Messages in iCloud also uses end-to-end encryption. If you have iCloud Backup turned on, your backup includes a copy of the key protecting your Messages.Yes, but it's end-to-end encryption. The poster could have meant that the plaintext passwords never hit the iCloud. Or I could just be giving them a free way to wiggle out of an argument.
The meat of end-to-end encryption is that, "the messages are encrypted by the sender but the third party does not have a means to decrypt them, and stores them encrypted. The recipients retrieve the encrypted data and decrypt it themselves."
But this topic landed me on this page (Apple Support: iCloud security overview) which was very clarifying for me. 128-bit AES encryption is indeed "industry standard", but it can be decrypted. Unless end-to-end encrypted, the private keys would need to be stored on Apple's servers because the same key used to encrypt is the key used to decrypt.
What I'm not really sure about is why law enforcement seems to have readily available access to iCloud Backups but not Messages. That article seems to imply that they would have access to stored messages, but it may be that end-to-end encryption also plays a role in Messages too. If not, hopefully that is introduced here at WWDC. Still reviewing updates! Lots of posts today!
Well, If you enable Messages over the iCloud and iCloud backups, Apple and Authorities can access your msgs through your iCloud backups. Simply because the encryption of your backups is done with Apples own private key. Once they download your backup and decrypt it with *their* key, they can access your private keys and decrypt your messages by using your private key.
Just Apple Marketing Mumbo Jumbo, to make people feel more secure...
And I bet they have plenty of *cough, cough* undiscovered backdoors build-in...