At 08:51 AM 12/5/2011 +0000, Alan Bourke wrote:

> >  It's basically a rootkit on Andriod and iPhones.
> > > This announcement came out on Dec 1 (Thurs). Note my use of term rootkit:
> > > software that hides its presence and allows privileged access to system
> > > data/function.
>
>No it isn't a rootkit - it's not very well hidden apart from anything
>else, is it.

Well, it certainly is not listed as an App. I'm not sure if the researcher 
had to invoke the phone debug mode to see it or not. When I looked at my 
phone services I couldn't find a service that was named ??IQ?? or described 
as "metric" collection. But I'm pretty sure it's there somewhere. Also the 
service itself cannot be halted by a user (at least on some of the models). 
Compare that to "proper" services like my weather app - it's clearly shown 
with the title of the app - the same title that I can find when I'm looking 
at all apps installed on my phone. I know that there are core Android 
services that don't show up in my installed apps list either - but those 
are OS-required services for phone operation. This is an "add-on" app, 
installed/bundled by carriers.

So, to review: it's software that is not necessary for phone operation, 
sitting in a privileged execution space, keylogging user input. Maybe it's 
not hidden as well as typical rootkit software usually is (maybe Android 
and iPhone OSs make that too difficult). But it's doing the things typical 
malware rootkit software does.

>"After reverse engineering CarrierIQ myself, I have seen no evidence
>that they are collecting anything more than what they've publicly
>claimed: anonymized metrics data.  There's a big difference between
>"look, it does something when I press a key" and "it's sending all my
>keystrokes to the carrier!"."

Since this is in quotes I presume this is a statement you've pulled off the 
web, so you may not know the answers to these questions. Reverse 
engineering is not the same as looking at the source code. Watching phone 
debug steps may not yield all operations the software is taking. So, is 
this confidence coming from looking at source code or a quick look at 
operation? Will the app automatically update (since it's sitting in the 
privileged security space, it does not have to obey any user setting)? And 
don't forget the other things that were just as worrisome: seeing 
supposedly encrypted URL strings in plain text, seeing all text messages 
(incoming as well as outgoing), etc. Are you saying those aren't reasons 
for concern?

It was definitely shown that the app is operating in a privileged access 
area to be able to see all the stuff it was seeing. So without looking at 
the source code, there is no way to tell what it really does. The app 
itself could simply detect when the phone is in debug mode and limit it's 
function - just require other special key combos to unlock it's complete 
debug mode for it's own developers.

I believe Sony's rootkit they put on Windows PCs didn't send all keystrokes 
back home either. The point was that it could. And the point was users were 
unaware that it was running. And last but not least, there was concern of 
the software being 'hijacked' at some point by a virus. Sounds pretty 
similar to what we've got here.


>There's definitely a case for making non-technical (i.e. most) phone
>users aware of its presence and letting them opt out, but that doesn't
>make it a rootkit.

Why are you limiting this statement to non-technical users? Do you think 
technical users were already aware of it? Do you think technical users all 
root their phones by default and kill off things they don't like? I doubt 
that most Android/iPhone app developers knew about this either. (now 
there's a cool idea, capture info on apps under development by all 
developers and sell the info to the big boys).

And if your sole reason for ruling this out as a rootkit is because it's 
not completely hidden from the user, well, I don't know if that's a good 
justification. Again, I didn't clearly see it in my list of running 
services (and definitely nothing in my applications list). And I don't see 
anything that talks about metrics in that list. When I have time maybe I'll 
try to root my phone and go look for it that way. But since smartphones are 
relatively new on the scene, and since the term rootkit was originally 
defined for computers, I believe the term rootkit is appropo at this time. 
Maybe a new term will be invented, but from what I see this fits the bill 
well enough as a rootkit.

If you'd feel more comfortable calling it a key logger or general malware, 
or spyware, OK <shrug>. And if you don't call it a rootkit, are you 
satisfied the carrier has made you aware of its existence and function by 
telling you they may occasionally capture anonymous metric data as part of 
your contract? Are you completely satisfied this software is only capturing 
and sending anonymous information?

I'm not. But maybe I'm just too untrusting. After all, no company has 
obtained personal data without clearly getting consent in the past. Have they?

-Charlie

>--
>   Alan Bourke
>   alanpbourke (at) fastmail (dot) fm
>
>
[excessive quoting removed by server]

_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/[email protected]
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to