Did you know that when you press the home button of your iPhone to go back to the home screen, it captures the previous app opened and animates that image to zoom out and show you the back the home screen? Why should you be concern as an iPhone user?...Security.
Your iPhone is watching you.
If you've got an iPhone, pretty much everything you have done on your handset has been temporarily stored as a screenshot that hackers or forensics experts could eventually recover, according to a renowned iPhone hacker who exposed the security flaw in a webcast Thursday.
While demonstrating how to break the iPhone's passcode lock in a webcast, iPhone hacker and data-forensics expert Jonathan Zdziarski explained that the popular handset snaps a screenshot of your most recent action -- regardless of whether it's sending a text message, e-mailing or browsing a web page -- in order to cache it. This is purely for aesthetic purposes: When an iPhone user taps the Home button, the window of the application you have open shrinks and disappears. In order to create that shrinking effect, the iPhone snaps a screenshot, Zdziarski said.
The phone presumably deletes the image after you close the application. But anyone who understands data is aware that in most cases, deletion does not permanently remove files from a storage device. Therefore, forensics experts have used this security flaw to gather evidence against criminals convicted of rape, murder or drug deals, Zdziarski said.
"There's no way to prevent it," Zdziarski said during the webcast. "I'm kind of divided on it. I hope Apple fixes it because it's a significant privacy leak, but at the same time it's been useful for investigating criminals."
And though the handset only snaps screenshots when users press the Home button, Zdziarski said this is only one way forensics experts collect evidence. Other methods include taking data from the iPhone's keyboard cache, Safari cache, Google Maps lookups and so on. Experts and hackers can also recover deleted photos or e-mails from months ago.
In addition to exposing the privacy leaks, Zdziarski walked webcast attendees through the steps required to bypass an iPhone's passcode in order to gain full access to it.
The method didn't look all that easy, but Zdziarski said it could take as little as 60 seconds to break the iPhone's security. To make a long story short, the process involved using Pwnage to create a custom firmware bundle and tweaking it with rather arcane methods to delete the iPhone's passcode protection. Once set up, the technique can be used over and over on different iPhones, Zdziarski added.
Despite the intricacy of the method, Zdziarski stressed that anybody with the time and digital sophistication has the ability to break the iPhone's security.
"This flaw can only be exploited by somebody with physical access to a device, but your phone could get into the hands of someone with more malicious intent," he said. "Obviously, you don't want to trust any of your data to a passcode."
A full recording of the webcast, hosted by O'Reilly, will be available shortly. We'll post a link as soon as it's available.
Those interested in learning how to break iPhone security can pre-order Zdziarski's book iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets.
Apple did not return phone calls for comment.