Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy Security The Courts Apple

Apple Logs Your iMessage Contacts - And May Share Them With Police: The Intercept 61

The Intercept is reporting that despite what Apple claims, it does keep a log of people you are receiving messages from and shares this and other potentially sensitive metadata with law enforcement when compelled by court order. Apple insists that iMessage conversations are safe and out of reach from anyone other than you and your friends. From the report:This log also includes the date and time when you entered a number, along with your IP address -- which could, contrary to a 2013 Apple claim that "we do not store data related to customers' location," identify a customer's location. Apple is compelled to turn over such information via court orders for systems known as "pen registers" or "tap and trace devices," orders that are not particularly onerous to obtain, requiring only that government lawyers represent they are "likely" to obtain information whose "use is relevant to an ongoing criminal investigation." Apple confirmed to The Intercept that it only retains these logs for a period of 30 days, though court orders of this kind can typically be extended in additional 30-day periods, meaning a series of monthlong log snapshots from Apple could be strung together by police to create a longer list of whose numbers someone has been entering.
This discussion has been archived. No new comments can be posted.

Apple Logs Your iMessage Contacts - And May Share Them With Police: The Intercept

Comments Filter:
  • Siri on Mac (Score:5, Insightful)

    by NMBob ( 772954 ) on Wednesday September 28, 2016 @11:32AM (#52976677) Homepage
    Even the turn-on dialog for Siri on the Mac says it will go through your Contacts list so Siri can 'know more about you'. Not good.
    • Even the turn-on dialog for Siri on the Mac says it will go through your Contacts list so Siri can 'know more about you'. Not good.

      Siri has a turn-on dialog with you? I didn't know they released that feature of Siri to the public yet.
      Heh

    • Re: (Score:1, Informative)

      by macs4all ( 973270 )

      Even the turn-on dialog for Siri on the Mac says it will go through your Contacts list so Siri can 'know more about you'. Not good.

      Would you rather it didn't warn you? The fact is, Siri is OFF by default on macOS; so if you are that privacy-conscious, you don't HAVE to "Opt-IN".

      Sheesh! You'd have a point if Siri was ON by default and/or it didn't warn you BEFORE it scanned your Contacts.

      Oh, and you don't HAVE to use MacOS' Contacts list. I NEVER have. The ONLY Contact I have EVER had in my macOS Contacts/Address Book for the past 16 years is my own.

      • by NMBob ( 772954 )
        After you've had your morning, or noon, coffee you might realize what I was saying was that not only is your iPhone capable of spying on you, but now your Mac can too, all while Apple has been gettin up on stages and spouting how concerned they are about your privacy. After reading through the privacy notice about Siri I decided not to turn it on when I upgraded to Sierra.
        • After you've had your morning, or noon, coffee you might realize what I was saying was that not only is your iPhone capable of spying on you, but now your Mac can too, all while Apple has been gettin up on stages and spouting how concerned they are about your privacy. After reading through the privacy notice about Siri I decided not to turn it on when I upgraded to Sierra.

          So the warning was helpful to you. How is this news?

      • by vux984 ( 928602 )

        "Would you rather it didn't warn you? The fact is, Siri is OFF by default on macOS; so if you are that privacy-conscious, you don't HAVE to "Opt-IN".

        Oh 'macs4all' your fanboi is shining through again. Nobody said Siri was on by default. And you are right, Apple did the right thing by shipping it off and making it opt in (hello Microsoft Cortana -- are you listening! I bet you are... because you're on by default!)

        Nevertheless, once turned on Siri is much the same privacy sucking nightmare Cortana and Google are. The fact that it's off by default doesn't change what it is if you turn it on. Its literally the headline feature of the OS update; so talking a

        • Nevertheless, once turned on Siri is much the same privacy sucking nightmare Cortana and Google are.

          Nope, sorry. That is incorrect.

          Siri on MacOS (and also Siri on iOS 10) does its level-best to do as much as it can "client-side", directly on your Mac/iDevice. This is VERY different from Cortana an Google's "voice assist" stuff, which take every opportunity to send every utterance to their respective motherships.

          If you would bothered to have watched the WWDC keynote, Apple talked at length about the lengths they have gone to make Siri, Dictation, and Spotlight do as much as they possibly can directly o

          • by vux984 ( 928602 )

            I'm not sure that the main thrust of your argument is entirely relevant here, because the context is that its slurping your contacts into icloud, which is definitely not anonymized in anyway.

            It does this so that siri on your phone knows about the contacts on your desktop, just in case you ask about them. Is this not correct?

            That said, I concede that calling it the same privacy nightmare as cortana and google is overstating it too much. Siri / icloud has many, but certainly not ALL, of the same privacy issue

    • Re:Siri on Mac (Score:5, Informative)

      by Anubis IV ( 1279820 ) on Wednesday September 28, 2016 @12:21PM (#52977075)

      In the case of Siri on the Mac, however, the information is kept on-device, as I recall. In contrast, the situation discussed in the summary involved information that was never being kept strictly on-device and that Apple never claimed was private information that they weren't capable of accessing (which makes the "despite what Apple claims" seem a bit odd). Anyone who had ever glanced through Apple's (quite easily readable) white papers on their security measures would know that they had never made those claims.

      According to Apple, iMessage conversation follows roughly this pattern (it's been at least six months since I brushed up on the specifics, so I'll definitely be glossing over quite a few details):
      0) At some point in the past, Alice and Bob established Apple IDs, turned on iMessage, provided one or more pieces of contact info by which they could be identified by others via iMessage (e.g. e-mail, phone number), and then linked devices to those Apple IDs. During the process that links a device to an Apple ID, the device generated a fresh private-public key pair and provided the public key to Apple.

      1) Alice creates an iMessage intended for Bob and presses send.

      2) Alice's device opens an encrypted connection to Apple and indicates to Apple that it wishes to send an iMessage to the Apple ID associated with a provided piece of Bob's contact info.

      3) Apple looks up the Apple ID associated with that contact info and returns the set of public keys associated with Bob's Apple ID, one per active device he owns.

      4) Alice's device encrypts the iMessage once for each of Bob's devices (using the keys from step 3 so that only Bob's devices can decrypt them), then sends them to Apple. Metadata is included to help Apple route the correct messages to the correct devices.

      5) Apple receives the encrypted iMessages and pushes them down to each of Bob's devices.

      6) Apple keeps a log of recent messages so that they are able to perform various operations, such as syncing the Read status between Bob's devices after he reads the iMessage on one of them.

      All of which is to say, Apple never claimed that they didn't know who you were talking with and when it was happening. Rather, they claimed the exact opposite, since that information is necessary for the operation of iMessage. The fact that they keep a log of information that was always available to them is both unsurprising and something that they had already disclosed. What they actually claimed was that your communication with that other person was end-to-end encrypted such that they couldn't get access to the content of the messages, and that remains true, so far as we know.

  • by Opportunist ( 166417 ) on Wednesday September 28, 2016 @11:34AM (#52976683)

    You know, back in the Soviet Union you at least only got locked up and shot if your father was a crook, but in the free world it's already enough to know one.

  • by turkeydance ( 1266624 ) on Wednesday September 28, 2016 @11:35AM (#52976695)
    told in 30-day extensions of a court order.
  • So there's a chance of Tantric SMSs from Sting?

  • by Anonymous Coward

    If you think for one moment that Apple, Google, FB, Twitter, etc don't log shit, don't share your shit with law enforcement/government, or even remotely give two fucks about your privacy.... you need to get your head out of your ass.

    Do you really think the board of directors gives a flying fuck about you? They care about making money.

  • by sl3xd ( 111641 ) on Wednesday September 28, 2016 @11:44AM (#52976793) Journal

    The message contents are encrypted & "zero knowledge", but I'm not aware of a method to route messages between user devices with "zero knowledge".

    Tor makes it more difficult to trace, but it's not impossible when you have the NSA's resources.

    • by AHuxley ( 892839 )
      At some point all that encryption has to be made plain text. For ads on some networks or the total cost of all free networks been encrypted or for federal or mil telco compliance in some nations.
      Why build a really secure end to end global network when different nations have mil or legal requests?
      Secure the public end and comply internally.
      Where that data is plain text again is the access point of 5 eye nations, their staff, ex staff, former staff and any their party nation who helps.
  • by Anonymous Coward

    OMG! Apple logs pretty much what any half-decent firewall or web server logs every time anyone sends a request/packet through it: source, target, timestamp.

    Shock! Horror! Headphone jacks! ...

    Seriously, people are clutching at straws now.

    And about location. Sure, an IP address can give you a location, if you consider "I'm somewhere in the Mall, or adjacent areas within reach of the wif signal" a "location".

    It's not exactly granular. And with ISPs deploying carrier grade NAT (more common that you might think)

    • OMG! Apple logs pretty much what any half-decent firewall or web server logs every time anyone sends a request/packet through it: source, target, timestamp.

      Exactly. And unlike most firewalls and web server logs, Apple at least purges this every 30 days. Plus, they have a big ol' disclaimer that the information does not reflect that any actual communication took place. That disclaimer is more than enough for any half-braindead 1st year law student to stand on for "reasonable doubt".

      And about location. Sure, an IP address can give you a location, if you consider "I'm somewhere in the Mall, or adjacent areas within reach of the wif signal" a "location".

      It's not exactly granular. And with ISPs deploying carrier grade NAT (more common that you might think), IP address based location is worthless.

      And isn't that exactly what the Courts have told Rightscorp, et al, when they have tried to sue based solely on an IP address?

      Plus, this is even (much!) less information than a tra

  • ...if YOU don't encrypt it, it is NOT encrypted.

    That goes for metadata, too.

    • by sl3xd ( 111641 )

      How do you deliver the messages if the recipient is encrypted (and you don't have a key to read it), and you already know the sender?

      Tor tries to make it harder to trace, but it's not impossible to defeat.

    • ...if YOU don't encrypt it, it is NOT encrypted.

      That goes for metadata, too.

      So, please explain to me how a system that uses Apple's servers (or anyone's for that matter) would work, where the source and destination addresses were not in the clear.

  • by wiredog ( 43288 ) on Wednesday September 28, 2016 @12:07PM (#52976965) Journal

    Since you need that to route using the internet protocol. And, yes, it is possible to attach a location to an ip address. Which may not necessarily match your real location.

  • by cfalcon ( 779563 ) on Wednesday September 28, 2016 @12:13PM (#52977017)

    This is hardly new news. Envelope information is available on many platforms.

    Apple cooperates fully with the law. The parts that make the news are when they correctly construct some part of their system such that they don't have the key to it, and refuse to do their best to crack it.

    The fact that Apple logs their own queries to route messages (each one can be delivered over their network, or over SMS) is unsurprising. The fact that they deliver a log should be completely unsurprising. iMessage is end to end encrypted, but that doesn't mean it magically loses the need to be routed. When you send an iMessage, your destination address is a PHONE NUMBER. The fallback delivery message is SMS. Of course it needs to have some method of figuring out who gets an iMessage and who gets an SMS.

  • Seriously! (Score:4, Interesting)

    by Bender Unit 22 ( 216955 ) on Wednesday September 28, 2016 @12:33PM (#52977163) Journal

    Who seriously believe that anything they do via their smartphone, are not snooped on by some governmental institution?

  • Or rather don't trust your "Mobile Surveillance Device" that, to add insult to injury, you paid for yourself. It is as simple as that.

E = MC ** 2 +- 3db

Working...