Mobile menu toggle

Apple to iPhone Passcode Finder App: Get Lost

By

passcode
Photo: citizenmccord.com

Just one day after we posted the top ten most common iPhone passcodes, Apple has yanked the app that generated them. According to the developer, though, he was only following Apple’s own rules.

In an email to Daniel Amitay, Apple Tuesday said the app was “surreptitiously harvesting user passwords.” In his defense, Amitay blogs that his app falls under Section b. of the iTunes EULA. The section states:

b. Consent to Use of Data: You agree that Application Provider may collect and use technical data and related information, including but not limited to technical information about Your device, system and application software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product support and other services to You (if any) related to the Licensed Application. Application Provider may use this information, as long as it is in a form that does not personally identify You, to improve its products or to provide services or technologies to You.

“First, these passcodes are those that are input into Big Brother, not the actual iPhone lock screen pass codes,” Amitay writes. “Second, when the app sends this data to my server, it is literally sending only that number (e.g. “1234”) and nothing else. I have no way of identifying any user or device whatsoever.”

The developer said he’d planned on using the data collected to update his Big Brother app, warning users not to pick the common pass codes.

When we originally posted this story, we originally arched an eyebrow at Amitay’s publication of iOS passcodes, but once we saw it was not only anonymously collected, but data mined from his own app, we felt more comfortable with it. What do you think, though? Did Amitay act disreputably, or was he providing a valuable lesson in passcode security using data he had been given permission by Apple to use as he saw fit?

  • Subscribe to the Newsletter

    Our daily roundup of Apple news, reviews and how-tos. Plus the best Apple tweets, fun polls and inspiring Steve Jobs bons mots. Our readers say: "Love what you do" -- Christi Cardenas. "Absolutely love the content!" -- Harshita Arora. "Genuinely one of the highlights of my inbox" -- Lee Barnett.

26 responses to “Apple to iPhone Passcode Finder App: Get Lost”

  1. twitter-62476719 says:

    The data was collected anonymously + it was used for research purpose. I think instead of banning it, Apple should encourage users to strengthen security.

    But the developer should have proved his point for the anonymous part..not many would have believed I guess.

  2. aga says:

    After reading the article yesterday, I downloaded the app to see if there was any indication that it was monitoring my passcode. There was not. If it were not for your article I would not know. The app is also location aware. That has the potential to inform the developer not only my passcode but also where my phone is!

    I think it right Apple pull the app, at least until the developer makes it clear to user what he is doing, and therefore gains explicit permission from the user.

    I deleted the app as soon as I had run the test. The passcode I inserted for the test was fuku.

    Well done Apple, but I am horrified it got through their testing proceedure. How many other apps are monitoring data that I do not want sending to someone’s server?

  3. prof_peabody says:

    Bottom line is he is an idiot and deserves whatever he gets.  All Apple has done is ban the app, not the developer, so his punishment for what was basically a foolish and insulting stunt, is to make another app.  If it was me making the decision, I would have banned him for life from even submitting anything else. 

  4. prof_peabody says:

    As long as he was doing it in secret though, he can’t really say he has the users ‘explicit assent’ to use the information.  

    His personal intent has nothing really to do with it, it’s just about what laws/rules he broke.  His explanation is nice to have after the fact, but essentially irrelevant in the determination of right/wrong.  

    Ironically, he was probably ‘done in’ by the very tech bloggers he gave the information to in order to self-publicise.  Tech bloggers being what they are, completely exaggerated his story and misrepresented his password harvesting as being system passwords instead of passwords to apps.  

    So if not for the lame and typically inaccurate and hyperbolic reporting of tech bloggers, he might not have caused such a storm or even been noticed by Apple at all. 

  5. ElmerCat says:

    It’s not like the world needed someone to inform the public that “1234” is an insecure password. 

  6. aga says:

    I usually find I agree with your posts prof. Informed and balanced, unlike so much of the knee jerk or just jerk reactions I frequently see. When I spot your icon while scrolling, I always stop to read your informed opinion. Sage!

  7. aga says:

    Most people using the app would have put their system password in.

  8. Jason Burns says:

    I don’t think there was any wrongdoing…  however, I have not reviewed his code.

  9. twitter-62476719 says:

    That is true. I agree

    But you know, even though he is caught, and his app just got kicked out of Apple Store, he still is getting the attention.
    Though I am not very sure whether the attention is really going to help him or not – unless he has other apps – for which then I would suggest that the “Big Brother Camera Security” app became a loss leader for.

  10. twitter-62476719 says:

    If you really watch Apple news closely, you will actually know that Apple themselves watch your every move. While this app only got your passcode, Apple knows your contact #, your location (precise) and almost everything you do

    That is exactly why they were sued in December. And the investigation was carried out by WSJ (Wall Street Journal). Read: http://ow.ly/5iFJQ if you are interested.

    To which Steve Jobs, just as a CEO would, denied: http://www.cultofmac.com/steve

  11. CharliK says:

    If you actually watch the news closely you would know that in fact that is all false.  Apple is not watching your every move and never has. 

  12. GotoCamera says:

    The good folks at GotoCamera have made it a lot simpler to use a surveillance app over your iPhone, without demanding much of your time and money. And what’s more, it’s FREE! This FREE app gives you 1-click access to your cameras, archives, and settings.

    You can get started by creating an account (also free) at http://www.gotocamera.com. Follow the simple set-up instructions and set up your basic webcam to start monitoring your pets, family, home,
    business, and just about anything.

    Since your home monitoring is an extremely personal matter, GotoCamera ensures absolute security with your account. (much more secure than Hotmail, Yahoo, etc).

    Once you’re set-up, you can use your iPhone to view your webcams instantly, see stored recordings and also change your motion detection settings. See what the world’s media have to say about

    GotoCamera:

    VENTUREBEAT: “…a system designed for the everyman…”

    COMPUTER ACTIVE: Gotocamera makes it extremely easy to access your webcam over the internet using a web browser, with none of the rigmarole that network cameras entail.

  13. Jonathan Baize says:

    It doesn’t matter if they had published the list or not. I think it was a pointless exercise. There will always be pins that are the ten most common, regardless of what they are. If everyone who used those pins saw that list and changed their codes, all that would happen is the top ten list would be different than it used to be. Now because this company published the list, those pins are more vulnerable (to an extent). If they hadn’t mined the data and published it, those pins probably would have been fine. That said, anyone who picks 0000 as their pin either doesn’t care if someone else accesses their information, or is entirely stupid.

Leave a Reply