22 February 2016

Apple for the day UF


The New York Times has an article by Mike Isaac about the ongoing struggle between Apple and the FBI:
In Silicon Valley, if not in Washington, DC, Apple is being hailed for digging in its heels on a court order requiring it to aid the Federal Bureau of Investigation (the FBI) in gaining access to an an iPhone used by one of the attackers in the December 2015 mass shooting in San Bernardino, California.
Timothy D. Cook, Apple’s chief executive, emphasized on Tuesday in a letter to customers that helping the F.B.I. essentially hack into one of the company’s own phones would set a dangerous precedent. What’s more, Apple said it would have to create new software to do this.
But while company executives have embraced the notion that Apple is no longer able to intervene for law enforcement when investigators want access to an iPhone, it has repeatedly cooperated with court orders for access to online services like its iCloud.
That may sound like hypocrisy, but to people familiar with how Apple’s products and services work, it is simply a matter of technology.
iCloud is an Internet service Apple customers can use to back up information that is stored on their devices. It is helpful if your phone, tablet or computer is lost or badly damaged. And it, like other online services, is a gold mine for law enforcement — as the government spying revelations by the former National Security Agency contractor Edward J. Snowden showed.
Every few months for the last few years, tech giants like Facebook, Google, Microsoft and Twitter have published transparency reports, which are lists of instances in which a company turned over data on users at the behest of a court order in the United States or other countries.
In its most recent report, covering the first six months of 2015, Apple received nearly 11,000 requests from government agencies around the world regarding information on roughly 60,000 devices. Apple provided some data in roughly 7,100 of those requests, the report said.
Apple has stated repeatedly that it would hand over data to comply with a court order when it is technically able to do so. And as that report indicates, it has. Often.
But the operative phrase to understand the difference between Apple’s cooperation and its resistance is “technically able.”
In the fall of 2014, with an update to its iOS software, Apple switched off its ability to retrieve data from its phones and tablets. By doing this, Apple tried to take itself out of the equation when law enforcement is looking for access to a phone. In essence, the company could no longer fulfill a request if it was technically unable to do so.
ICloud is a different story. Apple encrypts that data on its servers and holds on to the key, which it uses to gain access to the data when it is required to do so by a court order.
There are practical reasons for managing security in the cloud differently from on an iPhone. ICloud exists, in part, to save backups in the event that, say, you drop your phone in a swimming pool. Apple needs to have that key to get your data back for you.
It is not so easy for a company to take away its ability to gain access to your information when that company’s ability to retrieve your information is the reason you are using its service.
Advertisement
Continue reading the main story
Advertisement
Continue reading the main story
“They’re a consumer-focused company, not a defense contractor,” said Steven M. Bellovin, a professor of computer science at Columbia University. “If someone loses their phone or forgets their password, they still want to be able to get their data back.”
That could soon change. Just as Apple has updated encryption practices for devices — like FileVault, which protects a Mac’s start-up disk, for example — the company plans to strengthen encryption on other products, said two senior Apple executives, who spoke on the condition of anonymity because the plans are not public.
That could include iCloud, if Apple can figure out a consumer-friendly way to keep the data under lock and key — a key Apple wouldn’t be able to use — without making it inconvenient for people who need to retrieve backups.
That is no simple feat. Apple would have to find a way to let users retrieve their own data safely even without the company’s help, while keeping out hackers and other sorts of data thieves.
There is reason to be cautious about mucking with iCloud’s security. In 2014, for example, a number of private photos were stolen from the iCloud accounts of celebrities like the actress Jennifer Lawrence. Apple said the episode was not a result of any widespread attack on the company’s software products. But it was a cautionary note for consumers of the service.
None of this iCloud discussion would apply to iMessage, Apple’s proprietary text messaging service. It uses technology called end-to-end encryption, which means messages sent using iMessage cannot be intercepted and decrypted. Only the sender and receiver, not Apple, have the keys to read such messages. Apple retains encrypted iMessages on its servers until they are read by the user or expire after several days.
For now, the best bet to protect your personal information from snoops may be to keep it off iCloud — and the many, many apps that may pass or store unencrypted information through data centers. It is safer on your device.
Just try not to drop your phone in a swimming pool.
Rico says WHAT

No comments:

Post a Comment

No more Anonymous comments, sorry.