Still waiting for Apple to provide end-to-end encryption on iCloud Backup for devices. Their documentation on this has always seemed intentionally vague.<p><a href="https://support.apple.com/en-us/HT202303" rel="nofollow">https://support.apple.com/en-us/HT202303</a><p>End-to-end encrypted data ->
- Apple Card transactions (requires iOS 12.4 or later)
- Home data
- Health data (requires iOS 12 or later)
- iCloud Keychain (includes all of your saved accounts and passwords)
- Maps Favorites, Collections and search history (requires iOS 13 or later)
- Memoji (requires iOS 12.1 or later)
- Payment information
- QuickType Keyboard learned vocabulary (requires iOS 11 or later)
- Safari History and iCloud Tabs (requires iOS 13 or later)
- Screen Time
- Siri information
- Wi-Fi passwords
- W1 and H1 Bluetooth keys (requires iOS 13 or later)
Lots of interesting stuff this time. Short list that I’ll update as I go:<p>Some sort of “checked C” in iBoot: <a href="https://support.apple.com/guide/security/memory-safe-iboot-implementation-sec30d8d9ec1/web" rel="nofollow">https://support.apple.com/guide/security/memory-safe-iboot-i...</a><p>Data is encrypted with your security policy, so if that changes (e.g. you disable SIP) it doesn’t expose it: <a href="https://support.apple.com/guide/security/sealed-key-protection-skp-secdc7c6c88e/web" rel="nofollow">https://support.apple.com/guide/security/sealed-key-protecti...</a><p>Details on what the SRD is and how it works: <a href="https://support.apple.com/guide/security/apple-security-research-device-seca7ff718d2/web" rel="nofollow">https://support.apple.com/guide/security/apple-security-rese...</a>
"For certain sensitive information, Apple uses end-to-end encryption" - there's a lot of important user generated data from Apple apps that is not end-to-end encrypted.<p>Frankly, I'd like to see them go even further and put in place a policy that all user-created-and-consumable content can only leave the device in end-to-end encrypted format and have those keys managed by my AppleID so not even Apple can decrypt.<p>They can introduce it at an API level without having to dictate storage providers. If a web-version of an app needs show my photos they can let the end-user browser decrypt it. This works for private data, 1:1 and 1:Many shared data.<p>I should have a choice with who hosts my encrypted data, who manages my keys/identity and who provides a service that uses that data. Let's get back to providing value through services and away from leaching value through hoarding data and controlling protocols.<p>Yes - this will force companies to change their business models if they rely on access to my data. Will it make for better software - Yes hands down. More companies can compete and we'll start to see more creative solutions.
I don't see anything about the "Unlock your iPhone with your Watch" feature that 14.5 is going to have[0] - i'd be interested in reading the in-depth security considerations they had. It's also currently a mystery if this feature does a partial Face ID scan in addition to requiring an unlocked Watch.<p>0: <a href="https://www.macrumors.com/2021/02/01/iphone-apple-watch-unlocking-ios-14-5/" rel="nofollow">https://www.macrumors.com/2021/02/01/iphone-apple-watch-unlo...</a>
It's nice to see that the Apple Security Research Device (i.e. the iPhone with root access) hasn't been forgotten about[0]. They even describe the additional security protections they had to do to ensure an attacker didn't give this device to someone that thought it was a regular iPhone (for example, the phone won't cold boot without being plugged into a charger, and if you plug it in, it shows the words "Security Research Device" before booting XNU in verbose mode)<p>0: <a href="https://support.apple.com/guide/security/apple-security-research-device-seca7ff718d2/1/web/1" rel="nofollow">https://support.apple.com/guide/security/apple-security-rese...</a>
PDF version: <a href="https://manuals.info.apple.com/MANUALS/1000/MA1902/en_US/apple-platform-security-guide.pdf" rel="nofollow">https://manuals.info.apple.com/MANUALS/1000/MA1902/en_US/app...</a>
I’m bummed as an admin that the new M1s remove a function as an admin I always loved with remote management.<p>From what a sales/dev person for a Saas MDM app for macOs told me, the M1s do not have a lock device feature. You can only wipe the device.<p>If an employee was terminated, we could remote send a lock command with a numeric code. The only way to remove the lock is to get the code from us or have Apple reset it in person. The in person visit you have to prove you’re the owner or have authorization from the company to have Apple unlock it.<p>My only option now is to wipe it. So now I have to find a cloud backup provider to back these devices up in case I need an important file from an employee who decides to go rogue.
I’d like to know how I’m still logged in in Twitch even after deleting and installing the app. Or how Spotify offered me to link it to an Alexia device I was setting up after I installed the Alexa app.
Any news about the T2 chip ending up being a way to silently implant malware in all Intel-based Macs that have it? Refunds? Replacements? Anything? Bueller?
<a href="https://arstechnica.com/information-technology/2020/10/apples-t2-security-chip-has-an-unfixable-flaw/?comments=1" rel="nofollow">https://arstechnica.com/information-technology/2020/10/apple...</a><p>I don't really know why anyone would take Apple's hardware security claims at face value after this.<p>edit: more links, though they're all pretty similar.<p><a href="https://www.wired.com/story/apple-t2-chip-unfixable-flaw-jailbreak-mac/" rel="nofollow">https://www.wired.com/story/apple-t2-chip-unfixable-flaw-jai...</a><p><a href="https://appleinsider.com/articles/20/10/05/apples-mac-t2-chip-has-an-unfixable-vulnerability-that-could-allow-root-access" rel="nofollow">https://appleinsider.com/articles/20/10/05/apples-mac-t2-chi...</a><p><a href="https://www.zdnet.com/article/hackers-claim-they-can-now-jailbreak-apples-t2-security-chip/" rel="nofollow">https://www.zdnet.com/article/hackers-claim-they-can-now-jai...</a><p><a href="https://www.theregister.com/2020/10/08/apple_t2_security_chip/" rel="nofollow">https://www.theregister.com/2020/10/08/apple_t2_security_chi...</a><p>edit 2:<p>If this is wrong, I'd like to know the truth! Really! Was it a hoax? Is there a patch? What happened?