Fingerprinting iPhones [www.schneier.com]
iPhone gyroscopes, of all things, can uniquely ID handsets on anything earlier than iOS 12.2 [www.theregister.co.uk]
Fingerprinting iPhones with the built-in gyroscope [www.grahamcluley.com]
Attackers Could Use Mobile Device Sensors to Generate Unique Device Fingerprint: Research [www.securityweek.com]
Calibration Fingerprint Attacks for Smartphones [www.lightbluetouchpaper.org]
In less than one second, a malicious web-page can uniquely fingerprint an Iphone, Pixel 2 or Pixel 3 without any explicit user interaction [boingboing.net]
Android and iOS devices impacted by new sensor calibration attack [www.zdnet.com]
Apple now also blocks websites from accessing motion sensor data via Mobile Safari.
— Catalin Cimpanu (@campuscodi) May 22, 2019
All in all, SensorID is quite dangerous, as privacy-focused browsers, ad blockers, and other anti-fingerprinting techniques can't block this type of fingerprintinghttps://t.co/WUsZVI0DuH pic.twitter.com/9aE9y12ywh
This new attack/fingerprinting method is named SensorID.
— Catalin Cimpanu (@campuscodi) May 22, 2019
It works by extracting "sensor calibration details" from a device's firmware. These are unique per device and can generate an identifier as unique and persistent as an IMEI code.
See image below for more: pic.twitter.com/VUphH71hYC
Apple patched iOS against SensorID fingerprinting in iOS 12.2, released in March.
— Catalin Cimpanu (@campuscodi) May 22, 2019
Google is still investigating, but the number of impacted Android devices is low, as very few Android OEMs calibrate motion sensors for their devices.https://t.co/WUsZVI0DuH pic.twitter.com/WBm8MAX7B1
Fingerprinting iPhones https://t.co/y0CpLxBoRU
— Schneier Blog (@schneierblog) May 22, 2019
Fingerprinting phoneshttps://t.co/z3AgqxiAsO
— Data Privacy (@data_tip) May 22, 2019
Fingerprinting iPhones https://t.co/51tG802lJO
— Nicolas Krassas (@Dinosn) May 22, 2019
Your iPhone can be uniquely fingerprinted by apps and websites in a way that you can never clear. Not by deleting cookies, not by clearing your cache, not even by reinstalling iOS. https://t.co/RYLKyiXXTv via @theregister
— stéphane koch (@stephanekoch) May 22, 2019
iPhone gyroscopes, of all things, can uniquely ID handsets on anything earlier than iOS 12.2 https://t.co/dHioAzrLg4 #infosec pic.twitter.com/u4vdT5VdnM
— #AI (@AI__TECH) May 22, 2019
Also, our work has been covered by @GazTheJourno for @TheRegister https://t.co/q8P12Kloal
— Alastair Beresford (@arberesford) May 21, 2019
This research could lead down some interesting paths. #ios #dfir https://t.co/MBg7l6HcRG
— ???? ?????? (@pr3cur50r) May 21, 2019
A brilliant example of the law of unintended consequences.https://t.co/x78o7120Rv
— Victoria Stamps (@AlmostSenseless) May 22, 2019
Fingerprinting iPhones with the built-in gyroscope https://t.co/oxrLLEO7uu via gcluley
— BrianHonan (@BrianHonan) May 22, 2019
Calibration fingerprint attacks for smartphones, which can be used to track you across websites in seconds, disclosed by @jz448, @arberesford & @PolymathInsight https://t.co/hQWZP7JETA
— Dr Alice Hutchings (@message4bob) May 21, 2019
Today @jz448 presented our fingerprinting attack @IEEESSP. We can build an identifier for iOS devices when the user visits a website or starts an app. It takes less than one second, no user interaction needed. Apple fixed in iOS 12.2, so update now.https://t.co/u2F5GoBw2s
— Alastair Beresford (@arberesford) May 21, 2019
In less than one second, a malicious web-page can uniquely fingerprint an Iphone, Pixel 2 or Pixel 3 without any explicit user interactionhttps://t.co/in485vkgQa pic.twitter.com/8KvgKM5jTo
— Masque of the Red Death (@doctorow) May 22, 2019
NEW: Android and iOS devices impacted by new sensor calibration attackhttps://t.co/WUsZVI0DuH pic.twitter.com/rDIdaXpJwA
— Catalin Cimpanu (@campuscodi) May 22, 2019
"A new device fingerprinting technique can track #Android and #iOS devices across the Internet by using factory-set sensor calibration details that any app or website can obtain without special permissions." #privacy #infosec https://t.co/UaqEP0VlUO
— Alasdair Allan (@aallan) May 22, 2019
Android and iOS devices impacted by new sensor calibration attack https://t.co/njTekggUoc by @campuscodi
— ZDNet (@ZDNet) May 22, 2019
In less than one second, a malicious web-page can uniquely fingerprint an Iphone, Pixel 2 or Pixel 3 without any explicit user interaction https://t.co/CCPuLuOG4K#Cybersecurity #cybercrime #cyberattacks #hacker #hack #breach #phishing #dos #ransomware #malware #virus #apt pic.twitter.com/4Fs37wFvGw
— Rich Tehrani (@rtehrani) May 22, 2019
#Android and #iOS devices impacted by new sensor calibration attack https://t.co/A9YtnJsvrr via @ZDNet & @campuscodi #mobile #security
— Gary Davis (@garyjdavis) May 22, 2019
Nuke JavaScript from orbit. It's the only way to be sure.https://t.co/pXlqDbq8je
— Eric Lawrence ? (@ericlaw) May 23, 2019
Android and iOS devices impacted by new sensor calibration attack | ZDNet https://t.co/mgw1XbjZWf
— Robert Alai (@RobertAlai) May 22, 2019