Apple denies giving FBI any iOS device UDIDs, raises questions over AntiSec claims

Apple denies giving FBI any iOS device UDIDs, raises questions over AntiSec claims

Hacking group AntiSec (connected to Anonymous and LulzSec) made some bold claims Tuesday that it had obtained the unique device identifiers (UDIDs) of 12 million iOS devices from an FBI laptop, setting more than a few people on edge. The FBI has already denied that anything was stolen, but Apple has gone one step further to argue that it had no involvement. Spokeswoman Natalie Kerris tells AllThingsD that Apple hasn’t given UDIDs to the FBI “or any organization” — suggesting that either AntiSec or the FBI isn’t telling the whole story of what data emerged and where. Even if there are real UDIDs floating around, Kerris adds that they don’t necessarily pose much danger. She notes that programming hooks in iOS 6 will provide an alternative to UDID for device-specific data, and that apps will eventually be forbidden from using the older identifiers altogether. While the truth in the situation is hard to pin down, the technical reality doesn’t leave much risk that our iPads and iPhones will be compromised. At least, not after this month.

Filed under: , , ,

Apple denies giving FBI any iOS device UDIDs, raises questions over AntiSec claims originally appeared on Engadget on Wed, 05 Sep 2012 14:03:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceAllThingsD  | Email this | Comments

FBI denies Apple Device ID leak

Earlier this morning, we reported that the AntiSec hacker group claimed to have stolen personal information of Apple device owners from an FBI agent’s notebook – amounting to 12 million or so Device IDs, while allegedly leaking out a million of those as proof. It is now the FBI’s turn to refute such allegations, where FBI officials claim that the bureau never requested for and has never been in possession of the database that was hacked. I guess it is a matter of words now, and an issue of public perception. Who do you think is the better poker player here, and whose bluff do you call?

FBI officials did, however, say that they are unable to verify the validity of the data which AntiSec released, and instead issued a warning to computer users to be more vigilant and careful whenever clicking on links as they might end up clicking on malicious links that lead to malware being installed on your machine.

By Ubergizmo. Related articles: Apple UDID Leak: Why Does It Matter?, 1 million Apple Device IDs leaked, claim hackers,

Apple UDID Leak: Why Does It Matter?


Ealier today, AntiSec hackers claimed that they had been able to breach into FBI servers and gain access to a list of 12 million Apple UDIDs. The group leaked 1 million UDIDs online, claiming them to be a part of the list.

The debate on the web has so far focused on how could the group have possibly laid its hands on the data? AntiSec’s claims that it was obtained from hacked FBI machines isn’t backed by any definitive proof. Nonetheless, if the claim is indeed true, this is a very worrisome revelation for privacy activists as well as the common users. (more…)

By Ubergizmo. Related articles: PSN Down: Sony Knew Defenses Were Obsolete (Expert), 1 million Apple Device IDs leaked, claim hackers,

Now there’s irony: Hacked FBI agent the posterboy for hacker collaboration

The FBI agent whose hacked laptop gave up a 12m-strong database of Apple device user details was the star of a promo encouraging hackers to get involved with the agency, it’s been revealed in an ironic twist to the tale. Special Agent Christopher K. Stangl was featured in a 2009 recruitment video titled “Wanted by the FBI: Cyber Security Experts,” in which he called on those “with computer science backgrounds” to get involved with the federal agency.

“Hello. My name is special agent Chris Stangl of the New York city field office of the FBI. Today more than ever we need individuals with computer science backgrounds to join the FBI. From a special agent that investigates cyber crime or the computer scientist that is embedded in the cyber squad that analyzes malware” Chris Stangl, FBI

Unsurprisingly, Stangl’s video on Facebook has seen renewed interest since AntiSec claimed it was the agent’s Dell Vostro laptop from which it extracted the database. “No way this guy should be entrusted with the personal info of 12 million people” one comment on the social site reads.

According to AntiSec, a remote exploit performed on the agent’s notebook granted access to select files saved to the desktop. Among those files was a database containing more than 12m records from iOS devices, including UDID identifiers, full names, phone numbers, postal addresses, and more.

Not all of the records had all of the data attached, and it’s unclear where exactly the database was sourced. Some suggestions have included previously-seized developer servers snatched as part of FBI raids, though the filename used implied that the National Cyber-Forensics & Training Alliance was involved somehow.

The FBI – and Stangl himself – have declined to comment on the security breach.

[via Forbes]


Now there’s irony: Hacked FBI agent the posterboy for hacker collaboration is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


1 million Apple Device IDs leaked, claim hackers

According to the AntiSec hacker group, they claim to hold more than 12 million Apple iOS Unique Device IDs, in addition to other personal information from device owners. As a move to back up such a claim, the AntiSec hacker group is said to have released slightly more than a million Apple Device IDs to the masses. This particular expose was unveiled on Pastebin, which is said to hold a detailed description of the method that the hacking group were said to have obtained the IDs from the FBI.

AntiSec claims, “During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of “NCFTA_iOS_devices_intel.csv” turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc.” (more…)

By Ubergizmo. Related articles: Apple freezes iCloud password change over the phone, iCloud account of Mat Honan hacked,

12m iPhone and iPad ID database hacked from FBI claims AntiSec

Hack collective AntiSec claims to have broken into an FBI agent’s laptop and extracted what turned out to be a 12m long list of personal details from Apple devices, alleging that the federal agency had been tracking users. The document supposedly contains Unique Device Identifiers (UDID), usernames, name and type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, and other content; AntiSec has released 1,000,001 UDIDs (along with the device name/type) as a proof of hack.

According to the group, a remote exploit on the Dell laptop used by one FBI supervisor managed to pull out several files saved to the desktop. One of those files was a .CSV database containing a huge number of Apple device details, though no other mention of the purpose of that file was discovered on the machine.

“During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java, during the shell session some files were downloaded from his Desktop folder one of them with the name of “NCFTA_iOS_devices_intel.csv” turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted [sic] on many parts. no other file on the same folder makes mention about this list or its purpose” AntiSec

However, that hasn’t stopped speculation as to the FBI’s intentions with the data. AntiSec suggests that it could be the basis of a tracking project, using Apple UDID codes to monitor individual users; it also claims that “it’s the right moment to release this knowing that Apple is looking for alternatives [to UDID].”

Not all of the records have all of the database fields filled in – some are limited to ZIP code – and it’s unclear where the FBI sourced the data from initially. The filename includes “NCFTA”, which is potentially the National Cyber-Forensics & Training Alliance, an organization which “functions as a conduit between private industry and law enforcement with a core mission to identify, mitigate and neutralize cyber crime” and which “manages the collection and sharing of intelligence” between those groups.

Although app developers have access to some of the data included, it’s apparently rare that they would have full postal address details for individual users.

[via TNW; via Hacker News]


12m iPhone and iPad ID database hacked from FBI claims AntiSec is written by Chris Davies & originally posted on SlashGear.
© 2005 – 2012, SlashGear. All right reserved.


Modder builds $150 open-source thermal imaging camera to help insulate his house (video)

Modder builds $150 thermal imaging camera to help insulate his house video

Modder Andy Rawson thinks he’s found the secret to turning smartphones into super-cheap thermal imaging hardware. Inspired by his quest to find leaks in his old home and the high cost of professional gear, he set about building his own. A 64-zone temperature sensor connects to his iPhone via the dock, overlaying the data onto his camera display. He’s planning to open-source the $150 hardware, and an Android variant of the hardware is currently in the works — although details for both are currently thin on the ground, you can see his announcement video after the break.

Continue reading Modder builds $150 open-source thermal imaging camera to help insulate his house (video)

Filed under: , ,

Modder builds $150 open-source thermal imaging camera to help insulate his house (video) originally appeared on Engadget on Mon, 03 Sep 2012 17:50:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceInstructables  | Email this | Comments

Guild Wars 2 hacked, players asked to be vigilant

NCsoft has issued advice to players of Guild Wars 2 to be “vigilant on receiving emails related to game accounts,” this coming after ArenaNet confirmed that there has been a bunch of hacked Guild Wars 2 accounts. This bit of news is rather surprising considering how Guild Wars 2 was up and running just a day ago, although there were those who pre-booked the game and had a 3-day headstart over the rest of the crowd. Over the weekend, a group of players resorted to airing their grievances on different online forums that their Guild Wars 2 account appeared to have been compromised.

There were some who experienced missing items, while others had it worse – being locked out of the game completely, and this is not even due to you being Iranian with a World of Warcraft account. So far, ArenaNEt’s support team have responded to some individual emails, one of them stating, “You are correct, your account was hacked. Thank you for submitting a ticket — that will expedite the process! (And I’m sorry that happened to you.)”

It seemed that there is a possibility of these hacked accounts being accessed by gold sellers, according to ArenaNet, with no firm confirmation on how widespread the hacking problem had become.

By Ubergizmo. Related articles: USB Video Out via Windows Phone 7, Guild Wars 2 live and running,

USB Video Out via Windows Phone 7

Thanks to a bunch of passionate and dedicated developers at XDA, here we are with a video above that depicts the wonders of experiencing USB Video Out for the Windows Phone 7 mobile operating system. It does seem to work in a butter smooth manner that is nothing short of impressive, but the setup process can be said to be quite the hassle since you will need a custom ROM installed beforehand that includes the special video out package. Not only that, you will also have to call upon the help of custom drivers, manually installing them on your computer in the process which could be a slight annoyance if you are running on a copy of 64-bit Windows 7.

Folks who do not know how to flash custom ROMs will just have to sit out on this particular feature, while others with the technical know how and intestinal fortitude would find this to be a neat trick to have up your sleeve, especially when you want to perform presentations right from your smartphone, or to play back recorded video on the spot.

By Ubergizmo. Related articles: Windows Phone 7 smartphones get tethering hack, Windows Phone Marketplace app-security cracked,

IKEA Kitchen Handle Hacked Into iPad Stand

While holding your iPad in your hands in typically the way you use a tablet, sometimes it’s nice to set it in a stand so you can watch movies, read recipes, or use it as a photo frame. This simple hack allows you to easily prop up your iPad on a flat surface. It’s pretty smart, and won’t cost you much.

kitchen handle ipad stand

You wouldn’t think that a curtain rod and a kitchen handle could be matched together to make an iPad stand, but Theo Gough made it work. Hot glue was used to mate them, and the stand works in landscape and portrait mode. The items used for this hack are no longer stocked at IKEA, but other similar pieces could probably be used.

kitchen handle ipad stand front

This stand doesn’t just work for iPads. Most tablets will be able to fit in this minimal stand.

kitchen handle ipad stand naked

[via IKEA Hackers]