Author Archives: Jonathan Zdziarski

About Jonathan Zdziarski

Respected in his community as an iOS forensics expert, Jonathan is a noted security researcher, penetration tester, and hacker. Author of many books ranging from machine learning to iPhone hacking and software development, Jonathan frequently trains many federal and state law enforcement agencies in digital forensic techniques and assists law enforcement and the military in high profile cases. Jonathan is also inventor on several US patent applications, father of DSPAM and other language classification technology, and an App Store developer. All opinions expressed on this website are the author's own. Follow Jonathan on Twitter: @JZdziarski

A Post-Mortem on ZDNet’s Smear Campaign

A few days after I gave a talk at the HOPE/X conference titled, “Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices”, ZDNet published what their senior editor has described privately to me as an opinion piece, however passed … Continue reading

Posted in Forensics, iPhone, Security | Comments Off

Apple is Making Progress

Apple’s new, relaxed NDA rules appear to allow me to talk about the iOS 8 betas. I will hold off on the deep technical details until the final release, as I see that Apple is striving to make a number … Continue reading

Posted in Forensics, iPhone, Security | Comments Off

Finding and Shooting Mountain Streams

Up in the mountains of northern Maine are a number of peaceful, hidden moss-covered streams. They’re not difficult to find, you just need to look for the culverts on mountain roads, and then you can follow them on foot deep … Continue reading

Posted in Photography | Comments Off

Apple’s Authentication Scheme and “Backdoors” Discussion

I’ve heard a number of people make an argument about Apple’s authentication front-ending the services I’ve described in my paper, including the “file relay” service, which has opened up a discussion about the technical definition of a backdoor. The primary … Continue reading

Posted in Forensics, iPhone, Security | Comments Off

Oxygen Forensics: Latest Forensics Tool to Exploit Apple’s “Diagnostic Service” to Bypass Encryption

While Apple’s claims may be that a key subject of my talk, “Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices” (com.apple.mobile.file_relay) is for diagnostics, a recent announcement from the makers of the fantastic Oxygen Forensics suite shows strong … Continue reading

Posted in Forensics, iPhone, Security | Comments Off

Roundup of iOS Backdoor (AKA “Diagnostic Service”) Related Tech Articles

There are a lot of terrible news articles out there, and a lot of terrible “journalists” who have either over-hyped my research, or dismissed it entirely. After ZDNet’s utterly horrible diatribe about my research, I posted a proof-of-concept to help … Continue reading

Posted in Forensics, iPhone, Security | Comments Off

Dispelling Confusion and Myths: iOS Proof-of-Concept

Here’s my iOS Backdoor Proof-of-Concept: http://youtu.be/z5ymf0UsEuw When I originally gave my talk, it was to a small room of hackers at a hacker conference with a strong privacy theme. With two hours of content to fit into 45 minutes, I … Continue reading

Posted in Forensics, iPhone, Security | Comments Off

Apple Confirms “Backdoors”; Downplays Their Severity

Apple responded to allegations of hidden services running on iOS devices with this knowledge base article. In it, they outlined three of the big services that I outlined in my talk. So again, Apple has, in a traditional sense, admitted … Continue reading

Posted in Forensics, iPhone, Security | Comments Off

Apple Responds, Contributes Little

In a response from Apple PR to journalists about my HOPE/X talk, it looks like Apple might have inadvertently admitted that, in the most widely accepted sense of the word, they do indeed have backdoors in iOS, however claim that … Continue reading

Posted in Forensics, General, iPhone, Security | Comments Off

Slides from my HOPE/X Talk

Identifying Backdoors, Attack Points, and Surveillance Mechanisms in iOS Devices In addition to the slides, you may be interested in the journal paper published in the International Journal of Digital Forensics and Incident Response. Please note: they charge a small … Continue reading

Posted in Forensics, iPhone, Security | Comments Off