{"id":13975,"date":"2018-12-02T10:45:08","date_gmt":"2018-12-02T18:45:08","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/12\/02\/news-7742\/"},"modified":"2018-12-02T10:45:08","modified_gmt":"2018-12-02T18:45:08","slug":"news-7742","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/12\/02\/news-7742\/","title":{"rendered":"iTunes Doesn&#8217;t Encrypt Downloads\u2014on Purpose"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5bfc8fffec3c605f7c21c17e\/master\/pass\/itunes_https-02.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Sun, 02 Dec 2018 12:00:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">The push to <\/span>encrypt traffic throughout the web has resulted in <a href=\"https:\/\/www.wired.com\/story\/hotel-airport-wifi-safe\/\">safer and more secure browsing<\/a> across millions of sites. But not everywhere uses the so-called Transport Layer Security that keeps HTTPS-enabled sites safe from prying eyes. Including, it turns out, Apple\u2019s iTunes and iOS App Store infrastructure, which runs its downloads over unencrypted connections.<\/p>\n<p>Typically you can tell when a website uses HTTPS encryption by the <a href=\"https:\/\/www.wired.com\/story\/google-chrome-https-not-secure-label\/\">little green padlock<\/a> on the left side of the URL bar. But not every web portal comes with that sort of visual indicator, which is what led researchers from the privacy products firm Disconnect to iTunes and the App Store.<\/p>\n<p class=\"paywall\">Every time you download an app or an update from the App Store, or a movie, television show, or song from iTunes, it travels over HTTP without TLS. That makes it at least theoretically easier for your Internet Service Provider, a nation-state-hacker, or even just someone on a shared Wi-Fi network to observe all of those interactions. Each unencrypted download also includes an Apple-generated code called a Destination Signaling Identifier, a unique device ID generated by iCloud that changes only periodically. The researchers worry that attackers could use the DSIDs to track someone\u2019s media habits, or the apps they use.<\/p>\n<p class=\"paywall\">\u201cOnce you leave the browser, there\u2019s no insight into what\u2019s over TLS and what\u2019s not,\u201d says Disconnect CTO Patrick Jackson, a former NSA researcher. \u201cThere\u2019s so much you can learn about someone based on when they\u2019re downloading an app, what media they\u2019re into. With those habits they\u2019ve already given up a lot about who they are.\u201d<\/p>\n<p class=\"paywall\">Disconnect researchers submitted a bug report about the behavior to Apple in September, outlining their concerns and noting that anyone can confirm the observations with a network analysis tool that records traffic. Apple replied that the situation isn&#x27;t a bug, and that downloads over HTTP are &quot;expected.&quot; The response points out that though the downloads themselves aren&#x27;t encrypted, other phases of the interaction to initiate and complete a download are, including a metadata transfer before the actual download. Apple also has a process in place to cryptographically confirm the validity and integrity of downloaded files. The company declined to comment further on its use of HTTP for downloads.<\/p>\n<p>&quot;There\u2019s so much you can learn about someone based on when they\u2019re downloading an app.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Patrick Jackson, Disconnect<\/p>\n<p class=\"paywall\">It&#x27;s important to remember that all of this is distinct from internet traffic within the apps themselves, which is generally encrypted. Since 2016, Apple has required its developers to use TLS in the apps they submit to the App Store, althoguh <a href=\"https:\/\/www.wired.com\/2017\/02\/security-news-week-least-76-ios-apps-vulnerable-attacks\/\">noncompliant entries<\/a> have been known to slip in. Apple was also a bit slow to implement TLS for iTunes in general, and expanded its use in 2013 after <a href=\"https:\/\/elie.net\/blog\/web\/apple-finally-turns-https-on-for-the-app-store-fixing-a-lot-of-vulnerabilities#.UTr8YRnRwmL\" target=\"_blank\">researchers raised concerns<\/a>.<\/p>\n<p class=\"paywall\">Though it&#x27;s initially surprising that a company as purportedly pro-privacy as Apple might not offer total HTTPS adoption on its backend, iOS researcher Will Strafach says he thinks the setup serves a specific purpose. By sending the downloads themselves over plaintext HTTP instead of an encrypted connection, system administrators, especially in large enterprise environments, can create a sort of way station to cache large apps and files on their local network for faster distribution. That means they won&#x27;t eat up bandwidth if the app, update, or other file is being downloaded over and over again onto numerous devices. If the connection were encrypted between Apple&#x27;s servers and the devices, that stopover wouldn&#x27;t be possible.<\/p>\n<p class=\"paywall\">&quot;It seems non-standard and odd at first, but I don&#x27;t think there is a security threat here since integrity checks still occur,&quot; Strafach says. He agrees that there are always potential downsides to sending data unencrypted, but notes that an attacker who wants to track what a target is downloading might still be able to do it even with TLS encryption, based on an app&#x27;s size.<\/p>\n<p class=\"paywall\">For its part, the Google Play Store seems to have found a way around this caching mechanism, which is not totally surprising since Google specifically staked out <a href=\"https:\/\/www.wired.com\/2016\/11\/googles-chrome-hackers-flip-webs-security-model\/\">its support for ubiquitous HTTPS<\/a> years ago. A Google spokesperson told WIRED that all Play data and files are transferred via complete HTTPS with an integrity check. Disconnect confirms that it didn&#x27;t see any HTTP-only traffic coming from Google Play.<\/p>\n<p class=\"paywall\">Beyond the specifics of iTunes and the App Store, though, the Disconnect researchers say that gaps in HTTPS implementation are an important issue for apps and web platforms, because most don&#x27;t offer clear indicators for users. Others have sounded the alarm as well; researchers from the University of Cincinnati found in a study conducted last year that <a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2210832716300722#!\" target=\"_blank\">many Android apps<\/a> do not adequately implement TLS because of problems like poor developer practices, server misconfigurations, and documentation issues. Even <a href=\"https:\/\/www.wired.com\/story\/tinder-lack-of-encryption-lets-strangers-spy-on-swipes\/\">popular apps like Tinder<\/a> have lagged behind on adding HTTPS.<\/p>\n<p class=\"paywall\">The web is certainly safer than ever before because of expanded HTTPS adoption. But some parts of it\u2014even big parts like iTunes\u2014aren&#x27;t completely on board, and may never be.<\/p>\n<p class=\"related-cne-video-component__dek\">It\u2019s 2017! It\u2019s time to start using an encrypted messaging app. Why? Using end-to-end encryption means that no one can see what you\u2019re sharing back and forth.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/itunes-downloads-https-encryption\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5bfc8fffec3c605f7c21c17e\/master\/pass\/itunes_https-02.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Sun, 02 Dec 2018 12:00:00 +0000<\/strong><\/p>\n<p>While HTTPS has made the web at large a much safe place, Apple has chosen to forgo it for iTunes and App Store downloads.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714],"class_list":["post-13975","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13975"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13975\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13975"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13975"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}