Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Am I understanding this correctly? If I buy a new iPhone and add it to my Apple ID, I can't turn on the "Advanced Data Protection" feature to encrypt my iCloud backups for 60 days?

So if I have an iPhone 13, turn on "Advanced Data Protection" and encrypt my iCloud backups, and then next month, I buy a brand new iPhone 14 and copy my iPhone 13 over to it, does that mean my backups on the new iPhone 14 are now all of sudden unencrypted until I am allowed to turn on this feature again in two months?

This makes no sense.
All this means is you can't enable the feature on your account via a newly activated device. If you enable the feature on your account via the 13, you will have nothing to worry about when you get a 14 as the feature is already on.

All this prevents is malicious intent. If you don't have the feature enabled, and someone gains access to your credentials/account, without the activation lockout period they could theoretically sign in on a new device, enable the feature, and then lock you out of your own account for a ransom.
 
No, advance data protection is account wide. If you're able to enable it on iPhone 13 it will also be on iPhone 14. But the waiting period still exists for new starts on new devices.

Thank you. This makes much better sense to me now. :cool:
 
What is the logic that says users are better protected by waiting to enable this feature? I'm confused by the reasoning for this.

My guess is to prevent a bad guy from adding a device to your iCloud account and then locking it down with encryption, changed passwords, etc.
 
  • Like
Reactions: NetMage
Turning off and then turning on again should not automatically send keys to Apple,
meaning turn off ADP, then turning ADP back on again? Apple would receive a copy of your keys but destroy them again.

I guess if you're looking at it from the perspective of not uploading a copy of the keys to Apple period and trusting that they delete them? Sure thats a valid concern. But if Apple is shown to be able to "recover" ADP enabled accounts for whatever reason then that's pretty bad.

edit: but we don't know if the encryption keys are rotated when ADP is enabled. I'd bet on this being the case so Apple wouldn't have a copy of the keys period. Again, assuming everyone is being true to their word.
 
  • Like
Reactions: Wizec
edit - Ninja'd by Rigby. ;-) Definitely seems the reason with either 3rd party damage or extortion being the ultimate goal they're trying to prevent there, nicely thought out.

Does provide an interesting choice for the general user - don't turn it on and Apple can save yourself from yourself (recovering your data etc.), but at the risk of warrant based access of your data - or you can turn this on and its all on you. Whether your country does or does not have a relatively strong rule of law foundation would likely alter these calculations as well.
Good point on the extortion. Essentially this scenario would turn advanced protection into a form of ransomware. o_O "Pay me a zillion bitcoin to decrypt your data".
 
I can't even enable it now, it just spins. Maybe it'll be turned on when it's publicly released.

EDIT- Just did this now and now it says to update my Watch, Apple TV, and MB Pro to the latest versions before I can update. This is new and I guess I'll be turning it on next week.
 
  • Like
Reactions: fraXis and killawat
Likely to save people from themselves. While encrypted iCloud is great - plenty of people are going to get royally burned by it when they forget stuff
Could be another reason also, so the servers don’t get immediately impacted by thousands of users running encryption processes. But I like the thought of malicious or careless parties being hindered from encrypting Apple ID parties data.
 
Last edited:
Could be another reason also, so the servers don’t get immediately impacted by thousands of users running encryption processes. But I like the thought of malicious or careless parties being hindered from encrypting Apple ID parties data.
They don't need to encrypt data. It's already encrypted, they just change where the keys are stored (in HSMs in their data centers or on your devices). The technical foundation for this has been designed years ago.
 
Could be another reason also, so the servers don’t get immediately impacted by thousands of users running encryption processes. But I like the thought of malicious or careless parties being hindered from encrypting Apple ID parties data.

Encryption is so well accelerated on modern processors that there is no extra “burden” from encryption.

Apple is encrypting at rest, but this will trigger a new encryption pass with new keys generated and unknown to Apple. The encryption will have to occur on device though otherwise Apple would need the keys. So that weight won’t be borne by Apple servers.
 
The FUD is strong in this thread.
  • If you have a device that’s been active for a while, you can turn it on.
  • If you turn it on, it’s on for ALL devices.
  • The reason you can’t use a recently activated device, is so if someone compromises your account and signs in on a device, they can’t lock you out of your data.
 
The FUD is strong in this thread.
  • If you have a device that’s been active for a while, you can turn it on.
  • If you turn it on, it’s on for ALL devices.
  • The reason you can’t use a recently activated device, is so if someone compromises your account and signs in on a device, they can’t lock you out of your data.
This needs to be the top post.
 
Encryption is so well accelerated on modern processors that there is no extra “burden” from encryption.

Apple is encrypting at rest, but this will trigger a new encryption pass with new keys generated and unknown to Apple. The encryption will have to occur on device though otherwise Apple would need the keys. So that weight won’t be borne by Apple servers.
All the data is already encrypted on the server, and has been for some time. All this does is move the keys from the server to the device.
 
What is the logic that says users are better protected by waiting to enable this feature? I'm confused by the reasoning for this.
My guess is this is to protect the backups of someone with a compromised account to give them time to act. Perhaps a similar threat to SIM swaps?
 
  • Like
Reactions: NetMage
Encryption is so well accelerated on modern processors that there is no extra “burden” from encryption.

Apple is encrypting at rest, but this will trigger a new encryption pass with new keys generated and unknown to Apple. The encryption will have to occur on device though otherwise Apple would need the keys. So that weight won’t be borne by Apple servers.
I'm not sure if they actually rotate the keys. But if they do, they can space it out to prevent a spike of new iCloud Backup and Drive uploads.
 
Likely to save people from themselves. While encrypted iCloud is great - plenty of people are going to get royally burned by it when they forget stuff
THey already do.

Enabling recovery code, forgetting the Email, forgetting they useda fake name, DOB, fake location, fake number, passwords etc.

Then they claim they never did any of that and would never do any of that. etc etc.

like people need to start writing **** down if they are going to do stupid ****.

This is just another tool for the paranoid and schizophrenic people of the world to loose all their ****.. THEN BLAME someone for stealing or HACKING them.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.