{"id":31188,"date":"2023-01-26T19:36:13","date_gmt":"2023-01-26T17:36:13","guid":{"rendered":"https:\/\/www.kaspersky.co.za\/blog\/apple-new-data-protection\/31188\/"},"modified":"2023-01-26T19:36:28","modified_gmt":"2023-01-26T17:36:28","slug":"apple-new-data-protection","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/apple-new-data-protection\/31188\/","title":{"rendered":"New privacy features in Apple devices"},"content":{"rendered":"<p>In December 2022, Apple <a href=\"https:\/\/www.apple.com\/newsroom\/2022\/12\/apple-advances-user-security-with-powerful-new-data-protections\/\" target=\"_blank\" rel=\"nofollow noopener\">announced<\/a> a raft of new user data protection features. The most important was the expanded list of end-to-end encrypted data uploaded to iCloud. In most cases, only the owner of a key has access to it, and even Apple itself won\u2019t be able to read this information. There was also an unofficial announcement: the company mentioned it was dropping its controversial plans for a technology to scan smartphones and tablets for child pornography.\n<\/p>\n<h3>Encryption of iCloud backups<\/h3>\n<p>\nLet\u2019s start with the innovation of most interest. Owners of iPhones, iPads and macOS computers (not all, but more about that below) can now encrypt backup copies of their devices uploaded to iCloud. We\u2019ll try to explain this rather complicated innovation as simply as possible, but there\u2019ll still be plenty of detail as it is really quite important.<\/p>\n<p>All Apple mobile devices upload backups of themselves to iCloud by default. This extremely useful feature helps restore all data to a new device as it was on the old one at the time of the last backup. In some cases, such as if your smartphone is lost or broken, it\u2019s the only way to access family photos or work notes. You\u2019ll likely have to pay extra for this feature: Apple provides a mere 5 GB of cloud storage for free, which fills up fast. You either have to buy extra gigabytes or choose what data to back up: for example, you might exclude music, video, and other heavy files.<\/p>\n<p>Apple has always encrypted backups on its servers, but in such a way that both the company and the user had the decryption key \u2014 so backups were only protected from hacks against the company\u2019s servers themselves. The December update of Apple operating systems introduced a new <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/end-to-end-encryption\/\" target=\"_blank\" rel=\"noopener\">end-to-end encryption<\/a> feature whereby data remains encrypted all the way from sender to recipient.<\/p>\n<p>This kind of encryption is of most relevance to communication tools \u2014 especially messengers. Its presence shows that the developer cares about data confidentiality; for example, Apple\u2019s own messaging service, iMessage, has long used end-to-end encryption. The convenience of end-to-end encryption depends on its implementation. For instance, <a href=\"https:\/\/www.kaspersky.com\/blog\/telegram-why-nobody-uses-secret-chats\/46889\/\" target=\"_blank\" rel=\"noopener nofollow\">in Telegram most chats are unencrypted<\/a> and accessible on all devices connected to the account, but you can create a separate \u201csecret\u201d chat with another user; this exists only on the device on which you initiated the encrypted chat, and its content is visible only to you and your chat partner, no one else.<\/p>\n<p>But back to backups. By default, Apple backups save all information on your device, including iMessage correspondence. What\u2019s of note here is that, although iMessage communication is encrypted end-to-end, if an attacker somehow manages to get a backup copy of your phone, they\u2019ll be able to read your message history. Plus, they\u2019ll have access to a huge amount of other data: photos, documents, notes, and so on. It is this potential security hole that Apple has fixed.<\/p>\n<p>With end-to-end encryption of backups, you\u2019re the only sender and recipient of data, and only you have access to the key to decrypt it. If the algorithm is implemented correctly, Apple won\u2019t be able to decrypt your data even if it wants to. Someone who gets hold of your Apple ID without knowing the encryption key won\u2019t be able to steal your data either.<\/p>\n<p>The new setting is called Advanced Data Protection, and it looks as follows:<\/p>\n<div id=\"attachment_46985\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2023\/01\/26193420\/apple-new-data-protection-01.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-46985\" class=\"size-full wp-image-46985\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2023\/01\/26193420\/apple-new-data-protection-01.jpg\" alt=\"Advanced Data Protection settings\" width=\"390\" height=\"792\"><\/a><p id=\"caption-attachment-46985\" class=\"wp-caption-text\">Advanced Data Protection settings<\/p><\/div>\n<p>It\u2019s important to note that, once the feature is enabled, you and only you are responsible for access to your data: if you lose the encryption key, even Apple support would be powerless to help. That\u2019s why the new privacy setting will be voluntary: if you decide not to activate it, your backups will still be available to Apple and could be stolen by intruders if, say, your Apple ID is hacked.<\/p>\n<p>Incidentally, Advanced Data Protection cannot be activated on a device recently added to your Apple ID. After all, if someone gets hold of your Apple ID and activates end-to-end encryption on their smartphone, you\u2019ll lose access to your data. Even if you manage to restore access to your account, you won\u2019t have the encryption key! Therefore, if you just bought a new Apple device, you can only enable Advanced Data Protection from the previous one.\n<\/p>\n<h2>End-to-end encryption of other data<\/h2>\n<p>\nApple\u2019s new feature is not limited to just smartphone, tablet, and laptop backups. Photos and notes will also be encrypted. It\u2019s possible that this list will grow, but for now Apple is talking about strong protection for 23 categories of data, without specifying which. Previously, end-to-end encryption was used for 14 categories, including iMessage chats, Keychain passwords, and all health-related data, such as readings from Apple Watch sensors.<\/p>\n<p>But we do know what end-to-end encryption definitely won\u2019t be used for: iCloud mail, calendars, and contacts. According to Apple, this is to ensure compatibility with other developers\u2019 systems.\n<\/p>\n<h2>Hardware security keys for Apple ID authentication<\/h2>\n<p>\nEven with end-to-end encryption implemented, access to many types of data on your iPhone, iPad or Mac is through your Apple ID account. If an attacker manages to gain access to it, they\u2019ll be able to restore your backup on their device (which is what Advanced Data Protection prevents) and track your location using Find My.<\/p>\n<p>A common way to steal your Apple ID credentials is phishing. Having stolen your iPhone, the thieves can\u2019t just resell it, except perhaps for parts. They must enter your Apple ID to unlink the phone from it, after which a new owner can register it. And when you\u2019re desperately trying to find your phone (for example, using Find My iPhone), <a href=\"https:\/\/www.kaspersky.com\/blog\/how-they-stole-my-iphone\/23330\/\" target=\"_blank\" rel=\"noopener nofollow\">you\u2019re very easily duped<\/a>: strange text messages seemingly from Apple arrive at the contact number you specified, with a link to sign in with your Apple ID. Instead of Apple\u2019s website, you go to a plausible imitation and enter your credentials, which fall straight into the cybercriminals\u2019 hands. Alas, sometimes even <a href=\"https:\/\/www.kaspersky.com\/blog\/what_is_two_factor_authentication\/5036\/\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a> (which requires an additional code) doesn\u2019t help. The phishing page may consider this protection method and ask you for a one-time verification code.<\/p>\n<p>A hardware security key (a separate device like a flash drive) greatly reduces the likelihood of falling for phishing. In this case, for Apple ID authentication, you either put the NFC key near the device, or insert it into the Lightning or USB-C connector. All data is exchanged in encrypted form only with Apple\u2019s servers. It\u2019s almost impossible for a fake phishing site to successfully imitate this kind of authentication.<\/p>\n<div id=\"attachment_46986\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2023\/01\/26193459\/apple-new-data-protection-02.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-46986\" class=\"size-full wp-image-46986\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2023\/01\/26193459\/apple-new-data-protection-02.jpg\" alt=\"Apple ID account sign-in screen requiring a physical security key\" width=\"390\" height=\"792\"><\/a><p id=\"caption-attachment-46986\" class=\"wp-caption-text\">Apple ID account sign-in screen requiring a physical security key<\/p><\/div>\n<h2>Additional protection for iMessage<\/h2>\n<p>\nAnother minor innovation concerns Apple\u2019s native messenger. After the update, it will warn you if a third party can see messages between you and another user. The details aren\u2019t yet known, but the feature is expected to counter the most sophisticated attacks, such as <a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/man-in-the-middle-attack\/\" target=\"_blank\" rel=\"noopener\">man-in-the-middle<\/a> ones. If that happens, you\u2019ll get a warning about possible eavesdropping right in the chat. What\u2019s more, iMessage Contact Key Verification users will be able to compare the verification code either (i) when actually meeting the person with whom you\u2019re messaging, (ii) on FaceTime, or (iii) in another messenger app.<\/p>\n<div id=\"attachment_46987\" style=\"width: 410px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2023\/01\/26193540\/apple-new-data-protection-03.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-46987\" class=\"size-full wp-image-46987\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/103\/2023\/01\/26193540\/apple-new-data-protection-03.jpg\" alt=\"iMessage Contact Key Verification lets users verify they're communicating only with whom they intend\" width=\"400\" height=\"800\"><\/a><p id=\"caption-attachment-46987\" class=\"wp-caption-text\">iMessage Contact Key Verification lets users verify they\u2019re communicating only with whom they intend<\/p><\/div>\n<p>iMessage Contact Key Verification will be useful to potential victims of sophisticated and expensive cyberattacks: journalists, politicians, celebrities, etc. Ordinary users are more likely to be inconvenienced by it, like the previously unveiled <a href=\"https:\/\/www.kaspersky.com\/blog\/apple-lockdown-mode\/45061\/\" target=\"_blank\" rel=\"noopener nofollow\">Lockdown Mode<\/a>. In any case, it will be available to everyone.\n<\/p>\n<h2>When will the new features be available?<\/h2>\n<p>\nThe most useful feature \u2014 Advanced Data Protection \u2014 already went live on December 13, 2022. To use it, you need to update <strong><em>all<\/em><\/strong> devices linked to your Apple ID account; the minimum operating system requirements are:\n<\/p>\n<ul>\n<li>iPhone \u2014 iOS 16.2 or later<\/li>\n<li>iPad \u2014 iPadOS 16.2 or later<\/li>\n<li>Mac \u2014 macOS 13.1 or later<\/li>\n<li>Apple Watch \u2014 watchOS 9.2 or later<\/li>\n<li>Apple TV \u2014 tvOS 16.2 or later<\/li>\n<li>HomePod speakers \u2014 version 16.0 or later<\/li>\n<li>Windows computers with iCloud for Windows \u2014 version 14.1 or later<\/li>\n<\/ul>\n<p>\nIf just one device doesn\u2019t support the right version (for example: iPhone 7 and earlier; 4<sup>th<\/sup>-generation and lower iPads), you won\u2019t be able to enable Advanced Data Protection until you unlink it from your account. Incidentally, the current version of macOS \u2014 Ventura \u2014 supports most devices released since 2017.<\/p>\n<p>Apple hasn\u2019t named the launch dates for the other features, stating only that they\u2019ll be coming some time this year.\n<\/p>\n<h2>Scanning devices for child pornography scrapped<\/h2>\n<p>\nLastly, another important change was more\u2026 whispered than announced: an Apple spokesperson only mentioned briefly in an <a href=\"https:\/\/www.wsj.com\/articles\/apple-plans-new-encryption-system-to-ward-off-hackers-and-protect-icloud-data-11670435635\" target=\"_blank\" rel=\"nofollow noopener\">interview<\/a> that the company no longer plans to implement CSAM Detection, which we\u2019ve <a href=\"https:\/\/www.kaspersky.com\/blog\/what-is-apple-csam-detection\/41502\/\" target=\"_blank\" rel=\"noopener nofollow\">already written about<\/a>. Recall that, in August 2022, Apple announced a technology for detecting child pornography on devices. The more correct legal term, which Apple used, is Child Sexual Abuse Material (CSAM). The idea was that all Apple devices would carry out background scanning of images, and if any matched the database of child pornography images, the company would be notified and tip off the law enforcement agencies.<\/p>\n<p>Although Apple insisted that CSAM Detection would not violate the privacy of ordinary users with nothing illegal on their devices, the initiative was still criticized. Apple\u2019s promises of \u201cminimal likelihood of false positives\u201d didn\u2019t help: in any case, the feature turned out to be extremely non-transparent and, a first, implemented directly on the device \u2014 not in the cloud system that Apple itself manages, but on the phone or tablet. Apple critics, such as the US non-profit Electronic Frontier Foundation, rightly <a href=\"https:\/\/www.eff.org\/deeplinks\/2021\/08\/if-you-build-it-they-will-come-apple-has-opened-backdoor-increased-surveillance\" target=\"_blank\" rel=\"nofollow noopener\">pointed out<\/a> that the noble goal of preventing the spread of child pornography could easily morph into scanning devices for any content.\n<\/p>\n<h2>Advances in data privacy<\/h2>\n<p>\nApple\u2019s introduction of end-to-end encryption for the most sensitive user data and scrapping of controversial scanning technology show that the company really does care about user privacy. And enabling Advanced Data Protection will greatly reduce the chances of data theft from an iCloud hack. Moreover, Apple won\u2019t be able to hand over your data at the request of law enforcement. At present, the company can do this in respect of all accounts where any information is uploaded to the cloud.<\/p>\n<p>In addition, we mustn\u2019t forget that, for any security measure, sooner or later a hacking technique will be found. Even in end-to-end encryption technology vulnerabilities can crop up, and Apple innovations always get put to the most stringent test by both conscientious security researchers and cybercriminals. But it\u2019s important to remember that no amount of encryption will help if someone gains access to your unlocked Apple device.<\/p>\n<p>And while Apple\u2019s innovations are certainly useful, they will cause the user some inconvenience. If you lose the decryption key, your data is lost forever. And if you lose your only Apple device, you may have problems restoring your data to a new one. So, we recommend taking a timeout to fully consider the new features and whether they\u2019re right for you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In late 2022, Apple announced a raft of new data protection features. Why does that matter to users?<\/p>\n","protected":false},"author":665,"featured_media":31190,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1788],"tags":[14,260,43],"class_list":{"0":"post-31188","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"tag-apple","9":"tag-data-protection","10":"tag-privacy"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/apple-new-data-protection\/31188\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/apple-new-data-protection\/25112\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/apple-new-data-protection\/20606\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/apple-new-data-protection\/27738\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/apple-new-data-protection\/25438\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/apple-new-data-protection\/25833\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/apple-new-data-protection\/28347\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/apple-new-data-protection\/27542\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/apple-new-data-protection\/34577\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/apple-new-data-protection\/46984\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/apple-new-data-protection\/20065\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/apple-new-data-protection\/20682\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/apple-new-data-protection\/29704\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/apple-new-data-protection\/25802\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/apple-new-data-protection\/31475\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/apple\/","name":"apple"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/31188","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/665"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=31188"}],"version-history":[{"count":1,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/31188\/revisions"}],"predecessor-version":[{"id":31189,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/31188\/revisions\/31189"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/31190"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=31188"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=31188"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=31188"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}