Apple’s claim of unbreakable iMessage encryption ‘basically lies’

A close look at Apple’s iMessage system shows the company could easily intercept communications on the service despite its assurances to the contrary, researchers claimed Thursday at a security conference.

Apple asserted in June, following disclosures about the NSA’s data collection programs, that iMessage, which lets users send texts over Wi-Fi for free, is protected by end-to-end encryption that makes it impossible for Apple or anyone else to descramble the messages.

[ InfoWorld presents the Bossies 2013, the best open source software for security, data centers, clouds, and more. | Keep up with key security issues with InfoWorld’s Security Adviser blog and Security Central newsletter. ]

But researchers at the Hack in the Box conference in Kuala Lumpur showed it would be possible for someone inside Apple, of their own volition or because they were forced to by a government, to intercept messages.

The company’s claim that iMessage is protected by unbreakable encryption is “just basically lies,” said Cyril Cattiaux, who has developed iOS jailbreak software and works for Quarkslab, a penetration testing and reverse engineering company in Paris.

The researchers emphasized they have no indication that Apple or the government is reading iMessages, only that it would be possible to do so.

Asked to comment, Apple didn’t directly address the claims about iMessage and pointed instead to a statement it issued in June after the disclosures about the NSA’s Prism data collection program.

The statement says in part that Apple first heard about Prism only when it was asked about it by news organizations. “We do not provide any government agency with direct access to our servers, and any government agency requesting customer content must get a court order,” the statement says.

One document revealed by former NSA contractor Edward Snowden indicated Apple became part of Prism in October 2012.

Apple uses public key cryptography to encrypt iMessages between the sender and the recipient. But its system for managing public keys is opaque, the researchers said, making it impossible to know if iMessages are being sent to a third party such as the NSA.

When someone sends an iMessage, the iOS device pulls the recipient’s public key from Apple’s non-public key server to create the ciphertext, or encrypted message. The iMessage is decrypted by the recipient using their private key.

The problem is “Apple has full control over this public key directory,” Cattiaux said.

Trust has always been an issue with public keys. To send an encrypted message, the sender frequently has to trust that the key listed on the key server used to relay the message actually belongs to the recipient.

Source: http://www.infoworld.com/d/security/apples-claim-of-unbreakable-imessage-encryption-basically-lies-228948
Category: Johnny Galecki   fox sports   bay bridge   made in america   Laura Prepon  

This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s