Podcast
Root Causes 266: End-to-end Encryption in the Apple Technology Stack


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
January 4, 2023
Recent announcements from Apple lay out a set of expansions in the scope and capability of encryption throughout the Apple ecosystem. In this episode we detail the announced changes and some of their implications.
Podcast Transcript
Lightly edited for flow and brevity.
So what’s going on, Tim, is Apple is expanding their end-to-end encryption to iCloud backups which is kind of a big deal for people who really want to keep their backups in the cloud but it also extends out to some of their apps like Notes and stuff like that though what it doesn’t extend to is email. That’s the big exception but I think what’s interesting about that particular announcement is the fact that you can now hold the keys – and let me tell you what I mean by that. Whenever we say we are talking about encryption we are talking about there is a key pair that was generated for you behind the scenes.
It would have been sent over to their HSM in the cloud and what Apple is doing now, you can opt into this which is you will now be the sole possessor of the private key on one particular device. Your phone probably.
So all the details of this I don’t have in my head yet because I haven’t actually physically played with it but these are all good questions.
Like that’s the way we are all living right now and it works fine for most of us. But, on the other hand, if you know why you need to possess your private key and not let anybody else have it well then you know why you are doing that.
And it’s true in this case as well. So I want to cover off two other pieces of the announcement from December 7, Tim.
And they are kind of related. Especially this part which is the usage of hardware keys with iPhone and iPad. So it’s already obviously been available to use a hardware key like a YubiKey, as an example, with a MacBook but now, you will be able to use NFC-based and lightening port YubiKeys with your iPhone and iPad, Tim.
I think that kind of goes hand-in-hand with if you are now in the possession of your private keys and you don’t even want to trust just the way the phone is storing it either in the software or the enclave or where Apple is putting it, you can actually now put that into your YubiKey, as an example.
So, essentially using FIDO technologies for authentication, which underlying is WebAuthn. Of course, they have the marketing term of security keys. That’s Apple’s marketing term for it but in reality it’s just FIDO WebAuthn, which of course, we have a previous podcast meaning about meaning certain websites that want to take advantage that passwordless authentication for their websites can now, the entire ecosystem is now in place from the hardware token through the operating system and the necessary SDKs that you can incorporate within iOS and within your website. So everything is now in place.
And here’s the third one, Tim, just to mention it. So, basically, Apple is now claiming in the same December 7 release – sorry, not release, but news release – they claim that an iMessage, their new iMessage can alert you if state-sponsored spies are eavesdropping on you and I think really what that comes down to, Tim, is when you are iMessaging with someone that’s already an end-to-end encrypted communication using Apple’s words. Not something I’ve personally verified but it’s Apple’s words. So, there’s two issues with that. One is let’s say you and I were doing a PGP communication and we wanted to exchange our public keys with each other offline. Completely offline. Let’s say we met face-to-face and we wanted to be able to exchange each other’s public keys. With PGP, that’s just kind of how it works. With iMessage, it’s not something that you were ever able to do because you couldn’t just get that key information and pass it on. But apparently, Apple will be – and again, this is another thing I just haven’t had my hands on yet, but they are now claiming that that kind of PGP-like experience of passing the public key to verify who it is actually speaking to is a part of what they are offering and a second part of what they are offering here is let’s say that an unauthorized computer came into the possession of the Apple ID of the person you are speaking to. You as the other end of the iMessage party will be notified to that and, in fact, they had a screenshot of what that would look like on Apple’s blog on this topic. So, I thought that was interesting. They are giving you visibility to the state of security. Things like, hey was there an unauthorized computer that has successfully logged into the Apple ID account. So, they’re giving you that kind of capability now.
Anyway, interesting announcement December 7 and it’s right up the ballpark of this particular podcast. So there you go.

