Same concept as iTunes. Windows still uses iTunes for backing up and so do older versions of macOS.Lol...what? MacOS uses finder to backup iPhone locally now. No need for iTunes.
Same concept as iTunes. Windows still uses iTunes for backing up and so do older versions of macOS.Lol...what? MacOS uses finder to backup iPhone locally now. No need for iTunes.
There are few providers that can store contacts E2E encrypted (Protonmail is one of them). There are several email providers that store the mails E2E encrypted (Protonmail, mailbox.org, Tutanota and others). Coincidentally (?) most are based outside the US, probably because of the trouble Lavabit got into during the Snowden affair. However, the caveat here is that few people send (or are set up to receive) encrypted emails, so they can usually be captured in transit before the provider encrypts them for storage in your mailbox.So my contacts synced via icloud
are encrypted but Apple can read them and give them to authorities
because they are not end-to-end encrypted?
My mail isn’t encrypted at all?
iMessages, FaceTime, Health Data, Home Data, iCloud Keychain, WiFi Password, Siri, Payment Information, Quicktype Keyboard and Screen Time.What's confusing? What else on the iPhone is end-to-end encrypted?
Do I understand it correctly:
- Everything on your phone is impossible for Apple or anyone else to see, without knowing the password.
- Everything stored on iCloud is open if Apple gives permission.
If true it goes against a big part of what I thought Apple was all about - Privacy! One of the biggest selling points compared to their competitors.
More and more of your stuff is stored in the cloud instead of on your phone...
That's a much better response than "don't confuse people".iMessages, FaceTime, Health Data, Home Data, iCloud Keychain, WiFi Password, Siri, Payment Information, Quicktype Keyboard and Screen Time.
In the cited Reuters article but not in the MacRumors summary is this text:
"However, a former Apple employee said it was possible the encryption project was dropped for other reasons, such as concern that more customers would find themselves locked out of their data more often."
Apple encrypts all data in transit (i.e. while they are being transmitted over the network) and at rest (i.e. while they are stored in data centers). This provides protection from network captures in transit and unauthorized access within the data centers. But for data that aren't also E2E encrypted, they possess the decryption keys and can thus produce the clear text data on request.Im really confused as to what is and is not encrypted. According to this iCloud is encrypted so how is anyone getting into these iCloud backups? Can someone please explain
Same concept as iTunes. Windows still uses iTunes for backing up and so do older versions of macOS.
Can I have Time Capsule for iOS? That is all I need. For those who dont want iCloud. It gives them the same benefits of iCloud Backup but within a local environment.
Depends. If the recipient has only activated iCloud syncing of their messages, the messages stay encrypted with a key that only the recipient has. If they have also enabled iCloud Backup, however, that key is uploaded to the cloud together with all the other device content, which means now Apple can decrypt the messages. So as long as iCloud Backup is not used, the messages are safe.I thought iCloud was encrypted. Does this mean that my messages are exposed if I or the person i'm talking to backs their messages up to iCloud?
Why do people post things that are clearly incorrect? From Apple:
[automerge]1579624904[/automerge]
Curious how they'd spin this when they find out that all the major could servicesoperate like this and lack end-to-end encryption.
Im really confused as to what is and is not encrypted. According to this iCloud is encrypted so how is anyone getting into these iCloud backups? Can someone please explain
iCloud data security overview - Apple Support
iCloud uses strong security methods, employs strict policies to protect your information, and leads the industry in using privacy-preserving security technologies like end-to-end encryption for your data.support.apple.com
I'm curious, where are your complaints about Google, Microsoft or all the other cloud services that also hold the master keys to encrypted data? Why the outrage over Apple and not those services? Why is Apple being singled out for something that everyone does in similar fashion?The point is that while it is encrypted with Apple's keys, that means that it is accessible to anyone who has access to those keys.
Those keys may be hacked, they could be stolen, they could be sold by a rogue employee, they could have been generated incorrectly using a non-random process or become accessible in any number of ways. Once Apple's encryption keys are compromised EVERYTHING that was encrypted with those becomes accessible to anyone who has access to those keys.
They are a huge target for anyone who wants access to a ton of encrypted information because they compromise everything encrypted with them. If one was using on device end to end encrypted, compromising one key would compromise one set of backups, not billions of backups.
[automerge]1579627683[/automerge]
The question is twofold:
1. What precisely is encrypted?
and
2. Who holds the keys to that encrypted information?
What you quote above is encrypted, but with Apple's key. Your phone is encrypted with an on device key. So if someone compromises Apple's key, everyone is compromised vs if each device backup uses its own key to encrypt the information, cracking a key on your iPhone only makes that single phone vulnerable, not everyone's.
Think about this though: Imagine you are one of several thousand Apple employees who has access to the keys. Might one of these people sell out for $50 million into a non-US bank account? Or might someone attempt to infiltrate Apple to get access to the keys? Or someone screws up and clicks on a phishing link and the keys are stolen? Or the key generation was compromised so that the key may seem random, but isn't? Or that the host is compromised (e.g. see the Intel/AMD bugs or kernel bugs)? There are many attack vectors and eventually one will be successful which puts everyone at risk.
Being able to compromise every Apple device iCloud backup is a huge prize, particularly since many iCloud services are hosted at Azure or AWS or somewhere else where employees there may have access to the encrypted backups.
Whether you have anything to hide or not, privacy is an important component of liberty. I don't think I have anything to hide, but I also don't have a camera installed in the bathroom or bedroom of the house. Likewise, I don't post every detail of my financial life etc online.
The practical downside of this is that with billions of backups (how many per device?) the incentive to obtain the keys to access that information is huge and eventually it will happen. It is solely a question of when, not if.
Each file is broken into chunks and encrypted by iCloud using AES-128 and a key derived from each chunk’s contents, with the keys using SHA-256. The keys and the file’s metadata are stored by Apple in the user’s iCloud account. The encrypted chunks of the file are stored, without any user-identifying information or the keys, using both Apple and third-party storage services—such as Amazon Web Services or Google Cloud Platform—but these partners don’t have the keys to decrypt the user’s data stored on their servers.
I think this scenario is far fetched. Apple uses HSM (hardware security module) clusters in the cloud, which make it very difficult to extract the keys. It is far more likely that keys in the user's possession (e.g. for E2E encryption) are compromised.The point is that while it is encrypted with Apple's keys, that means that it is accessible to anyone who has access to those keys.
Those keys may be hacked, they could be stolen, they could be sold by a rogue employee, they could have been generated incorrectly using a non-random process or become accessible in any number of ways.
If they have implemented it right, the root keys themselves are accessible by very few or no persons (decryption can be performed on the HSM without the key ever leaving it).Think about this though: Imagine you are one of several thousand Apple employees who has access to the keys.
I see a pattern of posters who will twist things around to make Apple look bad no matter what.
Apple is nothing like Google in how it gathers or treats your data. To imply they are is not just a logical fallacy (false equivalency) is is nothing short of an outright lie. Google is orders of magnitude worse than Apple in the quantity of data they collect, where they collect it from and what they use it for.
BTW, monetization and encryption are not the same thing. So why are you bringing monetization into this discussion?
Let’s get some things straight. Apple is practically one of the only major tech companies taking a stand against the FBI over encryption and privacy. And Apple deserves a lot of credit for what they’ve done.
Secondly, think about what would happen in Washington if the FBI lost access to ALL iPhone data. We would almost certainly see legislation forcing back doors or banning consumer encryption altogether.
My guess is Apple is leaving this one thing as a carrot to dangle, just so they can say that they ARE providing the FBI with data when given a lawful warrant. If they eliminate all possibility of providing the FBI with ANY data when requested lawfully, then that would really stir up a **** storm that would probably end in a way none of us want. This allows them to satisfy government requests, without severely compromising the security of iOS or macOS.
I’m sure Apple thinks long and hard about these issues. No matter how much you want to dump all over Tim Cook.
You’re being disingenuous again. Apple isn’t selling user data to Google because Google gets no user identifying information.You didn't read my post very carefully before drafting your missive. I didn't say Apple is like Google in how it gathers or treats your data. I said Apple gets $9B/year from Google to enable them to monetize your data. They're both profiting from the monetization of users' data - the only difference is Google is the one actually doing it whereas Apple is handing its users to Google to allow it (and profiting from it just like Google is). And I brought up monetization to demonstrate the pattern of Tim Cook/Apple saying one thing in public but doing the opposite in private.
The main concern is that Apple can be compelled by local authorities (not just in the US) to decrypt the content, and that this can be abused by said authorities.