Hacker News new | past | comments | ask | show | jobs | submit login

When they subpoena Apple, they will get cloud data which will not be decrypted. The issue is whether they would be able to give Apple a device and say 'decrypt plz'.



If the device is backed up in iCloud, Apple already has the decryption key and will have to provide it if they receive a supoena. The only way you're safe, even in theory, is to only do local encrypted backups.


The whole point of the updated system is that they don't have your decryption key. They will still turn over encrypted data, but LE won't be able to decrypt. That might be a leap of faith though.


> The whole point of the updated system is that they don't have your decryption key.

It's a nice thought.[1]

> While Apple does not have the crypto keys that can unlock the data on iOS 8 devices, they do have access to your iCloud backup data. Apple encrypts your iCloud data in storage, but they encrypt it with their own key, not with your passcode key, which means that they are able to decrypt it to comply with government requests.

[1] https://firstlook.org/theintercept/2014/09/22/apple-data/


So you are saying that if you lose your device there is no way to recover your data?


No, he's saying the decryption key will be a simple passcode for an encrypted private key stored on apple's servers, or something even worse than that. Promising, ain't it? ...with the examples we have of the type of passwords people use...


Is the decryption key something the user chooses like a password, or is it random noise generated on the device that the user does not need to know?


Not sure. I suspect it is chosen by the user, going by what I've read.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: