{"id":10752,"date":"2015-03-10T19:09:50","date_gmt":"2015-03-10T23:09:50","guid":{"rendered":"http:\/\/mjtsai.com\/blog\/?p=10752"},"modified":"2015-03-11T00:00:27","modified_gmt":"2015-03-11T04:00:27","slug":"the-cias-xcode","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2015\/03\/10\/the-cias-xcode\/","title":{"rendered":"The CIA&rsquo;s Xcode"},"content":{"rendered":"<p><a href=\"https:\/\/firstlook.org\/theintercept\/2015\/03\/10\/ispy-cia-campaign-steal-apples-secrets\/\">Jeremy Scahill and Josh Begley<\/a> (via <a href=\"https:\/\/twitter.com\/UMAD\/status\/575216093414957056\">Asem H.<\/a>):<\/p>\n<blockquote cite=\"https:\/\/firstlook.org\/theintercept\/2015\/03\/10\/ispy-cia-campaign-steal-apples-secrets\/\"><p>The security researchers also claimed they had created a modified version of Apple&rsquo;s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool.<\/p>\n<p>[&#8230;]<\/p>\n<p>The modified version of Xcode, the researchers claimed, could enable spies to steal passwords and grab messages on infected devices. Researchers also claimed the modified Xcode could &ldquo;force all iOS applications to send embedded data to a listening post.&rdquo; It remains unclear how intelligence agencies would get developers to use the poisoned version of Xcode.<\/p><\/blockquote>\n<p><a href=\"http:\/\/mjtsai.com\/blog\/2013\/03\/14\/what-cs-papers-should-everyone-read\/\">Recall<\/a> Ken Thompson&rsquo;s <a href=\"http:\/\/cm.bell-labs.com\/who\/ken\/trust.html\">Reflections on Trusting Trust<\/a>.<\/p>\n<blockquote cite=\"https:\/\/firstlook.org\/theintercept\/2015\/03\/10\/ispy-cia-campaign-steal-apples-secrets\/\"><p>Researchers also claimed they had successfully modified the OS X updater, a program used to deliver updates to laptop and desktop computers, to install a &ldquo;keylogger.&rdquo;<\/p><\/blockquote>\n<p><a href=\"http:\/\/mjtsai.com\/blog\/2014\/02\/25\/software-update-backdoor\/\">Nat!<\/a> was wondering about this possibility last year.<\/p>\n<p><a href=\"http:\/\/www.cnbc.com\/id\/102492655\">Eamon Javers<\/a>:<\/p>\n<blockquote cite=\"http:\/\/www.cnbc.com\/id\/102492655\"><p>A U.S. intelligence official told CNBC Tuesday that American spies need to develop ways to get covert access to mobile devices.<\/p>\n<p>&ldquo;That&rsquo;s what we do,&rdquo; the official said. &ldquo;CIA collects information overseas, and this is focused on our adversaries, whether they be terrorists or other adversaries.&rdquo;<\/p><\/blockquote>\n<p>Xcode project manager <a href=\"https:\/\/twitter.com\/timtr\/status\/575318111320068097\">Tim Triemstra<\/a> is not happy (via <a href=\"https:\/\/twitter.com\/FredericJacobs\/status\/575320648467247104\">Frederic Jacobs<\/a>).<\/p>\n<p><a href=\"http:\/\/daringfireball.net\/linked\/2015\/03\/10\/cia-xcode\">John Gruber<\/a>:<\/p>\n<blockquote cite=\"http:\/\/daringfireball.net\/linked\/2015\/03\/10\/cia-xcode\"><p>To be clear, there is no indication in this report that this hacked version of Xcode has been used in the wild. To be useful, they&rsquo;d somehow have to get developers to use their modified Xcode toolset instead of Apple&rsquo;s, or, to somehow infect Apple&rsquo;s Xcode code base with their modifications. (Imagine a CIA or NSA agent, a trained computer scientist, who joins Apple&rsquo;s Xcode compiler team under false pretenses.)<\/p><\/blockquote>\n<p><a href=\"http:\/\/furbo.org\/2015\/03\/10\/xcode-compromised\/\">Craig Hockenberry<\/a>:<\/p>\n<blockquote cite=\"http:\/\/furbo.org\/2015\/03\/10\/xcode-compromised\/\"><p>The article refers to &ldquo;Xcode&rdquo; generically, but as we all know, there are a lot of pieces to this puzzle: I&rsquo;m going to examine a few of them below. It&rsquo;s your job to think about how these things might affect your own products.<\/p><\/blockquote>\n<p>Update (2015-03-10): <a href=\"https:\/\/twitter.com\/ageis\/status\/575345440356450304\">K.M. Gallagher<\/a> notes that the Mac App Store downloads Xcode using plain, insecure HTTP. Presumably it verifies that the installer package is signed by Apple, though. If you download Xcode manually, Apple&rsquo;s site uses HTTPS. You then end up with a disk image containing a Gatekeeper-signed application. However, Gatekeeper only checks that the application is signed by a registered Mac developer; it doesn&rsquo;t check that it was signed by Apple.<\/p>\n<p><a href=\"http:\/\/inessential.com\/2015\/03\/10\/russian_jokes\">Brent Simmons<\/a>:<\/p>\n<blockquote cite=\"http:\/\/inessential.com\/2015\/03\/10\/russian_jokes\"><p>But today I heard: &ldquo;It&rsquo;s not NSApplication &mdash; it&rsquo;s NSA-pplication!&rdquo;<\/p><\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Jeremy Scahill and Josh Begley (via Asem H.): The security researchers also claimed they had created a modified version of Apple&rsquo;s proprietary software development tool, Xcode, which could sneak surveillance backdoors into any apps or programs created using the tool. [&#8230;] The modified version of Xcode, the researchers claimed, could enable spies to steal passwords [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"","apple_news_api_id":"","apple_news_api_modified_at":"","apple_news_api_revision":"","apple_news_api_share_url":"","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[2],"tags":[1144,75,465,30,39,705,355,48,1146,226],"class_list":["post-10752","post","type-post","status-publish","format-standard","hentry","category-technology","tag-central-intelligence-agency-cia","tag-developertool","tag-gatekeeper","tag-mac","tag-macappstore","tag-nsa","tag-privacy","tag-security","tag-strawhorse","tag-xcode"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/10752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=10752"}],"version-history":[{"count":4,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/10752\/revisions"}],"predecessor-version":[{"id":10784,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/10752\/revisions\/10784"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=10752"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=10752"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=10752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}