Files
Joseph Goydish II 4d031eb035 Update README.md
2025-11-06 15:54:33 -05:00

2.3 KiB
Raw Permalink Blame History

Silent TCC Bypass & Undocumented Data Flow in iOS 18.6

Author: Joseph Goydish
Date: August 19, 2025
Affected Versions: iOS 18.6 (Confirmed: iPhone 1315)
Access Required: Physical device (no jailbreak or exploit)
Detection Method: Native system logs (log collect, Console.app, sysdiagnose)


Summary

This report documents undocumented system behavior observed in iOS 18.6, where trusted Apple daemons:

  • Bypass TCC (Transparency, Consent, and Control) to access protected data (e.g. Reminders)
  • Write to sensitive preference domains related to photo/comms safety without user interaction
  • Transmit network data (~5MB) silently via system daemons
  • Do so with no app context, no user prompt, and no visibility in UI or privacy settings

Key Findings

  • tccd silently accessed kTCCServiceReminders (Reminders) with preflight=yes and no client app
  • abm-helper, CommCenterRootHelper, cfprefsd, and others activated Mach/XPC communication
  • sosd attempted writes to com.apple.messages.commsafety.plist
  • nsurlsessiond and symptomsd coordinated silent upload/download (~5MB over 2s)

This behavior violates the assumptions behind Apple's TCC privacy framework and is not disclosed in Apples documentation.

Log Evidence

https://ia600904.us.archive.org/25/items/silent-tcc-bypass-undocumented-video/Silent%20TCC%20Bypass%20Undocumented%20Video.mov



Why It Matters

  • No UI prompt, no app context = user has no way to see or deny access
  • TCC is silently bypassed, violating Apples stated privacy guarantees
  • EDR/MDM cannot detect this — trusted daemons execute the chain
  • Forensics and red teams must rely on logs — not standard analytics

Recommendations

  • Monitor system daemon activity with periodic log collect analysis
  • Alert on unauthorized TCC access or daemon write attempts
  • Increase transparency from Apple on system-internal privacy behavior

Resources


“The privacy model we trust is bypassed by the operating system itself.”