TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

iOS 11 Security [pdf]

338 pointsby Artemis2over 7 years ago

17 comments

gervaseover 7 years ago
Apple seems to be investing heavily in security and privacy, but I&#x27;m curious to see if they can actually convince the average consumer to care (and&#x2F;or buy into their security narrative, depending on your level of cynicism). So far, the convenience and features offered by their competition (at the expense of user privacy) seem to be a stronger draw.<p>I figure either (A) they&#x27;re trying to carve out a niche of hardcore consumers who do care, or (B) they&#x27;re trying to play a long game, hoping that broad sentiment shifts towards valuing electronic privacy. If it&#x27;s the former case, I think they&#x27;re doing fine; these kinds of whitepapers will reach most of those who care, and periodic news articles (&quot;Terrorist iPhone unable to be unlocked!&quot;) will reach the rest.<p>If it&#x27;s the latter, I think it&#x27;s a pretty big risk given the scale of their re-education task (the pool of users willing to sacrifice personal privacy for other benefits, i.e. Google and Facebook&#x27;s bread and butter) and the potential pushback they&#x27;ll receive&#x2F;have been receiving from governmental sources.<p>What does HN think? Is this a viable business differentiator for them, long term? Or will they have to shift to the &#x27;dark side&#x27; of personalized data and services to remain competitive in the future?
评论 #16140937 未加载
评论 #16141733 未加载
评论 #16140958 未加载
评论 #16142815 未加载
评论 #16140844 未加载
评论 #16140939 未加载
评论 #16140726 未加载
评论 #16143878 未加载
评论 #16140888 未加载
评论 #16141764 未加载
评论 #16140823 未加载
评论 #16140821 未加载
评论 #16140964 未加载
评论 #16142412 未加载
评论 #16141841 未加载
评论 #16143051 未加载
评论 #16149344 未加载
评论 #16140750 未加载
评论 #16141241 未加载
评论 #16142563 未加载
评论 #16140865 未加载
评论 #16140837 未加载
评论 #16141066 未加载
评论 #16140849 未加载
tzaholaover 7 years ago
I hope Apple will begin to spin privacy and security as part of their &quot;premium lifestyle&quot;. Because if privacy and security will be associated with premiumness, other companies will have an incentive to implement similar measures in their products. People will actually care about their digital privacy for the first time! (though not because of the benefits of privacy, but to show off to others that they can afford a <i>premium</i> product with privacy)<p>Sort of like how companies suddenly started caring about their mobile phones&#x27; package design after the iPhone was released with its sleek packaging.
评论 #16142775 未加载
amckinlayover 7 years ago
Apple security is confusing. For example, Find My Mac does not require 2FA even when 2FA is enabled. An attacker can remotely wipe your MacBook with just your iCloud password.<p>Another example: apparently there is a distinction between &quot;two-factor authentication&quot; and &quot;two-step authentication&quot;, the later being a deprecated, but active system. Reading the docs for the older system, you&#x27;ll soon discover differences in things such as account access and recovery that lead to an entirely different set of consequences and caveats for security. You&#x27;ll find out that in certain scenarios you could permanently lose access to your iCloud account and iTunes purchases under &quot;two-step authentication*, but not the newer &quot;two-factor authentication&quot;. If a user confused the two while reading the Apple online support pages, it could have grave consequences.<p>Security is something that needs to be documented and marketed in clear terms. Why Apple would adopt names so similar for two distinct implementations of a security mechanism that they could arbitrarily describe either is incoherent with Apple&#x27;s supposed model of user friendliness. It&#x27;s what Microsoft does with its products, not Apple. Additionally, all facets of a security feature should be documented, and documented well. It is unacceptable that Apple does not warn users that 2FA can be bypassed in certain scenarios. I hope Apple does further focus on security, and documenting it well.
评论 #16142488 未加载
评论 #16142778 未加载
评论 #16142191 未加载
评论 #16143989 未加载
5_minutesover 7 years ago
I certainly appreciate this effort, whatever their long term intention or strategy is with this in a commercial way (or not), it’s in line with what I expect when it comes to my privacy and security.<p>Some of the google&#x2F;Android “features” and what they do with your data, make old school keyloggers look like a joke.
polygotover 7 years ago
&quot;The processor forwards the data to the Secure Enclave but can’t read it. It’s encrypted and authenticated with a session key that is negotiated using a shared key provisioned for each Touch ID sensor and its corresponding Secure Enclave at the factory.&quot;<p>&gt; &quot;at the factory&quot;<p>I suppose the secret key is erased at the factory, however, what if it isn&#x27;t? Or, is the secret key generated on-chip via a random number generator? If it were stored at the factory somewhere then it would be possible to link it to each iPhone. I&#x27;m not familiar with cryptography, so I think it&#x27;s just a misunderstanding on my part, and I&#x27;m not sure if this would be a weakness in the Touch ID sensor.
评论 #16142042 未加载
评论 #16141640 未加载
samatover 7 years ago
I am wondering if someone could explain Chinese iCloud accounts transfer implications.<p>I see that iCloud Keychain is still secure, but pretty much everything is fucked up, right?
评论 #16141578 未加载
milesover 7 years ago
Could you please add (PDF) to the title? Didn&#x27;t HN used to do this automatically? Or did the trailing &quot;?&quot; in the URL break that functionality?
评论 #16141717 未加载
joshoover 7 years ago
iCloud Keychain may be surprising for some folks. For example, it can be restored from an iCloud backup only to the same machine. Also, you have no ability to recover your iCloud keychain from your own time machine backups.<p>The reasons, as the document outlines, are for added security. But, having recently wiped my iCloud keychain by resetting Safari&#x27;s privacy settings and inadvertently loosing all my passwords, I was surprised to discover that I couldn&#x27;t restore my passwords from my own backups. The upside is a compromised iCloud password doesn&#x27;t also leak all the keychain passwords.
neomover 7 years ago
Anyone know if other cell phone vendors publish a document like this?
评论 #16140696 未加载
评论 #16160791 未加载
cocktailpeanutsover 7 years ago
&gt; &quot;The processor forwards the data to the Secure Enclave but can’t read it. It’s encrypted and authenticated with a session key that is negotiated using a shared key provisioned for each Touch ID sensor and its corresponding Secure Enclave at the factory.&quot;<p>If I understand this correctly, IF they&#x27;re using Diffie Hellman key exchange to generate the shared session key for every chip, doesn&#x27;t this mean Apple also owns the session key for every single iDevice out there and can crack into them if they wanted to?<p>Does this mean the &quot;security&quot; only protects users from men-in-the-middle, but not from Apple (or NSA if they come after them)?
评论 #16142089 未加载
ploggingdevover 7 years ago
Regarding iCloud accounts, Apple seems to be forcing the usage of phone numbers for 2FA and account recovery without an option to disable it. I switched from an Android device to an iPhone recently and was asked to setup an iCloud account. I went through the setup process and realized that my phone number was setup as a 2nd factor with no option to disable it [0]. For all the talk about Apple devices being the most secure, not many people seem to be complaining about how Apple forces a phone number as a 2nd factor + account recovery method. Most people backup very personal data to their iCloud accounts and forcing users to use a phone number for 2FA and account recovery is ridiculous. IMO Google gets 2FA right : I can setup a Yubikey + Authenticator + backup codes and remove my phone number as a 2FA method. And I also realized that there&#x27;s no way to delete an iCloud account. I assumed all the big companies will have an option to delete accounts. I hope there&#x27;s a law mandating all online accounts need to have a clearly defined lifecycle with an option to delete accounts and personal data if users want to.<p>(First time using an Apple device, so I might be misunderstanding the 2FA situation, correct me if I&#x27;m wrong.)<p>[0] <a href="https:&#x2F;&#x2F;support.apple.com&#x2F;en-us&#x2F;HT204915" rel="nofollow">https:&#x2F;&#x2F;support.apple.com&#x2F;en-us&#x2F;HT204915</a>
评论 #16142319 未加载
评论 #16142359 未加载
评论 #16143944 未加载
mrbluesover 7 years ago
Is it possible to extract data from a locked and turned off iphone 7 or newer device?
zythonover 7 years ago
Please tag this as pdf
yorbyover 7 years ago
Was Steve Jobs in charge of over-viewing security?
ConcernedCoderover 7 years ago
Is this chain-of-trust implementation the reason my backlit-keyboard on my macbook pro won&#x27;t light up whilst asking me for my password on coldboot? It&#x27;s a giant pain in the rear to get up and flip on a light when you&#x27;re in bed programming at night... ( sigh )
MikeGaleover 7 years ago
This looks like a great example of insecurity through security.<p>Given that Apple is not trustworthy and you need to be able to change and&#x2F;or inspect a device to have a chance at security, this is a solid strike for a human-thought-free insecure world.
drewmcmillanover 7 years ago
&gt;The probability that a random person in the population could look at your iPhone X and unlock it using Face ID is approximately 1 in 1,000,000 (versus 1 in 50,000 for Touch ID)<p>I would love to know the likelihood of this in reality. For example, What about people who look like you? You don&#x27;t tend to hang around with completely random people, its often parents and siblings who, unlike fingerprints, may bare facial resemblance enough to trick it