iOS exploit closed in iOS 12.2 let websites use motion sensors to 'fingerprint' devices
Though already patched on iPhones and iPads, University of Cambridge researchers say they've developed a hacking technique that can "fingerprint" a person by way of motion sensors.
The method uses JavaScript to collect accelerometer, gyroscope, and magnetometer data from smartphones when they visit an infected website, the researchers explain. This works in under 1 second, without requiring any consent, and creates a "globally unique fingerprint" for any impacted iOS device -- even after a factory reset.
If successful the attack makes it possible to track someone across both apps and the Web, so long as they use the compromised device. There are no known instances of it being used in the real world, but at least 2,653 websites are collecting motion data, and it's believed the Cambridge technique can be applied retroactively.
Apple was notified about the problem in August and fixed it in March's iOS 12.2, using a suggestion to add random noise to ADC outputs. Credited researchers include Cambridge's Jiexin Zhang and Alastair Beresford, as well as Polymath Insight Limited's Ian Sheret.
Google's Pixel 2 and 3 phones are said to remain vulnerable. No other tested Android phones have the problem, but some other factory-calibrated Android products could theoretically be exposed.
The method uses JavaScript to collect accelerometer, gyroscope, and magnetometer data from smartphones when they visit an infected website, the researchers explain. This works in under 1 second, without requiring any consent, and creates a "globally unique fingerprint" for any impacted iOS device -- even after a factory reset.
If successful the attack makes it possible to track someone across both apps and the Web, so long as they use the compromised device. There are no known instances of it being used in the real world, but at least 2,653 websites are collecting motion data, and it's believed the Cambridge technique can be applied retroactively.
Apple was notified about the problem in August and fixed it in March's iOS 12.2, using a suggestion to add random noise to ADC outputs. Credited researchers include Cambridge's Jiexin Zhang and Alastair Beresford, as well as Polymath Insight Limited's Ian Sheret.
Google's Pixel 2 and 3 phones are said to remain vulnerable. No other tested Android phones have the problem, but some other factory-calibrated Android products could theoretically be exposed.
Comments
With android that is not so. Android's fix is almost always in the next OS update, that less than 10% of their users get, which means that most android users walk around with phones not updated. Google can blame the carriers, who in turn blame the manufacturers; lots of blame to go around but no one to solve the problem. For example, with BlueBorne virus, Apple patched and fixed it with iOS10, which was installed to almost all their devices. Google fixed it and pushed it to their pixel users (less than 1/2 of 1% of android users). The rest of android users continue to use compromised devices with no hope of a fix.
So in response to your comment, Apple fixes security issues and their customers actually get them. Hard to blame that.