Saturday, July 20, 2013

How vulnerable is your smartphone data stored - THE WORLD


article by e-mail

A backup function saves the main smartphone data This is handy -., but at the same time also quite uncertain

How vulnerable is your smartphone data stored

The most important user data from a smartphone are copied, saved and stored on a server. Very few people know of this backup feature. This is not completely harmless.

The most important user data from a smartphone are copied, saved and stored on a server. Very few people know of this backup feature. This is not completely harmless. From


In light of NSA’s debate win backup capabilities of modern smartphones a new meaning: the units place – so that the user wishes – copies of all important user data on the server operating system from manufacturer . Thanks to the copy in the server cloud contact, photo albums, SMS archives, and user account data will be retained even if a device is stolen, the software crashes or irrevocably makes the hardware limp.

This protection is activated when Google’s Nexus devices based on the Android operating system in-house from the first start. Apple’s iOS devices ask for when ordering, if user data to be backed up in the iCloud. Microsoft’s devices dominate the fuse on Microsoft’s cloud servers from the factory.

The catch: The data are partly stored unencrypted on the servers of the company – and which are in the United States. Theoretically can also employees of the company or armed with a search notice NSA employee access it. That was the beginning of the week Mica Lee of the U.S. civil rights organization EFF, he rejected the Google developer suggests that at least passwords and login data for the WLAn networks of users are stored unencrypted on Google’s servers.

eavesdropping, simply

Especially against the backdrop of accusations of industrial espionage against the U.S. intelligence is controversial: Who knows the data to dial in to an encrypted wireless network companies can eavesdrop unnoticed there. Whether Google secures further data such as logins for email accounts of the third party on its servers, is not known.

security experts Heise Online, however, point out that companies frequently use the same password for network logins and email accounts – this is called single sign on process. Users can only circumvent the problem by “Back up my data” feature off on their Android devices quite, but so also do without the useful backup function.

even goes a step further smartphone manufacturer Blackberry: According to the analysis from security experts Frank Rieger by the German Chaos Computer Club transfer devices with the new BlackBerry 10 operating system without warning or notice automatically all the e-mail server log data to the Canadians. Better yet, shortly after the establishment of a new account on a BlackBerry could track how a Canadian Blackberry server use the login data to verify the e-mail account Rieger.

Even at Apple, the NSA can read along

“BlackBerry collects the credentials of all e-mail accounts to its users, so they are accessible to Canadian authorities. And Canada is a member of the” Five Eyes “, the extremely narrow cooperation under which the NSA not only with the British GCHQ – recently made famous by the TEMPORA wiretapping program – working together but also with the corresponding sniffer services Australia, New Zealand and Canada, “Rieger commented on his blog


who wants to avoid the transfer, must be considered when setting up the mail account on his BlackBerry in a hidden input from the keyboard “Advanced” menu uncheck the “Diagnostics option – Send and usage data “remove


Apple Remains: The Group indicates that all account and login data of iPhone users are coded with a device-specific 256-bit key. The dial-in details so the backups can be used only on the device on which the backup was originally created – Apple has it not zugrif. This is different with backup files for SMS logs or contact details. Here also, the NSA could read along again, so she brings the proper search warrant.

© Axel Springer AG 2013. All rights reserved

No comments:

Post a Comment