

Last year, meanwhile, at least one related lawsuit was filed against Apple, over UDID tracking by app developers. The lawsuit cited a Wall Street Journal investigation which found that half of tested iOS and Android apps sent UDID information back to developers, advertising networks, or gaming syndicates without first gaining a user's authorization or consent.

See the future of business technology at Interop Las Vegas, May 6-10. It's the best place to learn how cloud computing, mobile, video, virtualization, and other key technologies work together to drive business. Register today with priority code CPQCNL07 to get a free Expo Pass or to save 25% on Flex and Conference passes..

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
3/30/2012 | 3:22:17 AM
re: Apple Rejects Apps Over Privacy Concerns
I see why this caught some developers off guard, but it was also a longtime coming in a sense as the article notes. @readers: do you think Apple is doing the right thing here by rejecting these apps?
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.