Despite what mobile operating system vendors say, it’s the OS flaws that put everyone at risk.

Adam Ely, COO, Bluebox

October 9, 2015

4 Min Read

To say jailbroken devices aren’t a real problem is a strong statement but a true one. There are good reasons to use devices that allow us to remove pre-installed applications, modify the operating system, and install our own tools and patches to improve the security of the operating environment. It’s what we do today on our servers and PCs, and if done properly, there’s no reason it shouldn’t also happen on mobile.

Yet mobile OS vendors continue to tell us jailbroken devices are riskier than their unmodified counterparts when, in fact, jailbreaking is not the risk—it’s the lack of inherent operating system security, a la Windows 98. Mobile OS vendors have done little to protect the internals once the thin layer of security is broken. It’s why mobile operating system vendors try to prevent users from jailbreaking their phones and removing that meager single layer of protection. Not even when we give users administrative rights on their corporate PCs are we completely vulnerable to outside attacks, yet with mobile operating systems, we are by design.

Why are we willing to tolerate the ineffective single line of defense security model on mobile devices? We don’t accept this for any other device in our organization; it’s time we hold mobile to the same standards.

When jailbreaking is the only solution
A seldom-mentioned truth is that it’s not just the end users who are jailbreaking devices. Sometimes it’s done under the control of corporate IT, which has to resort to jailbreaking devices to make them sustainable within the organization after they lose manufacturer and carrier support. For example, if a company has rolled out a fleet of 50,000 devices to their mobile workforce, what happens if the mobile device vendor or carrier stops supporting the hardware or operating system version? Is it reasonable to expect the enterprise to bear the expense of a mandatory software upgrade, or to replace the device?

It’s a significant problem for enterprises. Mobile-powered workforces need to frequently choose between running outdated, vulnerable devices with little management capability or customizing them in order to continue supporting their fleet and get a return on their initial investment. This is due to the economics of mobile in the enterprise being primarily driven by the vendor and carrier, using consumer models that result in great profits for them and bad ROI for us. This problem is not as notable with PC deployments, even though PC operating systems also lose support over time, because it happens much less frequently and allows for a better ROI.

Jailbroken or not, it’s the OS that’s the problem
It’s true that jailbroken devices have the potential to leave organizations with more open, possibly less secure devices. But restricting use to non-jailbroken devices isn’t the answer to security either. These seemingly secure devices have their own set of problems. If they were secure, why would iOS have needed over 100 security fixes from iOS 8 to 9? And how would malware be able to infect a device via AirDrop? The operating system isn’t magic -- it has its own inherent security issues.

My team at Bluebox Security loves to break things—it’s why we all got into security. We routinely break mobile app security measures just to show that it’s possible. From banking apps that leave hidden admin menus allowing us to query the corporate infrastructure in inappropriate ways, to breaking the in-app logic of apps to turn off surge pricing or bypass subscription charges, we’re able to steal service, data, and access within apps on off-the-shelf, fully-patched, non-jailbroken devices. But many app developers have bought into the idea that these non-jailbroken devices are secure as they are. As a result, security measures aren’t put in place to properly test mobile apps during the development cycle—leaving users at risk when using apps of every kind, from travel to banking.

Forget about trust
Despite these known issues, as consumers and enterprise technology providers alike, we have bought into relying on the security of mobile operating systems. We cling to the belief that a thin layer of defense will protect us and our data. But the truth is that the operating system’s security doesn’t extend to the apps where all of the valuable data lies.

To address this risk, we must approach mobile security from the point of zero trust for the device and app environment and instead apply safeguards around the things that matter: apps, data, identity and access. Under this model, it’s not game-over because a device is rooted. That’s an outdated conclusion that, if valid, means we should all give up now and turn our data over to the bad guys because they’ve already won. Risk modeling our mobile ecosystem as developers, administrators, and defenders is important and often not done because of false assumptions. I encourage you to instead assume the operating system security is not trustable and build protections with this zero trust model assumption. We owe it to the end user to provide security that is worthy of their trust.

About the Author(s)

Adam Ely

COO, Bluebox

Adam Ely is the founder and COO of Bluebox. Prior to this role, Adam was the CISO of the Heroku business unit at Salesforce where he was responsible for application security, security operations, compliance, and external security relations. Prior to Salesforce, Adam led security and compliance at TiVo and held various security leadership roles within The Walt Disney Company where he was responsible for security operations and application security of Walt Disney web properties including ABC.com, ESPN.com, and Disney.com.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights