Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Ok if the county changed the Apple ID password (I'm assuming via appleid.apple.com) doesn't the password still have to be changed on the device in settings > iCloud?
 
Naturally most people would ask how they change the password for the Apple ID - well it's quite easy. If they hacked or have access to this email account, they simply request a password reset change via https://iforgot.apple.com and reset the password via email then access the email to reset the password.

Alternatively this can be reset via security questions, but this is more difficult and can eventually lock you out of your account for 24 hours. Once the password is reset they can access the Apple ID account and anything iCloud based as well.

Naturally most people would read the article, discover that the password was, according to the FBI, changed by the department of health he worked for and, knowing they also issued him the phone, assume he didn't have a personal iCloud ID but a corporate one controlled by his employer?

Your information is otherwise good though.
 
  • Like
Reactions: vmistery
That's not the plan at all.

1) an iCloud ENCRYPTED backup; do you think Apple would be silly enough to transmit the passwords in plain text? Really?

2) they already have the password.

I'm relieved your criminal hacker skills are so poor.

The backup being encrypted has nothing to do with the connection to iCloud. If that transmission isn't encrypted, it is going over the wire in plain text format.

Prime example: Wireshark your own interface, and visit a site over HTTP, then again over HTTPS. You will see the difference with encryption being enabled, as well as the output of the packets being transmitted.

BL.
 
I think everyone is confused. It appears that after October 19 this device stopped backing up to iCloud. And less than 24 hours after the attack the county changed the password associated with this Apple ID. The FBI wants access to the phone to get information in between that time that wasn't backed up to iCloud. My question is had the password not been changed what would Apple engineers had been able to do if iCloud backup was turned off in settings? Even if they connected it to a known network it wouldn't back anything up if that setting was turned off would it? And what other reason would there be for no iCloud backups after Oct 19 other than iCloud backup being turned off in settings?

Apple seems to believe that iCloud backups are still turned on. If true, then the user had iCloud backup enabled and apparently made their last backup on 19 October. That does not mean that the function is disabled, it is possible that they were never in a trusted Wi-Fi network to make such a backup. After all, it only happens on Wi-Fi and while the device is not actively used. By changing the password, the device will now refuse to back up as it is notified of an account change. If the password were still the same, the iPhone might have started backing up again so that the FBI could retrieve that backup with the iCloud credentials.

Add me to the "confused" category. The FBI had access to earlier iCloud backups, but then made it impossible to get future ones. Okay, fine. But, didn't the FBI make this password change after they had the phone in their custody? If so, what new information could they possibly get if the password was left alone?

Apple says that the iPhone would have started making another iCloud backup if connected to a known Wi-Fi network. When the password changes, all account access is denied until the user updates the password in the settings app.
 
The backup being encrypted has nothing to do with the connection to iCloud. If that transmission isn't encrypted, it is going over the wire in plain text format.

Prime example: Wireshark your own interface, and visit a site over HTTP, then again over HTTPS. You will see the difference with encryption being enabled, as well as the output of the packets being transmitted.

BL.

Yes it does. It would be like writing the safe combination on the wall by the safe. That would be idiotic.
 
I find it strange that the FBI had access to the iCloud info. Access to all numbers called and received. All websites visited....Any non-iMessage texts sent and received. Access to the MDM info (work phone)

But still need apple to build a new OS to defeat security against brickforcing?!???
 
Add me to the "confused" category. The FBI had access to earlier iCloud backups, but then made it impossible to get future ones. Okay, fine. But, didn't the FBI make this password change after they had the phone in their custody? If so, what new information could they possibly get if the password was left alone?

Look at the timeline. Last backup October 19. So all the data from then onwards. Does that make sense now?

Ok if the county changed the Apple ID password (I'm assuming via appleid.apple.com) doesn't the password still have to be changed on the device in settings > iCloud?

Yes.
 
If you'd like to stand with Apple's stance on privacy, there is a White House petition at https://petitions.whitehouse.gov/petition/apple-privacy-petition
To say the coverage this is getting I am shocked that the petition is getting little support.
Come on America get signing!

Globally other customers have no say so we rely on you!

If all your states make there own little laws this will not matter as sooner or later a new iOS will be made without encryption.
 
  • Like
Reactions: spinnyd and bronzi
I think if iCloud backups are off then there would be nothing. Access to the device would be key there. I think that's the rub and why they want that backdoor. No?
Well yes, If this guy turned off iCloud backups then you would need access to the device. I'm confused as to why changing the password matters. What other reason would there be for not having backups after Oct 19 other than he turned it off in settings? And if it's turned off how do you turn it back on outside of the settings app on the device? is there a way to turn on device specific iCloud backups via the web?
 
Yes it does. It would be like writing the safe combination on the wall by the safe. That would be idiotic.

You can send an encrypted file over HTTP. Just because the file is encrypted, doesn't mean that the transport layer is also encrypted. That's the point you are missing.

The attack vector in this case would not be the backup; it would be the transmission to the WiFi hotspot that the phone would connect to, and monitoring that hotspot for when it connects to iCloud. If that connection to iCloud is not over any secure channel, that transmission layer is in a clear text format, including the password being supplied. That could be sniffed at that hotspot.

BL.
 
  • Like
Reactions: MrAverigeUser
I find it strange that the FBI had access to the iCloud info. Access to all numbers called and received. All websites visited....Any non-iMessage texts sent and received. Access to the MDM info (work phone)

But still need apple to build a new OS to defeat security against brickforcing?!???

They don't have access to the 6 weeks prior to the shooting.

Depending on how long it was being planned, what they have so far might be the equivalent of discovering how many poos bin laden had in the 70s.
 
How could they log in with a different ID, when they don't know the PIN code? huh??
 
From my understanding of this, Apple suggested creating an iCloud backup by taking the phone to a known wifi network, plugging it in and letting it do its thing. But because the password had been changed on the Apple ID, that wouldn't work - the password would need to be entered first (so that's now two things to crack. Yay).

Is this spin on apples part? The fbi say they have access to the backups up until 19 October. That means the only way that plan would have worked anyway was if he hadn't left the phone plugged in on a known wifi network for SIX WEEKS. Or, as the suggestion was in earlier articles, he deliberately disabled it, in which case this plan would not have worked.

I support Apple on this but this seems like using a get out of jail free card.

Maybe the FBI changed the iCloud password to prevent any accomplishes to log in and erase those backups???
 
  • Like
Reactions: diegogaja
Conclusion: Don't use Apple's iCloud backups! Backup only locally to an encrypted Mac :)
There are also ways to hack those backups ... We used to said that; If some one has access to your computer, in order to get the backup I guess you are done. But this case prove us wrong
 
You can send an encrypted file over HTTP. Just because the file is encrypted, doesn't mean that the transport layer is also encrypted. That's the point you are missing.

The attack vector in this case would not be the backup; it would be the transmission to the WiFi hotspot that the phone would connect to, and monitoring that hotspot for when it connects to iCloud. If that connection to iCloud is not over any secure channel, that transmission layer is in a clear text format, including the password being supplied. That could be sniffed at that hotspot.

BL.

The point you are missing is that they already have the password.

And I've never heard of this type of attack being successful. How many iCloud users again? Pretty sure apples already thought of this and made sure it's more secure.
 
Look at the timeline. Last backup October 19. So all the data from then onwards. Does that make sense now?



Yes.
Ok but if he turned off iCloud backup in settings than what can be done outside of getting access to the device itself? What other reason would there be no backups after Oct 19?
 
That is the proverbial 'technical engineer' who decided they could fix their own system and when they broke it even more to the point of no recovery, they then contact the I.T. guy and expect it to get fixed. #FAIL
 
They don't have access to the 6 weeks prior to the shooting.

Depending on how long it was being planned, what they have so far might be the equivalent of discovering how many poos bin laden had in the 70s.

They will have any phone numbers dialed and received up to the perp being killed via his cellular company. Ditto for any websites visited on cellular data.
 
Maybe the FBI changed the iCloud password to prevent any accomplishes to log in and erase those backups???

Theyd already physically downloaded those backups with apples assistance.

They didn't change the password.

So, no.
 
Well yes, If this guy turned off iCloud backups then you would need access to the device. I'm confused as to why changing the password matters. What other reason would there be for not having backups after Oct 19 other than he turned it off in settings? And if it's turned off how do you turn it back on outside of the settings app on the device? is there a way to turn on device specific iCloud backups via the web?
I don't think you can "remotely" turn on iCloud backups. I thought if you changed the password on your iCloud then you had to input it again on your device. If the device wasn't on a known wifi network then it would not have prompted for the new password.

I don't know. There are holes here that I think my mind is trying to fill, unsuccessfully at that.
 
Apple seems to believe that iCloud backups are still turned on. If true, then the user had iCloud backup enabled and apparently made their last backup on 19 October. That does not mean that the function is disabled, it is possible that they were never in a trusted Wi-Fi network to make such a backup. After all, it only happens on Wi-Fi and while the device is not actively used. By changing the password, the device will now refuse to back up as it is notified of an account change. If the password were still the same, the iPhone might have started backing up again so that the FBI could retrieve that backup with the iCloud credentials.
Ah I get it now. But how would Apple know what's a trusted wifi network? Via iCloud Keychain?
 
They will have any phone numbers dialed and received up to the perp being killed via his cellular company. Ditto for any websites visited on cellular data.

Skype, WeChat, line, whatsapp, viber etc can be used as a substitute for cellular calls. VPN might have prevented the other also.
 
The point you are missing is that they already have the password.

And I've never heard of this type of attack being successful. How many iCloud users again? Pretty sure apples already thought of this and made sure it's more secure.

Again, you miss the point. The point is that you don't go to the destination to get what you are looking for. You go to the intermediary: The WiFi hotspot. Sniff there to get what they were looking for, not the destination (iCloud).

Good tip for you. run a traceroute(1) from your machine to any destination. Note how many hops you go through to get to that destination. I'll bet you anything that the first hop is a router. That is where the attack vector would be. Sniff there for that packet, and unless it is going over VPN or any secure socket layer, the data contained within the packet would be in plain text format, or a hash that could be compared to to get the plain text variant of that hash (read: password).

That is all that the FBI would have needed to do without changing any password.

BL.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.