Apple Advances User Security With Three New Data Protections (apple.com) 22
WankerWeasel writes: Apple today introduced three advanced security features focused on protecting against threats to user data in the cloud, representing the next step in its ongoing effort to provide users with even stronger ways to protect their data. With iMessage Contact Key Verification, users can verify they are communicating only with whom they intend. With Security Keys for Apple ID, users have the choice to require a physical security key to sign in to their Apple ID account. And with Advanced Data Protection for iCloud, which uses end-to-end encryption to provide Apple's highest level of cloud data security, users have the choice to further protect important iCloud data, including iCloud Backup, Photos, Notes, and more.
One Time Pad (Score:2)
This hardware key will open Apple products to a lot of secure environments. My sister has a dongle for her computer.
But I would like to see a compromise that is less inconvenient. Like maybe the Apple Watch knows you are wearing it, and only you, and that is the only way to log in.
Re: (Score:2, Troll)
My sister has a dongle for her computer.
I have a dongle for your sister!!!
Sorry, just couldn't resist (:
Re: (Score:3)
Ultimate data security in the cloud (Score:5, Insightful)
Don't put your data in the cloud.
Don't believe cloud providers' claims on security.
Assume the cloud providers themselves are a threat.
Re:Ultimate data security in the cloud (Score:5, Insightful)
Exactly. If you don't control the encryption algorithm independently from the app and encrypt BEFORE the app touches the data, assume the app maker or cloud provider has access to it and can get to your data if they want to. The whole kerfuffle years back when the FBI was trying to get into the iPhone in California from the suspected terrorist, was a master class in misdirecting the public to what they wanted people to focus on. Them: Apple won't give you up. But in reality, the statement should be Apple won't give you up unless they eventually make us with court orders. And beyond that, the REAL question should have been, why is it even POSSIBLE for Apple to give you up? They shouldn't control the encryption and cloud usage should not be forced but yet they somehow redirected everyone and the media from asking those questions.
Re: (Score:3, Interesting)
All good advice.
However it is worth noting that US courts have, in general, concluded that you can be required to give up your "key" - physical or digital - in response to a search warrant just as you can be required to provide the combination to a safe if the search warrant's scope includes the associated location or data. Although if you refuse to do so in the case of physical locks, the search team will probably just drill out or force the lock rather than bother to go to court and have the court toss yo
Re: (Score:3)
I have nothing to hide to a court. I'd provide the key willingly. I just don't want cloud providers to rip through my data and exploit it.
Why do you assume people who use encryption are doing something illegal?
Re: (Score:2)
I'm not making the assumption you think I was making.
However, encryption is sometimes used to conceal criminal activity and the parent mentioned the FBI and the iPhone encryption case.
Of course in that case those that were most likely to have the encryption key were dead as a result of their criminal activities so the FBI had to figure out other ways (including the attempt to make Apple help them) to decrypt the data.
Re: (Score:2)
It seems to me the founders, while certainly never considering this possible future state that includes iPhones and encrypted Cloud storage of digital
Re: (Score:2)
Your interpretation of the US Constitution seems to vary from that of the courts. You may think yours is more correct than theirs but they sort of make the rules so that puts you at a disadvantage.
People don't actually have a "right to remain silent" in all cases. The now infamous "Miranda warning" and its "right to remain silent" clause is a fairly recent invention of the Supreme Court and only applies to those who are in custody and is often misunderstood (thank you Hollywood). Even then it's not absolute
Re: (Score:2)
Addendum:
As well, a court may well refrain from ordering you to provide the encryption key or the encrypted data if the fact that you could do so would incriminate you (but not because the data itself would -- that's just an object like a knife with blood on it found under your mattress).
For example, the fact that you demonstrate that you know the password to an encrypted file will tend to incriminate you as the prosecution could use that to tend to disprove your defense (perhaps "suggested" by your lawye
Re: (Score:2)
"why is it even POSSIBLE for Apple to give you up"
Because the most common scenario is people who accidentally lost their credentials trying to recover their own account.
Google should do the same (Score:2)
Bring My Own Key (Score:4, Insightful)
Great. When will I be able to bring my own encryption key, instead of relying on Apple to provide one?
Re: (Score:3)
When you are able to provide Apple with complete, unfettered access to your encryption key, you'll be allowed to use your own encryption key.
Re:Bring My Own Key (Score:4, Interesting)
Even that is not sufficient. You must encrypt using your own key with an app (preferably an entire operating system) out of apple's control before passing to any app that apple does control. Otherwise they can still get to it.
PGP (Score:1)
Still, it's a step forward (Score:3, Informative)
Re: Still, it's a step forward (Score:2)
Apple Advances Marketing (Score:1)