{"id":6071,"date":"2011-03-26T09:32:45","date_gmt":"2011-03-26T13:32:45","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=6071"},"modified":"2022-12-30T16:00:13","modified_gmt":"2022-12-30T21:00:13","slug":"ipad-notes","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/ipad-notes\/","title":{"rendered":"iPad Notes"},"content":{"rendered":"<h3><a href=\"https:\/\/web.archive.org\/web\/20111025102113\/http:\/\/www.fiercecio.com:80\/techwatch\/story\/researchers-outline-ios-attack-access-stored-passwords-six-minutes\/2011-02-15\" target=\"_blank\" rel=\"noopener noreferrer\">Researchers Outline iOS Attack to Access Stored Passwords in Six Minutes<\/a><\/h3>\n<p><em><a href=\"https:\/\/www.apple.com\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105700 size-thumbnail\" title=\"Researchers Outline iOS Attack to Access Stored Passwords in Six Minutes\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_logo-6.jpg?resize=67%2C75&#038;ssl=1\" alt=\"Researchers Outline iOS Attack to Access Stored Passwords in Six Minutes\" width=\"67\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_logo-6.jpg?resize=67%2C75&amp;ssl=1 67w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_logo-6.jpg?resize=135%2C150&amp;ssl=1 135w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_logo-6.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 67px) 100vw, 67px\" \/><\/a><a title=\"Fierce CIO\" href=\"https:\/\/www.fiercecio.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FierceCIO<\/a> <\/em> <a href=\"https:\/\/web.archive.org\/web\/20111025102113\/http:\/\/www.fiercecio.com:80\/techwatch\/story\/researchers-outline-ios-attack-access-stored-passwords-six-minutes\/2011-02-15\" target=\"_blank\" rel=\"noopener noreferrer\">reports<\/a> that researchers from Germany&#8217;s <a href=\"http:\/\/www.sit.fraunhofer.de\/en\/\" target=\"_blank\" rel=\"noopener noreferrer\">Fraunhofer Institute for Secure Information Technology<\/a> say (<a href=\"https:\/\/web.archive.org\/web\/20110304012924\/http:\/\/www.sit.fraunhofer.de:80\/en\/Images\/sc_iPhone%20Passwords_tcm502-80443.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>) they can break into an <a href=\"http:\/\/www.apple.com.\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <a href=\"http:\/\/www.apple.com\/ios\/\" target=\"_blank\" rel=\"noopener noreferrer\">iOS<\/a> device (<a href=\"http:\/\/www.apple.com\/iphone\/\" target=\"_blank\" rel=\"noopener noreferrer\">iPhone<\/a> or <a href=\"http:\/\/www.aple.com\/ipad\/\" target=\"_blank\" rel=\"noopener noreferrer\">iPad<\/a>) to extract stored passwords in just six minutes. The attack requires physical access to the iOS device. Once boosted, large swaths of the iOS file system could be swiftly pried open by hackers.<\/p>\n<p>Data that can be exploited include account passwords for MS Exchange ActiveSync, LDAP, VPN, and Wi-Fi. A successful attack starts with a jailbreak, followed by installing an SSH server to load a script to get access to the keychain entries which contain the passwords.<\/p>\n<p>Based on this weakness, the author says that iOS needs work, &#8220;&#8230; a proper implementation of security using best practices could require a rewriting of key security components in Apple&#8217;s iOS.&#8221; He concludes that &#8220;&#8230; organizations deploying the iOS hardware at the moment might find it prudent to perform encryption at the app level instead of relying on the iPhone&#8217;s or iPad&#8217;s broken passphrase system.&#8221;<\/p>\n<h3><a href=\"http:\/\/arstechnica.com\/apple\/news\/2011\/02\/six-minute-keychain-hack-highlights-busted-iphone-security-model.ars\" target=\"_blank\" rel=\"noopener noreferrer\">iPhone Password Hack Shows Flawed Security Model<\/a><\/h3>\n<p><em><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105703\" title=\"iPhone Password Hack Shows Flawed Security Model\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/iphone_sad2.png?resize=54%2C100&#038;ssl=1\" alt=\"iPhone Password Hack Shows Flawed Security Model\" width=\"54\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/iphone_sad2.png?resize=40%2C75&amp;ssl=1 40w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/iphone_sad2.png?resize=81%2C150&amp;ssl=1 81w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/iphone_sad2.png?w=161&amp;ssl=1 161w\" sizes=\"auto, (max-width: 54px) 100vw, 54px\" \/><a title=\"Ars Technica\" href=\"https:\/\/arstechnica.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ars Technica<\/a><\/em> has a different <a href=\"http:\/\/arstechnica.com\/apple\/news\/2011\/02\/six-minute-keychain-hack-highlights-busted-iphone-security-model.ars\" target=\"_blank\" rel=\"noopener noreferrer\">article<\/a> on the latest iOS vulnerability. <em>Ars<\/em> argues that the attack isn&#8217;t entirely new, and is actually a product of Apple&#8217;s &#8220;DRM approach&#8221; to security. Forensics expert <a href=\"http:\/\/www.zdziarski.com\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Jonathan Zdziarski<\/a> told <em>Ars<\/em> that similar exploits have been around since Apple introduced the iPhone 3G. According to Mr. Zdziarski,<\/p>\n<blockquote><p>The real problem is that Apple hasn&#8217;t yet fully implemented a truly secure environment for iOS. Apple has &#8230; been relying on their DRM know-how, and just erasing the label that says &#8216;DRM&#8217; and calling it &#8216;security. The problem with this is that DRM only makes things a little more difficult for hackers.&#8221;<\/p><\/blockquote>\n<p>&#8220;Real security relies on the strength of the key, and the secrecy of the key,&#8221; Mr. Zdziarski continued. &#8220;And as long as the keys are all stored on the iPhone and don&#8217;t rely on a user password, they can easily be compromised.&#8221;<\/p>\n<p>The <em>Ars<\/em> article says that while Apple has continually improved the iDevices information security, they all have the same flaws. Mr. Zdziarski told <em>Ars<\/em> he believes Apple is pushing to make iOS devices compliant with the FIPS 140-2 (<a href=\"http:\/\/csrc.nist.gov\/publications\/fips\/fips140-2\/fips1402.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>) security standards. However, he warns that. &#8220;&#8230; at the end of the day &#8230; Apple will need to abandon their DRM approach if they want true security, as opposed to just some fancy marketing strategies.&#8221;<\/p>\n<h3><a href=\"https:\/\/web.archive.org\/web\/20130521132307\/http:\/\/www.networkworld.com\/news\/2011\/030911-vmware-virtual-desktops.html\" target=\"_blank\" rel=\"noopener noreferrer\">VMware Unleashes Virtual Desktops for Apple iPad<\/a><\/h3>\n<p><a href=\"https:\/\/web.archive.org\/web\/20201021140046\/https:\/\/www.macworld.com\/article\/1158437\/vmware_ipad.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105711 size-thumbnail\" title=\"VMware Unleashes Virtual Desktops for Apple iPad\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/VMware_iPad_logo.jpg?resize=75%2C75&#038;ssl=1\" alt=\"VMware Unleashes Virtual Desktops for Apple iPad\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/VMware_iPad_logo.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/VMware_iPad_logo.jpg?resize=148%2C150&amp;ssl=1 148w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/VMware_iPad_logo.jpg?w=175&amp;ssl=1 175w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a><a title=\"NetworkWorld\" href=\"http:\/\/www.networkworld.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Network World<\/em><\/a> is <a title=\"VMware unleashes virtual desktops for Apple iPad \" href=\"https:\/\/web.archive.org\/web\/20130521132307\/http:\/\/www.networkworld.com\/news\/2011\/030911-vmware-virtual-desktops.html\" target=\"_blank\" rel=\"noopener noreferrer\">reporting<\/a> that <a href=\"http:\/\/www.vmware.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">VMware<\/a> (<a href=\"https:\/\/www.tradingview.com\/chart\/?symbol=NYSE%3AVMW\" target=\"_blank\" rel=\"noopener noreferrer\">VMW<\/a>) has released VMware <a title=\"View client for iPad\" href=\"http:\/\/blogs.vmware.com\/view\/2011\/03\/view-client-for-ipad.html\" target=\"_blank\" rel=\"noopener noreferrer\">View Client for iPad<\/a> to the <a href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> <a href=\"http:\/\/itunes.apple.com\/us\/app\/vmware-view-for-ipad\/id417993697?mt=8&amp;ls=1\" target=\"_blank\" rel=\"noopener noreferrer\">App Store<\/a>. &#8220;We&#8217;ve been working on it since the middle of last year,&#8221; says Pat Lee, director of end-user computing clients at VMware.<\/p>\n<p>VMware said it had trouble making Windows work as a virtual desktop on the iPad. &#8220;Windows really isn&#8217;t touch-savvy,&#8221; Lee says. VMware tried to adapt the iPad experience to Windows. &#8220;We spent a lot of time building custom gestures to make sure it blends into the iOS experience,&#8221; Lee says.<\/p>\n<p>VMware created a virtual trackpad that can appear on the screen. &#8220;We want it to be as logical as possible,&#8221; Lee says. VMware promised &#8220;instant-on&#8221; access to Windows desktops from the iPad, as well as support for Bluetooth keyboards. VMware is using\u00a0 <a href=\"https:\/\/web.archive.org\/web\/20120806024505\/http:\/\/www.teradici.com:80\/pcoip\/pcoip-technology.php\" target=\"_blank\" rel=\"noopener noreferrer\">PCoIP<\/a> to deliver the remote desktops and says the client will offer a secure connection to server-hosted desktops.\u00a0 The View client for iPad will be free for existing users, who are charged either $150 or $250 per seat.<\/p>\n<p>The VMware announcement comes after <a href=\"http:\/\/www.citrix.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Citrix<\/a> (<a href=\"https:\/\/investors.citrix.com\/news-and-events\/press-releases\/2022\/01-31-2022-130150749\" target=\"_blank\" rel=\"noopener noreferrer\">CTXS<\/a>)\u00a0 released <a href=\"https:\/\/web.archive.org\/web\/20120910060323\/http:\/\/www.citrix.com:80\/English\/ps2\/products\/product.asp?contentID=1689163\" target=\"_blank\" rel=\"noopener noreferrer\">Receiver<\/a> for iPad, and <a href=\"http:\/\/www.parallels.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Parallels <\/a>developed <a href=\"https:\/\/web.archive.org\/web\/20170809031607\/https:\/\/itunes.apple.com\/us\/app\/parallels-mobile\/id295531450?mt=8\" target=\"_blank\" rel=\"nofollow noopener\">Parallel&#8217;s Mobile<\/a>, an iPad desktop application.<\/p>\n<h3><a title=\"AppScout\" href=\"https:\/\/web.archive.org\/web\/20110515092350\/http:\/\/www.appscout.com:80\/2011\/03\/contracts_hd_for_ipad_give_con.php\" target=\"_blank\" rel=\"noopener noreferrer\">Contracts HD for iPad: Give Contracts the Finger<\/a><\/h3>\n<p><a href=\"https:\/\/clipart-library.com\/clipart\/1598025.htm\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-105705\" title=\"Contracts HD for iPad: Give Contracts the Finger\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/contract-clipart.jpg?resize=149%2C90&#038;ssl=1\" alt=\"Contracts HD for iPad: Give Contracts the Finger\" width=\"149\" height=\"90\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/contract-clipart.jpg?resize=75%2C45&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/contract-clipart.jpg?resize=150%2C91&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/contract-clipart.jpg?w=616&amp;ssl=1 616w\" sizes=\"auto, (max-width: 149px) 100vw, 149px\" \/><\/a>Hat tip to <a title=\"AppScout\" href=\"https:\/\/web.archive.org\/web\/20110731220842\/http:\/\/www.appscout.com:80\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>AppScout<\/em><\/a> for<a title=\"AppScout\" href=\"https:\/\/web.archive.org\/web\/20110515092350\/http:\/\/www.appscout.com:80\/2011\/03\/contracts_hd_for_ipad_give_con.php\" target=\"_blank\" rel=\"noopener noreferrer\"> finding<\/a> Contracts HD for iPad. They say that it is one of those apps that is breathing life into the existence and usefulness of the tablet device. Contracts HD is designed to allow any <a title=\"Apple\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>)<a title=\"iPad\" href=\"http:\/\/www.apple.com\/ipad\/\" target=\"_blank\" rel=\"noopener noreferrer\"> iPad<\/a> user to create, collaborate, sign, and email completed contracts using iPad&#8217;s dynamic touch-screen interface. The app also provides a database of contract templates for which anyone can add an addendum to all existing contracts, auto-fill appropriate fields within the contract with your exact information, and allows both parties to sign contracts safely and securely by using a fingertip.<\/p>\n<p>Once the contract is signed, and all parties have received their PDF copies via email, you can save contracts to a secure archive for easy access later. Contracts HD also has a little brother app for iPhone that enables you to synchronize contracts between devices.\u00a0 Contracts HD for iPad is $9.99 in the <a title=\"iTunes App Store\" href=\"https:\/\/web.archive.org\/web\/20120401002159\/http:\/\/itunes.apple.com:80\/us\/app\/contracts-hd\/id412123437?\" target=\"_blank\" rel=\"noopener noreferrer\">iTunes App Store<\/a> ($4.99 for the iPhone version).<\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>AAPL iPad &#038; iPad2 have captured a lot of mind share but how does it fit into the enterprise<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[3045,101,391,389,67,22,296,3103,4,390],"class_list":["post-6071","post","type-post","status-publish","format-standard","hentry","category-hardware","tag-3045","tag-apple","tag-citirx","tag-drm","tag-hack","tag-hardware","tag-ipad","tag-passphraae","tag-security","tag-vmware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/6071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=6071"}],"version-history":[{"count":23,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/6071\/revisions"}],"predecessor-version":[{"id":132954,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/6071\/revisions\/132954"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=6071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=6071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=6071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}