Apple's iMessage encryption claims refuted (again)

Summary:Apple has claimed iMessage and FaceTime are protected by end-to-end encryption. But encrypted to whom?

imessaglogo_200x200
Image: CNET

In June, Apple released a statement with details on the number of requests it receives from government agencies for customer records (answer: about 1,000 per month). In the statement, Apple claimed that iMessage – which lets users send free texts over Wi-Fi – uses end-to-end encryption and therefore cannot be decrypted by Apple:

For example, conversations which take place over iMessage and FaceTime are protected by end-to-end encryption so no one but the sender and receiver can see or read them. Apple cannot decrypt that data.

The claim was almost immediately refuted by security researchers, including Matthew Green, a cryptographer and research professor at Johns Hopkins University, who wrote: "If you use the iCloud backup service to back up your iDevice, there's a very good chance that Apple can access the last few days of your iMessage history." 

More recently, researchers at the Hack in the Box conference in Kuala Lumpur showed it would be possible for someone inside Apple, either a rogue employee or one compelled by the NSA, to intercept iMessages.

iOS jailbreak developer Cyril Cattiaux (via Macworld) explains that "Apple has full control over this public key directory" trading off ease-of-use for the user for transparency about the pubic keys. Traditional public servers (like MIT's PGP Public Key Server) allow the sender to see information, like when a key changed, so they can decide whether or not to trust it.

Cattiaux explains:

The biggest problem here is you just cannot control that the public key you are using when you are ciphering the message is really the key of your recipient and not, for example, the public key of some guy in Apple.

A solution would be for Apple to store public keys in a protected database on the iOS device so that they could be compared, according to Cattiaux. A proof-of-concept application called MITM Protect was released for jailbroken devices that does just that.

Is the sky falling? No, not exactly.

Paul Kocher, president and chief scientist of Cryptography Research, tells Macworld that "People generally can’t assess or control of the risks of cloud-based services since the data is maintained on systems that can’t be audited." He goes on to say that "it isn’t fair to criticize Apple too heavily since other services aren’t better (and most are worse)."

It's simple, really. Don't say anything illegal on iMessage or Facetime and assume that the NSA is always watching. 

Topics: Apple, Security

About

Jason D. O'Grady developed an affinity for Apple computers after using the original Lisa, and this affinity turned into a bona-fide obsession when he got the original 128 KB Macintosh in 1984. He started writing one of the first Web sites about Apple (O'Grady's PowerPage) in 1995 and is considered to be one of the fathers of blogging.... Full Bio

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.