How safe is iMessage in the cloud? – Macworld

Examining privacy and security in the world of Apple

Of all the problems iMessage has, Apple says it plans to solve a persistent one: having access to all your conversations on every device, instead of messages and data lying scattered across all the Macs, iPhones, and iPads you use. But is this the right problem to solve?

Apples Craig Federighi explained at the 2017 Worldwide Developers Conference that iMessage will be stored in iCloud with end-to-end encryption, but provided no other details. Later, he mentioned that Siri training will sync across iCloudinstead of being siloed on each of your Apple devices, and that training and marking faces in Photos People album will do the sameand with end-to-end encryption.

Despite that encryption promise, this concerns me. Its better to have the least amount of personal and private information pass through other systems, instead of directly between two devices. Its especially good to have the least amount of private data stored elsewhere, except if the encryption for that data is firmly under your control or fully independently vetted.

That storage issue is particularly problematic with iMessage. While Apples design for at-rest storage could be terrific, iMessage itself is way behind its competition in providing an effective, modern encryption model. Notably, if a party sniffs and records encrypted iMessage data from a privileged position and a later flaw allows the recovery of an encryption key, all previously encrypted data can be unlocked. The way to prevent that is using forward secrecy, which Signals OpenWhisper protocol employs in the Signal app and in WhatsApp.

Craig Federighi explains how Siri training syncs among devices using end-to-end encryption.

While Ive queried Apple for more details on how all this will work, its likely they wont provide any until closer to the OS updates or even afterwards. If youre installing developer or public betas, you should consider how this might affect you without having all the details to hand.

Apple designed its iCloud Keychain sync in an admirable way. It uses a zero knowledge approach, which is the gold standard for hands-off data transfer and storage. With a cloud-storage system like Dropbox or how Apple hands email, contacts, calendars, photos, and other iCloud data, all information has an encryption overlay while in transit and another form of encryption at rest on the cloud servers.

However, that at-rest encryption lies under the control of the company offering the service. It possesses all the keys needed to lock your data on arrival and unlock it to transmit it back. Thus, its susceptible to internal misuse, hacking, legitimate government warrants, and extralegal government intrusion.

With iCloud Keychain and other similar syncingsuch as that used by 1Password and LastPass, which I discussed in a recent columna secret gets generated by software running only on client devices and that secret is stored only there. The company that runs the sync or storage service never has possession. Data is encrypted by the mobile or desktop OS and transmitted.

When multiple devices need access to the same pool of data, systems typically use device keys to encrypt a well-protected encryption key that in turn protects the data. (This is the approach used as far back as PGP in the 1990s.) That way, theres a process to enroll and remove devices from the pool of legitimate ones that can access the actual data encryption key.

I fully expect this is what Apple is using: an expansion of iCloud Keychain to more kinds of data. iCloud Keychain has a sometimes funky enrollment process that, when it hiccups, can leave users adrift. I receive email every several weeks from those who have iOS iCloud Keychain errors that they cant fix or permanently dismiss, even by un-enrolling and re-enrolling in that iCloud option.

But its the right way to do, when you consider the intensely personal information in text messages, Siri training data, and Photos facial-recognition and -tagging. Imagine someone gaining full access to all that in a form they could decode? (Were not sure yet either whether that encrypted information will be created in such a way that its not useful without source data on devices, of course.)

Its reasonable to worry about centrally stored and synced data, because it represents such a weak point in data protection. Given that Apple is stepping up the kind of data you can sync and store, it should also be upgrading its under-the-hood encryption techniques and disclosing more information about how it works. And it should submit its work to external independent auditing and provide more transparency to allow outsiders to monitor for government or third-party intrusion.

All of this can be done without compromising security; all of it would, in fact, dramatically improve the integrity of your data from outside examination. Apples stance on keeping our information unavailable to it is admirable. But it needs to give more assurances that nobody else could possibly access it either.

Read more:
How safe is iMessage in the cloud? - Macworld

Related Posts

Comments are closed.