←back to thread

833 points Bluestein | 9 comments | | HN request time: 0.412s | source | bottom
Show context
mro_name ◴[] No.40715944[source]
I wonder how it can be legal to repeatedly undermine constitution and push or vote for later high-court-nullified laws and be allowed to repeat as if nothing was wrong with that. Like drunk driving forever. We ban counter-constitutional activities outside parliament and authorities. Why not inside?

I am much for 3-strikes here.

replies(6): >>40716013 #>>40716069 #>>40716073 #>>40716129 #>>40716284 #>>40717138 #
1. sneak ◴[] No.40716069[source]
It’s because we aren’t actually nations of laws. There are certain groups in every nation (yes, even the ones you like or perhaps respect) who operate outside of the law as if it doesn’t exist.

The most popular “e2ee” messengers in use (WhatsApp, iMessage) are already clientside backdoored in this manner. Most people in most societies are already under this type of surveillance. This is just to tidy up the small loopholes like Signal etc.

replies(2): >>40716167 #>>40716368 #
2. worldsayshi ◴[] No.40716167[source]
> The most popular “e2ee” messengers in use (WhatsApp, iMessage) are already clientside backdoored in this manner.

Do you have a source for this?

Can this be concluded by looking at the app traffic?

replies(2): >>40716744 #>>40722273 #
3. matthewdgreen ◴[] No.40716368[source]
> The most popular “e2ee” messengers in use (WhatsApp, iMessage) are already clientside backdoored in this manner.

No they are not. This is nonsense. The charitable interpretation is that you’re confusing the systems on iMessage that can voluntarily detect nudity and report it to you (but not the police or Apple) with the systems being proposed in TFA which have mandatory reporting to provider+police. The uncharitable interpretation is that you’re just making stuff up because it sounds good. Please don’t do either, it makes everyone worse off.

replies(2): >>40718417 #>>40722281 #
4. Cthulhu_ ◴[] No.40716744[source]
"clientside backdoored" is a vague statement, but they may mean e.g. Snowden's revelations that the NSA has secret backdoor access to the big tech companies.
5. talldayo ◴[] No.40718417[source]
Apple's lack of reliable security is practically all they're known for at this point. They can't even protect your notifications from warrantless surveillance[0], nor can they refuse to supply your encryption keys if they're demanded[1].

You wanna talk about making stuff up? How are you possibly able to say that the iPhone doesn't have clientside backdoors when you don't have any source code to back that claim up? You are the one making stuff up because it sounds good; Apple's concerted efforts to undermine their own security features is well-documented and even exists by Apple's own admission.

[0] https://arstechnica.com/tech-policy/2023/12/apple-admits-to-...

[1] https://itsecurity.blog.fordham.edu/2021/12/08/data-can-be-o...

replies(1): >>40719114 #
6. matthewdgreen ◴[] No.40719114{3}[source]
Saying “everyone knows these products are backdoored” and then supporting your claim with “well, they’re closed source” is a ridiculous thing to do. Please stop.
replies(1): >>40719524 #
7. talldayo ◴[] No.40719524{4}[source]
Please stop? I just cited two credible sources on either side of the backdoor. It's one thing if you don't want to acknowledge what's happening, it's another thing to publicly deny it. If you've got any concrete evidence that Apple does not furnish backdoors in their products, now is a good time to show it. Otherwise I see no rational reason for anyone to assume Apple products are totally secure.
8. sneak ◴[] No.40722273[source]
iCloud Backup backs up the entirety of someone's iMessage history (or their endpoint iMessage sync keys, which equate to the same thing) each night to Apple without e2ee.

If you enable e2ee for iCloud/iCloud Backup, all of your iMessage traffic will still be escrowed, simply from the other end of all of your conversations because they still have iCloud e2ee turned off (because it's off by default).

If the endpoint sends the plaintext post-decryption to the middle transit service (Apple) in a way that is readable to that middle service (iCloud Backups contain complete iMessage history and are encrypted to Apple keys), then it's not e2ee. This is called "plaintext escrow".

Same goes for WhatsApp. It backs up its message history to iCloud or Google Drive, which are, in the usual case (99.9%+ of users) non-e2ee.

9. sneak ◴[] No.40722281[source]
It's well documented that the complete iMessage history (if the "Messages in iCloud" feature is disabled) or the endpoint iMessage sync keys (if "Messages in iCloud" is enabled, the default), are included in the non-e2ee iCloud Backup which is non-e2ee and readable by Apple.

Approximately nobody has enabled e2ee for iCloud Backups (and approximately nobody wants to; they'd rather Apple be able to restore their photos and conversations when they've lost their phone and forgotten their password).

Each and every night when plugged in every iPhone by default makes sure that Apple receives an Apple-readable copy of all of the photos and iMessages (or iMessage cross-device sync keys) on the device.

It's not e2ee if the endpoint device escrows the plaintext. Apple and the FBI can read 99%+ of all iMessages in the world in near-realtime.

(This is because, in the usual case, the backup includes the "Messages in iCloud" cross-device endpoint synchronization keys, and Apple of course runs the sync servers that see the encrypted traffic. If you have Messages in iCloud turned off, the backup simply contains all of the iMessages directly, and Apple presumably only gets them once each 24h period when the iCloud Backup runs at night when plugged in and on wifi.)

The only case in which iMessage is e2ee is when both iMessage endpoints either have iCloud disabled, or both iMessage endpoints have iCloud Backup disabled, or both iMessage endpoints have iCloud Advanced Data Protection (backup e2ee) enabled. The moment you add an iPhone not so configured to the iMessage groupchat, the whole thing falls apart, because the defaults are to escrow the plaintext in a non-e2ee fashion.