The State Of Mobile OS Patching

We expect our PC operating systems to be regularly patched to counter the latest security hole, but we don't have that same assurance with our phones and tablets.

Kurt Marko, Contributing Editor

May 20, 2011

3 Min Read

The recent uproar and subsequent congressional hearings over location-tracking software embedded in iOS and Android devices highlights a disturbing dichotomy between their respective vendors' (Apple and Google) approaches to patching the operating system: Who's in control when pushing out an OS update, the user or the carrier? The answer becomes significant as smartphones become increasingly attractive malware targets, with new vulnerabilities, like this one opening up Android phones on open Wi-Fi networks to snooping, popping up weekly.

One of the oft-cited shortcomings of Apple's OS update distribution scheme for the iPhone and iPad is that it can't be done over the air. Instead, the device must be tethered to a computer, with updates downloaded and installed via iTunes. Note that Research in Motion uses a similar client application for updating firmware in BlackBerrys.

In contrast, Android phones are updated wirelessly over a 3G or Wi-Fi connection. Yet what Android gives in convenience it takes away in control, since users are at the mercy of their carriers for providing an over-the-air update (the only user-initiated approach requires jailbreaking the phone, downloading a compatible Android binary of questionable authenticity and security, and following a detailed installation process that usually involves booting the phone into recovery mode). The problem is that carriers' cavalier attitudes toward their customers means OS upgrades are few and far between.

The tracking imbroglio provides a case in point on the security ramifications of the two approaches. Kvetching about Apple's weeklong delay in responding to the initial report documenting the unsecured iPhone location cache aside, it clearly has been more responsive in documenting and fixing the problem than Google. Apple released a detailed statement about a week after initial media reports of the problem (Google waited until last week's hearing before providing similar detail) and released an OS patch fixing the problem a week after that (and a full week before the hearing). While Google says location tracking can be turned off by application, it admits that storing and securing location data is the responsibility of individual apps and isn't something users or Google can control other than to disable what is often a critical piece of the application software.

What this incident highlights, however, is a user's helplessness in the face of a potentially more serious OS flaw. While we expect our PC operating systems to be regularly, and in many cases, automatically, patched to counter the latest security hole, we don't have that same assurance with our phones and tablets.

Apple has been quite vigorous in patching iOS, with three updates since the latest major version rolled out with the iPad 2 in March, and leaves control over downloading and installation with the user. Google, on the other hand, keeps the ball in the carriers' court, and let's just say, I'm still waiting for Android 2.3 (Gingerbread) to hit my Droid X more than five months after its release. This leaves me with the sinking feeling that I may have to live with a gaping security hole for a long time should a major Android threat hit the wild.

So, before updating your smartphone or getting that new tablet, think about how you'll keep it patched and secure, since your interests and the vendors' aren't necessarily aligned.

Read more about:

20112011

About the Author(s)

Kurt Marko

Contributing Editor

Kurt Marko is an InformationWeek and Network Computing contributor and IT industry veteran, pursuing his passion for communications after a varied career that has spanned virtually the entire high-tech food chain from chips to systems. Upon graduating from Stanford University with a BS and MS in Electrical Engineering, Kurt spent several years as a semiconductor device physicist, doing process design, modeling and testing. He then joined AT&T Bell Laboratories as a memory chip designer and CAD and simulation developer.Moving to Hewlett-Packard, Kurt started in the laser printer R&D lab doing electrophotography development, for which he earned a patent, but his love of computers eventually led him to join HP’s nascent technical IT group. He spent 15 years as an IT engineer and was a lead architect for several enterprisewide infrastructure projects at HP, including the Windows domain infrastructure, remote access service, Exchange e-mail infrastructure and managed Web services.

Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.

You May Also Like


More Insights