Sometimes you have to examine the details of the statement. They specifically said they never worked with the NSA. They did not say they never worked with any security agency in the US or Globally.
Well, in their new statement they did:
"As we have said before, Apple has never worked with any government agency from any country to create a backdoor in any of our products or services. "
I sure hope this doesn't turn out to be a baldfaced lie. The rest of the statement is, unfortunately, not very convincing though:
"We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers, and Apple for troubleshooting technical issues."
Why would "IT departments" or Apple need to be able to access a packet sniffer on the device? It might be useful for developers for debugging purposes, but then the capture service should only be installed on the debug image, not on all devices. Similarly, many of the personal data accessible through the file_relay service are not useful for "IT departments" or Apple.
"A user must have unlocked their device and agreed to trust another computer before that computer is able to access this limited diagnostic data."
That is technically true, but rather easy to bypass. There are some easy things Apple could do to tighten this up:
- Allow the user to manage and remove pairings from the device. It only takes a few seconds for an attacker to create a pairing, and there is currently no way for the user to even detect this
- Add an option to allow the user to block any further pairings
- Disable access to the usbmux service over Wifi if the user has disabled Wifi synicng in iTunes
And, of course, as suggested by Zdziarski, respect the user's encrypted backup setting in all services, and remove unnecessary services from the device.