Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

Apple: Stop Tracking iOS Users By Device IDs

Documentation changes to the iOS 5 beta tell developers to track users via their own applications, not the serial number associated with each device.

11 iPad Apps For Better Collaboration
Slideshow: 11 iPad Apps For Better Collaboration
(click image for larger view and for slideshow)
Apple has instructed third-party developers to cease tracking iPhone, iPad, and iPod Touch users via the unique serial number associated with each one of its hardware devices. Widespread use of the tracking technique had raised privacy concerns and triggered multiple lawsuits against Apple.

In particular, new language in the documentation for iOS 5--the forthcoming version of Apple's mobile OS--informs developers that tracking via the unique device identifier (UDID) has become deprecated. That's developer-speak for "we no longer encourage you to use this feature."

"Instead, create a unique identifier specific to your app," according to Apple's documentation. As that suggests, applications will still be able to track users. But deprecating UDID would make it more difficult for businesses that track user behavior online, such as advertising firms, to track a single person's behavior across different applications. Furthermore, since Apple vets all applications--via its AppStore "walled garden" model--it will be able to enforce UDID restrictions.

Does Apple's restriction on the use of UDID by third-party developers mean that Apple itself will cease using UDID? Apple wasn't immediately available to respond to that question.

Research suggests that use of UDID for tracking individual Apple iOS device users is widespread. According to a 2010 study, for example, 68% of tested iPhone apps, when they launched, shared a device's UDID with a server--connected to the application developer, or with an advertising network--while 18% returned unknown, encrypted data back to a server.

Apple has seen multiple lawsuits arise from its use of UDID. For example, the company was sued in a January class action lawsuit for transmitting data to third parties that could be used to track device users without their consent, allegedly in violation of state and federal privacy laws.

According to the related complaint, "Apple allows the UDID to be displayed to application developers, and allows the downloaded applications access to the user's browsing history each time the user clicks on an advertisement or application appearing on their mobile device." Furthermore, noted the complaint, users can't block the use of UDID by iOS applications.

Apple's iOS documentation change was reported by TechCrunch Friday, which obtained a copy of Apple's developer documentation, which is only available to registered developers.

In discussions there, developers reacted in various ways, with some noting that after a feature becomes deprecated, it typically doesn't disappear for at least a few more versions of an OS. Others, however, lamented that without UDID it would be more difficult to track users who installed their applications on multiple devices, perhaps in violation of licensing agreements. Some, however, noted that UDID wasn't the only way to track a device, and acknowledged that UDID had been widely abused as a user-tracking technique.

Information about iOS 5, which has been in beta since June, has been trickling out, most notably via developers sharing their questions and comments via online forums. Apple has been releasing a new build of the beta OS about every two weeks. The final, production version, is due out this fall.

Automation and orchestration technologies can make IT more efficient and better able to serve the business by streamlining common tasks and speeding service delivery. In this report, we outline the potential snags and share strategies and best practices to ensure successful implementation. Download our report here. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24368
PUBLISHED: 2021-06-20
The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin WordPress plugin before 7.1.18 did not sanitise or escape its result_id parameter when displaying an existing quiz result page, leading to a reflected Cross-Site Scripting issue. This c...
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.