Risk
3/27/2012
01:09 PM
Connect Directly
RSS
E-Mail
50%
50%

Apple Rejects Apps Over Privacy Concerns

Escalating crackdown begins on apps that use UDID numbers to try and identify unique devices.

10 Top iOS 5 Apps
10 Top iOS 5 Apps
(click image for larger view and for slideshow)
Apple has begun rejecting iOS apps that use the unique identifier built into each iPhone, iPad, or iPod Touch to track the device.

The move appears to have caught some developers by surprise. "Everyone's scrambling to get something into place," Victor Rubba, chief executive of Canadian developer Fluik--publisher of such games as Office Jerk and Plumber Crack--told TechCrunch, which first reported the crackdown by Apple. "We're trying to be proactive and we've already moved to an alternative scheme," he said.

According to TechCrunch, two out of Apple's 10 iOS review teams last week began rejecting any app that used UDID (which stands for "unique device identifier," which is a random, alphanumeric string assigned to every iOS device). "Next week, that will rise to four ... teams, and keep escalating until all 10 teams are turning down apps that are still using UDIDs," it reported.

[ The government is getting more involved in consumer privacy and security issues. Read FTC Calls For Data Privacy Laws. ]

Playhaven, which helps about 1,200 iOS developers monetize their apps, confirmed that some of the developers that it works with first started getting app updates rejected last week by Apple over the use of UDID. As a result, the company's CEO said that there's a scramble now to find an alternative system. While there are many options, such as using a device's Wi-Fi Mac address--which also poses privacy challenges--or adopting OpenUDID, an open source, single-sign-on system that users would opt into, developers have yet to agree on a single new standard.

While the UDID crackdown may make life difficult for the lucrative iOS advertising and gaming ecosystems, it didn't happen overnight. Indeed, Apple first warned in August 2011 that developers should cease tracking users by their device IDs. As of October 2011, with the official release of iOS 5.0, meanwhile, Apple officially said that using UDID to identify individual devices would become depreciated, meaning that it "has been superseded and may become unsupported in the future." Instead, it told developers that they should "create a unique identifier specific to your app."

Pressure on Apple to improve iOS app privacy practices has been steadily growing. Thursday, two ranking members of the House, Henry A. Waxman (D-Calif.) and G. K. Butterfield (D-N.C.), sent letters to 34 businesses that develop social iOS applications, including Facebook, Foursquare, and Twitter, asking them for details about their apps' information-collection practices.

"Following recent reports that apps could collect address book information and photos without notice and consent from users of Apple's mobile devices, the members are seeking to better understand what, if any, information these particular apps gather, what they do with it, and what notice they provide to app users," read the letter. "The members want the information to begin building a fact-based understanding of the privacy and security practices in the app marketplace."

This isn't the first time Apple has faced questions over UDID-related practices. In 2010, privacy advocates began warning that developers could use the UDID to track individual users. Or as a research paper released at the time by Eric Smith, assistant director of information security and networking at Bucknell University, put it: "Privacy and security advocates, personal iPhone owners, and corporate iPhone administrators should be concerned that it would be feasible--and technically, quite simple--for their browsing patterns, app usage, and physical location collected and sold to unintended customers such as advertisers, spouses, divorce lawyers, debt collectors, or industrial spies."

Last year, meanwhile, at least one related lawsuit was filed against Apple, over UDID tracking by app developers. The lawsuit cited a Wall Street Journal investigation which found that half of tested iOS and Android apps sent UDID information back to developers, advertising networks, or gaming syndicates without first gaining a user's authorization or consent.

See the future of business technology at Interop Las Vegas, May 6-10. It's the best place to learn how cloud computing, mobile, video, virtualization, and other key technologies work together to drive business. Register today with priority code CPQCNL07 to get a free Expo Pass or to save 25% on Flex and Conference passes..

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Bprince
50%
50%
Bprince,
User Rank: Ninja
3/30/2012 | 3:22:17 AM
re: Apple Rejects Apps Over Privacy Concerns
I see why this caught some developers off guard, but it was also a longtime coming in a sense as the article notes. @readers: do you think Apple is doing the right thing here by rejecting these apps?
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6306
Published: 2014-08-22
Unspecified vulnerability on IBM Power 7 Systems 740 before 740.70 01Ax740_121, 760 before 760.40 Ax760_078, and 770 before 770.30 01Ax770_062 allows local users to gain Service Processor privileges via unknown vectors.

CVE-2014-0232
Published: 2014-08-22
Multiple cross-site scripting (XSS) vulnerabilities in framework/common/webcommon/includes/messages.ftl in Apache OFBiz 11.04.01 before 11.04.05 and 12.04.01 before 12.04.04 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, which are not properly handled in a (1)...

CVE-2014-3525
Published: 2014-08-22
Unspecified vulnerability in Apache Traffic Server 4.2.1.1 and 5.x before 5.0.1 has unknown impact and attack vectors, possibly related to health checks.

CVE-2014-3563
Published: 2014-08-22
Multiple unspecified vulnerabilities in Salt (aka SaltStack) before 2014.1.10 allow local users to have an unspecified impact via vectors related to temporary file creation in (1) seed.py, (2) salt-ssh, or (3) salt-cloud.

CVE-2014-3587
Published: 2014-08-22
Integer overflow in the cdf_read_property_info function in cdf.c in file through 5.19, as used in the Fileinfo component in PHP before 5.4.32 and 5.5.x before 5.5.16, allows remote attackers to cause a denial of service (application crash) via a crafted CDF file. NOTE: this vulnerability exists bec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.