


UK Once Again Demands Backdoor To Apple's Encrypted Cloud Storage (arstechnica.com) 67
The UK government has issued a new order to Apple to create a backdoor into its cloud storage service, this time targeting only British users' data, despite US claims that Britain had abandoned all attempts to break the tech giant's encryption. Financial Times: The UK Home Office demanded in early September that Apple create a means to allow officials access to encrypted cloud backups, but stipulated that the order applied only to British citizens' data, according to people briefed on the matter.
A previous technical capability notice (TCN) issued in January sought global access to encrypted user data. That move sparked a diplomatic clash between the UK and US governments and threatened to derail the two nations' efforts to secure a trade agreement.
In February, Apple withdrew its most secure cloud storage service, iCloud Advanced Data Protection, from the UK. "Apple is still unable to offer Advanced Data Protection in the United Kingdom to new users," Apple said on Wednesday. "We are gravely disappointed that the protections provided by ADP are not available to our customers in the UK given the continuing rise of data breaches and other threats to customer privacy." It added: "As we have said many times before, we have never built a back door or master key to any of our products or services and we never will."
A previous technical capability notice (TCN) issued in January sought global access to encrypted user data. That move sparked a diplomatic clash between the UK and US governments and threatened to derail the two nations' efforts to secure a trade agreement.
In February, Apple withdrew its most secure cloud storage service, iCloud Advanced Data Protection, from the UK. "Apple is still unable to offer Advanced Data Protection in the United Kingdom to new users," Apple said on Wednesday. "We are gravely disappointed that the protections provided by ADP are not available to our customers in the UK given the continuing rise of data breaches and other threats to customer privacy." It added: "As we have said many times before, we have never built a back door or master key to any of our products or services and we never will."
UK government = Privacy Rapists (Score:3)
The UK government has issued a new order to Apple to create a backdoor into its cloud storage service
UK government is a Privacy Rapist. 'nuff said.
Re: (Score:2, Insightful)
Re: (Score:1)
obviously you have proof of this.
(notice is not a question, and i don't want to hear your nonsense.) links or shut the fuck up.
Google cares more about your privacy than Apple (Score:3)
https://support.apple.com/en-us/111754
Of course other governments are going to want the same deal China has. So I
Re: (Score:2)
Not just Apple, either (for the US-side)... I really don't think any country has an encryption scheme that the government can't crack.
Re: (Score:2)
Can you clarify? You say that all governments have computationally-feasible attacks of Rijndael, Serpent and Twofish, that cryptanalysts have no idea exist?
Re: (Score:2)
(scroll down)
Told ya.
The schemes don't have to be attacked... the governments aren't going to let an "encryption scheme they can't decrypt" exist, end of story. If they did, someone could get hired at the Pentagon and just email documents without a care in the world.
Re: (Score:2)
The schemes don't have to be attacked... the governments aren't going to let an "encryption scheme they can't decrypt" exist,
But secure "schemes" already exist! You can encrypt storage devices using known algorithms provided by the linux kernel, which you can compile yourself from a tarball downloaded from kernel.org (gentoo user FTW). I admit I have not read the source, but many eyes have.
I agree with if it's about commercial cloud offers, but elsewhere you can deploy your own crypto. Your only vulnerability is the "trusting trust" paper which is theoretical.
Re: (Score:1)
I admit I have not read the source, but many eyes have.
I love it when people come out with the "It's open source, many eyes have looked at it so it must be fine." Well many eyes looked at the SUDO command which is in pretty much every Linux distro there is yet there was a serious privilege escalation vulnerability that existed for TWELVE YEARS [cyberpress.org], only finally getting fixed a few months ago.
Re: (Score:2)
So you found 1 old vulnerability in the code of some popular software, therefore... the government can crack my encrypted SSD?
There are probability thousands of privilege escalation vulnerabilities out there. If an attacker has a local account, you can consider it's game over. sudo is shipped but you're not obliged to configure it to work. Personally I never even installed it as the existence of sudo on a machine is an OBVIOUS security flaw in itself.
But we're talking cryptography algorithms, not a random p
Re: (Score:2)
you don't need either
encryption (Score:2)
Re:encryption (Score:5, Interesting)
Nothing has indicated Apple has "played ball" with the govt as far as backdoors, and from some stories (unlocking terrorists phones) it seems as though the govt doesn't have any.
There's one simple metric to know whether the government has access to encrypted data: angry calls by law enforcement agencies making repeated requests for lawmakers to force companies to allow access to encrypted data.
Consider how, until several years ago, the FBI and other US TLAs were arguing all the time for access to encryption, with media reporting on that almost non-stop. Consider how they all stopped talking about it a few years later, and to this day still say little to nothing about it. Now, what's more likely: that they conformed to the fact they'll never get access to it so stopped trying; or that they don't need to ask anymore?
By using this metric it's clear the UK and the EU don't have access to encrypted content from Apple and other big techs, while US most certainly does. The moment UK and EU officials stop talking about this we'll know they, too, got access to it.
Re: (Score:2)
By using this metric it's clear the UK and the EU don't have access to encrypted content from Apple and other big techs, while US most certainly does. The moment UK and EU officials stop talking about this we'll know they, too, got access to it.
This is the sort of logic that leads to beliefs like the flat earth.
Re: (Score:2)
This is the sort of logic that leads to beliefs like the flat earth.
No, it's basic "canary in the coalmine" logic: the moment it stops singing you know something is wrong.
Re: (Score:2)
Did the threat stop? If not, then why aren't US govt reps still complaining about it? Its not like they have been friends of Apple or big companies lately.
Re: (Score:2)
but you know about the undocumented hardware registers that Kaspersky found a few years ago on Apple hardware, right? Should come up on a google search, I don't have the reference handy, but.... ummm.. surprise! Apple did something that you're not supposed to know about.... gee... I wonder what tha
Re: UK government = Privacy Rapists (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Did you try markup? HTML works.
Re: (Score:2)
Re: (Score:2)
Yeah but manually entering html tags in 2025 is a bit of a ball-ache. Do you seriously add angle bracket letter P close angle bracket on every paragraph?
Slashdot is a testament to the 90s web, a site frozen in time.
At least they finally got Unicode working, kinda.
LOL
Re: (Score:1)
I have it so ingrained from being here for so long...
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
Free Speech of Russia Comedians canâ(TM)t make a comment about possible shooter political affiliation.
Bullshit. What happened was a disgusting display by the people celebrating the dead person's death, praising the shooter, and then you have the retard on TV say "Oh the shooter's maga" when it turns out he'd been radicalized into his actions by trans and trans-supporting loons. Shooter has a trans lover.
But before any of that was known, that idiot had to go on TV and throw the blame at one group, when it was the exact opposite group that radicalized him.
I feel for his parents. I grieve for the nation. I
Re: (Score:1)
and then you have the retard on TV say "Oh the shooter's maga"
Except that's not what he said. The actual quote: "We hit some new lows over the weekend with the MAGA gang desperately trying to characterize this kid who murdered Charlie Kirk as anything other than one of them, and doing everything they can to score political points from it." Yes, it's not too much of a stretch to go from those precise words to "oh the shooter's maga", but it's still stretching his words and not what he said.
Re: (Score:1)
Exactly.
In the early hours and days after the shooting, the MAGA gang indeed WERE desperately trying to characterise the kid who murdered Charlie Kirk as anything other than one of them, and indeed WERE doing everything they can to score political points from it. It’s funny because it is true. And it is exactly as Kimmel said. And it is free speech. And they got him taken off air for saying it.
1984.
Re: (Score:1)
Re: (Score:2)
Re: (Score:2)
You're talking a lot about rape in the last days, using it as a drastic metaphor for things where other words would fit better. Maybe you should see someone.
Here ya go [slashdot.org] you easily triggered Meta[stasize]/Alphabet employee.
Re: (Score:2)
Well, somebody's being a stalker!
Maybe you should surrender yourself.
From a brit (Score:2)
Re: (Score:3, Funny)
As a fellow Brit, I concur with the rider that said fucking should be performed repeatedly and sideways.
There are only two choices... (Score:5, Insightful)
...security or no security
It's impossible to design a system that is secure against the bad guys and insecure against the good guys
It's also impossible to define who the good guys are, or guarantee that they will always be good
Lawyers and politicians need an education in tech reality
Re: There are only two choices... (Score:2)
Security is non-binary (Score:2)
...security or no security
Yes but to be fair any system that allows for decryption of the data is insecure because, if you can encrypt the data then so can the bad guys even if that means they have to turn up at your house and hold a gun to your head to get the decryption key. Hence, if you want to reduce security to a simple binary choice we always chose the 'no security' option because absolute security is rather pointless.
Re: (Score:2)
^a million percent^
If I encrypt an email and send it to you, your computer HAS to either have the decryption key already, or it HAS to include the key with the message... otherwise, what's the point? You'll just get an email of junk. If it's a thing that's done in the browser, then the browser, once again, has to have the key (or the email provider). If it's an open-source standard, then it's well known how to decrypt it... "if you have instructions how to scramble these letters, it's pretty much useless
Re:There are only two choices... (Score:5, Insightful)
I do not consider that to be 'tech reality', I consider it to be simple logic.
The point of encryption is secrecy. Effective secrecy against bad guys means effective secrecy against governments because there exists governments in the world that are bad guys.
Therefore If I want to design secrecy effective against North Korea it requires me to design secrecy effective against the UK.
In addition, if you do not recognize the need for secrecy against North Korea is greater than your need to know what I am hiding than you are NOT a good guy.
Re: (Score:2)
If the only way to catch a particular bad guy is to weaken security for everyone (backdoors, hoarding exploits, deliberately weak encryption etc etc) then I say that bad guy should go uncaught.
And I would hold that position no matter who the bad guy might be.
Re: (Score:2)
When you are the center of the world, you are always the good guy. Other people won't agree, but they do not matter as you are the center of the world.
Say no to cloud (Score:5, Insightful)
Re: (Score:2)
This is why you NEVER use cloud storage. If you have no choice but to use cloud storage you should be encrypting the data outside of the cloud or any "backup / syncing" software required for the cloud. If it's encrypted in the cloud the cloud provider 100% has the private key to decrypt, If it's encrypted in their backup / syncing software they most likely can also have a copy of the private key or have a backdoor to decrypt. If you encrypt it separately then only you have the private key and the only way anyone is decrypting it is to brute force it or use a vulnerability to break it.
More to the point, this is why governments — the United States government in particular — need to demand that Apple open up their platform to allow third-party backup tools so that users can choose whether to use iCloud backups, Google Drive backups, Dropbox backups, CrashPlan backups, a not-yet-existing tool that backs up to a NAS on your home network whenever you're at home and to an encrypted disk image on iCloud when you aren't, etc. That puts the backup companies in competition with one an
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
The problem is that the iOS sandbox makes a full backup via rsync impossible, because except as permitted by specific entitlements, apps don't have access to other apps' private sandboxed data (as opposed to data that the app intentionally stores in a shared location), and unless something has changed very recently, there is no "full disk access" sandbox entitlement or equivalent on iOS(*).
* There are at least ostensibly ways to create magic sandbox escapes that would give an app that ability, but I'm 99.9
Re: (Score:2)
Well, this is a bit old, and may not apply anymore, but you used to be able to backup entire disk partitions from Linux on the Apple. (But that might have been from a live CD, I don't remember.)
Re: (Score:2)
Well, this is a bit old, and may not apply anymore, but you used to be able to backup entire disk partitions from Linux on the Apple. (But that might have been from a live CD, I don't remember.)
Ah. I understand the confusion. You're talking about a Mac. The Mac platform isn't truly locked down; you can give any app full disk access trivially in System Settings, etc. This is mainly for historical reasons, because taking away privileges is a lot harder than never having them in the first place, and a lot of apps wouldn't work at all if you couldn't.
When talking about Apple's locked-down platform, I was referring to iOS (iPhone, iPad) and, by extension, iOS derivatives like VisionOS and WatchOS.
Re: (Score:2)
Yes as a terrorist I would take some precautions and not use cloud storage. But what do you mean "this is why" you don't use cloud storage in a general sense? Someone can request access to data. That is very vague. What does this mean for the average Brit?
That is what most of these discussions miss. The average Brit is going to see your post, shrug, and keep happily putting their holiday pics up on their Cloud storage, giving precisely zero fucks if some government secret service operative is masturbating t
Re: (Score:2)
but we all know (Score:3)
Transnistria demands white M&Ms! (Score:2)
There's always been a nasty streak there, but creeping incompetence seems to be making it worse.
Glad I saw some of it when I did.
Re: (Score:1)
Citizenship vs Residency (Score:1)
As a US citizen living in the UK, how is this new approach going to work?
Stupid people demand stupid things (Score:2)
What else is new.