SlideShare una empresa de Scribd logo
1 de 31
A Day in the Life of Your Mobile Phone 
(or: how your phone hates you) 
Rob Barnes, CISSP®, CSSLP® 
Software Security Architect 
The College Board 
#YourPhoneHatesYou 
Strengthening Cybersecurity Defenders #ISC2Congress
Reality: 
Your phone hates you. 
3 #ISC2Congress 
How we like to think our 
phones protect our privacy:
Things you do every day 
4 #ISC2Congress 
» Check email 
» Check weather 
» Check stocks 
» Use social media 
» Take photos 
» Post photos 
» Buy coffee 
» Sync device with phone 
» Join Wi-Fi access points 
» Send email 
» Navigate with map 
» Research restaurants 
» Place hands-free calls 
» Browse websites 
» (Plus all the things your kids 
do that you don’t know 
about)
Things your phone does every day 
Collects location information 
(Divulges location information.) 
Collects personal information 
(Divulges personal information.) 
Collects usage information 
(Divulges usage information.) 
5 #ISC2Congress
6 #ISC2Congress 
Does it matter? 
97% of mobile applications access personal 
address books, social media pages and 
connectivity options like Bluetooth or Wi-Fi. 
86% of mobile applications are insecure. 
But it doesn’t matter. 100% of what 
you do reveals something about you. 
http://www8.hp.com/us/en/hp-news/press-release.html?id=1528865#.VA2ntvlr6Cc 
http://threatpost.com/insecure-applications-we-are-84-percent-120711/75961
Don’t think like an attacker. 
7 #ISC2Congress 
Think like: 
a marketer. 
a parent. 
a forensic investigator.
Location Privacy: Using the device 
8 #ISC2Congress
Location Privacy: Browsing 
This is where I spent my summer, as told by a web service: 
9 #ISC2Congress
When you (or an app) access a web page or web service, 
it sends the following information: 
Browser version 
(a two-for-one bonus!) 
10 #ISC2Congress 
Firmware version = iOS 
6.1.4 
Belongs to Verizon FiOS in Chantilly, 
VA 
Device make and model 
(OLD!) 
Location and Device Privacy 
108.28.101.205 
08/Sep/2014:14:18:45 -0400 
Mozilla/5.0 (iPhone; CPU iPhone OS 6_1_4 like Mac OS X) 
Version/6.0 Mobile/10B350 Safari/8536.25
Location Privacy: Using apps 
Are you sure you’re just checking the weather? As a 
bonus to you, Weather Channel shares your usage 
statistics! 
» http://or1.sc.omtrdc.net/b/ss/twciiphonescroll/0 . . . 
» Resolution=640x1136 
» AppID=iPhone 6.2.1 (420573) 
» TimeSinceLaunch=58 
XY 
» Z 
DeviceName=iPhone6,1 
» action=weather:data-refresh-requested 
» OSVersion=iOS 7.1.2 
» CarrierName=Verizon 
» actionTracking=weatherdatarefreshrequested 
» ts=1408722639 (which translates to 8/22/2014 11:50:39 AM) 
XY 
Z 
11 #ISC2Congress
Location Privacy: Using apps 
Sure enough, you agreed 
to all of this. 
12 #ISC2Congress
Why should you care? 
“Big Data” marketing can infer: 
13 #ISC2Congress 
When you’re at home 
When you’re at work 
When you’re driving
…and when you’re not 
Why should you care? 
14 #ISC2Congress 
An attacker can infer: 
When you’re at home
Device Privacy: Using Wi-Fi 
Hi! Can I please join your network? 
My MAC address is 
DC:9B:9C:xx:xx:xx! 
Sure! 
(Ah…so you’re an Apple 
device…) 
Thanks! Oh, also, my name is 
“Rob Barnes’s iPhone 5”! 
OK, thanks. Welcome! 
(Welcome, indeed, “Rob Barnes”!) 
15 #ISC2Congress
Device Privacy: Using Wi-Fi 
Hey, it’s “Rob Barnes’s iPhone 5” 
again. Sorry to bother you. What is 
the IP address for 
email.mycompany.com? 
It’s 209.48.123.456. 
16 #ISC2Congress
Why should you care? 
17 #ISC2Congress 
Dear Rob Barnes: 
Congratulations! Your iPhone 5 is eligible 
for a free upgrade! Please click here for 
details, or visit your local Atlanta Apple 
retail store. 
This message was sent to 
rbarnes@mycompany.com. Click here to 
unsubscribe from future emails. 
Sincerely, 
The Apple Customer Loyalty Team
Device Privacy: Using Wi-Fi 
18 #ISC2Congress 
belkin.d36 
belkin.d36.guests 
HoundNet_Guest 
xfinitywifi 
DUKE 
LCPS-OPEN 
Residence_GUEST 
Marriott_Guest 
Kimpton 
Marriott_CONFERENCE 
Dunn_Bros_337! 
Carlton 
My stored Wi-Fi networks 
(com.apple.wifi.plist)
Device Privacy: Using Wi-Fi 
19 #ISC2Congress 
belkin.d36 
belkin.d36.guests 
HoundNet_Guest 
xfinitywifi 
DUKE 
LCPS-OPEN 
Residence_GUEST 
Marriott_Guest 
Kimpton 
Marriott_CONFERENCE 
Dunn_Bros_337! 
Carlton 
<key>lastAutoJoined</key> 
<date>2014-07-13T06:33:08</date> 
<key>SSID_STR</key> 
<string>Marriott_Guest</string> 
<key>Strength</key> 
<real>0.9104790687561035</real> 
<key>CAPABILITIES</key> 
<key>NOISE</key> 
<integer>91</integer> 
<key>isWPA</key> 
<integer>0</integer> 
<key>CaptiveNetwork</key> 
<boolean>true</boolean> 
<key>lastJoined</key> 
<date>2014-07-12T16:22:16</date>
Device Privacy: MAC 
Ever get the feeling that you’re being watched? 
This recycling bin is tracking 
you. 
http://qz.com/112873/this-recycling-bin-is-following-you/ 
20 #ISC2Congress
Device Privacy: MAC 
Ever get the feeling that you’re being watched? 
Your supermarket is 
tracking you. 
http://www.moxieretail.com/storage/heat_map2.jpg 
21 #ISC2Congress
Why should you care? 
Loyalty 
Card Yo 
u 
22 #ISC2Congress
A picture is worth1,000 words… 
http://sophosnews.files.wordpress.com/2012/12/mcafee-exif.jpg?w=640 
23 #ISC2Congress
…and some EXIF data as well… 
Exif Image Size 470 × 353 
Make Apple 
Camera Model Nam 
iPhone 4 
e 
Orientation Horizontal (normal) 
Date/Time Original 2012:12:03 12:26:00 
Create Date 2012:12:03 12:26:00 
Flash Off, Did not fire 
GPS Latitude Ref North 
GPS Latitude 15.658167 degrees 
GPS Longitude Ref West 
GPS Longitude 88.992167 degrees 
GPS Altitude Ref Above Sea Level 
GPS Altitude 7.152159468 m 
Resolution 72 pixels/inch 
24 #ISC2Congress
…and some geolocation, too. 
25 #ISC2Congress
Usage Privacy: Using email 
26 #ISC2Congress 
iOS mail header: 
X-Mailer: iPhone Mail (10B350) 
[10B350 = iOS 6.1.4] 
Android mail header: 
X-Mailer: YahooMailAndroidMobile/3.1.3
Usage Privacy: Using Bluetooth 
http://cnet3.cbsistatic.com/hub/i/r/2013/08/22/2cbcf893-6de6-11e3-913e-14feb5ca9861/resize/620x/e604bfe06973383ec0c3ca6323c35487/142B6607.jpg 
27 #ISC2Congress
How to Protect Yourself 
28 #ISC2Congress 
» Location Services 
• Turn it off 
• Use it selectively 
» Browsing 
• Use Onion browser (or other Tor equivalent) 
• Maintain awareness 
» Wi-Fi 
• Do not connect to untrusted networks 
– (But if you do, assume everything you do is monitored) 
– (Also, tell your device to “forget” the network when you’re 
done.)
How to Protect Yourself 
29 #ISC2Congress 
» EXIF Data 
• iOS 
– TrashExif 
– Metadata Cut 
• Android: 
– EXIF Stripper 
– Photo Editor
How to Protect Yourself 
30 #ISC2Congress 
» MAC Tracking 
• iOS 
– Upgrade to iOS 8 
• Android 
– Pry-Fi (requires rooting the device) 
» Bluetooth 
• Delete any data from synced devices 
– This becomes increasingly applicable with iOS 8’s HealthKit
The End. 
31 #ISC2Congress 
Rob Barnes 
rbarnes@collegeboard.org 
ww.linkedin.com/in/robertdbarnes 
#YourPhoneHatesYou

Más contenido relacionado

La actualidad más candente

Month Report Webinar - How The Most Successful Apps Monetize Their User Base
Month Report Webinar - How The Most Successful Apps Monetize Their User BaseMonth Report Webinar - How The Most Successful Apps Monetize Their User Base
Month Report Webinar - How The Most Successful Apps Monetize Their User Base
Distimo
 
紙copi Night 2009.12.04
紙copi Night 2009.12.04紙copi Night 2009.12.04
紙copi Night 2009.12.04
Isshu Rakusai
 
I os7 infographic_gw
I os7 infographic_gwI os7 infographic_gw
I os7 infographic_gw
Gregg Wheeler
 

La actualidad más candente (7)

Month Report Webinar - How The Most Successful Apps Monetize Their User Base
Month Report Webinar - How The Most Successful Apps Monetize Their User BaseMonth Report Webinar - How The Most Successful Apps Monetize Their User Base
Month Report Webinar - How The Most Successful Apps Monetize Their User Base
 
iPhone Jailbreaking
iPhone JailbreakingiPhone Jailbreaking
iPhone Jailbreaking
 
iPhone cake and eat it too, 211me
iPhone cake and eat it too, 211meiPhone cake and eat it too, 211me
iPhone cake and eat it too, 211me
 
Relentless Mobile Threats to Avoid
Relentless Mobile Threats to AvoidRelentless Mobile Threats to Avoid
Relentless Mobile Threats to Avoid
 
紙copi Night 2009.12.04
紙copi Night 2009.12.04紙copi Night 2009.12.04
紙copi Night 2009.12.04
 
I os7 infographic_gw
I os7 infographic_gwI os7 infographic_gw
I os7 infographic_gw
 
Android Wear Applications in C# with Xamarin
Android Wear Applications in C# with XamarinAndroid Wear Applications in C# with Xamarin
Android Wear Applications in C# with Xamarin
 

Similar a A Day in the Life of your Mobile Phone (or: How Your Phone Hates You)

Multi channel advantage
Multi channel advantageMulti channel advantage
Multi channel advantage
Dipesh Mukerji
 
Your Mobile Internet Device
Your Mobile Internet DeviceYour Mobile Internet Device
Your Mobile Internet Device
Christian Nord
 
Cisco connect jabber client update
Cisco connect   jabber client updateCisco connect   jabber client update
Cisco connect jabber client update
Vitor Costa
 
SKOPOS Market Insight - GIMRA - Mobile, Finance, MFX
SKOPOS Market Insight - GIMRA - Mobile, Finance, MFXSKOPOS Market Insight - GIMRA - Mobile, Finance, MFX
SKOPOS Market Insight - GIMRA - Mobile, Finance, MFX
skoposuk
 
10 reasons why now is the perfect time to get serious about the mobile web
10 reasons why now is the perfect time to get serious about the mobile web10 reasons why now is the perfect time to get serious about the mobile web
10 reasons why now is the perfect time to get serious about the mobile web
Tijs Vrolix
 

Similar a A Day in the Life of your Mobile Phone (or: How Your Phone Hates You) (20)

Developing for Mobility
Developing for MobilityDeveloping for Mobility
Developing for Mobility
 
Mobile Trends 2012
Mobile Trends 2012Mobile Trends 2012
Mobile Trends 2012
 
Multi channel advantage
Multi channel advantageMulti channel advantage
Multi channel advantage
 
Business Email Hosting
Business Email HostingBusiness Email Hosting
Business Email Hosting
 
Js On Mobile Devices
Js On Mobile DevicesJs On Mobile Devices
Js On Mobile Devices
 
NYSL Technology Workshop: Mobile Internet (2009)
NYSL Technology Workshop: Mobile Internet (2009)NYSL Technology Workshop: Mobile Internet (2009)
NYSL Technology Workshop: Mobile Internet (2009)
 
Debunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSecDebunking the Top 5 Myths About Mobile AppSec
Debunking the Top 5 Myths About Mobile AppSec
 
BigDesign 2014 - What's Before Mobile First?
BigDesign 2014 - What's Before Mobile First?BigDesign 2014 - What's Before Mobile First?
BigDesign 2014 - What's Before Mobile First?
 
PhoneGap Session at Multi-Mania.be 2013
PhoneGap Session at Multi-Mania.be 2013PhoneGap Session at Multi-Mania.be 2013
PhoneGap Session at Multi-Mania.be 2013
 
Developing Enterprise-Grade Mobile Applications
Developing Enterprise-Grade Mobile ApplicationsDeveloping Enterprise-Grade Mobile Applications
Developing Enterprise-Grade Mobile Applications
 
Your Mobile Internet Device
Your Mobile Internet DeviceYour Mobile Internet Device
Your Mobile Internet Device
 
5 Compelling Reasons to Upgrade Your Old Phone System NOW
5 Compelling Reasons to Upgrade Your Old Phone System NOW5 Compelling Reasons to Upgrade Your Old Phone System NOW
5 Compelling Reasons to Upgrade Your Old Phone System NOW
 
Welcome To The Mobile World
Welcome To The Mobile WorldWelcome To The Mobile World
Welcome To The Mobile World
 
ICSFTS_Chapter1-8.pdf
ICSFTS_Chapter1-8.pdfICSFTS_Chapter1-8.pdf
ICSFTS_Chapter1-8.pdf
 
Cisco connect jabber client update
Cisco connect   jabber client updateCisco connect   jabber client update
Cisco connect jabber client update
 
SKOPOS Market Insight - GIMRA - Mobile, Finance, MFX
SKOPOS Market Insight - GIMRA - Mobile, Finance, MFXSKOPOS Market Insight - GIMRA - Mobile, Finance, MFX
SKOPOS Market Insight - GIMRA - Mobile, Finance, MFX
 
Mobile JavaScript
Mobile JavaScriptMobile JavaScript
Mobile JavaScript
 
10 reasons why now is the perfect time to get serious about the mobile web
10 reasons why now is the perfect time to get serious about the mobile web10 reasons why now is the perfect time to get serious about the mobile web
10 reasons why now is the perfect time to get serious about the mobile web
 
Mobile is slow - Over the Air 2013
Mobile is slow - Over the Air 2013Mobile is slow - Over the Air 2013
Mobile is slow - Over the Air 2013
 
Smartphone Reporting Done Smarter
Smartphone Reporting Done SmarterSmartphone Reporting Done Smarter
Smartphone Reporting Done Smarter
 

Último

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 

A Day in the Life of your Mobile Phone (or: How Your Phone Hates You)

  • 1.
  • 2. A Day in the Life of Your Mobile Phone (or: how your phone hates you) Rob Barnes, CISSP®, CSSLP® Software Security Architect The College Board #YourPhoneHatesYou Strengthening Cybersecurity Defenders #ISC2Congress
  • 3. Reality: Your phone hates you. 3 #ISC2Congress How we like to think our phones protect our privacy:
  • 4. Things you do every day 4 #ISC2Congress » Check email » Check weather » Check stocks » Use social media » Take photos » Post photos » Buy coffee » Sync device with phone » Join Wi-Fi access points » Send email » Navigate with map » Research restaurants » Place hands-free calls » Browse websites » (Plus all the things your kids do that you don’t know about)
  • 5. Things your phone does every day Collects location information (Divulges location information.) Collects personal information (Divulges personal information.) Collects usage information (Divulges usage information.) 5 #ISC2Congress
  • 6. 6 #ISC2Congress Does it matter? 97% of mobile applications access personal address books, social media pages and connectivity options like Bluetooth or Wi-Fi. 86% of mobile applications are insecure. But it doesn’t matter. 100% of what you do reveals something about you. http://www8.hp.com/us/en/hp-news/press-release.html?id=1528865#.VA2ntvlr6Cc http://threatpost.com/insecure-applications-we-are-84-percent-120711/75961
  • 7. Don’t think like an attacker. 7 #ISC2Congress Think like: a marketer. a parent. a forensic investigator.
  • 8. Location Privacy: Using the device 8 #ISC2Congress
  • 9. Location Privacy: Browsing This is where I spent my summer, as told by a web service: 9 #ISC2Congress
  • 10. When you (or an app) access a web page or web service, it sends the following information: Browser version (a two-for-one bonus!) 10 #ISC2Congress Firmware version = iOS 6.1.4 Belongs to Verizon FiOS in Chantilly, VA Device make and model (OLD!) Location and Device Privacy 108.28.101.205 08/Sep/2014:14:18:45 -0400 Mozilla/5.0 (iPhone; CPU iPhone OS 6_1_4 like Mac OS X) Version/6.0 Mobile/10B350 Safari/8536.25
  • 11. Location Privacy: Using apps Are you sure you’re just checking the weather? As a bonus to you, Weather Channel shares your usage statistics! » http://or1.sc.omtrdc.net/b/ss/twciiphonescroll/0 . . . » Resolution=640x1136 » AppID=iPhone 6.2.1 (420573) » TimeSinceLaunch=58 XY » Z DeviceName=iPhone6,1 » action=weather:data-refresh-requested » OSVersion=iOS 7.1.2 » CarrierName=Verizon » actionTracking=weatherdatarefreshrequested » ts=1408722639 (which translates to 8/22/2014 11:50:39 AM) XY Z 11 #ISC2Congress
  • 12. Location Privacy: Using apps Sure enough, you agreed to all of this. 12 #ISC2Congress
  • 13. Why should you care? “Big Data” marketing can infer: 13 #ISC2Congress When you’re at home When you’re at work When you’re driving
  • 14. …and when you’re not Why should you care? 14 #ISC2Congress An attacker can infer: When you’re at home
  • 15. Device Privacy: Using Wi-Fi Hi! Can I please join your network? My MAC address is DC:9B:9C:xx:xx:xx! Sure! (Ah…so you’re an Apple device…) Thanks! Oh, also, my name is “Rob Barnes’s iPhone 5”! OK, thanks. Welcome! (Welcome, indeed, “Rob Barnes”!) 15 #ISC2Congress
  • 16. Device Privacy: Using Wi-Fi Hey, it’s “Rob Barnes’s iPhone 5” again. Sorry to bother you. What is the IP address for email.mycompany.com? It’s 209.48.123.456. 16 #ISC2Congress
  • 17. Why should you care? 17 #ISC2Congress Dear Rob Barnes: Congratulations! Your iPhone 5 is eligible for a free upgrade! Please click here for details, or visit your local Atlanta Apple retail store. This message was sent to rbarnes@mycompany.com. Click here to unsubscribe from future emails. Sincerely, The Apple Customer Loyalty Team
  • 18. Device Privacy: Using Wi-Fi 18 #ISC2Congress belkin.d36 belkin.d36.guests HoundNet_Guest xfinitywifi DUKE LCPS-OPEN Residence_GUEST Marriott_Guest Kimpton Marriott_CONFERENCE Dunn_Bros_337! Carlton My stored Wi-Fi networks (com.apple.wifi.plist)
  • 19. Device Privacy: Using Wi-Fi 19 #ISC2Congress belkin.d36 belkin.d36.guests HoundNet_Guest xfinitywifi DUKE LCPS-OPEN Residence_GUEST Marriott_Guest Kimpton Marriott_CONFERENCE Dunn_Bros_337! Carlton <key>lastAutoJoined</key> <date>2014-07-13T06:33:08</date> <key>SSID_STR</key> <string>Marriott_Guest</string> <key>Strength</key> <real>0.9104790687561035</real> <key>CAPABILITIES</key> <key>NOISE</key> <integer>91</integer> <key>isWPA</key> <integer>0</integer> <key>CaptiveNetwork</key> <boolean>true</boolean> <key>lastJoined</key> <date>2014-07-12T16:22:16</date>
  • 20. Device Privacy: MAC Ever get the feeling that you’re being watched? This recycling bin is tracking you. http://qz.com/112873/this-recycling-bin-is-following-you/ 20 #ISC2Congress
  • 21. Device Privacy: MAC Ever get the feeling that you’re being watched? Your supermarket is tracking you. http://www.moxieretail.com/storage/heat_map2.jpg 21 #ISC2Congress
  • 22. Why should you care? Loyalty Card Yo u 22 #ISC2Congress
  • 23. A picture is worth1,000 words… http://sophosnews.files.wordpress.com/2012/12/mcafee-exif.jpg?w=640 23 #ISC2Congress
  • 24. …and some EXIF data as well… Exif Image Size 470 × 353 Make Apple Camera Model Nam iPhone 4 e Orientation Horizontal (normal) Date/Time Original 2012:12:03 12:26:00 Create Date 2012:12:03 12:26:00 Flash Off, Did not fire GPS Latitude Ref North GPS Latitude 15.658167 degrees GPS Longitude Ref West GPS Longitude 88.992167 degrees GPS Altitude Ref Above Sea Level GPS Altitude 7.152159468 m Resolution 72 pixels/inch 24 #ISC2Congress
  • 25. …and some geolocation, too. 25 #ISC2Congress
  • 26. Usage Privacy: Using email 26 #ISC2Congress iOS mail header: X-Mailer: iPhone Mail (10B350) [10B350 = iOS 6.1.4] Android mail header: X-Mailer: YahooMailAndroidMobile/3.1.3
  • 27. Usage Privacy: Using Bluetooth http://cnet3.cbsistatic.com/hub/i/r/2013/08/22/2cbcf893-6de6-11e3-913e-14feb5ca9861/resize/620x/e604bfe06973383ec0c3ca6323c35487/142B6607.jpg 27 #ISC2Congress
  • 28. How to Protect Yourself 28 #ISC2Congress » Location Services • Turn it off • Use it selectively » Browsing • Use Onion browser (or other Tor equivalent) • Maintain awareness » Wi-Fi • Do not connect to untrusted networks – (But if you do, assume everything you do is monitored) – (Also, tell your device to “forget” the network when you’re done.)
  • 29. How to Protect Yourself 29 #ISC2Congress » EXIF Data • iOS – TrashExif – Metadata Cut • Android: – EXIF Stripper – Photo Editor
  • 30. How to Protect Yourself 30 #ISC2Congress » MAC Tracking • iOS – Upgrade to iOS 8 • Android – Pry-Fi (requires rooting the device) » Bluetooth • Delete any data from synced devices – This becomes increasingly applicable with iOS 8’s HealthKit
  • 31. The End. 31 #ISC2Congress Rob Barnes rbarnes@collegeboard.org ww.linkedin.com/in/robertdbarnes #YourPhoneHatesYou

Notas del editor

  1. What this presentation is not about: BYOD Mobile application security Carrier vectors What this presentation is about: Privacy (and the distinction from security) Awareness of fingerprints you leave Awareness of information you store How to protect yourself How to use your phone more responsibly Points: Privacy is equal parts forensics and penetration testing Not everything here is specific to mobile devices, but the implications can be different Location Phone capabilities are different from laptop Phone calls Pictures Contacts …
  2. Who knows you’re here? Your manager? Your co-worker? Your spouse? Verizon, AT&T, Comcast, Google, Yahoo, Facebook, Twitter? They know where you are because of what you’re doing with your phone.
  3. Consider all the things you do throughout the day.
  4. Whatever your transactions are, your phone collects and divulges it. All of it. Consider Redbox and Wreck-it-Ralph.
  5. We use mobile devices because of the convenience and utility. Most apps are insecure, but it doesn’t matter. There is a principle named for the French forensic scientist Dr. Edmond Locard called the “Locard Exchange Principle.” Wherever you go and whatever you do, you leave something behind, such as DNA. Remember Wreck-it-Ralph? Consider the Redbox example, where an app collects name, address, credit card, and location. We provide it willingly to companies, but what do they do with it? Redbox forms a business partnership with Verizon, and oh by the way, Verizon was hit this summer with a record fine by the FCC for $7M for using your private information in unauthorized and undisclosed ways.
  6. When thinking about privacy, it’s perhaps to think like a marketer, parent, or forensic investigator. Attackers often have to work hard to get personal information. But you volunteer this information anyway, but how are companies using it?
  7. Mobile devices are constantly emitting beacons searching for cell towers, wireless networks, and Bluetooth devices. Consider my visit to Tucson over the summer. It was hot. I went to the pool-twice. And my phone knows about it. However, this information stays on the phone. Think like a parent or an investigator!
  8. Consider another example of location awareness. This map represents every access to a web service. Web services know where you are. Also consider the use of synchronized browsers: is your Google Maps search showing up on your home computer? (similar to photo streaming)
  9. IP resolution service example: http://ipinfo.io But what about apps? They typically use web services as well, which is just another HTTP request. Companies whose apps are constantly used (Facebook, weather, etc.) can establish patterns of usage to determine where you live and work.
  10. Apps do the same thing—they call web services. Consider IP sourced-edits in Wikipedia. Full URL: http://or1.sc.omtrdc.net/b/ss/twciiphonescroll/0/OIP-4.1.0/s18379378?AQB=1&ndh=1&t=00/00/0000 00:00:00 0 240&c.&pe=lnk_o&pev2=weatherdatarefreshrequested&a.&Resolution=640x1136&AppID=iPhone 6.2.1 (420573)&TimeSinceLaunch=58&DeviceName=iPhone6,1&action=weather:data-refresh-requested&OSVersion=iOS 7.1.2&CarrierName=Verizon&.a&actionTracking=weatherdatarefreshrequested&.c&ts=1408722639&aid=431F9AD4E6BB4875-36C94AF890F3FE33&ce=UTF-8&pe=lnk_o&pageName=iPhone/420573&pev2=AMACTION:weather:data-refresh-requested&AQE=1
  11. Seems mostly innocuous. But what is it doing with the data?
  12. Facebook and other frequently used services might use this data for direct marketing. Wikipedia records and displays IP address for content changes (ref: Diebold changes from Diebold, Snowden changes from US Senate). Browser fingerprinting.
  13. Home automation can reveal a great deal about patterns.
  14. Apple MAC address range is DC:9B:9C:00:00:00 - DC:9B:9C:FF:FF:FF
  15. Connected devices use the Wi-Fi router’s DNS lookup.
  16. Just by using a wireless access network, your profile can be cobbled together and used against you.
  17. At least this information is just stored on the device. Or is it? Where are backups stored? How are they protected? Is the backup included with service-managed backups?
  18. Autojoining known networks.
  19. Tracking MAC addresses is like tracking people with video surveillance.
  20. MAC tracking is already being done in supermarkets to create customer traffic heatmaps. MAC tracking improves on camera-based tracking because it can identify unique devices (you) and perhaps your identity. Where is the milk located? Where is the produce? Supermarkets can use heatmaps to analyze shopper traffic.
  21. Your device can often be associated with some other factor that when together can identify you with your phone. In one example, a company compiled a profile of a customer whom it expected was pregnant and sent coupons to the house of a man who didn’t realize his daughter was pregnant.
  22. Case study: John McAfee Wanted in Belize Picture taken in Guatemala
  23. Consider pictures of kids pictures of white boards at work locations
  24. Smart phones can include an X-Mailer header that divulges device details.
  25. Do you use hands-free in the car? Have you transferred the contact information to the car? Do you still have the car? Did you wipe the contact information from your car?
  26. Get a Faraday bag.