iOS 9.3 makes it crystal clear if your work iPhone is being tracked by your employer

“Apple is ramping up security and privacy efforts on all fronts right now, although most attention is currently directed towards the ongoing Apple FBI iPhone backdoor case,” Benjamin Mayo reports for 9to5Mac.

“Reddit user MaGNeTiX has found that Apple is taking a big step in iOS 9.3 (currently on beta 5) towards transparency when an iOS device is being managed by an institution or enterprise through MDM [Mobile Device Management],” Mayo reports. “If your iPhone is being tracked by the company, it is now clearly marked in the About page of Settings and the Lock Screen.”

Mayo reports, “It’s hard to get more clear than a permanent ‘This iPhone is managed by your organisation’ message at the bottom of the screen… Current iOS versions do not prominently indicate if this kind of control is taking place on a device.”

Read more in the full article here.

MacDailyNews Take: The more clarity offered to users, the better.

11 Comments

  1. Go Apple!!!!

    Tim Cook Is The Next President After Hillary!

    Then again Tramp will be the next and screw up everything so the the 4rd smallest economy after China, Europe and India needs Tim Cook from Canada!

    1. Your enthusiasm for someone who treats security as a joke (Clinton) and who is responsible for the deaths of four Americans is incomprehensible.

      Trump appeals to disaffected Democrats and low-information voters. That is why he does so well in open primary states.

  2. Wouldn’t you just assume any device issued to you by your employer would be trackable and manageable by your employer? It’s a work phone. It’s their property. And everything you do on it contractually belongs to them, just as the computer you use at your desk.

  3. A corporate owned phone should include a corporate master key. With that said, why wasn’t the attacker’s phone added to MDM? That would have been their way in. My understanding, is that with Mac OS with File Vault, it is the case. I also believe corporate iPads also have a master key.

    This is completely different from the FBI’s request because it’s a business phone. There is no perceived privacy, while at work.

  4. Even without the proposed badging, this explains precisely why there’s NOTHING on the San Bernadino iPhone and the government knows it. The perpetrators *destroyed* their personal phones when the end came. Before that they *destroyed* their computer hard drive. But not this phone? Why? Because it was a work phone issued by the county and they knew that the county could monitor it or examine it at any time. Nobody, not even a pair of whack jobs like those two would just assume an iPhone was impenetrable when it would have been trivial to destroy. Therefore, their failure to destroy it tells the tale – NOTHING of value on it.

    The terrorists knew to destroy their *personal* communications equipment based on terrorist group training materials that our government has copies of from multiple sources. I was at an FBI WMD briefing last month which featured a bunch of suspicious behaviors one should be careful to watch for if you’re in the business of selling materials that could be used to construct explosive devices (for example, acetone, concentrated peroxide, ammonium nitrate etc.) One slide of that briefing was a reproduction of the FBI bulletin to merchants that the *terrorists have incorporated into their own training materials*. Measures and countermeasures. Know your enemy kind of stuff.

    Of course, those training materials are now, alas, going to be updated to direct the next whack jobs to iPhones. But we’ll still be able to follow their digital footprints to a large degree. And if it weren’t an iPhone, it would be any of the hundreds of other privacy-evading tools freely available outside the country and equally beyond the FBI’s grasp. And regardless of the outcome of the current case, I sincerely doubt that any dedicated terrorist would leave useful information on an iPhone and rely on the hope/expectation that there isn’t really a back door or that it couldn’t somehow be hacked. Finally, look at the Paris attacks – they just used disposable burner phones and unencrypted communications during the crime. Speak in code phrases for operational maneuvers and don’t make plans electronically – that’s a time-tested strategy over 100 years old that’s hard to prevent.

    1. Yes. There is very much a history of Blackberry phones being ‘secure’ and therefore worthy of business and government use, followed by Apple reaching for and attaining the same, then taking it farther. It has been a follow-the-leader, overtake-the-leader, become-the-leader situation, with regards to cell phone security.

Reader Feedback

This site uses Akismet to reduce spam. Learn how your comment data is processed.