My Apple Watch SE running the latest public WatchOS beta is listed as not having the latest OS version for the upgrade.
It depends. Most HSMs do not allow extraction of the keys (that's the whole point). Some allow transfer of wrapped keys for backup or scaling purposes.You’re misunderstanding what Apole is describing here.
Apple is saying they store the keys inside “Hardware Security Modules” which is an Apple specific way of describing a key vault. Apple generates these keys and stores them in this vault which is industry best practice (meaning if you stole a server from the Apple Data Center you won’t be able to decrypt that data since you wouldn’t have the key) on key management and storage. That doesn’t mean that Apple doesn’t have access to this key. They do have access to it.
It’s not just a “New device.” It’s a new device FOR YOUR APPLE ID - so one you recently signed into (-‸ლ)The last bullet is where the logic breaks down.
Someone can compromise your account and sign in on an old device. Why would someone need to purchase a new device to compromise an account?
I would guess that the new device rule has nothing to do with new devices, but rather to artificially stagger the process of encrypting devices and accounts to reduce the load on iCloud services.
'New device' isn't clearly defined, so a device purchased one year ago can be considered 'new' for all intents and purposes.
Sorry for dumb question, but what's FUD stands for?The FUD is strong in this thread.
- If you have a device that’s been active for a while, you can turn it on.
- If you turn it on, it’s on for ALL devices.
- The reason you can’t use a recently activated device, is so if someone compromises your account and signs in on a device, they can’t lock you out of your data.
Fear, Uncertainty, Doubt. It's a flavor of misinformation meant to maintain the status quo often identified in tech circles, especially related to nebulous or yet-unproven tech. see also IBM in the 70's, MS in the 90's.Sorry for dumb question, but what's FUD stands for?
Fear Uncertainty and Doubt.Sorry for dumb question, but what's FUD stands for?
Obviously, a keystore can vary in its implementation. The E2EE method Apole implements uses a hardware key manager that is on the device and doesn’t allow pulling the key off the device. You can read all about that in their T2 and similar white papers on how the handle encryption keys for data that Apple doesn’t get the key to.It depends. Most HSMs do not allow extraction of the keys (that's the whole point). Some allow transfer of wrapped keys for backup or scaling purposes.
Thanks😊Fear, Uncertainty, Doubt. It's a flavor of misinformation meant to maintain the status quo often identified in tech circles, especially related to nebulous or yet-unproven tech. see also IBM in the 70's, MS in the 90's.
The way the article is worded -- "new device" rather than something like "device newly associated with a certain Apple ID" -- plus the Twitter posters that missed the point of why this delay has a security purpose, contributed to a lot of confusion.It doesn't matter if the device is new or old. What matters is how long the device that wants to enable advanced protection has been registered to the Apple ID.
based on somebody else's screenshot on this thread you are unable to activate advanced data protection if any of your devices are before a certain version. I suspect you wouldn't even be able to login to an iCloud account with ADP enabled using an older version.Is there any information regarding support for older OSes?
Thanks for pointing this out. Good find.based on somebody else's screenshot on this thread you are unable to activate advanced data protection if any of your devices are before a certain version. I suspect you wouldn't even be able to login to an iCloud account with ADP enabled using an older version.
While inconvenient this makes sense to me. The older device would be forced to interact with iCloud in the traditional way and would have the same constraints that regular data protection offer today.
Imagine how many people will forget their encryption key and lose data on this.
Not sure on the reasoning behind keeping experienced users from being able to activate this feature.
Very excited about this coming to Canada.
The FUD is strong in this thread.
- If you have a device that’s been active for a while, you can turn it on.
- If you turn it on, it’s on for ALL devices.
- The reason you can’t use a recently activated device, is so if someone compromises your account and signs in on a device, they can’t lock you out of your data.
FreakinEurekan forgot to add an additional bullet point:This needs to be the top post.
I just created a YouTube channel under a new gmail account and put all my photos and video on there where I know no one will view it.
Imagine how many people will forget their encryption key and lose data on this.
Not sure on the reasoning behind keeping experienced users from being able to activate this feature.
Very excited about this coming to Canada.
Starting with iOS 16.2, iPadOS 16.2, and macOS 13.1, all of which are expected to be released next week, users have the option to enable a new Advanced Data Protection feature that expands end-to-end encryption to many additional areas of iCloud, including Messages backups, Photos, Notes, Reminders, Voice Memos, and more.
![]()
To protect users, Apple does not allow Advanced Data Protection to be enabled from a brand new device for an unspecified period after the device was first set up and added to a user's Apple ID account. We have seen dates range from late January to early February for when users will be able to turn on the feature from a new device. This buffer helps to prevent a malicious actor from enabling the feature if a user is hacked.
Users can still enable Advanced Data Protection from an older device they added to the same Apple ID account, such as another iPhone, iPad, or Mac. In this case, all devices added to that Apple ID account are fully protected by the expanded end-to-end encryption for iCloud, including newer ones that are still in the waiting period.
Turning on Advanced Data Protection removes your encryption keys from Apple's servers for the iCloud categories protected by the feature, ensuring that your data remains secure even in the case of a data breach in the cloud. When the feature is enabled, the encryption keys are only stored on your trusted Apple devices, meaning that they cannot be accessed by Apple or others. The feature can be turned off at any time, at which point your devices will securely upload the encryption keys to Apple's servers again.
When Advanced Data Protection is enabled, access to your data via iCloud.com is disabled by default. Users can turn on data access on iCloud.com, which allows the web browser and Apple to have temporary access to data-specific encryption keys.
iCloud already protects 14 data categories using end-to-end encryption by default, without Advanced Data Protection enabled, including passwords stored in iCloud Keychain, Health data, Apple Maps search history, Apple Card transactions, and more. Apple has a support document with a chart detailing what is protected by standard levels of encryption and what is protected by Advanced Data Protection when enabled.
Advanced Data Protection is available for U.S. users only at launch and will start rolling out to the rest of the world in early 2023, according to Apple. For more details about the feature, read our coverage of Apple's announcement earlier this week.
Article Link: Expanded iCloud Encryption Can't Be Enabled From New Apple Devices Right Away
And someone has a device, has your Apple login info, then what? You will lose everything.Should be an option to enable from new device immediately. Maybe in the future, Apple will provide one.