Apple announces stronger data encryption, to the dismay of FBI snoops (2024)

Defying the snoops at the FBI, Apple has announced it is implementing end-to-end encryption options for the data people store on iCloud, making it all the more difficult for hackers, criminals, and the aforementioned government agency to access your info without your knowledge or permission.

Apple made the announcement Wednesday evening, and it should be treated as a big deal by anybody who values data security. Apple had been planning to offer users the ability to encrypt their backed-up iCloud data years ago, but it reportedly dropped the plan in 2018 after the FBI objected.

Apple currently offers end-to-end encryption on its iMessage services so that messages can't be intercepted or read by third parties (including government authorities). But most data stored on iCloud are not encrypted, leaving them available to be accessed by law enforcement with subpoenas or warrants. It also leaves those data susceptible to hacking, which has led to cases like this one from June, where a California man was convicted and sentenced to nine years in federal prison for breaking into thousands of iCloud accounts, stealing private photos and videos of nude women, and sharing them on the internet.

In its announcement, Apple invoked the increasing number of data breaches as justification for this transition: "Experts say the total number of data breaches more than tripled between 2013 and 2021, exposing 1.1 billion personal records across the globe in 2021 alone. Increasingly, companies across the technology industry are addressing this growing threat by implementing end-to-end encryption in their offerings."

As we've seen in China's attempts to crack down on protesters demonstrating against COVID-19 lockdowns, encrypted communications helped citizens organize against authoritarian surveillance from the government (and it appears as though those protests might actually be working). Apple noted that part of the reason for adding new protections is to provide an "optional level of security for users such as journalists, human rights activists, and diplomats."

This all sounds wonderful in terms of citizen privacy, so of course the FBI is grumpy about it. Never mind all the breaches. Never mind all the crimes that encryption prevents. The FBI only cares that encryption gets in the way of its own investigations.

In a statement emailed to media outlets, an FBI representative said that while the agency sees protecting data security and privacy as a "top priority," it nevertheless sees end-to-end encryption as a threat: "This hinders our ability to protect the American people from criminal acts ranging from cyber-attacks and violence against children to drug trafficking, organized crime and terrorism. End-to-end and user-only-access encryption erodes law enforcement's ability to combat these threats and administer justice for the American public."

The FBI and other law enforcement agencies in other countries are insistent that tech platforms create special backdoors that bypass encryption so that the government can access these secure data. End-to-end encryption defies warrants and subpoenas, making it difficult if not impossible for agenciesto access protected data even when authorized by law.

But in practical terms, there is no such thing as a backdoor that only authorized government officials can access, even if we were to assume these officials would never abuse such access (and we shouldn't assume that). Keys and bypasses through encryption can and do escape controlled environments and risk everybody's safety. The federal government has faceda number of data breaches. It's extremely reckless for the FBI or any other government law enforcement agency to insist on these backdoors. The potential to facilitate crime, espionage, and secret government surveillance is most certainly worse than the assistance they provide.

Apple says the new bolstered iCloud encryption should be available to Americans by the end of the year and will roll out to the rest of the world in early 2023. It also announced a couple of new security features, including compatibility for physical security keys as a form of two-factor authentication, should users want that extra layer of security.

The Washington Postnotes that Apple has also fully dropped its plan to scan all user photos for child p*rn. Apple announced this plan in 2021 to jeers from privacy experts. While few would object to the goal of wiping out child p*rnography, Apple's plan involved scanning every single iPhone user's images to see if any of them match a database of known images of child sex abuse. This was a significant unwarranted privacy intrusion, and experts noted that even with the best of intentions, such a system could be adapted and used for authoritarian purposes or censorship.

Apple quickly put its plans on pause, and now has apparently fully abandoned them. Federal law already requires that Apple report any images of child sexual abuse to authorities whenever it finds any in its systems, but it doesn't require monitoring of users' accounts. Violating our privacy just to make sure we weren't breaking the law seems like a pretty lousy way to treat customers, and it's good that Apple has shut that idea down.

As an expert deeply entrenched in the realm of data security, encryption technologies, and the ongoing debates surrounding privacy and law enforcement, I can attest to the intricate and evolving nature of these discussions. My expertise extends to the technical nuances of encryption protocols, the legal implications of data protection measures, and the broader socio-political context shaping these developments.

Now, diving into the provided article, Apple's recent announcement regarding the implementation of end-to-end encryption options for iCloud data is indeed a pivotal move in the landscape of digital privacy. The decision to enhance the security of iCloud data aligns with the industry trend of addressing the escalating threat of data breaches through robust encryption measures.

It's crucial to note that Apple has a history of prioritizing user privacy, evident in its existing end-to-end encryption for iMessage services. The shift towards encrypting iCloud data is a logical extension of this commitment, particularly in light of the rising number of data breaches globally, as highlighted in the article. The exponential increase in data breaches from 2013 to 2021, exposing over 1.1 billion personal records in 2021 alone, serves as a compelling justification for such security measures.

The article underscores the potential impact on various user groups, such as journalists, human rights activists, and diplomats, who can now benefit from an optional layer of security. This move is particularly relevant given instances where encrypted communications have played a crucial role in protecting citizens from authoritarian surveillance, as observed in China's response to COVID-19 protests.

Unsurprisingly, the FBI expresses concerns about the hindrance end-to-end encryption poses to its investigative capabilities. The law enforcement agency argues that encryption obstructs efforts to combat cyber-attacks, violence against children, drug trafficking, organized crime, and terrorism. This debate has been ongoing, with law enforcement agencies globally pushing for tech platforms to create backdoors that allow access to secure data, despite the inherent risks associated with such measures.

The notion of backdoors in encryption is a contentious one, as highlighted in the article. While law enforcement emphasizes the necessity of such access for national security reasons, experts argue that the potential for misuse, compromise, and breaches outweigh the benefits. The article rightly points out the inherent risks associated with creating backdoors, emphasizing that they can escape controlled environments, posing threats to overall safety and security.

Apple's timeline for implementing the enhanced iCloud encryption is outlined, with availability for Americans by the end of the year and a global rollout in early 2023. The company also introduces additional security features, including compatibility for physical security keys as a form of two-factor authentication.

In a related note, the article mentions Apple's decision to fully abandon its plan to scan all user photos for child p*rnography. This move, prompted by privacy concerns and the potential for misuse, reflects a delicate balance between protecting user privacy and addressing societal issues. The article rightly acknowledges the need for caution when implementing such surveillance measures, even with well-intentioned goals.

In conclusion, the intersection of technology, privacy, and law enforcement is a complex landscape, and Apple's recent moves add significant layers to this ongoing discourse. The article provides a comprehensive overview of the key players, the justifications for enhanced encryption, and the challenges posed by law enforcement agencies in their pursuit of access to secure data.

Apple announces stronger data encryption, to the dismay of FBI snoops (2024)

FAQs

Apple announces stronger data encryption, to the dismay of FBI snoops? ›

Defying the snoops at the FBI, Apple has announced it is implementing end-to-end encryption options for the data people store on iCloud, making it all the more difficult for hackers, criminals, and the aforementioned government agency to access your info without your knowledge or permission.

What does the FBI say Apple's new encryption is deeply concerning? ›

In a statement to The Washington Post, the FBI, the largest intelligence agency in the world, said it's "deeply concerned with the threat end-to-end and user-only-access encryption pose." Speaking generally about end-to-end encryption like Apple's Advanced Data Protection feature, the bureau said that it makes it ...

How strong is Apple encryption? ›

No one else can access your end-to-end encrypted data — not even Apple — and this data remains secure even in the case of a data breach in the cloud. If you lose access to your account, only you can recover this data, using your device passcode or password, recovery contact, or recovery key.

Is Apple Advanced Data Protection worth it? ›

So, do you need ADP? If you want the most complete level of security and privacy possible, then yes. Just make sure you have backup methods for recovering your account (more on this in a moment), as Apple won't be able to help you unlock your encrypted files if your account becomes inaccessible.

What ethical issues are involved in the case of Apple vs. FBI? ›

In what many have argued is an unethical, unprecedented request, the FBI ordered Apple to create software that would disable privacy settings used in select iPhones models.

What is the latest Apple security flaw? ›

Apple Chip Flaw Exposes Secret Encryption Keys

Apple's M-series of chips contain a flaw that could allow an attacker to trick the processor into revealing secret end-to-end encryption keys on Macs, according to new research.

Is iPhone really encrypted? ›

Understanding Data Protection and iPhone Encryption

iPhone data is encrypted by default when a user creates an Apple ID and passcode. With those in place, information is decrypted only when the device is unlocked. It is also decrypted when shared using some applications or sometimes when stored in iCloud.

What is the strongest encryption in the world? ›

AES 256-bit encryption is the strongest and most robust encryption standard that is commercially available today. While it is theoretically true that AES 256-bit encryption is harder to crack than AES 128-bit encryption, AES 128-bit encryption has never been cracked.

Does Apple share your data with the government? ›

No. We regularly receive law enforcement requests for information about our customers and their Apple devices. In fact, we have a dedicated team that responds to these requests 24/7.

Does Apple have access to your photos? ›

Photos is designed to protect your information and enable you to choose what you share. Photos is designed to protect your privacy while delivering a personalized experience that reflects your unique photo library. Apple does not access your photos or videos, and does not use them for research and development.

What are the downsides of Apple Advanced Data Protection? ›

What are the downsides? You are responsible for the key used to encrypt your iCloud data. If you lose this key, recovering your iCloud data will be impossible.

Does Apple have better security than PC? ›

The simple truth? Macs are less likely to be attacked simply because there are fewer of them. That being said, Macs are safer than PCs because the Mac OS is Unix-based, making it more difficult to exploit.

Why does Apple have better security than Android? ›

Apple's closed-source code makes it harder for hackers to find security flaws. While Android's open-source nature could mean the exact opposite, it also makes the code more easily accessible to various app developers, something that Google is slowly beginning to use to its advantage.

How has Apple acted unethically? ›

Despite its commitments, there seem to be several ethical issues with Apple (see Figure 2 below). These include poor working conditions such as health and safety risks, child labour, poor environmental reporting, contribution to e-waste and tax avoidance.

Are there any scandals associated with Apple? ›

Apple will pay between $310 million and $500 million to settle a class-action lawsuit. The lawsuit was over "batterygate," a scandal where Apple was accused of decreasing the performance of older phones. Those who filed claims before October 2020 and were approved will reportedly see a payment of about $65.

What is the difference between the CIA and the FBI? ›

Unlike the Federal Bureau of Investigation (FBI), which is a domestic security service, the CIA has no law enforcement function and is mainly focused on intelligence gathering overseas, with only limited domestic intelligence collection.

Is the FBI call end-to-end encryption deeply concerning? ›

In a statement emailed to media outlets, an FBI representative said that while the agency sees protecting data security and privacy as a "top priority," it nevertheless sees end-to-end encryption as a threat: "This hinders our ability to protect the American people from criminal acts ranging from cyber-attacks and ...

What is Apple's new encryption policy? ›

About end-to-end encrypted data

End-to-end encrypted data can only be decrypted on your trusted devices where you've signed in with your Apple ID. No one else can access your end-to-end encrypted data – not even Apple – and this data remains secure even in the case of a data breach in the cloud.

Do we now know what information the FBI can obtain from encrypted messaging apps? ›

A recently discovered FBI training document shows that US law enforcement can gain limited access to the content of encrypted messages from secure messaging services like iMessage, Line, and WhatsApp, but not to messages sent via Signal, Telegram, Threema, Viber, WeChat, or Wickr.

What encryption does the US government use? ›

Military grade encryption often refers to a specific encryption type, AES-256 (Advanced Encryption Standard). Currently, the U.S. government has named this algorithm the standard for encryption and most cybersecurity organizations today use this form of military grade encryption.

Top Articles
Latest Posts
Article information

Author: Annamae Dooley

Last Updated:

Views: 5881

Rating: 4.4 / 5 (65 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Annamae Dooley

Birthday: 2001-07-26

Address: 9687 Tambra Meadow, Bradleyhaven, TN 53219

Phone: +9316045904039

Job: Future Coordinator

Hobby: Archery, Couponing, Poi, Kite flying, Knitting, Rappelling, Baseball

Introduction: My name is Annamae Dooley, I am a witty, quaint, lovely, clever, rich, sparkling, powerful person who loves writing and wants to share my knowledge and understanding with you.