Wow. Just wow.
You don't have to force anyone to give up any public keys. They are public keys. Get it? Public. Available for everyone to see.
If Apple can't read these messages "without re-engineering systems", then nobody can just take some keys and access the data.
I think he meant the private keys which generated the public certificates. With the private key you can generate a new public certificate allowing impersonation, or read public-key encrypted messages intended for the owner of the private key.
But, by my understanding, Apple doesn't hold the private keys (centrally) either (they are held in your iOS device), although there might be a more obvious attack based on compromising the user's icloud account to register another "device" to receive messages (BUT, this "controversy" is not about divulging private keys, from what I've read). Apple just ensures that the public certificates passed around are the certificates matching the intended recipient.
The risk here is that Apple could manufacture a new public key based on a private key of their own, claim that public key is John Smith's public key, then intercept all messages intended for John Smith. The important thing here is that after intercepting those messages intended for John Smith they would need to re-encrypt the same message using John Smith's
actual public key so John Smith does actually get the message (or, John Smith just forever wonders why he never gets those messages people say they sent him). I forget if there is an authenticity signature in place as well, but if that were so then Apple would need to
also forge the public certificate of the message sender so they could re-sign the message, and John Smith would only ever be able to get messages or send messages to people inside this "forged certificate" system (because anyone else would end up with a signature mismatch). So, unless Apple also has a constraint on this "realm" (if someone is inside the realm they get compromised certificates; if they are outside they get regular certificates), that "realm" would pretty quickly end up encompassing the entire universe of iMessage certificates.
It is a very different type of system at that point, requiring massive forged-keypairs storage mechanism and all messages to pass through a server with access to this storage mechanism.
This is what Apple means, by my read, by "re-engineering" needed for any kind of message interception. It is feasible, but would definitely not be something done on a whim or even in response to a single request from the NSA.
Again, IMHO, the weakest part of any public-private key system is almost always the security of the private key. I think that that is much more likely to be compromised on this system than that Apple would re-engineer the system to provide a man-in-the-middle infrastructure. And, again, the way to counter this is to use a second layer of encryption if you need to: create new private keys which are not stored on your device at all, securely exchange the public certs based on those, and for each secure message encrypt/sign the messages using your hand-entered private key and the recipient's public cert.
It's inconvenient, but that's life as a paranoid.
----------
You missed the entire point. Apple stores the encryption keys on a third party server so that Apple cannot read your messages. ANYBODY who gets those encryption keys can then read the messages. With those keys stored on a commercial server, it's extremely easy for the NSA to access them. All they have to do is get a FISA warrant, DOJ National security letter, or just hack the servers.
To be clear, that is not the vulnerability described by Quarkslab / Cattiaux.
"The biggest problem here is you just cannot control that the public key you are using when you are ciphering the message is really the key of your recipient and not, for example, the public key of some guy in Apple," Cattiaux said.
He is worked up over a potential man-in-the-middle public key replacement scheme (see my previous post), not the ability for the private keys to be compromised. I agree that is a more likely flaw in the system, but it is a long-known flaw.