What Will Apple Do
?"> Once phone users have the same freedom to install and run programs that PC users have, the floodgates of malware will open up. Apples interim, crossed-fingers approach will be to create a digital signature system like the one they just released on Leopard (so the OS X code is handy, anyway) to provide accountability, if not actual protection, against malware. Presumably such signatures will be required for loading apps on the iPhone. Remember Microsoft created such a digital signature system for executables. They started requiring them on Vista x64 kernel mode code and encountered a lot of resistance as a consequence. Remember also that they later clarified that:Mossbergs hardly the first to raise these concerns. When Google offered to bid in the FTC auctions early next year they "suggested" several rules for the FTC to impose on the bidders, including allowing customers to run any app they wished. The FCC in fact agreed to some of the rules, only to have Verizon Wireless file suit in Federal Court objecting to the decision. I have to agree with most of the calls for openness. Certainly its better than allowing an oligopolist gang to set all of the rules. I just wish the security implications were explored a little more clearly, because as sure as the suns coming up tomorrow morning, malware will bloom when the mobile platforms are opened up. For years weve been hearing about the threat of mobile malware. For probably four or five years now, every December when security writers like me get pitched on the big security trends, vendors tell is that next year is the year of the rise of mobile malware. But so far its basically been all theory and very little implementation (and what malware there is out there is on the Symbian platform). When the vendors are right and half the phones out there turn into mobile bots, will we regret the call for openness? Give people time. You still hear people talk about how things were better back when AT&T ran all telecom and you couldnt even own the telephone in your house. Sometimes things get more complicated as they get better. If mobile networks get more dangerous well find ways to cope, and the only sure thing is that the telecoms will find a way to make money on it. Security Center Editor Larry Seltzer has worked in and written about the computer industry since 1983. Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers blog Cheap Hack
More from Larry Seltzer
- KMCS is a not a security boundary, rather, it is only one aspect of a defensein-depth approach to security. KMCS does not provide a means to determine the "intent" of the signed code (i.e., good or bad); indeed, signed code may contain bugs, be of poor quality or may be malicious in nature.
Is this what the telcos are worried about? Are they protecting us from attack and complexity by rigidly defining what programs we can run on our phones? Call me cynical, but I doubt it. They just want a cut of whatever programs run on the phone.