Apple's 'Find My' Feature Uses Some Very Clever Cryptography - WIRED
Apple's 'Find My' Feature Uses Some Very Clever Cryptography - WIRED |
| Apple's 'Find My' Feature Uses Some Very Clever Cryptography - WIRED Posted: 05 Jun 2019 12:00 AM PDT ![]() When Apple executive Craig Federighi described a new location-tracking feature for Apple devices at the company's Worldwide Developer Conference keynote on Monday, it sounded—to the sufficiently paranoid, at least—like both a physical security innovation and a potential privacy disaster. But while security experts immediately wondered whether Find My would also offer a new opportunity to track unwitting users, Apple says it built the feature on a unique encryption system carefully designed to prevent exactly that sort of tracking—even by Apple itself. In upcoming versions of iOS and macOS, the new Find My feature will broadcast Bluetooth signals from Apple devices even when they're offline, allowing nearby Apple devices to relay their location to the cloud. That should help you locate your stolen laptop even when it's sleeping in a thief's bag. And it turns out that Apple's elaborate encryption scheme is also designed not only to prevent interlopers from identifying or tracking an iDevice from its Bluetooth signal, but also to keep Apple itself from learning device locations, even as it allows you to pinpoint yours. "Now what's amazing is that this whole interaction is end-to-end encrypted and anonymous," Federighi said at the WWDC keynote. "It uses just tiny bits of data that piggyback on existing network traffic so there's no need to worry about your battery life, your data usage, or your privacy."
Matthew Green, Johns Hopkins University In a background phone call with WIRED following its keynote, Apple broke down that privacy element, explaining how its "encrypted and anonymous" system avoids leaking your location data willy nilly, even as your devices broadcast a Bluetooth signal explicitly designed to let you track your device. The solution to that paradox, it turns out, is a trick that requires you to own at least two Apple devices. Each one emits a constantly changing key that nearby Apple devices use to encrypt and upload your geolocation data, such that only the other Apple device you own possesses the key to decrypt those locations. That system would obviate the threat of marketers or other snoops tracking Apple device Bluetooth signals, allowing them to build their own histories of every user's location. "If Apple did things right, and there are a lot of ifs here, it sounds like this could be done in a private way," says Matthew Green, a cryptographer at Johns Hopkins University. "Even if I tracked you walking around, I wouldn't be able to recognize you were the same person from one hour to the next." In fact, Find My's cryptography goes one step further than that, denying even Apple itself the ability to learn a user's locations based on their Bluetooth beacons. That would represent a privacy improvement over Apple's older tools like Find My iPhone and Find Friends, which don't offer such safeguards against Apple learning your location. Here's how the new system works, as Apple describes it, step by step:
As staggeringly complex as that might sound, Apple warns that it's still a somewhat simplified version of the Find My protocol, and that the system is still subject to change before it's actually released in MacOS Catalina and iOS 13 later this year. The true security of the system will depend on the details of its implementation, warns Johns Hopkins' Green. But he also says if it works as Apple described to WIRED, it might indeed offer all the privacy guarantees Apple has promised. "I give them nine out of 10 chance of getting it right," Green says. "I have not seen anyone actually deploy anything like this to a billion people. The actual techniques are pretty well known in the scientific sense. But actually implementing this will be pretty impressive." More Great WIRED Stories1Updated 6/5/2019 3:20 PM EST with a clarification from Apple that Find My stores and returns only one location for a lost device. |
| Posted: 30 May 2019 12:00 AM PDT Apple, Google, Microsoft and 44 other organisations and security experts have signed an open letter condemning a proposal to secretly add law enforcement organizations to encrypted chats and calls. The proposal by GCHQ – Britain's equivalent of the NSA – seeks to provide an encryption workaround that would breach privacy and security in apps like Messages, FaceTime, WhatsApp and Signal …
![]() NordVPNThe proposed workaround, aka 'ghost proposal'So far, companies like Apple have been able to tell law enforcement that it has no way to provide them with access to Messages chats and FaceTime calls because the services use end-to-end encryption. This means that Apple doesn't know the encryption key and therefore cannot access the content. But Britain's Government Communications Headquarters (GCHQ) thinks it has a clever workaround. First revealed back in February, it wants messaging companies to secretly add law enforcement agencies as invisible participants in chats.
For obvious reasons, the plan is being known as the 'ghost proposal.' Open letterThe open letter was sent on May 22 and made public today. It says the ghost proposal must be rejected on three grounds:
As the letter puts it:
The signatories say that iMessage, WhatsApp and Signal go to particular lengths to guard against exactly this risk – of third-parties managing to add themselves to a conversation.
This is why, when you add a new Apple device, you get an alert on your existing devices. The letter emphasises the fundamental problem that any backdoor created for use by the good guys inevitably carries the risk that it will be exploited by the bad guys. This is, of course, the reason Apple refused to create a weakened version of iOS for the FBI in the San Bernardino shooting case. The lengthy letter condemning the proposal to secretly add law enforcement agencies to encrypted chats is signed by tech giants, civil rights organizations and security experts. You can read it here. Photo: Shutterstock Check out 9to5Mac on YouTube for more Apple news: |
| You are subscribed to email updates from "iphone encryption,nexus 5x encryption,what is the purpose of encryption" - Google News. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
| Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States | |



Comments
Post a Comment