{"id":10192,"date":"2016-03-23T10:39:52","date_gmt":"2016-03-23T14:39:52","guid":{"rendered":"http:\/\/www.techwalls.com\/?p=10192"},"modified":"2016-03-23T10:39:52","modified_gmt":"2016-03-23T14:39:52","slug":"apple-encryption-not-entirely-foolproof","status":"publish","type":"post","link":"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/","title":{"rendered":"Apple Encryption is Not Entirely Foolproof"},"content":{"rendered":"<p>Just when the FBI is hard at work trying to find a way to break into the San Bernardino iPhone, a team of researchers at Johns Hopkins University has uncovered a flaw in Apple encryption that could have helped the law enforcement agency to crack the device.<!--more--><\/p>\n<p>The bug could pave the way for hackers to decrypt an otherwise secure communication between iOS devices, peering into private photos, videos and instant messages. Specifically, the flaw involves the iMessage service, a platform used by Apple customers to send instant messages. The discovery utterly disrupts the belief that the iPhone encryption is completely sure-fire. It\u2019s not at all foolproof.<\/p>\n<p><a href=\"https:\/\/www.techwalls.com\/analysts-predict-decline-apple-sales-year\/apple-1\/\" rel=\"attachment wp-att-9868\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-9868\" src=\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2016\/01\/apple-1.jpg\" alt=\"apple-1\" width=\"1000\" height=\"750\" srcset=\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2016\/01\/apple-1.jpg 1000w, https:\/\/www.techwalls.com\/wp-content\/uploads\/2016\/01\/apple-1-300x225.jpg 300w, https:\/\/www.techwalls.com\/wp-content\/uploads\/2016\/01\/apple-1-768x576.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n<p>Johns Hopkins University\u2019s findings make the legal battle between the FBI and Apple \u2013 where the agency is forcing the company to develop software that could bypass the encryption protocol \u2013 nonsense, if at all the Apple does not release a patch for the flaw. But that is not the case, as Apple already confirmed a fix is underway for the latest operating system, iOS 9.3.<\/p>\n<p>While the Apple-FBI legal strife revolves around data stored in an iPhone, the Johns Hopkins University researchers\u2019 discovery zeroed in on data that traverses between two devices. But the common ground is the flaw found in the encryption software, which could lead to greater loopholes in security of the entire infrastructure.<\/p>\n<p>How did the researchers manage to intercept a file stored in an iPhone? The cryptography experts develop a software tool that imitates an Apple server. The clone software then targeted a transmitted data that involved a photo stored in the iCloud server. The targeted transmission also included a 64-digit key used to decrypt the data.<\/p>\n<p>The key\u2019s digits were not visible to the researchers, but they managed to guess the key through repeated attempts at altering a character in the key and transmitting each iteration to the targeted device until they were able to guess the exact digits. According to the researchers, they repeated the process thousands of times until they succeeded. The process also works on the later versions of the iOS operating system.<\/p>\n<p>When they succeeded in guessing the key, the researchers managed to recover the photo from the server of Apple. The attack was stealth in nature, so the user would have not known it if it had been a real-life scenario, according to researchers.<\/p>\n<p>The tactic would not work on iOS devices that run the 9.3 version, fortunately. Part of the security loophole is the lack of third-party assessment of the Apple encryption, the researchers claim.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just when the FBI is hard at work trying to find a way to break into the San Bernardino iPhone, a team of researchers at Johns Hopkins University has uncovered a flaw in Apple encryption that could have helped the law enforcement agency to crack the device.<\/p>\n","protected":false},"author":89,"featured_media":9868,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[4],"tags":[74,1456,297,20,387],"class_list":{"0":"post-10192","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-gadget","8":"tag-apple","9":"tag-encryption","10":"tag-ios","11":"tag-iphone","12":"tag-security","13":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Apple Encryption is Not Entirely Foolproof<\/title>\n<meta name=\"description\" content=\"Just when the FBI is hard at work trying to find a way to break into the San Bernardino iPhone, a team of researchers at Johns Hopkins University has uncovered a flaw in Apple encryption that could have helped the law enforcement agency to crack the device.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest Authors\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/\",\"url\":\"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/\",\"name\":\"Apple Encryption is Not Entirely Foolproof\",\"isPartOf\":{\"@id\":\"https:\/\/www.techwalls.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2016\/01\/apple-1.jpg\",\"datePublished\":\"2016-03-23T14:39:52+00:00\",\"dateModified\":\"2016-03-23T14:39:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84\"},\"description\":\"Just when the FBI is hard at work trying to find a way to break into the San Bernardino iPhone, a team of researchers at Johns Hopkins University has uncovered a flaw in Apple encryption that could have helped the law enforcement agency to crack the device.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/#primaryimage\",\"url\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2016\/01\/apple-1.jpg\",\"contentUrl\":\"https:\/\/www.techwalls.com\/wp-content\/uploads\/2016\/01\/apple-1.jpg\",\"width\":1000,\"height\":750},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techwalls.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gadget\",\"item\":\"https:\/\/www.techwalls.com\/gadget\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Apple Encryption is Not Entirely Foolproof\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techwalls.com\/#website\",\"url\":\"https:\/\/www.techwalls.com\/\",\"name\":\"TechWalls\",\"description\":\"Technology News | Gadget Reviews | Tutorials\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techwalls.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84\",\"name\":\"Guest Authors\",\"url\":\"https:\/\/www.techwalls.com\/author\/guestauthor\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple Encryption is Not Entirely Foolproof","description":"Just when the FBI is hard at work trying to find a way to break into the San Bernardino iPhone, a team of researchers at Johns Hopkins University has uncovered a flaw in Apple encryption that could have helped the law enforcement agency to crack the device.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/","twitter_misc":{"Written by":"Guest Authors","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/","url":"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/","name":"Apple Encryption is Not Entirely Foolproof","isPartOf":{"@id":"https:\/\/www.techwalls.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/#primaryimage"},"image":{"@id":"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2016\/01\/apple-1.jpg","datePublished":"2016-03-23T14:39:52+00:00","dateModified":"2016-03-23T14:39:52+00:00","author":{"@id":"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84"},"description":"Just when the FBI is hard at work trying to find a way to break into the San Bernardino iPhone, a team of researchers at Johns Hopkins University has uncovered a flaw in Apple encryption that could have helped the law enforcement agency to crack the device.","breadcrumb":{"@id":"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/#primaryimage","url":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2016\/01\/apple-1.jpg","contentUrl":"https:\/\/www.techwalls.com\/wp-content\/uploads\/2016\/01\/apple-1.jpg","width":1000,"height":750},{"@type":"BreadcrumbList","@id":"https:\/\/www.techwalls.com\/apple-encryption-not-entirely-foolproof\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techwalls.com\/"},{"@type":"ListItem","position":2,"name":"Gadget","item":"https:\/\/www.techwalls.com\/gadget\/"},{"@type":"ListItem","position":3,"name":"Apple Encryption is Not Entirely Foolproof"}]},{"@type":"WebSite","@id":"https:\/\/www.techwalls.com\/#website","url":"https:\/\/www.techwalls.com\/","name":"TechWalls","description":"Technology News | Gadget Reviews | Tutorials","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techwalls.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.techwalls.com\/#\/schema\/person\/440f216965cffca997e53e754f489c84","name":"Guest Authors","url":"https:\/\/www.techwalls.com\/author\/guestauthor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts\/10192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/users\/89"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/comments?post=10192"}],"version-history":[{"count":0,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/posts\/10192\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/media\/9868"}],"wp:attachment":[{"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/media?parent=10192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/categories?post=10192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techwalls.com\/wp-json\/wp\/v2\/tags?post=10192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}