Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
UCS Invicta: Integrated Flash
Deploy flash memory technology to
deliver peak workload performance.

Find out more>>
Network Security
Is your endpoint data protected?
Average Rating:
Rate this article:  
Apple's iMessage Security Disputed by Researchers

Apple's iMessage Security Disputed by Researchers
By Seth Fitzgerald

Share
Share on Facebook Share on Twitter Share on Linkedin Share on Google Plus

With security researchers now claiming that Apple is indeed able to access iMessage data, it is possible that the information has been shared with the NSA. If Apple controls the encryption keys used to protect iMessage information, it is capable of decryption of messages for the NSA if it chooses to do so.
 


Apple has claimed for months that its iMessage encryption software is unbreakable, meaning that all messages sent via the service cannot be read by anyone, including Apple itself. Security researchers have now come out to refute that claim, stating that iMessage encryption is not actually secure in the way Apple has made it out to be.

Not only are the researchers refuting Apple's statements, but they have basically suggested Apple lied. Immediately after French iOS jailbreak-developer Cyril Cattiaux made his claim about iMessage, Apple responded, stating that it has not lied and that iMessage encryption standards are higher than most.

Is Apple Lying?

According to Apple, iMessage encryption prevents anyone but the sender and receiver from reading the messages that are sent via data transmission between two iOS devices. However, these claims do not seem to be backed up by any real information and are being refuted by Cattiaux, as well as Matthew Green, a cryptographer and research professor at Johns Hopkins University.

"If you use the iCloud backup service to back up your iDevice, there's a very good chance that Apple can access the last few days of your iMessage history," said Green, in response to Apple's claim. The most upfront attacks against Apple and its "unbreakable encryption" statement have come from a group named QuarksLab, a penetration and testing lab in Paris.

Members of QuarksLab have said claims that the encryption is "unbreakable" are nothing more than lies. Apple has stuck with its statements, despite researchers coming out to refute them. "iMessage is not architected to allow Apple to read messages," said an Apple spokeswoman.

NSA Concerns

Apple has been releasing information regarding how many U.S. National Security Agency data requests it receives since June, and according to the company, it receives around 1,000 requests per month. Although the requests are coming in on a consistent basis, Apple assured its customers that it is unable to see iMessage data and therefore has never and will never hand that over to the NSA.

With security researchers now claiming that Apple is indeed able to access iMessage data, it is possible that the information has been shared with the NSA. Cattiaux and his colleagues have shown that Apple controls the encryption keys used to protect iMessage information. With Apple in control of the keys, it is completely capable of decryption of messages for the NSA if it chooses to do so.

Not only have multiple security researchers come forth with their own information to show that Apple's encryption is breakable, but technology publications have been reassured by other experts that the findings are accurate and backed up by data.

"Because Apple controls the device and they issue the keys, it's clear that if Apple wanted, they could 'man in the middle' so that they could themselves decrypt it," said Ashkan Soltani, an independent researcher.

Whether or not Apple is sharing iMessage data with the NSA is still unknown, but it now appears as though the company is quite capable of doing so.
 

Tell Us What You Think
Comment:

Name:



IT departments are embracing cloud backup, but there's a lot you need to know before choosing a service provider. Learn all the critical things you need to know by accessing the white paper, "5 Things You Didn't Know About Cloud Backup". Access the White Paper now.


 Network Security
1.   Chinese Hackers Steal Patient Data
2.   FBI Cybersquad To Add Agents
3.   Apple Opens China iCloud Data Center
4.   Supervalu Suffers a Data Breach
5.   Snowden Talks MonsterMind Program


advertisement
FBI Cybersquad To Add Agents
Rewarded for recent security successes.
Average Rating:
Chinese Hackers Steal Patient Data
Info includes Social Security numbers.
Average Rating:
Facebook's Security Chief Questioned
Spotlight shines on security strategy.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Chinese Hackers Nab Info on Millions of U.S. Patients
A group of Chinese hackers has stolen the personal information, including names and Social Security numbers, of about 4.5 million patients at hospitals operated by Community Health Systems.
 
Premier FBI Cybersquad in U.S. To Add Agents
After helping prosecutors charge Chinese army officials with stealing trade secrets from major companies and by snaring a Russian-led hacking ring, the premier FBI cyber-squad is getting a boost.
 
Apple Opens iCloud Data Center in China
Treading lightly, Apple acknowledged it has started to store encrypted iCloud personal data of some Chinese users on servers in mainland China, operated by the state-owned China Telecom.
 

Enterprise Hardware Spotlight
Compression, Deduplication Come to Violin Concerto 2200
Violin Memory has announced that data deduplication and compression capabilities are now available on its Concerto 2200 solution. Typically, users will experience deduplication rates between 6:1 and 10:1.
 
Cisco Axes 6,000 Employees in Restructuring Plan
Faced with declining profits, Cisco is laying off up to 6,000 employees in the months ahead -- a whopping 8 percent of its global workforce. That's in addition to the 4,000 jobs Cisco cut last year.
 
Web Slows, Have Internet Routers Reached The Limit?
If you encountered problems connecting to the Internet on August 12, you weren't alone. Networking experts blame the wide-scale slowdown on outdated routing systems that are reaching their limits.
 

Mobile Technology Spotlight
HTC Debuts Windows Phone Version of One M8 Smartphone
HTC is bringing the Windows Phone mobile OS to its flagship One M8 device -- the first time any mainstream flagship smartphone has been offered with a choice of operating systems.
 
RootMetrics Ranks Verizon Tops in Mobile Networks
Verizon Wireless is the top-performing cellphone service provider, according to a new report. In the first half of 2014, Verizon led on a nationwide and state-by-state basis -- and in metro areas.
 
Sprint Comes Out with Data Guns Blazing
As its new CEO promised, Sprint has rolled out a new aggressively competitive price plan. The shared data plans promise twice the high-speed data and at lower prices than AT&T and Verizon Wireless.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.