Pshh I'll take it off your hands if you're just going to throw it in the trashWhere is iOS 16.2?! I’m about to throw my expensive iPhone in the trash!!!
😏
Pshh I'll take it off your hands if you're just going to throw it in the trashWhere is iOS 16.2?! I’m about to throw my expensive iPhone in the trash!!!
😏
How?WRONG
This buffer only helps the hacker in the long run. I hope Apple changes their mind and enable users to set up iCloud encryption during device setup. This is privacy disaster waiting to happen if buffer time is added.
It’s a joke… I hoped it would come across that way.Why??
The last bullet is where the logic breaks down.The FUD is strong in this thread.
- If you have a device that’s been active for a while, you can turn it on.
- If you turn it on, it’s on for ALL devices.
- The reason you can’t use a recently activated device, is so if someone compromises your account and signs in on a device, they can’t lock you out of your data.
I think it is specifically not allowing it to be turned on from any device newly added to your account if it is not already enabled. But an account with it already enabled would be no issue. This stops a hacker (or more likely an abuser) from adding a device to your account and locking you out of your data.The last bullet is where the logic breaks down.
Someone can compromise your account and sign in on an old device. Why would someone need to purchase a new device to compromise an account?
I would guess that the new device rule has nothing to do with new devices, but rather to artificially stagger the process of encrypting devices and accounts to reduce the load on iCloud services.
'New device' isn't clearly defined, so a device purchased one year ago can be considered 'new' for all intents and purposes.
The FUD is strong in this thread.
- If you have a device that’s been active for a while, you can turn it on.
- If you turn it on, it’s on for ALL devices.
- The reason you can’t use a recently activated device, is so if someone compromises your account and signs in on a device, they can’t lock you out of your data.
That’s false. You can’t enable it at all if you either have a device added to your iCloud account that does not support iOS 16 or macOS Ventura or apparently a new device. If you have those devices, you have to remove them from your iCloud account first. All your devices have to jive because you won’t be able to use iCloud at all with any of those devices, the older ones or a recently added device. The case might be different if ADP is already enabled for your iCloud account and THEN get a new device.From a new device. If you have another device on your iCloud account already, you can still turn it on. You just can’t turn it on from a recent added device.
Yeah that’s fair I guess. As I said, I think that a way to override the warning should be allowed, Apple must just be sure that the user is not enabling lightly this feature. But they could definitely do a better job of communicating the risk of not enabling the featureIf the end user is setting up a brand new device on a brand new Apple ID while good security hygiene to enable this protection from the beginning, the user should take note of Apple's limitation and reduce iCloud usage (backups, photos, messages etc) until advance data protection can be enabled.
I'm not sure if they actually rotate the keys. But if they do, they can space it out to prevent a spike of new iCloud Backup and Drive uploads.
Did you read the article? Because it clearly explains how wrong your are:That’s false. You can’t enable it at all if you either have a device added to your iCloud account that does not support iOS 16 or macOS Ventura or apparently a new device.
Users can still enable Advanced Data Protection from an older device they added to the same Apple ID account, such as another iPhone, iPad, or Mac. In this case, all devices added to that Apple ID account are fully protected by the expanded end-to-end encryption for iCloud, including newer ones that are still in the waiting period.
The last bullet is where the logic breaks down.
Someone can compromise your account and sign in on an old device. Why would someone need to purchase a new device to compromise an account?
Right, so it means a device newly associated with a certain Apple ID, and not a newly bought or manufactured device.Probably to prevent the scenario where an attacker somehow gains access to someone's account and then uses their own device (never registered to the victim's Apple ID) to enable advanced protection. This would permanently lock out the victim since Apple cannot help recover the data when advanced protection is enabled. The delay gives the victim enough time to change the password and remove the attacker's device from the account.
It doesn't matter if the device is new or old. What matters is how long the device that wants to enable advanced protection has been registered to the Apple ID.The last bullet is where the logic breaks down.
Someone can compromise your account and sign in on an old device. Why would someone need to purchase a new device to compromise an account?
I would guess that the new device rule has nothing to do with new devices, but rather to artificially stagger the process of encrypting devices and accounts to reduce the load on iCloud services.
'New device' isn't clearly defined, so a device purchased one year ago can be considered 'new' for all intents and purposes.
Well, they were stored in HSM so Apple wouldn't be able to access them without the user's passcode. But it's possible that they will still rotate the keys to also close that loophole.They’d have to rotate the keys. Otherwise, Apple would still have access to the keys…
Looks like it. But it's possible to use Macs without them being associated to an Apple ID (of course this means you could no longer use iCloud services under your main Apple ID). I also have an older Mac that doesn't support Ventura and I plan to just use it without iCloud going forward.So say I have a bunch of the usual Apple devices. iPhone, watch iPads ATV, etc. that are all newer but if I have one iMac that can't update to anything newer than Big Sur, doesn't that mean I can't enable this? I'm thinking I can't. RIGHT?
TIA
EDIT:
Got the answer two posts down. Thank you!
I think it is specifically not allowing it to be turned on from any device newly added to your account if it is not already enabled. But an account with it already enabled would be no issue. This stops a hacker (or more likely an abuser) from adding a device to your account and locking you out of your data.
Well, they were stored in HSM so Apple wouldn't be able to access them without the user's passcode. But it's possible that they will still rotate the keys to also close that loophole.
It kinda of sucks that the same update that gives us E2EE and requires us to take older devices off our iCloud account is also the same update that prevents AirDrop from staying open to everyone longer than 10 minutes making seamless file sharing between older devices a pain.Looks like it. But it's possible to use Macs without them being associated to an Apple ID (of course this means you could no longer use iCloud services under your main Apple ID). I also have an older Mac that doesn't support Ventura and I plan to just use it without iCloud going forward.
My understanding is that the encryption keys for services that weren't end-to-end encrypted so far were kept in HSMs, and could be unlocked once the user authenticates and thus provides the necessary credentials to Apple's servers. If they remove the code that sends (device side) or collects (server side) these credentials they would theoretically no longer be able to access the keys (since they are protected by HSMs). See:I don’t follow you… Perhaps it is due to multitasking with work…
But... If Apple didn’t have access to the keys before then this whole thing wouldn’t be needed as it would be E2E encrypted already. That’s the not case as they do have access to the key. Enabling this would require a new key that they don’t have access to and a rotation.
But perhaps you can explain what I’m missing here?
My understanding is that the encryption keys for services that weren't end-to-end encrypted so far were kept in HSMs, and could be unlocked once the user authenticates and thus provides the necessary credentials to Apple's servers. If they remove the code that sends (device side) or collects (server side) these credentials they would theoretically no longer be able to access the keys (since they are protected by HSMs). See:
iCloud encryption
Data encryption in iCloud is closely tied to the data storage model, starting with the CloudKit frameworks and APIs.support.apple.com
Theoretically they could of course make copies of the keys before deleting them. To close that loophole, they could rotate the keys on the end devices after advanced encryption is enabled as you suggested. But I don't know exactly what they do.
Please recycle.Where is iOS 16.2?! I’m about to throw my expensive iPhone in the trash!!!
😏