62 pointsby _____k15 days ago5 comments
  • romanovcode15 days ago
    The flaw is that they had those keys to begin with. What's the point of encryption if key is available and free to use? Same with iCloud Email.

    Privacy cannot come from human-made laws and regulations because they get abused on they change. Privacy comes from mathematics which do not care for laws and regulations.

    • dogma113815 days ago
      The main threat model here is a stolen/lost device or an unscrupulous repair shop not a government agency with a warrant.

      You also do not have to backup keys in the cloud, however for most users it’s the best solution since for them data recovery in case of a hardware failure is more important than resiliency against state level adversaries.

      • toomuchtodo15 days ago
        I am an Apple ecosystem lifetime participant. I have recovery and legacy contacts. What I would love is for those contacts to have the encryption key(s) for my data shared with them so they can provide me with recovery options if needed, but Apple cannot.

        Certainly, nation state actors could pursue those people to obtain access to key material, but that is a different hill to climb than simply sending requests to Apple, especially for contacts outside of the jurisdiction or nation state reach. Perhaps Shamir's secret sharing would be a component of such an option (you need X out of Y trusted contacts to recover, 2 out of 3 for easy mode, 3 out of 5 for hard mode).

    • eddyg15 days ago
      • dogma113815 days ago
        Apple can recover your keys also unless you enable ADP.

        With MSFT cloud backup of keys is an opt-in. With Apple it’s an opt-out.

      • romanovcode15 days ago
        I will include iCloud in this because their email has nothing to do with ADP and is accessible by any agency that would ask.
        • dogma113815 days ago
          Mailbox encryption is near pointless since at the least it needs to be encrypted at both ends not to mention relays.

          For email each individual message should be encrypted if you want any confidentiality and even then the meta data is in the clear.

          And this is because in order to send or receive an email the provider needs to access it. If they put it into a box later on to which they do not hold the key that is just security theater at that point.

      • alt22714 days ago
        Dude thats from 9 years ago.

        A lot has changed since then and it is common knowledge that Apple regularly give government agencies access to their systems and hides it from the public until a whistleblower leaks it.

        https://www.reuters.com/technology/cybersecurity/governments...

        In a statement, Apple said that Wyden's letter gave them the opening they needed to share more details with the public about how governments monitored push notifications. "In this case, the federal government prohibited us from sharing any information," the company said in a statement. "Now that this method has become public we are updating our transparency reporting to detail these kinds of requests."

  • fuzzfactor15 days ago
    You all did know that the idea of a Microsoft account was a security & privacy compromise from day zero of its conception, right?
    • jmclnx15 days ago
      Well I would say this should be true for most people here. I expect the same for Apple too. The big question is, when will these keys hit the wild ? Since they exist, eventually they will get out there.

      We all know, if you want real security, there are much better OSs.

      • dagmx15 days ago
        Why would you expect Apple to have the keys? They famously fought the FBI on the grounds of not having access to the keys themselves.

        Good engineering practices say that you shouldn’t even find yourself in the position of having the keys.

        And what “better OS” pushes you to encrypted drives on setup? Most Linux distros don’t.

    • jqpabc12315 days ago
      Yes; and none of my computers have one. Contrary to popular myth, it is relatively easy to install Win11 Pro without one.
      • josephcsible15 days ago
        A constant cat-and-mouse game of Microsoft disabling every method to do so as soon as they become somewhat popular is not "relatively easy".
        • jqpabc12315 days ago
          Really? I haven't had any problems, even with computers that don't meet the official hardware requirements.

          Download the Win11 Pro ISO, extract it to a USB drive and then execute the command below from it for a totally automated install that bypasses all the BS.

          .\setup.exe /product server /auto upgrade /EULA accept /migratedrivers all /ShowOOBE none /Compat IgnoreWarning /Telemetry Disable

          You're welcome!

          PS: I know it says "server" but when upgrading a desktop machine, desktop is what you will get --- minus a lot of BS.

          • josephcsible15 days ago
            I believe you that that way works today, but once knowledge of it starts to spread, I expect Microsoft to break it, just like they previously broke Shift+F10 "oobe\bypassnro" and "start ms-cxh:localonly".
            • jqpabc12315 days ago
              It has worked all along and MS can't break it because I have the ISO that it works with.

              It's unlikely it can be broken without totally abandoning the server market and disrupting a lot of existing installations --- which would be a marketing disaster.

            • alt22714 days ago
              There will always be a way to create local accounts in Windows because they are intrinsic to how windows actually works.
              • josephcsible14 days ago
                There may always be a way, but every few months the existing way will stop working and people will need to discover a new way.
                • alt22713 days ago
                  Thats exactly my point, they will keep closing loopholes but they will never truly stop people doing it without removing local accounts completely, which they cant do.
  • jqpabc12315 days ago
    ... does not possess the forensic tools to break into devices encrypted with Microsoft BitLocker

    Nice intel to have. Now, all that is needed for reasonable security is to avoid storing the key in the cloud. Duhhh.

    Basic rule: Not your hardware (computer/drive), not your data.

    Never store anything on someone else's hardware that you need to maintain full control over.

    But, but, but encryption? It helps but encryption does not guarantee full access when you don't control the hardware.

    • OptionOfT15 days ago
      They don't have the tools but for 99% of the people who have laptop with device encryption, they mandate Microsoft Accounts, and guess where the keys are uploaded to? Thats right, https://aka.ms/recoverykey.

      You don't need to build backdoors when you store a copy of the key.

      • jqpabc12315 days ago
        they mandate Microsoft Accounts

        I don't use these. See post below.

    • general146515 days ago
      > Nice intel to have. Now, all that is needed for reasonable security is to avoid storing the key in the cloud. Duhhh.

      You can go one step further. Encrypt your computer, store keys on the cloud, then encrypt your computer again but store keys into a file. You can see key ID on Microsoft Live account. Now you won't even look suspicious.

  • OutOfHere15 days ago
    The part that I was shocked to read is that Apple is equally unsafe.