Skip to main content

Despite FBI whining, iMessage isn’t invincible after all, researcher claims

how to save text messages
FBI director James Comey has been campaigning against Apple and Google’s decision to introduce “end-to-end” encryption on the companies’ respective smartphones since they announced it last fall. Most recently, Comey testified before the Senate Judiciary Committee about the dangers of encryption and asked Senators to pressure tech companies into rolling it back so that the contents of smartphones would be accessible to law enforcement. Comey argued that criminals are “going dark,” hiding evidence of their wrongdoing behind encryption that his agency cannot break.

However, Comey’s arguments about encryption don’t align with how iPhone encryption actually works, claims computer-security researcher Nicholas Weaver. In a post on the blog Lawfare on Tuesday, Weaver points out that, even if encryption protects the contents of your iMessages, the FBI can still obtain plenty of information about you from your iPhone — for instance, your location data and your iMessage metadata would both be accessible to law enforcement with a warrant.

Crucially, Weaver also points out that iPhone users who enable iCloud backups would be vulnerable to a FBI search warrant. iCloud backs up the contents of messages to Apple’s servers, making the messages themselves easily accessible — a far cry from the inaccessibility described by Comey before the Senate Judiciary Committee.

“Finally, there is iMessage, whose ‘end-to-end’ nature, despite FBI complaints, contains some significant weaknesses and deserves scare-quotes,” Weaver explains. Even though Apple CEO Tim Cook has claimed that there is no way for the company to read users’ iMessages, Weaver points out that it is possible to compromise the cryptography used to encrypt these messages.

Some encryption systems use a public keyserver, where users can look up and independently verify each other’s keys. However, Apple’s keyserver is private, so users have no way to independently verify each other’s keys. Apple could collaborate with law enforcement to provide a false key, thereby intercepting a specific user’s messages, and the user would be none the wiser. Weaver writes, “There remains a critical flaw: There is no user interface for Alice to discover (and therefore independently confirm) Bob’s keys.  Without this feature, there is no way for Alice to detect that an Apple keyserver gave her a different set of keys for Bob.  Without such an interface, iMessage is ‘backdoor enabled’ by design: The keyserver itself provides the backdoor.” Weaver says this vulnerability could also be used to tap into FaceTime calls.

“If one desires confidentiality, I think the only role for iMessage is instructing someone how to use Signal [an open-source encrypted messaging app],” Weaver concludes.

Editors' Recommendations

Kate Conger
Former Digital Trends Contributor
Kate is a freelance writer who covers digital security. She has also written about police misconduct, nail polish, DARPA…
This sketchy iMessage rumor is the worst thing I’ve seen all year
A concept image render of a new redesigned iMessage app on the iPhone

I’ve used every iPhone, including the original, since 2008, when I received one as a birthday gift. The OG iPhone was my first Apple product, and it kind of got me started down the rabbit hole of all things Apple. I eventually bought a MacBook, iPad, and Apple Watch after my first iPhone.

One of the things that I’ve grown to like about Apple products is their simplicity. Everything is pretty simple to understand, so you can get going on actually using the product. One of those things is iMessage, and I rely on it every single day to stay in touch with my friends and family on my iPhone 14 Pro, iPad Pro, Apple Watch, and iMac.

Read more
iPhone 14 Pro vs. OnePlus 10 Pro camera showdown isn’t even a contest
Comparing iPhone 14 Pro with OnePlus 10 Pro

The iPhone 14 Pro marks Apple’s first major camera upgrade in a while, and in our tests, it has proved to be a capable performer. The OnePlus 10 Pro, with all its Hasselblad-tuned photography chops, was only $100 cheaper than the iPhone 14 Pro at launch and was positioned as a rival to Apple’s Pro flagship.

If you’ve been torn between the two, with camera skills being your main requisite, we’re here to help. In this detailed camera showdown, we’ll go through the strengths and weaknesses of each phone across different lenses and varied scenarios to find out the imaging heavy-hitter.
iPhone 14 Pro vs. OnePlus 10 Pro: camera specifications

Read more
iPhone 14 Pro vs. iPhone 13 Pro camera battle isn’t as close as you think
The iPhone 14 Pro and iPhone 13 Pro seen from the back.

If you’re looking longingly at the new iPhone 14 Pro and wondering just how good the camera is, and whether it's better than the Apple phone that’s already in your pocket, we’ve got the answer for you. Over the first few days with the 14 Pro, I’ve taken several hundred photos with it and the iPhone 13 Pro, ready to put the two against each other in a battle that’s sure to get heated.
iPhone 14 Pro vs. iPhone 13 Pro camera specifications
You can see a complete breakdown of what’s new with the iPhone 14 Pro compared to the iPhone 13 Pro, but we’re only concerned with the cameras for this test. Apple has made some changes with the new generation. The iPhone 14 Pro has a new 48-megapixel main camera with an f/1.78 aperture, second-generation optical image stabilization, and its Deep Fusion, Smart HDR 4, and new Photonic Engine features. It's joined by a 12MP ultra-wide camera and a 12MP telephoto camera with a 3x optical zoom.

The iPhone 13 Pro has three 12MP cameras on the back. The main camera has Apple’s previous generation optical image stabilization and an f/1.5 aperture, while the telephoto also has a 3x optical zoom. On the software side, the phone also has Deep Fusion and Smart HDR 4 technology but doesn’t have the new Photonic Engine. The two phones use different processors, with the A15 Bionic powering the iPhone 13 Pro, and the A16 Bionic in the iPhone 14 Pro. On the front is a 12MP selfie camera, but the 14 Pro gets the Photonic Engine and an f/1.9 aperture.

Read more