Naturally most people would ask how they change the password for the Apple ID - well it's quite easy. If they hacked or have access to this email account, they simply request a password reset change via https://iforgot.apple.com and reset the password via email then access the email to reset the password.
Alternatively this can be reset via security questions, but this is more difficult and can eventually lock you out of your account for 24 hours. Once the password is reset they can access the Apple ID account and anything iCloud based as well.
That's not the plan at all.
1) an iCloud ENCRYPTED backup; do you think Apple would be silly enough to transmit the passwords in plain text? Really?
2) they already have the password.
I'm relieved your criminal hacker skills are so poor.
I think everyone is confused. It appears that after October 19 this device stopped backing up to iCloud. And less than 24 hours after the attack the county changed the password associated with this Apple ID. The FBI wants access to the phone to get information in between that time that wasn't backed up to iCloud. My question is had the password not been changed what would Apple engineers had been able to do if iCloud backup was turned off in settings? Even if they connected it to a known network it wouldn't back anything up if that setting was turned off would it? And what other reason would there be for no iCloud backups after Oct 19 other than iCloud backup being turned off in settings?
Add me to the "confused" category. The FBI had access to earlier iCloud backups, but then made it impossible to get future ones. Okay, fine. But, didn't the FBI make this password change after they had the phone in their custody? If so, what new information could they possibly get if the password was left alone?
The backup being encrypted has nothing to do with the connection to iCloud. If that transmission isn't encrypted, it is going over the wire in plain text format.
Prime example: Wireshark your own interface, and visit a site over HTTP, then again over HTTPS. You will see the difference with encryption being enabled, as well as the output of the packets being transmitted.
BL.
Ok if the county changed the Apple ID password (I'm assuming via appleid.apple.com) doesn't the password still have to be changed on the device in settings > iCloud?
Add me to the "confused" category. The FBI had access to earlier iCloud backups, but then made it impossible to get future ones. Okay, fine. But, didn't the FBI make this password change after they had the phone in their custody? If so, what new information could they possibly get if the password was left alone?
Ok if the county changed the Apple ID password (I'm assuming via appleid.apple.com) doesn't the password still have to be changed on the device in settings > iCloud?
To say the coverage this is getting I am shocked that the petition is getting little support.If you'd like to stand with Apple's stance on privacy, there is a White House petition at https://petitions.whitehouse.gov/petition/apple-privacy-petition
Well yes, If this guy turned off iCloud backups then you would need access to the device. I'm confused as to why changing the password matters. What other reason would there be for not having backups after Oct 19 other than he turned it off in settings? And if it's turned off how do you turn it back on outside of the settings app on the device? is there a way to turn on device specific iCloud backups via the web?I think if iCloud backups are off then there would be nothing. Access to the device would be key there. I think that's the rub and why they want that backdoor. No?
Yes it does. It would be like writing the safe combination on the wall by the safe. That would be idiotic.
I find it strange that the FBI had access to the iCloud info. Access to all numbers called and received. All websites visited....Any non-iMessage texts sent and received. Access to the MDM info (work phone)
But still need apple to build a new OS to defeat security against brickforcing?!???
From my understanding of this, Apple suggested creating an iCloud backup by taking the phone to a known wifi network, plugging it in and letting it do its thing. But because the password had been changed on the Apple ID, that wouldn't work - the password would need to be entered first (so that's now two things to crack. Yay).
Is this spin on apples part? The fbi say they have access to the backups up until 19 October. That means the only way that plan would have worked anyway was if he hadn't left the phone plugged in on a known wifi network for SIX WEEKS. Or, as the suggestion was in earlier articles, he deliberately disabled it, in which case this plan would not have worked.
I support Apple on this but this seems like using a get out of jail free card.
There are also ways to hack those backups ... We used to said that; If some one has access to your computer, in order to get the backup I guess you are done. But this case prove us wrongConclusion: Don't use Apple's iCloud backups! Backup only locally to an encrypted Mac![]()
You can send an encrypted file over HTTP. Just because the file is encrypted, doesn't mean that the transport layer is also encrypted. That's the point you are missing.
The attack vector in this case would not be the backup; it would be the transmission to the WiFi hotspot that the phone would connect to, and monitoring that hotspot for when it connects to iCloud. If that connection to iCloud is not over any secure channel, that transmission layer is in a clear text format, including the password being supplied. That could be sniffed at that hotspot.
BL.
Ok but if he turned off iCloud backup in settings than what can be done outside of getting access to the device itself? What other reason would there be no backups after Oct 19?Look at the timeline. Last backup October 19. So all the data from then onwards. Does that make sense now?
Yes.
They don't have access to the 6 weeks prior to the shooting.
Depending on how long it was being planned, what they have so far might be the equivalent of discovering how many poos bin laden had in the 70s.
Maybe the FBI changed the iCloud password to prevent any accomplishes to log in and erase those backups???
I don't think you can "remotely" turn on iCloud backups. I thought if you changed the password on your iCloud then you had to input it again on your device. If the device wasn't on a known wifi network then it would not have prompted for the new password.Well yes, If this guy turned off iCloud backups then you would need access to the device. I'm confused as to why changing the password matters. What other reason would there be for not having backups after Oct 19 other than he turned it off in settings? And if it's turned off how do you turn it back on outside of the settings app on the device? is there a way to turn on device specific iCloud backups via the web?
Ah I get it now. But how would Apple know what's a trusted wifi network? Via iCloud Keychain?Apple seems to believe that iCloud backups are still turned on. If true, then the user had iCloud backup enabled and apparently made their last backup on 19 October. That does not mean that the function is disabled, it is possible that they were never in a trusted Wi-Fi network to make such a backup. After all, it only happens on Wi-Fi and while the device is not actively used. By changing the password, the device will now refuse to back up as it is notified of an account change. If the password were still the same, the iPhone might have started backing up again so that the FBI could retrieve that backup with the iCloud credentials.
They will have any phone numbers dialed and received up to the perp being killed via his cellular company. Ditto for any websites visited on cellular data.
The point you are missing is that they already have the password.
And I've never heard of this type of attack being successful. How many iCloud users again? Pretty sure apples already thought of this and made sure it's more secure.