Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
China Government Privacy Apple

Apple iCloud Data in China is Being Stored By a State-Run Telco (engadget.com) 84

Six months ago Apple caused controversy by announcing its intentions to move Chinese users' iCloud keys out of the US and into China, in order to comply with Chinese law. From a report: Now, that data, which includes emails, text messages and pictures, is being looked after by government-owned mobile operator China Telecom. And users and human rights activists alike have big concerns. The move has unsurprisingly been praised by state media, with Chinese consumers being told they can now expect faster speeds and greater connectivity. But as comments on Weibo (China's equivalent of Twitter) reveal, users have major privacy worries, claiming the government -- known for its extreme citizen surveillance methods -- will now be able to check personal data whenever it wishes.
This discussion has been archived. No new comments can be posted.

Apple iCloud Data in China is Being Stored By a State-Run Telco

Comments Filter:
  • by kriston ( 7886 ) on Wednesday July 18, 2018 @02:43PM (#56969842) Homepage Journal

    Don't we all now know that every non-domestic company in China is a joint venture with the state?

  • How long before we see:”US customers had their iCloud data stored in China by mistake” :D

    • Exactly. As RMS said: the only way to secure data is not to collect it in the first place.
      • Re: Next up (Score:4, Informative)

        by saloomy ( 2817221 ) on Wednesday July 18, 2018 @03:07PM (#56969956)

        My understanding with apple's ecosystem, especially around messages and account details, is that the company doesn't hold the decryption keys. Each device creates a public/private key pair, the private keys are stored on device, the public keys are in an API you draw from to send a message to each of the recicioente devices. The downside to this form of communication is each outbound message has to be encrypted and transmitted multiple times (matching the device count of the recipient).

        Therefore, it doesn't matter who has the data, as long as the government hasn't secretly cracked the form of encryption Apple uses, and they really never receive the private keys, which would otherwise be subject to subpoena.

        • The problem with that is: you don't know. The system is closed to you. They could have open access to anyone who pays for it (or government). Maybe it can be decrypted. Maybe it can be decrypted in the future when flaws are discovered. The best idea is not to collect it in the first place.
          • Re: Next up (Score:4, Informative)

            by saloomy ( 2817221 ) on Wednesday July 18, 2018 @03:28PM (#56970088)

            I agree that would be the best idea, if data security was your end goal. But that is not the end goal. The end goal is to provide a service that has to work even when your phone is off. They need to store/forward those messages. Any semi-competant techie will tell you the same thing. So, given as to how they need to store your messages to deliver to your devices that come online later, they have IMHO come up with a pretty clever solution: iOS Security [apple.com]. This states the level of encryption, the storing of private keys, and the methods and processes.

            Can this be cracked in the future? Yes. Should you then just destroy all services that require online storage of sensitive data? No. You implement the best techniques you know how, and improve when life teaches you.

            • No the end goal is provide a service so they can sell the data they are sucking in when they store your information. You are so naive. They aren't providing these cloud services for free for no reason!
              • Apple is providing services and tools to sell their hardware. If you haven't noticed, that's their main business. They don't need to make any money on their messages platform as l long as it keeps users tied to their platform and makes new users buy and enjoy their hardware. It's a marketing tool to sell Apple devices, not to sell ads, you tool.
                • It's marketing hype to sell gadgets with a huge markup, sukkas. Apple doesn't care about your privacy any more than Microsoft or Oracle do.

          • The problem with that is: you don't know.

            Do you believe that corporations are run by greedy bastards? If yes, then most likely your data is safe. If Apple was secretly collecting the keys and passing them on to the government, many people, both at Apple and in the government, would know about it. This knowledge would eventually leak. It would be a HUGE PR disaster for Apple, and cost them billions and billions in lost customers and lawsuits.

            • Do you also believe that at least one techie at Apple could have backdoored/stolen/worked with a foreign government secretly? Just how many Chinese born workers are at Apple, by the way? Now maybe Apple has so many layers of checks this wouldn't happen for a long time. Or maybe not, I don't know.

              Reality is, I'm not sure there is anybody to trust over Apple with phone data. I hope they aren't screwing everybody over. And you are right, it would be a PR nightmare if they were and got caught.

        • by DogDude ( 805747 )
          How did you come about this "understanding"? My understanding is that Apple sells all of your data to anybody and everybody. As per their privacy policy [apple.com]:
          Apple shares personal information with companies who provide services such as information processing, extending credit, fulfilling customer orders, delivering products to you, managing and enhancing customer data, providing customer service, assessing your interest in our products and services, and conducting customer research or satisfaction surveys. Th
          • You are incorrect sir. The data they specify is stuff like your shipping address (which they need if you buy something like a picture book). To learn about Messages security: read from the horses mouth: iOS Security [apple.com].

            • How do you know this? You are taking their word for it. You can't be that naive.
              • Re: (Score:3, Interesting)

                by saloomy ( 2817221 )

                You can stand up a device and wire-shark it. In fact many in the security industry probe solutions like this all the time to try and make a name for themselves. If/when someone finds something untrue, they publish it to become famous, collect bounties, and become expert consultants at ridiculously high rates. Also, this is a document sighted in many court cases and if Apple lied about it, it would ruin their business and expose them to untold levels of liability. Plus, you can look into their financials and

                • You can't wireshark encrypted communications. Plus you have no idea what they are doing on the server side. Ridiculous.

                  "Besides, do you run NO software that isn't open source and you haven't read through the source?"

                  Correct. I don't. You shouldn't either. I trust Open Source much more than I trust Apple. You should too.
                  • The firmware in your keyboard is open source? The firmware in the multiple processors in your hard drive is all open source? The firmware in all your wi-fi devices and interfaces is all open source?

                    • by tsa ( 15680 )

                      And you checked all of that for errors and back doors? If so, where do you find the time to earn a living?

            • Also from the privacy policy:

              we may collect a variety of information, including your name, mailing address, phone number, email address, contact preferences, device identifiers, IP address, location information and credit card information.
              • Show me where it says private messages again? Or Device Keys for that matter?

                • The point is YOU DON'T KNOW.

                  "we may collect a variety of information"

                  They could be doing anything.
                  • You do know. Its right there in their security document. If you don't believe them, wireshark or reverse it and prove otherwise.

                    Its a shitty argument to say "I dont believe them, just because it sounds wrong to me."

        • by dgatwood ( 11270 )

          My understanding with apple's ecosystem, especially around messages and account details, is that the company doesn't hold the decryption keys. Each device creates a public/private key pair, the private keys are stored on device, the public keys are in an API you draw from to send a message to each of the recicioente devices. The downside to this form of communication is each outbound message has to be encrypted and transmitted multiple times (matching the device count of the recipient).

          Therefore, it doesn't matter who has the data, as long as the government hasn't secretly cracked the form of encryption Apple uses, and they really never receive the private keys, which would otherwise be subject to subpoena.

          That depends on whether "the data" includes the set of authorized keys. Otherwise, it could matter a great deal, at least for future communication.

        • by AHuxley ( 892839 )
          That would make a PRISM hard. PRISM was not hard and no police are now calling for the ban on the use of an entire brand of devices.
          Security forces are happy. Police are happy. The beard is selling without questions by governments.
          Also consider how many governments around the world do that "subject to subpoena." part.
          To be allowed in the brand has to assure that nations security services that the product is subpoena supporting.
    • by SeaFox ( 739806 )

      How long before we see:”US customers had their iCloud data stored in China by mistake” :D

      Uh, that already happened [newsweek.com].

    • Maybe better there than on servers NSA can access?
  • Well? (Score:4, Interesting)

    by DontBeAMoran ( 4843879 ) on Wednesday July 18, 2018 @02:49PM (#56969878)

    What did you expect? This is China.

    Imagine companies had all their servers somewhere in Europe instead of the U.S.A. It's easy to imagine that the FBI, CIA, NSA and other three-letters-agencies would demand companies to have servers in the U.S.A. "for the security of its citizens".

    Same thing here, different point of view.

  • by PPH ( 736903 ) on Wednesday July 18, 2018 @02:49PM (#56969880)

    ... threw a hissy-fit when e-mail stored overseas wasn't made available to law enforcement.

    China, welcome to the club.

  • So in other words if you have an iPhone in China, whether anyone can beat the unlock password out of you or not is a moot point because the State already has all your data in it's posession?
    • by Arkham ( 10779 )

      So in other words if you have an iPhone in China, whether anyone can beat the unlock password out of you or not is a moot point because the State already has all your data in it's posession?

      They have the data, but it's encrypted by the phone. Unless they somehow learned to crack modern encryption, then they cannot look at the data.

      I guess it's possible that in China they've added another encryption key to the mix, but I doubt it.

      • Do you really think the Chinese government would stand for being locked out of anything within it's borders? They've either made a hush-hush deal with Apple to 'allow' them to operate in China under those conditions, or they've cracked it already. Or maybe they just do beat the shit out of anyone whose iPhone they want unlocked, beat them daily, threaten their families, and so on, until they get what they want, not like it's a stretch of the imagination in their case.
      • Unless they somehow learned to crack modern encryption, then they cannot look at the data.

        I seem to recall a recent case where the US government wanted Apple to decrypt someone's iPhone for them so it could be used in a court of law as evidence, and Apple (and every other smart person) laughed at them for even thinking it could be done. Absolutely impossible.

        And then someone in Israel came and did it.

        I also seem to recall being told how secure "modern encryption" was, and now I cannot even use those forms of encryption because they aren't secure.

        I guess it's possible that in China they've added another encryption key to the mix, but I doubt it.

        Of course they haven't. And of course Apple wi

  • This is a warning on why its foolish to count on for profit companies to guard your privacy (or anything else that might be "profitable"). Governments always control market access and in the end, if they are bad, they will make the tech in the country bad as well.

    Hard to believe, but given an unexpected turn of events and the election of a tyrant as a President, throw in a compliant legislature and this kind of collusion could be forced in the U.S.. Current President isn't interested in this so we, t
  • Sorry, but you'd have to be a dumb ass to assume anything in China is private!

    Just like assuming digital assistants aren't passing your recorded conversations to the NSA.

    You do business in China, don't assume you have any privacy for trade secrets or even thought crime.

    The idiocy of people astounds me.

  • by ArchieBunker ( 132337 ) on Wednesday July 18, 2018 @03:52PM (#56970228)

    Data stored in "the cloud" can be read by whoever runs the cloud, Fucking shocked.

  • I don't think the iCloud keys mentioned are enough to fully decrypt the messages.

    After all, our iMessage data can't be decrypted by Apple even though they presumably store the equivalent keys to what has been transferred. It's a multi-key encryption technique.

    In order to access iMessage data, or anything else locked to the phone, you'd still have to either spoof the biometrics (Touch ID or Face ID) or go in through GrayKey.

    China may one day get access to those messages, but they haven't got it yet
  • it wouldn't matter where the data was stored.

Genetics explains why you look like your father, and if you don't, why you should.

Working...