Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
That doesn't really matter. Of all security concerns it's the very last one. I'm mean it's sad to read that keychain isn't encrypted on its own within the backup but rather stored plaintext hoping the encryption of the backup container takes care of the security. This is bad practice in first place. I'm not sure if backup over wifi is still unencrypted as well. That's what I'd be more concerned of if you are using a shared WiFi. If you want to secure the data on your computer (including your backup) use either File-Vault or Windows EFS for advanced security. If you'r paranoid use a 3rd party software that you trust (e.g. the audited version of TrueCrypt).
 
In compliance with the Fourth Amendment of the United States Constitution, Apple will provide information they posses when as part of a CRIMINAL INVESTIGATION, law enforcement produces a valid search warrant; i.e. one that is based on probable cause and signed by a judge.

That only and exclusively applies to U.S. citizens, if you are anywhere else in the world nothing like that is needed.

The majority of Apple users are outside of the U.S.

FOR REFERENCE
independent.co.uk said:
...any data stored by non-American citizens on cloud servers located here in the US is accessible by various US agencies, including the FBI and CIA, without a warrant or other legal red tape.

http://www.idownloadblog.com/2013/01/30/us-authorities-icloud-access/

ALSO SEE
vocativ.com said:
Apple’s latest 2016 transparency report, which is released every six months, shows a dramatic spike in what it calls “national security orders.” Those include National Security Letters, which are warrantless notices sent by the FBI that demand particular information
...
[Apple] was asked to spill the beans on 16,112 devices. Most of the time—80 percent, to be exact—Apple provided at least some information in response to a request.

http://www.vocativ.com/310616/apple-transparency/
 
  • Like
Reactions: SirRahikkala
In the case of the iOS device backup, that password can be stored in the Keychain and thus the only password you have to type in is the Keychain password.
But what if there is something wrong and you do need to type that password when restoring from backup?
30 would be a good length.
 
That doesn't really matter. Of all security concerns it's the very last one. I'm mean it's sad to read that keychain isn't encrypted on its own within the backup but rather stored plaintext hoping the encryption of the backup container takes care of the security. This is bad practice in first place.
Why?
I'm not sure if backup over wifi is still unencrypted as well.
Of course not. The backup data never leaves the device unencrypted, regardless whether you use USB or Wifi.
 
For your Mac login/filevault password yes, and that would be a bit much. But for an iTunes backup you only ever have to enter that when you enable encryption or do a restore, so it isn't a big deal. That does mean you need to choose a good login / password vault password, but you should do that anyway.
But what if something is going wrong and you do need to enter that lengthy password? My practice: take a note, keep it safe. Don't just trust keychain and FileVault. I had problems with keychain access and I was forced to create a new keychain database. God knows if some iTunes backup password was removed in the process.
 
>> Apple has switched from using a PBKDF2 hashing algorithm with 10,000 iterations to using a SHA256 algorithm with a single iteration, allowing for a significant speed increase when brute forcing a password. <<

1st off, thank god this was publicly outed - so it has to get fixed. Guess I'll stay on 9 till the "fix" happens and is verified, just cause.

From a security standpoint, this is a WTF was Apple management thinking when the they authorized this - moment. The govt has gotten all quiet for the last 3 months. Maybe Apple management caved? If they did, we'd never know, cause they'd keep it quiet (just like this was happening).

Personally I wasn't thinking Tim would (his replacement, whomever that may be in the future, is another matter) - but this is a big No No when your company is placing itself as the only firm who cares about their users privacy in the world (at this point). Apple needs to carefully explain what happened here (not their normal procedure) or risk looking like they've chosen to work with the 3 letter agencies.

There was no reason to suddenly change the encryption mechanism, except to make it easer to crack.

That's the thing that's gnawing at me - this isn't an accident - going all the way to production. Every government in the world would want this. Might want someone on the inside doing this. Its crazy we're depending on one company to be the protectors of their customers privacy...that can only be a doomed condition.
 
But this is NOT physical access to the iPhone. They are talking about decrypting the BACKUP data. This data is typically on e hard drive on a PC or Mac or maybe in Apple's iCloud

Please read the article next time before commenting:

As Apple points out, this security oversight is limited to backups created on a Mac or PC and does not affect the security of iCloud backups.
 
I'm still on iOS 8. Wonder what number that was? Probably like 10.

The same as 9 I believe. This was a huge step backwards making their users local backups 2500 times easier to brute force (nation states, especially our current Administration (and both choices for the next one), would want this). Remember iCloud backups get handed over to those nation states when they ask, these local copies prior to iOS 10 were very hard to break.

It reminds me of Microsoft taking the Elephant Diffusor out of BitLocker (their windows disk encryption program) starting with Windows 8 - there was no reason to do it, except the governments would like it because it would make brute forcing possible / easier.

Apple needs to be totally transparent about this or their whole "we care about our users privacy" stance (the only major tech company on earth doing that) will blow up in their faces...
 
  • Like
Reactions: jb-net and JosephAW
This will be easily fixed:

Apple to buy Elcomsoft and shut it down.

They didn't get the memo that iOS 10 is an FBI version.
 
Last edited:
What's going on at Apple? This kind of thing is so basic and usually Apple gets the basics down quite well. BIG OVERSIGHT.
 
  • Like
Reactions: Sasparilla
This is iTunes backups. Most don't use iTunes backups these days, even fewer would have had time to make one for iOS 10. While this doesn't demand physical access to an iPhone, it seems to me like it would demand physical access to a PC or Mac (and only a PC or Mac, not an iPhone or iPad).

Tim is that you?
 
This is iTunes backups. Most don't use iTunes backups these days
Bull***t, the majority of friends and family I've helped or asked about this over the years do a local iTunes backup either because they either "don't trust the cloud" or prefer to have control over their data (iCloud backups are not necessarily daily even if on external power, on Wi-Fi, and locked, i.e. criteria for iCloud backups to auto-initiate). I do a local backup since I re-sync daily. So this is a bigger deal than you portray (though I'm not worried about it).
 
When people talk about iPhones and iTunes everyone says they hate/refuse to use iTunes because it's so horrible.

When a potential security risk is found in iTunes suddenly it's a big deal that affects a lot of people because they're all suddenly using iTunes?

The hypocrisy is strong in this thread.

This is like saying if you use the spare tire you're a hypocrite for complaining that the car has bad brakes and poor acceleration. iOS backup has nothing to do with music and other media mishandling.
 
  • Like
Reactions: Sasparilla
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.