- Gene Steinberg's Tech Night Owl - https://www.technightowl.live/blog -

The Dangers of the Unauthorized Use of Apple Products

So far at least, the Mac platform has been relatively free of malware, despite continued growth of Apple’s market share. Although some skeptics continue to rant about the inevitability of a major outbreak someday soon, it hasn’t happened so far.

But all that presumes that most Mac users run their computers in the authorized fashion, although there are a fair number of hobbyists who have taken to installing Mac OS X on a vanilla PC, which thus become “Hacintoshes.”

On another front, Apple’s latest success story, the iPhone, originally arrived without third party software, other than those few developers who opted to create a Web-based service for Safari. This inspired many customers to jailbreak their phones to allow for the installation of real software, even if it was unapproved.

The practice of sidestepping Apple’s built in security model clearly has potentially dangerous consequences, as some of you have no doubt heard. Indeed, Intego, a Mac security software publisher, has issued a memo about the arrival of an apparently serious iPhone virus:

“Following the recent discovery of a worm that changes wallpaper on iPhones, Intego has spotted another piece of malware that attacks iPhones, one that is far more dangerous than the ikee worm. This hacker tool, which Intego identifies as iPhone/Privacy.A, takes advantage of the same vulnerability in the iPhone as the ikee worm, allowing hackers to connect to any jailbroken iPhone (iPhones hacked to allow installation of software other than through iTunes) whose owners have not changed the root password.”

Now there are actually no antivirus apps for the iPhone. At best, you can install the latest version of Intego’s VirusBarrier X5 and update the detection strings to at least eradicate the iPhone virus if it turns up on your Mac. That will help prevent you from passing it on to an unlocked iPhone, but there is no comparable protection on a Windows PC.

The easiest solution is, of course, to change the root password of your jailbroken iPhone, or, even better, don’t tamper with it. This sort of behavior may seem fun and all, and it will definitely allow you to access features that Apple has placed padlocks on. On the other hand, it also means that you are opening yourself up to a wider universe of unintended consequences, and the potential for malware infections is probably just a part of what might go wrong.

Returning to the Hacintosh community, it appears to be true that the Snow Leopard 10.6.2 update really does remove support for the Intel Atom processor, widely used on those ever-popular netbooks. Now I don’t have to remind you that Apple has no product available that uses that processor, and they are under no obligation to assist hobbyists who install Mac OS X on unauthorized hardware. Indeed, if you try to make a business of it, and attempt to stand up to Apple, you face being smacked down by a lawsuit.

When it comes to the Atom, no doubt the hacker community will come up with a solution to prevent 10.6.2 from bricking those netbooks. That’s how things work, and don’t be surprised if a 10.6.3 arrives that removes support for the workaround, although I rather think that this is not Apple’s priority. Sure, they’d prefer to sell you a genuine Mac, but if individuals want to violate the user license and install Mac OS X on unapproved hardware, that’s their problem. Apple’s not responsible for supporting those installations, and I would certainly caution you to avoid using a Hacintosh for business purposes. If it stops working, or you lose your data because of something that wasn’t Apple’s fault, where do you go for support? Sure, there are hobbyists out there who might assist, but it’s not as if they’re doing it for a living, and maybe they just won’t have the time to help everyone who needs it.

When it comes to jailbreaking your iPhone, I wonder whether that practice makes much sense anymore. It all began before there was an App Store and a rich selection of third-party software. Yes, perhaps you’ll gain access to parts of the operating system that are hidden on a regular iPhone, but does that really matter anymore? It comes down to why you’d want to open up your iPhone to the dangers of the online universe. Would you do it to get an application or a type of application that Apple won’t offer, or just to have the ability to finagle with the operating system?

Or maybe to just prove to yourself that you can do it, after which it may make perfect sense to restore the phone to its shipping condition and update with Apple’s latest version of OS X. Now that it’s clear that jailbreaking might make your iPhone susceptible to malware, I wouldn’t depend on someone coming up with software to protect you. You may be opening a door you were never meant to enter.