Shortly after revelations about the NSA’s data-snooping programs became public, Apple publicly stated that the end-to-end encryption used in iMessage was so good that it was impossible for anyone — including Apple — to break the code. Now security researchers are saying that it could be possible for someone inside Apple to intercept uncoded messages either for themselves or the government.
The researchers spoke at the Hack in the Box conference in Kuala Lumpur, with iOS jailbreaker Cyril Cattiaux going so far as to call Apple’s assertion that iMessage encryption is rock-solid “just basically lies.” The team noted that there’s no evidence that Apple or the NSA is actually reading iMessages, but say that it’s possible.
Apple uses public key cryptography to encrypt iMessages, and Cattiaux says that “Apple has full control over this public key directory.” That means that a sender doesn’t have the ability to see whether a key has changed, or if the key is actually under the control of the recipient. Another researcher noted that “they give the key and nobody can really know if it’s a substitute or anything like that … it’s a matter of trust.”
Cryptography expert Moxie Marlinspike wasn’t involved with the research, but noted that trusting another party to manage cryptography keys on your behalf is no more secure than trusting them with unencrypted text. As Paul Kocher of Cryptography Research put it in an email to Computerworld, “It isn’t fair to criticize Apple too heavily since other services aren’t better (and most are worse).”
Researchers challenge Apple’s ‘unbreakable’ iMessages originally appeared on TUAW – The Unofficial Apple Weblog on Thu, 17 Oct 2013 13:00:00 EST. Please see our terms for use of feeds.