Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Even in the US, even if Apple doesn’t have a backdoor, isn’t NSA linked up into the telecom companies already?


If there's a properly implemented end-to-end encryption, then NSA cannot see anything, even having full access to telco-s.


But iCloud is not fully encrypted by default.


Could you elaborate?


iCloud Advanced Data Protection (the feature that TFA is referring to) is required for E2EE, and it is not enabled by default.

https://en.wikipedia.org/wiki/ICloud#Advanced_Data_Protectio...

> On December 7, 2022, Apple announced Advanced Data Protection for iCloud, an option to enable end-to-end encryption for almost all iCloud data including Backups, Notes, Photos, and more. The only data classes that are ineligible for Advanced Data Protection are Mail, Contacts, and Calendars, in order to preserve the ability to sync third-party clients with IMAP, CardDAV or CalDAV.


But they can store the traffic and decrypt it later, if feasible.


^ this and remember kids. Data processing does not require a warrant.


> if the target uses iCloud backup, the encryption keys should also be provided with content return

https://s3.documentcloud.org/documents/21114562/jan-2021-fbi...


That is from before opt-in end-to-end encryption was added for iCloud backups.


Does Apple have any better proof than a whitepaper that they don't backup the keys anyways?


Several people have reverse engineered the protocol and clients. None have found any evidence that the keys are backed up anywhere as far as I know.


which you can verify because everthing is proprietary so it just there usual marketing play


The whole point of encryption in transit is that it doesn't matter if the telecom companies aren't trusted: they still can't read the data.


All the in-transit encryption in the world won't matter if they've pwned the decrypted client device.

Every company from your device's manufacturer, OS vendor, telecom carrier, app distributors and 3rd party software providers can be compelled to help make that happen.

And then there's always Cellebrite and friends.


This is not just encryption in transit or simplistic client-side encryption.

It is end-to-end encryption, where each device's key generation is handled by your phone's Secure Enclave.

This article is a decent starting point in terms of what Advanced Data Protection is:

https://support.apple.com/en-us/102651

If you want a deeper dive into the security engineering of iCloud Keychain, the second half of this Blackhat talk by Apple's head of Security Engineering & Architecture (SEAR) is really great:

Synchronizing secrets: https://youtu.be/BLGFriOKz6U?si=cY94TYo28bRj4G7y&t=1357


Does all of that matter if an attacker has access to your device and can take screenshots of your conversations, or read those conversations out of memory in their unencrypted state?


No it doesn't — that's a totally different threat model.

Advanced Data Protection is mostly concerned with protecting data from attackers on the server and in transit.

If you're interested in protections when an attacker has physical access to your device, you should read the "Encryption and Data Protection" section of Apple's Platform Security Guide.

Web: https://support.apple.com/guide/security/welcome/web

PDF: https://help.apple.com/pdf/security/en_US/apple-platform-sec...


In computer security if an adversary is having an unlimited physical access to hardware, it is considered a game over.


The difference is that if the NSA has physical access to my phone, I'm probably aware of it. It makes routine fishing expeditions across broad populations much harder and more expensive, as well as easier to oppose.

If they can fish remotely and automatically, accountability goes completely out the window.


I'm aware of what E2EE is, all the encryption in the world does not matter if either end of the conversation is confiscated or pwned by adversaries.


>all the encryption in the world does not matter if either end of the conversation is confiscated or pwned by adversaries.

Yes of course, but it's not so simple to bypass the hardware-enforced protections that exist both device side and server side. As far as I can tell, it seems effort was made to design/architect everything in such a way such that the protections can't be retroactively circumvented even under legal compulsion.

Disclosure: I previously worked for Apple, but not on the design/implementation of any of this stuff and this is all my own opinions, not those of Apple.


You thinking way too deep when the whole OS including implementation of the E2EE is proprietary and could be silently and targeted exchanged for a backdoored variant if it's not by default.


A good portion of HN believes Apple would never do that so I wasn't going to bother with that angle because of the inevitable defensive posts it would generate in response.


Presumably the data is not that relevant; former NSA director Michael Hayden said: "We kill people based on metadata."


What are the chances that the NSA has a useful zero-day on the TLS encryption standard?


Probably not on the standard itself, but practically a guarantee they have attacks on the major implementations, especially OpenSSL.


What are the chances they just have everyone's private keys?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: