logo image

Apple Logs Your iMessage Contacts and Could Share Them With Police Essay

Apple's iMessage had a few security holes in  and  that potentially leaked photos and contacts, respectively. Though quickly patched, they are a reminder that the company faces a never-ending arms race to shore up its security to keep malicious hackers and government  out. But that doesn't mean they will always be able to keep it private.

A report from The Intercept  that iMessage conversation metadata gets logged in Apple's servers, which the company could be compelled to turn over to law enforcement by court order. While the content of those messages remains encrypted and out of the police's hands, these records list time, date, frequency of contact and limited location information.

When an iOS user types in a phone number to begin a text conversation, their device pings servers to determine whether the new contact uses iMessage. If not, texts are sent over SMS and appear in green bubbles, while Apple's proprietary data messages appear in blue ones. Allegedly, they log all of these unseen network requests.

But those also include time and date stamps along with the user's IP address, identifying your location to some degree, according to The Intercept. Like the phone logs of yore, investigators could legally request these records and Apple would be obliged to comply. While the company  that iMessage was end-to-end  in 2013, securing user messages even if law enforcement got access, Apple said nothing about metadata.

Apple confirmed to The Intercept 

Need essay sample on "Apple Logs Your iMessage Contacts and Could Share Them With Police"? We will write a custom essay sample specifically for you for only $ 13.90/page

that it does comply with subpoenas and other legal requests for these exact logs, but maintained that message content is still kept private. Its commitment to user security isn't really undermined by these illuminations — phone companies have been giving this information to law enforcement for decades — but it does illustrate what they can and cannot protect. While the company  FBI requests for backdoor iPhone access earlier this year and then introduced a wholly redesigned file system with a built-in unified  method on every device, Apple can't keep authorities from knowing when and where you text people.

Can’t wait to take that assignment burden offyour shoulders?

×
Sorry, but copying text is forbidden on this website. If you need this or any other sample, please register

Already on Businessays? Login here

No, thanks. I prefer suffering on my own
Sorry, but copying text is forbidden on this website. If you need this or any other sample register now and get a free access to all papers, carefully proofread and edited by our experts.
Sign in / Sign up
No, thanks. I prefer suffering on my own
Not quite the topic you need?
We would be happy to write it
Join and witness the magic
Service Open At All Times
|
Complete Buyer Protection
|
Plagiarism-Free Writing

Emily from Businessays

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out https://goo.gl/chNgQy

We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy