Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Did you just have a class in networking where you used Wireshark and suddenly think you're an expert? There's no way that iCloud backups are done over an unencrypted connection.

Again, Note that I said IF it went on a non-secure channel.

BTW: I've been a UNIX systems admin for the past 24 years. I've managed data from DoD servers to databases holding credit card data, conforming to PCI and ISO 27002 standards.

BL.
 
Have you guys ever thought that the FBI provoked this San Bernardino incident with the sole purpose of forcing Apple to make a backdoor for their devices?

Just the way the government provoked the 911 incident.

Bad reputation is building up for the FBI right now.
Provoked the attack? No I'm not at that point yet. But they did pick this particular case for political reasons. They can push the terrorist card. And we all know we will give up all our liberties to fight terror.

Oh wait......isn't that what terrorists hate about us and want to end, our hard fought for freedoms. Once our own government lies to us, and removes all our freedoms, terrorists can sit back, as they have won. But we will be safe.
 
  • Like
Reactions: garylapointe
Forgive me if this has already been answered...

Apple provided iCloud backup data to the FBI. But on this support document it states iCloud backup data is encrypted both in transit and on server.

So did Apple provide encrypted backup files to the FBI, or did Apple decrypt them and then hand over the data?

Or, was the server-side encryption a new thing and the iPhone in question was running an old version of iOS?

Or am I missing something?

As I wrote in my previous comment, I wonder the same thing as I thought all data to/from/residing in iCloud was encrypted and useless to Apple and anybody else.
[doublepost=1455936903][/doublepost]
Conclusion: don't commit crimes that will get the US Government to send subpoena's out looking for information for you.

Or at least don't store the data on your phone!

Gary

As we have seen, the US was performing bulk surveillance and data collection on all US citizens, the bulk of which were innocent.
 
  • Like
Reactions: Brookzy
Have you guys ever thought that the FBI provoked this San Bernardino incident with the sole purpose of forcing Apple to make a backdoor for their devices?

Just the way the government provoked the 911 incident.

Bad reputation is building up for the FBI right now.

And NASA faked the moon landings, right?

There is a bad reputation being built for Apple too. Just saying. Not assisting in the investigation of a terrorist attack when asked to do so isn't exactly good publicity.
 
  • Like
Reactions: ohio.emt
I never used iCloud or other Cloud Services.
And I surely will never ever do….

I never wanted to upgrade from IOS7 to later IOS…. but now I am thinking about….
 
Provoked the attack? No I'm not at that point yet. But they did pick this particular case for political reasons. They can push the terrorist card. And we all know we will give up all our liberties to fight terror.

Oh wait......isn't that what terrorists hate about us and want to end, our hard fought for freedoms. Once our own government lies to us, and removes all our freedoms, terrorists can sit back, as they have won. But we will be safe.

Oh no please not another theory of "The US government destroyed the twin towers...". Lets get real...

-Mike
 
  • Like
Reactions: ohio.emt
Apple should continue to attack the FBI's arguments through the media. There isn't a gag order in place. Hammer away at their incompetence and untrustworthiness. I don't dislike Tim Cook, but right now Apple needs a orator. *SJ* would have been awesome at this.

maybe THIS is the moment they get their value from Dre
 
The backup being encrypted has nothing to do with the connection to iCloud. If that transmission isn't encrypted, then the encrypted back up going over the wire in plain text format.

Prime example: Wireshark your own interface, and visit a site over HTTP, then again over HTTPS. You will see the difference with encryption being enabled, as well as the output of the packets being transmitted.

BL.

FFTY I hope. I can't imagine Apple allowing an unencrypted backup over the wire.
I need to read up on this because the FBI was able to get data from the iCloud backup.
 
Provoked the attack? No I'm not at that point yet. But they did pick this particular case for political reasons. They can push the terrorist card. And we all know we will give up all our liberties to fight terror.

Oh wait......isn't that what terrorists hate about us and want to end, our hard fought for freedoms. Once our own government lies to us, and removes all our freedoms, terrorists can sit back, as they have won. But we will be safe.

By the erosion of God-given and fought-for liberties as we have seen in the days following 9/11, the government is becoming that it's agents were sworn to defend against.
 
Again, Note that I said IF it went on a non-secure channel.

BTW: I've been a UNIX systems admin for the past 24 years. I've managed data from DoD servers to databases holding credit card data, conforming to PCI and ISO 27002 standards.

BL.

IF THE GUYS PASSWORD WAS "GARY" then they only needed to enter the password "GARY" .

it's been shown to you that the premise of your "if" is wrong.
 
Forgive me if this has already been answered...

Apple provided iCloud backup data to the FBI. But on this support document it states iCloud backup data is encrypted both in transit and on server.

So did Apple provide encrypted backup files to the FBI, or did Apple decrypt them and then hand over the data?

Or, was the server-side encryption a new thing and the iPhone in question was running an old version of iOS?

Or am I missing something?
Here's one answer to my own question.

The Intercept claim that Apple decrypts iCloud backup data when ordered to:
https://theintercept.com/2014/09/22/apple-data/ said:
While Apple does not have the crypto keys that can unlock the data on iOS 8 devices, they do have access to your iCloud backup data. Apple encrypts your iCloud data in storage, but they encrypt it with their own key, not with your passcode key, which means that they are able to decrypt it to comply with government requests.

That really sucks. I was under the impression the iCloud backups were useless even to Apple.
 
  • Like
Reactions: SantaFeNM
I doesn't seem like the government is coming clean and transparent with information.
They make it seem in the Intro (of the Motion) that Apple is not co-operating to help them with the investigation (see Intro of the Motion to Compel). And then go on to paint Apple as being "bad", while in fact, we are now hearing:
  • Apple was in discussions with them and did try to help the FBI
  • The password Apple ID was changed while in the device was in government hands (FBI blames the health dept)
Regardless, the fact the FBI did not come front and center with this info, leads to more distrust in the government.

Instead, we hear them making accusation like "it's all marketing ploy by Apple" (as mentioned in the Motion)...
Also "the government subsequently sought Apple's help in it's effort to execute lawfully issued search warrant. Apple refused". Well we are hearing a different story, and that Apple did help initially.

Everything written in the motion may be factual, but it doesn't present a truthful representation of what happened.

More transparency is needed.

.
This is US government, transparency ended decades ago. Now you will know what they want you to know, until it is leaked. Then red faced they will retrench and go off on some tangent to deflect criticism. This is all obvious to open mind looking at history since WWII?
 
Forgive me if this has already been answered...

Apple provided iCloud backup data to the FBI. But on this support document it states iCloud backup data is encrypted both in transit and on server.

So did Apple provide encrypted backup files to the FBI, or did Apple decrypt them and then hand over the data?

Or, was the server-side encryption a new thing and the iPhone in question was running an old version of iOS?

Or am I missing something?

The thing is that there are two logging codes, the Apple ID password and the passcode for the phone.
The Apple ID password I believe encrypts the Icloud data and yes Apple has that info because you're they need to log you in, change it, and decrypt your data to send it to you.

There are a lot of different kind of Icloud data, it is possible that some of them needs on device keys too to decrypt, I haven't looked into that.

https://support.apple.com/en-ca/HT202303

The Icloud backups stop on the 19th of October, because of a screwup by the FBI and the county where they guy worked at (it was a work phone), they somehow are no longer able to force a backup of subsequent data (if there are any).

Now, they need to get into the phone itself with a passcode. In that case, Apple would have to make a custom software/firmware to bypass the phone's key wipe security after X log in so the FBI can do a brute force attack on the passcode. This is not a trivial thing to do for Apple technically and most of all ethically.

The only reason it's even possible to create this software is that this phone is a 5c and not a 5s and more recent. In more recent phones the delays between attempts are enforced in hardware (and they key wipes too), so there is no way around unless Apple changes not only the software/firmware but also the hardware. Apple doesn't want to have access to the on phone data.
 
  • Like
Reactions: gigi1701
Isn't that title incorrect?
They changed the Apple ID, but the problem is they did NOT change it ON THE iPhone and now it won't connect...

BUT if they hadn't changed the ID and someone sent a remote wipe, then there would be that problem.

Gary

would a remote wipe show up explicitly on the phone, or would it still be on the passcode entry screen until the passcode was entered and then "BOOOM THIS PHONE WAS WIPED SUCKERSSS"? i've never used it.
 
Hold up! So there is a way access data in the iPhone? **** that ****. Fix that bug Apple. I pay a lot of money for these reasons. Steve Jobs would never allow this to happen.

actually Steve Jobs did allow it. All versions of iOS prior to iOS 8 had a coding in the system that would allow a computer to create a kind of permanent trusted connection. So long as the passcode hadn't reached the disabled/connect to iTunes screen, you could still do backups to that trusted computer even without inputing your passcode. That was created under Steve's watch. It was Tim Cook's regime that discovered that said coding created a potential hackable security risk and removed it. Which is why you have to manually trust the same computers over and over and unlock your passcode to do anything
 
The USA authoritarian dictators, FBI, CIA, Industrial Complex et al, should be making radical efforts to limit the access of lethal weapons in the hands of citizens.

More than 1 million American public citizens have been killed by guns since John Lennon was murdered in 1980' that's huge number, which is more than the amount of USA millitary personel killed in all the wars in American history.

How about the think tanks learn to develop passive societies so that laws such as "the right to protect ones self" isn't required. That law makes as much sense as the law, "right to poison myself with tobacco" or "the right to be poisoned by greedy corporations and governments by fossil fuels". After all economy, and profit are supposed to come after the health of humans and the planet so they tell us.

Tim Cook is probably taking advantage of this situation to try and repair the damage done after the acusations made in the past where Apple was said to have been helping FBI, CIA when Snowden mentioned Prism spying.
Nailed it
 
As I wrote in my previous comment, I wonder the same thing as I thought all data to/from/residing in iCloud was encrypted and useless to Apple and anybody else.
Most of the user data in iCloud is encrypted at rest (in part because they use 3rd party cloud providers like Amazon AWS and MS Azure to store them), but with the current design Apple has the keys for most of them (exception: iCloud Keychain).

It would theoretically be possible to encrypt iCloud backups with a key derived from the user's iCloud password (in this case Apple wouldn't be able to decrypt them), but currently they don't do this according to the iOS Security Guide ("The user’s iCloud password is not utilized for encryption so that changing the iCloud password won’t invalidate existing backups").
 
  • Like
Reactions: SantaFeNM
oh perhaps because the agencies that have been after Apple and others to create back doors all work for the president. FBI, Justice Department, Homeland security. Check your civics books, president is head of those departments.
If you're suggesting that the President is calling the shots in regards to the minutia of individual FBI investigations, well that's coo-coo; the man's got enough on his plate without demanding to know what's on some nobody's iPhone. The director of the FBI is appointed by the President, but after that he doesn't even report directly to the President. Hell, the FBI can even investigate the President if need-be.
 
From my understanding of this, Apple suggested creating an iCloud backup by taking the phone to a known wifi network, plugging it in and letting it do its thing. But because the password had been changed on the Apple ID, that wouldn't work - the password would need to be entered first (so that's now two things to crack. Yay).

Is this spin on apples part?

.

nope. its not spin. if you change your password it disconnects your phone from iCloud until you put in the new password.

also, as my Genius BF reminded me, automatic backups only attempt once every 24 hours (something he wishes they would change).so lets say you hit back up now on your phone at noon on Saturday when you are home watching sports. it will attempt to automatically backup every day at noon after that. but only if you are on wifi, plugged in and the phone is sleeping. How often are we in such a position every day at noon. That's why Tommy recommends to folks that they manually trigger a backup really late at night like right before they go to bed. more likely to met the proper conditions. It's also possible, Tommy reminded me, that said party might not have had enough iCloud storage space and the backups keep failing. but apple might have offered to max out the space to make sure that wasn't a problem. then the feds would need to go to the house or the man's office (if it has accessible wifi) to try to the attempt, perhaps having to leave the phone for 24 hours to hit the end of the daily countdown

Conclusion: Don't use Apple's iCloud backups! Backup only locally to an encrypted Mac :)

if you are going to do that then you have to remember that log in passwords can be changed so you need to encrypt the backup in iTunes and make sure that 'save password' is off
 
The only reason it's even possible to create this software is that this phone is a 5c and not a 5s and more recent. In more recent phones the delays between attempts are enforced in hardware (and they key wipes too), so there is no way around unless Apple changes not only the software/firmware but also the hardware. Apple doesn't want to have access to the on phone data.

apple claims it will affect ALL iphones, past and present. see the techcrunch article.
 
  • Like
Reactions: Arndroid
nope. its not spin. if you change your password it disconnects your phone from iCloud until you put in the new password.

also, as my Genius BF reminded me, automatic backups only attempt once every 24 hours (something he wishes they would change).so lets say you hit back up now on your phone at noon on Saturday when you are home watching sports. it will attempt to automatically backup every day at noon after that. but only if you are on wifi, plugged in and the phone is sleeping. How often are we in such a position every day at noon. That's why Tommy recommends to folks that they manually trigger a backup really late at night like right before they go to bed. more likely to met the proper conditions. It's also possible, Tommy reminded me, that said party might not have had enough iCloud storage space and the backups keep failing. but apple might have offered to max out the space to make sure that wasn't a problem. then the feds would need to go to the house or the man's office (if it has accessible wifi) to try to the attempt, perhaps having to leave the phone for 24 hours to hit the end of the daily countdown

you clearly misunderstood. the "spin" was suggesting that this was even a possibility.

also, that it tries once at a set time every 24 hours is simply not true... if it fails it will try the next time it is plugged in, locked and on wifi, whatever time of that that is. i've had automatic backups complete morning noon and night.
 
  • Like
Reactions: Arndroid
Apple has until February 26 to respond. The Government set the hearing for March 22. That's plenty of time for those here who are enjoying speculating on what happened, to compose several posts. Not to mention the duplicate threads that are bound to be created.

This will be quite an entertaining chapter in Apple's history.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.