Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.

MacRumors

macrumors bot
Original poster
Apr 12, 2001
68,198
38,989



Conversations in the Messages app feature end-to-end encryption that makes the content of the messages impossible to decipher, but according to documentation found by The Intercept, Apple tracks who its customers send iMessages to and is able to hand that information over to law enforcement when compelled to do so through a court order.

When a text message is sent to someone, the Messages app pings Apple's servers to see if the person has an iPhone or iPad in an effort to determine whether to send a message via iMessage or SMS. Each ping records date, time, number, and IP address, all of which is kept in a log that Apple says it stores for 30 days
Apple confirmed to The Intercept that it only retains these logs for a period of 30 days, though court orders of this kind can typically be extended in additional 30-day periods, meaning a series of monthlong log snapshots from Apple could be strung together by police to create a longer list of whose numbers someone has been entering.
The data on how Messages works was reportedly obtained by The Intercept from a document entitled "iMessage FAQ for Law Enforcement" that was given to the Florida Department of Law Enforcement's Electronic Surveillance Support Team. While labled "Law Enforcement Sources" and "For Official Use Only," it is not clear who wrote it.

Click to enlarge. Image via The Intercept

As The Intercept points out, the documentation suggests that each number entered into the Messages app is transmitted to Apple when a new chat is opened, even if a conversation does not end up taking place. An Apple spokesperson said that the logging information in the iMessage FAQ is "generally accurate" but did not give additional data to make it clearer exactly when the Messages app pings Apple's servers. Apple did, however, give the following statement:
When law enforcement presents us with a valid subpoena or court order, we provide the requested information if it is in our possession. Because iMessage is encrypted end-to-end, we do not have access to the contents of those communications. In some cases, we are able to provide data from server logs that are generated from customers accessing certain apps on their devices. We work closely with law enforcement to help them understand what we can provide and make clear these query logs don't contain the contents of conversations or prove that any communication actually took place.
Apple takes a strong stance on privacy and promises to keep customer data private with tools like end-to-end encryption for the Messages app, but it has always maintained that there is some information that it is able to provide to law enforcement officials when compelled to do so.

Apple's website features a privacy section that details the information it collects and the types of data that it provides for government requests, including a full rundown of what's available to law enforcement [PDF]. Apple's documentation does not appear to mention Messages specifically, but it does specify that iCloud connection logs are retained for 30 days and that FaceTime calls logs are also maintained.

Note: Due to the political nature of the discussion regarding this topic, the discussion thread is located in our Politics, Religion, Social Issues forum. All forum members and site visitors are welcome to read and follow the thread, but posting is limited to forum members with at least 100 posts.

Article Link: Apple Tracks Who You Contact on Messages, Stores Logs for 30 Days
 
No better than Google, nor any other phone company to begin with.

Again, since your data is going through a third party, they are not protected by the 4th Amendment when it comes to needing a warrant for search. All that is needed is a subpoena by a clerk of the court (and by default, any lawyer is a clerk of the court).

All of this was mentioned in the following thread, 3 years ago.

https://forums.macrumors.com/threads/your-personal-data-versus-the-4th-amendment.1649516/

This isn't Apple's fault. This isn't Google's fault. This isn't any Telco's fault. The fault of this lies in how the 4th Amendment is applied, and that it does not cover 3rd parties in charge of handling your data.

BL.
 
It's not a major issue, but it also flies in the face of Apple's privacy philosophy

No, it doesn't. Apple are completely upfront with their privacy policy.

We're talking about a messaging app, synced across Mac/iOS devices, capable of sending SMS and iMessage, with the entire conversation history available until you delete it. Pinging a device and Apple's servers, to figure out what a device is and how to talk to it, just comes with the territory of this technology.

And again, Apple can't see any of the content from the messages, nor do they store it or even have the facility to decrypt it. Complete non-issue.
 
Last edited:
what purpose do the logs serve outside of being able to supply this information to law inforcement? Could apple just encrypt the logs as well?

Well, the purpose for the existence of these logs could be for any number of reasons that I can't think up - caching, aiding people in switching from iMessage, random metrics, selling Teddy bears, etc. Just because you or I can't think of a specific reason outside of the law enforcement angle doesn't mean they exist for law enforcement.

I think the better question is what do these logs serve to provide law enforcement agencies? Not very much.
- There is no guarantee that conversation took place
- Response Time is not real
- Queries aren't made for all messages sent or attempted
- Queries can be made without messages being sent (or without confirmation on the user-end)
- Numbers aren't tied to any particular device

There is the chaining together an IP with an action, but it's all very circumstantial. It's less than what could be taken from telecom companies, which has defacto records acknowledging communication between two parties took place when utilizing their message system.

I just think Apple needs to make it be known - but IMO this is even less evasive than FaceTime logs which they already do.
 
Last edited:
Be afraid. Be very afraid.


No, I don't think so. Here is what the story failed to explain. When you start to send a text message say a new one, you type in the phone number of the person you are intending to text. Apple then pings it server to determine whether to make the bubble blue for imessage or green for sms. If you decide not to send or to send the message is a separate issue. Apple has already determine which method it will use and has given you a visual clue to that decision in form of the color. This is just as intended and has no real bearing on security or privacy. The only thing that we might be able to argue is that Apple should only keep that log for a week or a day but a month does not seem totally unreasonable.
 
Last edited:
No better than google now s/

No need for the /s sarcasm tag, the sentiment is misplaced:

Look back to Apple's 2009 privacy based lawsuit, Apple helping China's law enforcement but not the FBI, etc...


Why reason would Apple have for logging ip address?

Why should any company touting anonymity?

In some ways and places, it's fair to do so. Arguably one could support Apple on this topic as well given issues surrounding terrorism. Which is fair.

But it's probably more related to some marketing scheme to find local stores of services in the area, FWIW.
[doublepost=1475090899][/doublepost]
Hey, I already pay good tax dollars to have the NSA do that!

But Apple is a private company and will do it better and cheaper, "just because".

:rolleyes:
 
https://9to5mac.com/2016/09/28/apple-imessage-contacts-law-enforcement/

From Apple's docs:
“When you use your device, your phone number and certain unique identifiers for your iOS Device are sent to Apple in order to allow others to reach you by your phone number when using various communication features of the iOS Software, such as iMessage and FaceTime.”

“Apple has FaceTime call invitation logs when a FaceTime call invitation is initiated. These logs do not indicate that any communication between users actually took place.”

“Please note the only categories of user generated active files that can be provided to law enforcement, pursuant to a valid search warrant, are: SMS, iMessage, MMS, photos, videos, contacts, audio recording, and call history. Apple cannot provide: email, calendar entries, or any third-party app data.”

“iCloud content may include stored photos, documents, contacts, calendars, bookmarks and iOS device backups. iOS device backups may include photos and videos in the users’ camera roll, device settings, app data, iMessage, SMS, and MMS messages and voicemail. iCloud content may be provided in response to a search warrant issued upon a showing of probable cause.”
 
  • Like
Reactions: mrxak
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.