Tuesday, November 19, 2024
HomeAppleApple Dropped A Plan Let iPhone Users Have Fully Encrypt Backups On...

Apple Dropped A Plan Let iPhone Users Have Fully Encrypt Backups On Their Devices Including WhatsApp Chats

Published on

Apple now officially dropped plans to let iPhone users have their device backup in an encrypted form in Apple’s iCloud service after the FBI complained.

iCloud is an Apple cloud platform that allows Apple users to store and access their photos, videos, documents, notes, contacts, and more.

Since the FBI has a concern about breaking the icloud more difficult if the company implements the end-to-end encryption, the FBI wouldn’t be able to unlock the encrypted data during the investigation.

- Advertisement - SIEM as a Service

Now the Apple decision makes easier for the FBI to unlock the devices and access the backup data stored in the icloud.

Recently Trump attack Apple for refusing to unlock the device used by criminals and stats in his twitter feed “We are helping Apple all of the time on TRADE and so many other issues, and yet they refuse to unlock phones used by killers, drug dealers, and other violent criminal elements.”

According to the Reuters who have gathered this information from the secret source “When Apple spoke privately to the FBI about its work on phone security the following year, the end-to-end encryption plan had been dropped “

Another former employee told that “Legal killed it, for reasons you can imagine,” but there is no specific information he was given that neither why Apple has dropped this plan nor if the FBI was a factor in the decision.

The decision made by Apple seems to be not to make the FBI job easier to break the iPhone during the investigation but it might be a reason for reducing or stop Agencies to relies on hacking software offered by the private security companies that exploit security flaws to break into a phone which requires a direct access to the phone which would ordinarily tip off the user, who is often the subject of the investigation, Reuters reported.

Telegram founder Pavel Durov said today that “Now icloud is an official Officially a Suvillence Tool, Apple that relying on it to Store your private Message including WhatsApp is part of the problem.”

Apple Encryption

In the first half of the last year, Apple mostly received requests for data from government agencies, U.S. authorities.

Apple said this in their transparency report, Authorities are armed with regular court papers asked for and obtained full device backups or other iCloud content in 1,568 cases, covering about 6,000 accounts.

Due to this Plan, Apple wouldn’t have been able to turn over any readable data belonging to users who opted for end-to-end encryption and focus to protect some of the user’s most sensitive information such as health data and saved password.

“But backed-up contact information and texts from iMessage, WhatsApp, and other encrypted services remain available to Apple employees and authorities,” Router said.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Phobos Ransomware Admin as Part of International Hacking Operation

The U.S. Department of Justice unsealed criminal charges today against Evgenii Ptitsyn, a 42-year-old Russian...

Maxar Space Data Leak, Threat Actors Gain Unauthorized Access to the System

Maxar Space Systems, a leader in space technology and Earth intelligence solutions, has recently...

Apache Kafka Vulnerability Let Attackers Escalate Privileges

A newly identified vulnerability tracked as CVE-2024-31141, has been discovered in Apache Kafka Clients that could allow...

Zohocorp ManageEngine ADAudit Plus SQL Injection Vulnerability

Zohocorp, the company behind ManageEngine, has released a security update addressing a critical SQL...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical TP-Link DHCP Vulnerability Let Attackers Execute Arbitrary Code Remotely

A critical security flaw has been uncovered in certain TP-Link routers, potentially allowing malicious...

Understanding Crypto Macroeconomic Factors: Navigating Inflation, Rates, And Regulations 

Diving into the world of cryptocurrencies, I've found it's a fascinating intersection of technology...

Crypto Network Security: Essential Tips To Protect Your Digital Assets In 2023 

Exploring the world of cryptocurrencies has been a thrilling journey for me. The allure...