Last month, Apple CEO Tim Cook released a startling letter in which he claimed the company was “challenging the FBI’s demands” to open up a backdoor on the iPhone. From this emerged a wealth of various stances from publications, politicians, and even late night talk show hosts, who all reached the consensus that no one really knows what to do in the privacy vs. protection debate.
Despite Apple’s urge for encryption, however, research conducted by Johns Hopkins University cryptography professor Matthew Green and a handful of his students has determined that Apple may already be open to vulnerabilities — or at least the iMessage portion of it. In fact, Green went so far as to say that Apple’s iMessage encryption is fundamentally broken, requiring the company to mandate a complete cryptographical overhaul if it wants to keep its users safe from unsolicited lurking.
Especially at a time when the US government is doing everything in its legal jurisdiction to get its hands on a backdoor into encryption, this could be unfortunate for Apple if it doesn’t act quickly. A susceptibility to this degree could leave the Cupertino company open to not only pesky vigilante hackers, but the bureaucratic ones as well.
“I’ve always felt that one of the most compelling arguments against this approach — an argument I’ve made along with other colleagues — is that we just don’t know how to construct such backdoors securely,” the professor explained in a blog post abbreviating the complete research paper. “But lately I’ve come to believe that this position doesn’t go far enough — in the sense that it is woefully optimistic. The fact of the matter is that forget backdoors: we barely know how to make encryption work at all.”
Put simply, the flaws found by Green and his pack of students can make it so those skilled enough to test their abilities could decrypt multimedia attachments, including both pictures and video from iMessage. Although the post mentions that certificate pinning has effectively made iMessage less exposed, a person could theoretically access Apple’s servers and proceed to take the attachments anyway, in the case that there’s a Push Notification Service server liability.
Green complimented iMessage for using “end-to-end encryption” dating back to 2011, but unfortunately it appears as though Apple uses the term quite loosely. True end-to-end encryption would keep messaging conversations between only those participating internally. Apple’s protection of iMessage does not extend to the server, leaving a gap in its defenses.
If a hacker were to take hold of the key server, they would in turn be able to intercept messages as they are being typed — those that have not already undergone the encryption process. Be that as it may, more threatening is the prospect of attackers making their way into already-encrypted messages, which is totally possible, according to Green and his disciples.
“In the long term,” Green explained, “Apple should drop iMessage like a hot rock and move to Signal/Axolotl.” In the meantime, Green recommends that users update to iOS 9.3 and the latest version of OS X, which implement fixes that mitigate some, though not all, of the vulnerability.
- Hackers may be able to access private WhatsApp conversations
- Apple iOS 11.2.2 update offers a fix to the Spectre security vulnerability
- Crypto-mining malware nets hacker group $3.4 million worth of Monero coins
- Audiophiles belong on Android. Here’s what I learned from switching over
- Microsoft and Signal team up to bring end-to-end encryption to Skype