Security Vulnerabilities in ICEBlock
The ICEBlock tool has vulnerabilities:
The developer of ICEBlock, an iOS app for anonymously reporting sightings of US Immigration and Customs Enforcement (ICE) officials, promises that it “ensures user privacy by storing no personal data.” But that claim has come under scrutiny. ICEBlock creator Joshua Aaron has been accused of making false promises regarding user anonymity and privacy, being “misguided” about the privacy offered by iOS, and of being an Apple fanboy. The issue isn’t what ICEBlock stores. It’s about what it could accidentally reveal through its tight integration with iOS.
Clive Robinson • July 17, 2025 10:02 AM
@ ALL,
The developer Joshua Aaron apparently made claims about the application not storing user details etc. Which it appears are as far as the claims go “true”.
However as I often note especially with secure messaging apps which ICEBlock kind of is. That it’s rather more you need to consider. That is,
“You need to consider the whole system.”
Not just the fun bits like the application. Because it’s been known publicly for a couple of decades at least that an application can not function without,
1, An OS
2, A File System
3, One or more input devices
4, One or more output devices
5, Communications channels for information
Any one of which can be “shimmed” to do a “Man In The Middle” attack on the implicit communications paths.
As I’ve pointed out in the past “why attack the apps encryption when you can just watch the I/O at the OS or device driver levels?”
In effect you do a “run around attack”.
I’ve also previously pointed out that,
“Due to the redundancy needed to communicate information, the same redundancy can be used to create a communications channel within the existing communications channel.”
Therefore you can not stop information being leaked either accidently, covertly or even overtly in what is called a “communications side channel”.
Thus to be secure you need very fine control on any communications path be it implicit or explicit.
If there is failures in this area then private or confidential information will be leaked out into other parts of the system. And in turn from there to those observing in the right way.
This is true of all Applications and people who want privacy should seek out ways to mitigate the issues. Methods that I’ve discussed here and other places in the past.
Yes I know my view makes me unpopular with some, but at the end of the day, being honest with people is more important than pleasing people who don’t know what they are talking about, or trying to sell “snake oil”.