Apple UDIDs Leaked By Anonymous Came From Florida Firm, Not FBI

Summary: Apple didn't cough up its users' device unique identifier codes to the FBI, nor did the FBI's lax security lead to the codes leaking to the Web. Apparently -- get this -- the hackers lied.

A small Florida-based publishing firm told NBC News in an exclusive interview that it was in fact the source of the million-record database of unique Apple device identification numbers that were leaked by hackers associated with Anonymous last week.

The entrance by the posting organization's us president, BlueToad's John DeHart, is inconsistent with statements made by the hacktivist combined that it took the requirements from the U.S. Government Institution of Research, and exonerating Apple company from statements it offered it requirements to the government police officers device.

DeHart said there was a "98 % correlation" between its own data source of system requirements to the ones published by the online cyber criminals on Sept 3.

"That's 100 % level of assurance, it's our details," DeHart informed the information organization.

To recap:

AntiSec online cyber criminals, a loose-knit team associated with the broader Unknown combined, stated last week that it had pilfered more than 12 thousand Apple company iPhone and iPad system identifiers from a FBI computer. The team then published 1 thousand and one system requirements to Pastebin, often used by online cyber criminals to discuss uses and designers to discuss value as well.

iPhone and iPad exclusive system identifier (UDID) are often used by designers for statistics, but they can also be used to recognize customers through monitoring and probably risk users' comfort.

The FBI quickly said there was "no evidence" to recommend the details had been thieved from one of the bureau's computer systems. Questions stayed open to whether or not the FBI were informing the whole tale, or if Apple company had passed over the details as per a police officers ask for.

Normally-secretive Apple company, often silent in the face of debate, split its regular peaceful atmosphere and said in a declaration to AllThingsD that: "The FBI has not asked for this details from Apple company, nor have we offered it to the FBI or any company."

The Cupertino, CA.-based technological innovation massive also said it would do away with UDIDs in the next-generation iPhone and iPad software and would "soon be prohibiting the use of UDID" by designers.

At that point it was, "he said, she said." Nobody realized where the details had come from. Until now.

DeHart said an outside specialist notified the posting company that the details may have come from BlueToad, an app-building company that provides its services to 6,000 marketers, which the company then notified police officers.

He said, "we started to take actions to come forward, clear the history and take liability for this," including that he was "pretty apologetic" to the people who trusted the company to keep the details protected.

An Apple company representative informed NBC News that while, "developers do not have entry to users' username and security account details, security account details or bank cards details, unless a individual particularly elects to provide that details to the designer," a company such as BlueToad, "would have entry to a customer's system details such as UDID, system name and type."

BlueToad said in a community declaration that it has "fixed the vulnerability" and is wanting to make sure that another violation doesn't happen. The company is dealing with "an separate and nationally-recognized security guarantee company" to assist its initiatives.

So there are two things we know: Apple company and the FBI are back on the Xmas cards details of the average person, and online cyber criminals obviously lie. Who knew? 

Share this article :
Support :. Copyright © 2015. The Technology Zone - All Rights Reserved
Template Created By Gourav Kashyap Proudly Powered By Blogger