Security Experts:

Apple's iOS 6 to Enforce Strict Data Permissions

A story published by online Mac OS-related news site Mac Rumors outlines a new requirement for applications running on iOS 6 – strict privacy enforcement. The requirements were explained in the release notes for iOS 6, and seem to address some of the privacy issues Apple has had to contend with lately.

According to the Mac Rumors report, starting with iOS 6, apps will be required to get explicit user permission before they can access calendars, reminders, contacts, and photos.

iOS 6 Logo“For contact, calendar, and reminder data, your app needs to be prepared to be denied access to these items and to adjust its behavior accordingly. If the user has not yet been prompted to allow access, the returned structure is valid but contains no records. If the user has denied access, the app receives a NULL value or no data. If the user grants permission to the app, the system subsequently notifies the app that it needs to reload or revert the data,” the developer notes explain.

Such privacy features would have been useful to users of the LinkedIn application that was found to be harvesting calendar information. The information collection was part of an opt-in feature, but most users were unaware of the data collection or that they could opt out. However, going forward, issues such as this should be prevented.

In related news, Apple recently released a document that examines the security technology and features implemented within iOS itself. While none of the information is new or unknown, the guide is noteworthy, if only because it offers an official basic list of best practices to organizations wishing to deploy Apple devices. Some of the items discussed in the guide will be discussed this summer at the Black Hat Security Conference in Las Vegas. Dallas De Atley, manager of the Apple platform security team, is slated to give a talk on iOS security according to conference materials.

Source: MacRumors.com  

Steve Ragan is a security reporter and contributor for SecurityWeek. Prior to joining the journalism world in 2005, he spent 15 years as a freelance IT contractor focused on endpoint security and security training.