Wednesday, February 15, 2012

The remote deletion function into smart phones with standard rules do not complete lead concerns

Finland application developers, jr s. jain's (Janne Kytomaki) said last year he had noticed, on Google (the Po) Android Market application store, more popular application developers are the same not correct name. He then had a test, confirmed that the label wrong software is actually a hacker attacks, and the test results on the web.
Google and then quickly respond. Google to delete from the application of these application store, and use a kind of is not well known technology to prevent the spread of malicious software. Google in 25000 of infected Android smart phone launched a switch, direct users from mobile phones to delete these malicious software.
Torre's s. said: "I am from Android Market for Google to delete applications, and from a cell phone users start tool remove malware speed feel very surprised."
In each of the mobile operating system, Google, apple and Microsoft (the Po) are built with a technology, help technicians fast remote delete a user in your phone unauthorized content. This technique is called "delete switch", has become the iPhone and Android phone standard configuration. In Microsoft Windows 8 release after, this technology will more popular.
The actual operation lack of rules
Although this technology is usually used to remove harmful content, but for what is harmful content, companies and no standard definition of, also won't disclose when and how to use the technology. Santa Clara university high-tech law institute director Eric Goldman (Eric Goldman) said, hackers might be possible to use this technology to spread the virus, enterprise possible through the technology to collect user privacy information, and government departments may use the technology to prevent freedom of speech communication.
Goldman said: "we have seen the philosopher king dictators or charity mode. Some people will be in complete control of your hard disk, and they use their way is you don't hope or not agree. If they in a reasonable way to use this power, then the people's life will be better. But we don't know, whether they will follow the reasonable way. In fact, we may never know when they use this, a power."
Delete the switch on the technology is not complex, the tools to silent mode in the operating system background, and have administrator privileges. In a controlled network, such as the enterprise internal network, this technology has been around a long time. Through this technology, network administrators will be able to control every computer. However, this technology is not present in the personal computer was widely in use. And the personal computer users do not will continue to get to the Internet, also won't last update security patch, which may lead to the computer is Conficker worm virus infected with malicious software.
On the other hand, intelligent cellphone users always continuous online, and therefore must be controlled through the application store download the application. Smart phones information security company Lookout co-founder Kevin murphy salmon (Kevin Mahaffey) said, mobile software to make computer company in another way to solve the problem of information security.
He said: "the remote deletion tool for the PC era is the correct response. History will tell us whether this is overkill. We can in just the right way to use the technology, but we as an industry need to remain cautious. In this technology foundation, we can imagine the future of many adverse conditions."
Fears of a bit is, Google and Microsoft company in the process of using delete switch may face external pressure. Global countries government is more active request technology company offer help, to check email and Internet content. In 2010, India, Saudi Arabia and the united Arab emirates and other countries the government for the RIM users open communication, in order to check.
Information security firm Veracode co-founder Chris d SuoPeiEr (Chirs Wysopal) said: "if you set a control equipment, tools that cell phone manufacturers and operators can control, so this will also be government departments use."
Hackers are increasingly good at against protected network, and privacy leak has become the Internet industry faces a common problem. D SuoPeiEr said, delete the switch can bring the obvious benefits, but it also has a potential defects. He said: "it can increase security, but might be used to prevent the user communications. This is a lack of defined areas. Apple and Google also not say, what the situation will use the delete switch."
Google and Microsoft spokesman per capita said they only a few times in case used delete switch, but declined to provide details.
The company generally use
Google Android engineering vice President Locke haim (Hiroshi Lockheimer) said, delete the switch is mainly used for influencing the harmful content. He said: "we will delete as remote last choice. This is not the way we want to use."
In the case of the together, 28, information security researchers jean spiritualizing Hyde (Jon Oberheide) made a false application, disguised as a movie "the twilight, city of trailer, and on the Android Market lure in users download. In addition to a screen screenshots besides, the application without any content. This type of application was eventually download about 200 times, and eventually use Google to delete the mobile phone users in the switch to delete this application. The spiritualizing Hyde said: "in the end was still to come."
Google has learned a lot from the PC industry experience, in the development of the first edition Android system is taking a more positive information safety protection measures. Google partner at present has sold more than 250 million units Android device, and apple is sold more than 180 million iPhone department.
Information security experts say, if the hackers can crack Google users to push the mechanism equipment software, the user will be at risk. Locke haim said Google carefully studied the mechanism of safety, and built-in protection measures.
Microsoft in a few years ago in Windows smartphone introduced the function. Microsoft product management director Todd · Biggs (Todd Biggs) said: "delete the content is the final way, do not common. We will this as a way to reach the objectives, namely to offer consumers safety and reliable applications."
Microsoft disclosed last year, has been in desktop and notebook software into the delete switch technology. Microsoft also in Windows 8 application store in terms of use that to this.
RIM of the document is authorized to provide display, RIM has the right to delete any reason for the application of mobile phone users. RIM spokesman declined to comment. An apple spokesman declined to comment on related news. Steve Jobs (Steve Jobs) was confirmed in 2008, apple products that there exists a delete switch.
In 2009, amazon (the Po) was used to delete switch delete a user Kindle reader of the "1984" and "animal farm" ebook. Amazon was found that a vendor in do not have necessary authorized to sell these ebook.
At that time, the practice of amazon for users to be angry. Amazon CEO Jeff BeiZuo yunus (Jeff Bezos), says that this practice "stupid, owes a consideration, and against our principle". Amazon then promise, will no longer remove users Kindle the ebook reader.
Although delete switch show that science and technology companies to the control of the customer device is more and more strong, but it also from another reflects, there is no better way to ensure that other users equipment safety. But information security experts think, delete the switch can compensate for the value of the risks of this technology.
Information security company Accuvant researcher Charlie Miller (Charlie Miller) said: "for most users, remote delete the function of the application is useful. However, I do not want to Google or anyone else to tell me, and I can use what applications, can not use what applications, and remote management my equipment. For me, the security of the increase in control and cannot make up for the loss of privacy protection."

No comments:

Post a Comment