Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Now this concerns me. Just who is Apple Sleeping with? :apple:
See above. Your File Vault is secure, but I do recommend that your iCloud password be incredibly strong, you use a password locker (I prefer 1Password), make all your answers to recovery questions random, use 2FA where possible, and a VPN when on any public or questionable internet connection.

None of these steps will ensure protection, but not being the "weakest of the herd" means you're statistically unlikely to be attacked, save for being directly targeted, in which case you definitely want to make it as difficult as possible to be hacked.
 
According to security.stackexchange.com, this is a huge mistake:
http://security.stackexchange.com/q...ha256-to-generate-an-aes-encryption-key#16357

PBKDF2 is an intentionally slow algorithm, meant to make brute force guessing of passwords difficult.
SHA256 is a very fast algorithm, meant to produce hashes for dictionaries and sets and whatnot - basically, it helps make all your programs run quickly.

Normally quicker is better, so SHA256 is preferable in almost all situations, except when it comes to storing your password.

Either someone made an honest mistake and thought, hey, lets make this run faster because faster is better and they didn't consider the implications of hacking being faster, or they intentionally wanted to cripple security.
 
Apple has already said, they hand iCloud login credentials out to any government and or the FBI even without a warrant.
Doesn't matter if you don't backup to iCloud and don't store the recovery key from File Vault 2 with iCloud. No chance.
 
Apple has already said, they hand iCloud login credentials out to any government and or the FBI even without a warrant.

1) No, they don't simply hand out usernames and passwords to "any government" without a warrant (or reason).

2) If you're concerned about privacy and understand that any internet-facing login is a potential weak point, you choose not to store your Mac's recovery key on your iCloud account.
 
Doesn't matter if you don't backup to iCloud and don't store the recovery key from File Vault 2 with iCloud. No chance.

Absolutely correct, that's what I do. But most people store it in iCloud.
[doublepost=1474746699][/doublepost]
Either someone made an honest mistake and thought, hey, lets make this run faster because faster is better and they didn't consider the implications of hacking being faster, or they intentionally wanted to cripple security.

How stupid do you think Apples programmers are?

Do you think one single person changes that for no reason, without anybody overlooking it.

That was not an "honest mistake".
 
According to security.stackexchange.com, this is a huge mistake:
http://security.stackexchange.com/q...ha256-to-generate-an-aes-encryption-key#16357

PBKDF2 is an intentionally slow algorithm, meant to make brute force guessing of passwords difficult.
SHA256 is a very fast algorithm, meant to produce hashes for dictionaries and sets and whatnot - basically, it helps make all your programs run quickly.

Normally quicker is better, so SHA256 is preferable in almost all situations, except when it comes to storing your password.

Either someone made an honest mistake and thought, hey, lets make this run faster because faster is better and they didn't consider the implications of hacking being faster, or they intentionally wanted to cripple security.

I don't think one person could just alter a part of the codebase that easily. I'm sure apple uses some form of source control and a change that big would show up. Which leads me to believe at the very least a whole team or department agreed to this change even if the CTO/project lead did not.
 
  • Like
Reactions: Val-kyrie
Absolutely correct, that's what I do. But most people store it in iCloud.
[doublepost=1474746699][/doublepost]

How stupid do you think Apples programmers are?

Do you think one single person changes that for no reason, without anybody overlooking it.

That was not an "honest mistake".
Right. It was a conspiracy. They thought they could get away with it and no one would ever know.

How stupid do you think Apple programmers are?

:rolleyes:
 
"As Apple points out, this security oversight is limited to backups created on a Mac or PC and does not affect the security of iCloud backups."

With only 5GB of iCloud storage, I'd wager this is more impactful as most people backup to iTunes.

Yup.

But the point that they're making is that unlike something like the Yahoo breach, someone needs to actually have access to your personal computer to exploit this.
 
...

,
Apple confirmed it is aware of the issue and is working on a fix.As Apple points out, this security oversight is limited to backups created on a Mac or PC and does not affect the security of iCloud backups. ...

It is interesting they say that because someone fro. The Royal family just had their iCloud hacked.
 
There was no reason to suddenly change the encryption mechanism, except to make it easer to crack.

It probably wasn't done intentionally. It's easy to include a different encryption library or do a file replace and forget some part of the code used something some way.

My bet is they probably added the more simple encryption for another part of iTunes entirely and it conflicted with the backup encryption some how, perhaps changing a function that performs the encryption calls etc

I don't think this was done maliciously, I mean sure it could be but I don't think so.
 
Nice turn-around. But what they did is a fact and not a conspiracy.
The only fact is that the encryption changed. It's clearly a mistake, which they are fixing. No spokesperson has come forward to say we don't really need strong encryption. If it wasn't an "honest" mistake then what kind of mistake was it?
 
Right. It was a conspiracy. They thought they could get away with it and no one would ever know.

How stupid do you think Apple programmers are?

:rolleyes:

I understand many conspiracy theories are actually absurd or extreme but you can't always brush off the evidence by stating its just paranoia. Its impossible that this change to the GM IOS 10 codebase was made in secret by one programmer. This was a choice and there isn't any apparent benefit to making this change.

Don't get me wrong its very surprising. It's one thing not to strengthen the security, to weaken it is very odd coming from such a large company.
 
  • Like
Reactions: flowsy
Absolutely correct, that's what I do. But most people store it in iCloud.
[doublepost=1474746699][/doublepost]

How stupid do you think Apples programmers are?

Do you think one single person changes that for no reason, without anybody overlooking it.

That was not an "honest mistake".

Stupid enough to let the certificate expire on supportprofile.apple.com (yes I know that isn't the programmers, but you wouldn't expect them to be that stupid either)
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.