Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
The USA authoritarian dictators, FBI, CIA, Industrial Complex et al, should be making radical efforts to limit the access of lethal weapons in the hands of citizens.

More than 1 million American public citizens have been killed by guns since John Lennon was murdered in 1980' that's huge number, which is more than the amount of USA millitary personel killed in all the wars in American history.

How about the think tanks learn to develop passive societies so that laws such as "the right to protect ones self" isn't required. That law makes as much sense as the law, "right to poison myself with tobacco" or "the right to be poisoned by greedy corporations and governments by fossil fuels". After all economy, and profit are supposed to come after the health of humans and the planet so they tell us.

Tim Cook is probably taking advantage of this situation to try and repair the damage done after the acusations made in the past where Apple was said to have been helping FBI, CIA when Snowden mentioned Prism spying.
 
  • Like
Reactions: vmistery and HEK
So the govt who had the phone in its possession when the passcode was changed had the county employee change said passcode knowing that it would lock out the phone from downloading the last month in a halfs unsaved data to the cloud. SO that excuse compels them to go to the judge and force apple to build a backdoor. How convenient. IF they didnt change the passcode that data would have been uploaded to the cloud and the govt could have retrieved it from the cloud. They did not want the information that way because it wouldnt have compelled the judge to give it a court order forcing apple to open up a backdoor for the govt, hackers and thieves. Unbelievable
 
  • Like
Reactions: MagMan1979 and ATC
What if they change the iCloud password back to what it was before they changed it....wouldn't the iCloud backups then resume as if nothing happened (if they are indeed turned on)?

No.

Even if the password is not changed, iCloud backup can ask for verification of the password at random times and will not resume until it is done on the device.

But they have no access to the device.
 
  • Like
Reactions: NazgulRR
Again, you miss the point. The point is that you don't go to the destination to get what you are looking for. You go to the intermediary: The WiFi hotspot. Sniff there to get what they were looking for, not the destination (iCloud).

Sniffing Wi-Fi is essentially useless in 2016. Nobody sends data over the wire unencrypted beyond simple web browsing, and even a lot of ordinary websites have moved to HTTPS. Nothing related to iCloud is ever sent without encryption. Even the iCloud.com website uses HTTPS.

And the transport layer's encryption or lack thereof is irrelevant if the data is being sent in encrypted form over that transport layer. Encrypted is encrypted is encrypted. The only meaningful difference is that a different layer of software does the encryption on one side and the decryption on the other side.

The only thing you get from a typical iPhone when sniffing Wi-Fi is:

  • Ad traffic (often telling you what apps are running)
  • Basic web browsing of HTTP-based sites
  • App downloads (not the authentication, just the transfer of the actual app binary, and not for all apps)
  • Software update downloads
This tends not to be very useful data.
 
Everyone I know who's still trying to get by with the 5GB free iCloud storage has experienced the "backup full" issue. Have an iPad and iPhone? You just doubled how much space you're using. Have more than one iCloud backup of your phone saved? Same story. The backups aren't always smart about chipping away at unecessary data and sometimes bloat much larger than they need to be. I've sometimes had to delete backups that were 3GB, then create a new backup that only resulted in 1.2GB. Even then, it doesn't take long to use up 5GB with photos and HD video.

It's the most probable answer to why the backups stopped in October.

Wouldn't he be prompted to pay for more space or *turn it off* - the latter of which would stop the annoying notifications and therefore mean an increase in space wouldn't resume the backups.
 
so they can already get everything from the cloud thru backups? so what is the point? what do they expect to really find everything these days passes thru the cloud unless you manually disable. maybe imessage? is that end-to-end secure?
 
So is there stuff in the Oct 19 and prior iCloud backups that lead the government to believe there is valuable information on this phone?
No, there is likely nothing of value on this phone. And the FBI hasn't even suggested that there is. They've only left it to the imagination of the public that there must be highly-critical data here and Apple's putting us all at risk by not granting them access. Given that these suspects acted alone and with no actual ties to a terrorist organization, it's not like they're going to find the master plans of ISIS for the next 10 years, along with all of their secret base locations in Syria, but the FBI would love for us to believe that. They're making a big stink about this phone specifically because it's a high-profile case and they realize it's the best chance at getting the public, the politicians and the courts on their side.

As I've said before - there is certainly nothing so valuble on this phone that it's worth putting hundreds of millions of other user's identities and personal data at risk. We're talking about compromising a billion devices, should the tools exist in the world to do what the FBI has asked.
 
3vcfhs.jpg
 
Maybe the FBI changed the iCloud password to prevent any accomplishes to log in and erase those backups???
Folks, just read the FBI filing. It is explained in footnote 7 on page 18. The FBI discussed several options with Apple how to access the information on the device. One of them was to connect the phone to a known Wifi network in an attempt to let it run an automatic backup (which would obviously only have worked if iCloud backup was activated on the device). Quote:

"The four suggestions that Apple and the FBI discussed (and their deficiencies) were:
[...]
(3) to attempt an auto-backup of the SUBJECT DEVICE with the related iCloud account (which would not work in this case because neither the owner nor the government knew the password to the iCloud account, and the owner, in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup);
[...]"

The owner is Farook's employer.
 
  • Like
Reactions: Snide
From my understanding of this, Apple suggested creating an iCloud backup by taking the phone to a known wifi network, plugging it in and letting it do its thing. But because the password had been changed on the Apple ID, that wouldn't work - the password would need to be entered first (so that's now two things to crack. Yay).

Is this spin on apples part? The fbi say they have access to the backups up until 19 October. That means the only way that plan would have worked anyway was if he hadn't left the phone plugged in on a known wifi network for SIX WEEKS. Or, as the suggestion was in earlier articles, he deliberately disabled it, in which case this plan would not have worked.

I support Apple on this but this seems like using a get out of jail free card.
confused how would apple get it if icloud backup is manually disabled on the phone?
 
Everyone I know who's still trying to get by with the 5GB free iCloud storage has experienced the "backup full" issue. Have an iPad and iPhone? You just doubled how much space you're using. Have more than one iCloud backup of your phone saved? Same story. The backups aren't always smart about chipping away at unecessary data and sometimes bloat much larger than they need to be. I've sometimes had to delete backups that were 3GB, then create a new backup that only resulted in 1.2GB. Even then, it doesn't take long to use up 5GB with photos and HD video.

It's the most probable answer to why the backups stopped in October.

Agreed. IMO, Apple should provide enough backup storage with iCloud to back up a user's entire device. Given that Apple charges $100 for what amounts to about ten dollars worth of additional flash storage, they can afford it. And it might save them from silliness like this in the future....
 
What if they change the iCloud password back to what it was before they changed it....wouldn't the iCloud backups then resume as if nothing happened (if they are indeed turned on)?

I don’t know how iOS would respond. However, Apple is reasonably competent about basic security measures and I am pretty sure that Apple has not saved the password in a retrievable state. Passwords are nowadays stored as ‘salted’ hashes, if not better, and the verification happens by comparing those hashes. Even if they are lucky and found the old password somewhere, e.g. personal files, then there is still no guarantee that the Apple ID would create the exact same hash again (e.g. if the Apple ID generates new ‘salt’ as well when the password is changed) or that the iPhone would ignore the password change notice.
 
Wouldn't he be prompted to pay for more space or *turn it off* - the latter of which would stop the annoying notifications and therefore mean an increase in space wouldn't resume the backups.
I've personally seen people ignore those warnings about iCloud storage being full and backups haven't happened in X number of days for literally months. The reason I'm lead to believe this is the most likely cause of the backups stopping is because apple suggested connecting to a known network to activiate an icloud backup. The only reason they would have thought that to work is if they checked the account, saw that the storage was full, then upped the available storage.
 
  • Like
Reactions: Doc C
Folks, just read the FBI filing. It is explained in footnote 7 on page 18. The FBI discussed several options with Apple how to access the information on the device. One of them was to connect the phone to a known Wifi network in an attempt to let it run an automatic backup (which would obviously only have worked if iCloud backup was activated on the device). Quote:

"The four suggestions that Apple and the FBI discussed (and their deficiencies) were:
[...]
(3) to attempt an auto-backup of the SUBJECT DEVICE with the related iCloud account (which would not work in this case because neither the owner nor the government knew the password to the iCloud account, and the owner, in an attempt to gain access to some information in the hours after the attack, was able to reset the password remotely, but that had the effect of eliminating the possibility of an auto-backup);
[...]"

The owner is Farook's employer.

The FBI should employ some more technically minded people. Don't they contradict themselves in point 3? They say the auto backup wouldn't work because they didn't know the iCloud account password but the point is thy didn't need to. Only what you put in bold is relevant.
 
Sniffing Wi-Fi is essentially useless in 2016. Nobody sends data over the wire unencrypted beyond simple web browsing, and even a lot of ordinary websites have moved to HTTPS. Nothing related to iCloud is ever sent without encryption. Even the iCloud.com website uses HTTPS.

And the transport layer's encryption or lack thereof is irrelevant if the data is being sent in encrypted form over that transport layer. Encrypted is encrypted is encrypted. The only meaningful difference is that a different layer of software does the encryption on one side and the decryption on the other side.

The only thing you get from a typical iPhone when sniffing Wi-Fi is:

  • Ad traffic (often telling you what apps are running)
  • Basic web browsing of HTTP-based sites
  • App downloads (not the authentication, just the transfer of the actual app binary, and not for all apps)
  • Software update downloads
This tends not to be very useful data.

Hence, why I said if the connection to iCloud goes over plain text (read: protocol like HTTP). If it doesn't, then obviously that isn't going to work. But my point is that sniffing the hotspot would have been the best place for the FBI to find the data they're looking for, because it is the router that they are wanting to look at, not the WiFi connection. Sniff the routing layer, and they could have what they were looking for.

Too late for that, as they changed the password (allegedly).

BL.
 
I've personally seen people ignore those warnings about iCloud storage being full and backups haven't happened in X number of days for literally months. The reason I'm lead to believe this is the most likely cause of the backups stopping is because apple suggested connecting to a known network to activiate an icloud backup. The only reason they would have thought that to work is if they checked the account, saw that the storage was full, then upped the available storage.

Apple can't see our passwords but they must know that they have been changed. By the time Apple and the fbi were discussing it they'd have known it wouldn't work anyway for this reason.
 
The point you are missing is that they already have the password.

And I've never heard of this type of attack being successful. How many iCloud users again? Pretty sure apples already thought of this and made sure it's more secure.

He also thinks the I cloud password is actually sent in the clear... Oh my.
 
The FBI should employ some more technically minded people. Don't they contradict themselves in point 3? They say the auto backup wouldn't work because they didn't know the iCloud account password but the point is thy didn't need to. Only what you put in bold is relevant.
My interpretation is that they would have changed the password back to Farook's original password, so the phone could authenticate and do the auto-backup. But since they never had the original password, that wasn't possible.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.