Update: How to turn off Carrier IQ on your iPhone
Apple says it stopped supporting the monitoring software on 'most' iOS 5 devices
Computerworld - Editor's note: An earlier version of this story had the incorrect process for disabling Carrier IQ software. The story has been updated with the correct information.
iPhone users can turn off the Carrier IQ software that's raised a ruckus among consumers, bloggers and privacy advocates with just four taps.
Although earlier Thursday Apple said that its newest mobile operating system, iOS 5, does not support the Carrier IQ software, it slipped in a caveat.
"We stopped supporting Carrier IQ with iOS 5 in most of our products," said Apple in a statement Thursday. [Emphasis added.]
In a follow-up conversation, an Apple representative clarified that that meant Carrier IQ was not included in iOS 5 "on all devices," although she declined to say which devices had the metrics software -- only those with diagnostics turned on, perhaps? -- or to elaborate further.
Another part of Apple's statement read, "With any diagnostic data sent to Apple, customers must actively opt-in to share this information."
While Apple's comments seemed at first glance at odds with the findings of iOS developer Grant Paul, who claimed Carrier IQ is present on iOS 5, they actually were not, Paul said later Thursday.
In an update to his original analysis, Paul assured iOS 5 users that, "From my examinations, Apple's recent statement on the issue appears to be entirely accurate."
Carrier IQ is apparently enabled when the user agrees to allow their device to send diagnostic data to Apple -- something that iOS 5 poses when it installs -- or later enables the option manually through Settings.
To disable Carrier IQ on iOS 5, iPhone iOS 5 users should select the Settings app, touch "General," next "About" and then "Diagnostics & Usage" near the bottom of the pane. Touch "Don't Send" to place a checkmark in that field.
Like many other handset makers and carriers, Apple also distanced itself from the egregious accusations facing Carrier IQ, that it records keystrokes and logs text messages.
"We never recorded keystrokes, messages or any other personal information for diagnostic data and have no plans to ever do so," Apple said in the statement.
The brouhaha over Carrier IQ began last week when researcher Trevor Eckhart published information about the software, and described it as a "rootkit" that logged keystrokes and recorded user behavior.
Apple also said it would scrub Carrier IQ "from all devices" with a future iOS 5 software update. The company declined to set a timeline for the update's release, however.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His e-mail address is email@example.com.
- Lawmaker pushes consumer notification bill in wake of Carrier IQ concerns
- Goodbye 2011 ... What a year!
- Sprint disables Carrier IQ software on its handsets
- Iran tricked U.S. spy drone into landing in country, report says
- FBI never sought Carrier IQ data, director says
- Carrier IQ moves to allay fears of its tracking software
- FBI rejects FOIA request for Carrier IQ info
- Google's Schmidt calls Carrier IQ software a keylogger
- Carrier IQ downplays 2010 patent request
- 8 companies hit with lawsuit over Carrier IQ software
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts