Apple Is Reportedly Working On Stronger iCloud Encryption In Light Of Its Dispute With FBI

Apple - Logo

According to a recent rumor, Apple engineers are working on strengthening the encryption methods for iCloud and iPhone, so that the company can no longer decrypt any data stored in them. The idea of Apple developing a non-hackable encryption method gains traction after an Apple executive said in a conference call with reporters that it was reasonable to expect the company to continue strengthening the security policies of its products in light of the Apple/FBI battle.

If Apple succeeds in upgrading its security, it would create a technical challenge for law enforcement agencies to decrypt the content or force Apple to do it. Currently the iPhone backup is stored in iCloud and a copy of the keys used to encrypt the content is stored with Apple. That is how in the San Bernardino case, Apple gave FBI iCloud backups for the iPhone until October 19. Unfortunately, the company could not provide any recent iCloud backups as the iCloud password for the iPhone was changed, while the phone is government possession. This means the phone could no longer communicate with the backup servers.

If the Federal Bureau of Investigation wanted to get into a phone in the future, it would need a new way to do so. Therefore, they are asking Apple to write a new iOS with a backdoor access and deliver it as an update. Apple has refused their proposal to provide an OS with backdoor access. Apple’s decision was not well received by law enforcement agencies and Department of Justice calls Apple’s refusal as “Marketing Strategy”. Although many tech companies have declared their support for Apple, experts believe that the only way Apple can win this scenario is for Congress to get involved.

According to NY Times, anonymous sources claimed that Apple is working on a solution even before the San Bernardino attack. However, Apple declined to comment on what it called rumors and speculation. It is currently rumored that to prevent government from forcing to provide backdoor access in their software and device, Apple is investigating options involving storing encryption keys in the local device. Apple cannot provide copies of these backup to government as it could not decrypt the data as it will not have the encryption keys with them.

Similarly, in the hardware side, Apple is planning to make system storage to wipe itself on installing new firmware without a valid passcode. This means, if users tried to update their iOS without entering passcode or forget their passcode, then the system storage will be erased and they have to start afresh.

The above mention technique is not the only ones Apple is examining. The company is also having informal conversations with independent security researchers, to find a solution. According to Jonathan Zdziarski, a security researcher, “there are probably 50 different ideas we have all sent to Apple”.

If Apple decides to make their devices in this manner, then it would cause a new round of legal disputes and average customers will not like the idea of losing the family photos and videos because they forgot their password.

Raja Rajan Avatar

Help Us Grow

If you like this post, please share it with your friends.

You are free to copy and redistribute this article in any medium or format, as long as you keep the links in the article or provide a link back to this page.

Subscribe to Newsletter




Privacy Settings

Privacy & Cookie Overview

Our website uses cookies to provide you with the best user experience possible. These cookies are stored in your browser and perform essential functions such as recognizing you when you return to our website, as well as helping us to understand which sections of the website you find most useful and engaging.

To learn more, you can read our Privacy & Cookie Policy or reach out through our Contact form.

Strictly Necessary Cookies

Strictly Necessary Cookies must always be enabled to ensure the proper functioning of this website and to allow us to provide you with excellent service. These cookies are also essential for saving your cookie preferences.

Google Adsense

We use Google AdSense to keep this site free by displaying relevant ads. AdSense requires essential cookies that cannot be disabled, but you can manage other cookies. We respect your privacy and provide options to control non-essential cookies.

For more details on how Google handles your data, visit Google's Data Usage Policy. Please review our Privacy Policy for more information on how we protect your data.

AddToAny

We use AddToAny for social sharing. It doesnโ€™t store cookies, ensuring a privacy-friendly experience. AddToAny complies with GDPR and CCPA by default.

For more, see their Privacy Policy.

OneSignal

We use OneSignal to send notifications to users who opt in. OneSignal complies with GDPR and is certified under the EU-US and Swiss-US Privacy Shield frameworks.

For more, see their Privacy Policy.

3rd Party Cookies

This website utilizes third-party cookies, which can enhance your experience and support our ongoing efforts to improve our services.

Google Analytics

We use Google Analytics to collect anonymous data, such as visitor numbers and popular pages, to improve user experience and site performance. Keeping this cookie enabled helps us refine the site based on visitor activity.

For more information, see Googleโ€™s Privacy Policy.

Discover more from Prime Inspiration

Subscribe now to keep reading and get access to the full archive.

Continue reading