{"id":6517,"date":"2014-02-25T06:41:26","date_gmt":"2014-02-25T11:41:26","guid":{"rendered":"http:\/\/www.opensource.im\/?p=6517"},"modified":"2014-02-25T06:41:26","modified_gmt":"2014-02-25T11:41:26","slug":"apple-encryption-mistake-puts-many-desktop-applications-at-risk","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/apple-encryption-mistake-puts-many-desktop-applications-at-risk.php","title":{"rendered":"Apple encryption mistake puts many desktop applications at risk"},"content":{"rendered":"<p><p>    A subtle mistake    in how Apple implemented a basic encryption feature that    shields data from snooping also affects many desktop    applications that rely on the code, according to a noted    security researcher.  <\/p>\n<p>    Apple released a    patch on    Friday for its iOS mobile platform but has yet to fix the    problem for desktop computers, which often have several    applications that rely on the faulty code library, called        Secure Transport.  <\/p>\n<p>    Ashkan Soltani,    an independent privacy and security researcher, said many other    Apple and non-Apple applications are affected.  <\/p>\n<p>    Security    researcher Ashkan Soltani said several other desktop    applications, include Apples Mail, FaceTime and Calendar, use    a code library that could allow an attacker to steal data.    (Click to enlarge.)  <\/p>\n<p>    Those include    Apples Mail, FaceTime, Calendar, Keynote, the Safari browser,    iBooks and its Software Update applications. It would also    appear to affect third-party applications, such as the desktop    Twitter application and possibly VPN (virtual private network)    connections, depending on their configurations, Soltani    said.  <\/p>\n<p>    The Secure    Transport library, which handles setting up an encrypted    connection for many applications, was contained in iOS 6 and up    and OSX versions 10.9 and up, Soltani said via email.  <\/p>\n<p>    Most websites    handling sensitive personal data use SSL (Secure Sockets Layer)    or TLS (Transport Layer Security), which establishes an    encrypted connection between a server and a persons computer.    If an attacker intercepts the data, it is unreadable.  <\/p>\n<p>    Apples mistake    in Secure Transport allows an attacker to perform a    man-in-middle attack, and supply fake data that makes it appear    an authentic web service has been cryptographically    verified.  <\/p>\n<p>    This enables an    adversary to masquerade as coming from a trusted remote    endpoint, such as your favorite webmail provider and perform    full interception of encrypted traffic between you and the    destination server,     wrote Alex Radocea, senior engineer with the computer    security firm CrowdStrike, on Friday. CrowdStrike analyzed    Apples patch for iOS after it was released.  <\/p>\n<p>    The flaw is    deeply buried in a line of code, wrote    Adam Langley, a software engineer at Google, on his personal    blog.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.pcworld.com\/article\/2100680\/apple-encryption-mistake-puts-many-desktop-applications-at-risk.html\" title=\"Apple encryption mistake puts many desktop applications at risk\">Apple encryption mistake puts many desktop applications at risk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> A subtle mistake in how Apple implemented a basic encryption feature that shields data from snooping also affects many desktop applications that rely on the code, according to a noted security researcher. Apple released a patch on Friday for its iOS mobile platform but has yet to fix the problem for desktop computers, which often have several applications that rely on the faulty code library, called Secure Transport. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-6517","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/6517"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=6517"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/6517\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=6517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=6517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=6517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}