Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Android Cellphones Encryption IOS Operating Systems Security

Details of iOS and Android Device Encryption 146

swillden writes: There's been a lot of discussion of what, exactly, is meant by the Apple announcement about iOS8 device encryption, and the subsequent announcement by Google that Android L will enable encryption by default. Two security researchers tackled these questions in blog posts:

Matthew Green tackled iOS encryption, concluding that the change really boils down to applying the existing iOS encryption methods to more data. He also reviews the iOS approach, which uses Apple's "Secure Enclave" chip as the basis for the encryption and guesses at how it is that Apple can say it's unable to decrypt the devices. He concludes, with some clarification from a commenter, that Apple really can't (unless you use a weak password which can be brute-forced, and even then it's hard).

Nikolay Elenkov looks into the preview release of Android "L." He finds that not only has Google turned encryption on by default, but appears to have incorporated hardware-based security as well, to make it impossible (or at least much more difficult) to perform brute force password searches off-device.
This discussion has been archived. No new comments can be posted.

Details of iOS and Android Device Encryption

Comments Filter:
  • by weilawei ( 897823 ) on Monday October 06, 2014 @06:39PM (#48078593)

    Is that the NSA still has their backdoor.

    • by x0ra ( 1249540 ) on Monday October 06, 2014 @06:50PM (#48078697)

      What did you believe ? Who's enough of a fool to believe acronyms agencies will let Apple, Google or Microsoft decide on their own ? Not at this scale. Agencies won't mind if a tech entrepreneur try to get his share of the pie, but he will forever be insignificant. Once he become big enough, he'll join the group as everybody else, just to stay in business because the feds will certainly have found a non-compliance from a dusty law book.

      This whole thing is just a marketing show to re-gain the average customer not-so lost trust...

      • Re: (Score:3, Interesting)

        by Anonymous Coward

        Devil's advocate (and I could be wrong on this count.) Part of the TLA groups function is not just spying, but the other element. Preventing that country's interests from getting snooped. This is why NIST has guidelines [1] as well as info on the latest exploits that are around.

        With the possibility that the other guys may have just the backdoors as the NSA does, it makes upping the ante logical. Better nobody be able to read info than just your enemies. Again, this is pure conjecture, but the NSA/NIST

        • by tlhIngan ( 30335 )

          Apple places all their bets on the magic chip, and who knows if there is a backdoor in that. The chips are fabbed in China, and it would be trivial to add extra functionality to the mask. In fact, since the entire chip is designed in China, baking in added, undocumented "features" like password recovery or even a vector for bypassing signed code is entirely possible, and likely in place.

          Actually, the chips are designed in the US (Apple has acquired numerous ASIC designers and companies) and fabbed in either

      • Who's enough of a fool to believe acronyms agencies will let Apple, Google or Microsoft decide on their own?

        As one of the guys who builds this stuff at Google... I am. You can choose what you believe, of course, but keep in mind that excessive cynicism can be just as effective as rose-colored glasses at misleading.

        • what i find amazing is that in the many years that mobile devices have been common place, no one's yet actually produced evidence that they're being used for nefarious purposes. Just lots of claim and bullshit.

          Yes, yes, there's PRISM and god knows what else. But show me a case where the NSA or the CIA or the FBI used a built in backdoor off an off the shelf product.

      • Memo to slef : don't buy a phone from a company that's beholden to the NSA.

        Oh, it's a Samsung. Well, that concern is negated then.

    • by SumDog ( 466607 )

      Possibly, or it may be that Google and Apple are trying to mitigate the blow-back. I remember reading a lot of the Yahoo stuff that got declassified showed that they tried hard to oppose the directive they were given; not that it mattered because we found out later that the NSA tapped their fibre backbones anyway.

      I have a feeling that Google/Apple want to go down this route because it will mean that they technologically can't comply with certain NSA letters. Of course, government agencies may already have t

    • Yeah really. I canot believe ANYONE would think that LEO is all up in arms that now devices are "encrypted" and the kiddie porn will run rampant.

      If you're familiar with public relations tactics, these articles are so damn blatantly obvious.

      It's a good deal, google and apple who already work with the government anyway, are now allowed to act like their devices are safe, and the govt. can pretend to act like they're styimed and will never break a case again.

      Seriously. Is there anyone stupid enough to believ

  • by Anonymous Coward

    STOP THE VIDEO ADS SLASHDOT!

    THEY EAT ALL MY (meager) BANDWIDTH AND RELOAD CONSTANTLY!

    I CANT LEAVE A SLASHDOT TAB OPEN WITHOUT HEARING RANDOM SOUND 15 MINUTES LATER!

    THIS SITE IS BECOMING UNUSABLE.

    IVE NEVER NEED THE REMOVE ADS FEATURE AND NOW THAT I NEED IT I CANT FIND IT. HAS IT BEEN REMOVED?

    IVE NEVER USED ADBLOCK IN MY LIFE AND IM GOING TO HAVE TO DOWNLOAD IT FOR SLASHDOT! NEWS FOR NERDS INDEED. MORE LIKELY ILL JUST STICK TO REDDIT, I SEE THE SAME STORIES ON THERE DAYS EARLIER.

    sTop it sTop IT stOP IT stOP i

  • Presumably, the apps on the phone have access to the encrypted data on the phone, right? So there's a simple solution. The user is happily using their iWhatever. The government sends a Nation Security letter to Apple forcing them to put a backdoor into the phone of the target, such that this app can read whatever data it wants on the phone. So when the user boots up his/her phone, and enters the password, the rougue app should be able to read all the data on the phone.

    Can anyone tell me why this WOULDN'

    • by dunkindave ( 1801608 ) on Monday October 06, 2014 @07:31PM (#48079019)

      Presumably, the apps on the phone have access to the encrypted data on the phone, right? So there's a simple solution. The user is happily using their iWhatever. The government sends a Nation Security letter to Apple forcing them to put a backdoor into the phone of the target, such that this app can read whatever data it wants on the phone. So when the user boots up his/her phone, and enters the password, the rougue app should be able to read all the data on the phone.

      Can anyone tell me why this WOULDN'T work?

      Because National Security Letters [wikipedia.org] cannot be used for that. They can only be used by the FBI to demand the handing over of data in the possession of or passing through the control of the receiver, not the performance of actions (and how the data is produced is up to the company receiving the NSL, not the FBI).

      Now what is in the Cloud is a different matter since Apple would have access to that, though again it may be encrypted with a key only the iDevice possesses so Apple wouldn't be able to decrypt it for the FBI.

      • They might not use an NSL, but I wouldn't count on it. The other blunt instrument the government has at it's disposal is the
        Authorized use of Military force [wikipedia.org], which doesn't even mention surveilance or data and is about military force, but which the government has cited in its warrantless wiretapping when sued by the http://en.wikipedia.org/wiki/A... [slashdot.org]">ACLU. Kind of a stretch, but the government has long tried to get away with whatever they want and let the courts rule on it later.

        So I have no problem bel

      • by jaseuk ( 217780 )

        I agree that Apple can't give an agency access to the device.

        There is still some question around any icloud backup. You can lose a device and restore to a replacement. You can forget your password and go through the reset process. These two mechanisms tell us that in fact Apple could if pressured hand over an iCloud backup with the means to decrypt it, provided that they intercept the forgotten password process.

        Of course there could be some legal reason why the agency cannot change the password. If inclined

    • by Anonymous Coward

      Can anyone tell me why this WOULDN'T work?

      If your phone does not have auto-update or -download enabled, or is not attached to iCloud at all, then there's no way for Apple to push apps down. While a lot of things can be done automatically on iOS for convenience, you can turn off a lot of it as well.

      I'm sure there are potential base band attacks as well, but I'm not sure how closely linked that chipset is linked with the main CPU in iPhones. Probably less linked than most Android phones since Apple uses their own CPUs.

    • The user is happily using their iWhatever. The government sends a Nation Security letter to Apple forcing them to put a backdoor into the phone of the target, such that this app can read whatever data it wants on the phone.

      It's impossible to cut a hardware vendor out of the trust system, unless you audit the hardware of your device. But set this aside.

      This won't work because apps never see your password or have access to the decryption keys. The CPU itself doesn't have access to the decryption keys and do

      • I think you may have missed GP's point. The key protects the data. When the user enters the passphrase, the data is decrypted and apps can access all the data. Therefore, you don't NEED the key if you can put an app on the phone, then the user uses their phone. The encryption is useful only on a stolen or seized phone.

        • by Anonymous Coward

          No, apps don't have access to all the data. That's exactly what iOS's sandboxing model prevents - it makes sure that apps can't read data arbitrarily across the device, instead, only the app's own data, and data that's been explicitly authorised for that app to view.

          • There is that, but if that were trustworthy you wouldn't need encryption. I assume, I think rightly, that any forensic app installed by Apple or a letter agency will have no trouble bypassing the sandbox. I've yet to see any sandbox model, on any OS, that didn't leak like a sieve. See Java and Flash for well-known examples of that approach.

            • There is that, but if that were trustworthy you wouldn't need encryption.

              Defense in depth.

            • There is that, but if that were trustworthy you wouldn't need encryption. I assume, I think rightly, that any forensic app installed by Apple or a letter agency will have no trouble bypassing the sandbox. I've yet to see any sandbox model, on any OS, that didn't leak like a sieve. See Java and Flash for well-known examples of that approach.

              Idiot. It's called "defence in depth". The most basic knowledge of security will tell you that you will have multiple protections. Having three layers of security isn't an admission that the first two layers are unsafe, only to a clueless idiot. The third layer provides more security.

              • I'm about to go into a meeting where we're going to design a security architecture for a government agency involved in cybersecurity. While designing it, I'm going to watch out for the error GP made by implication, which is:

                Today's topic is encryption of data on mobile devices.
                A method of bypassing the encryption was suggested.
                Gp (and you) essentially argue that the encryption doesn't need to be solid because sandboxing.
                Next week, the same logic would argue that sandboxing doesn't need to be strong because

        • by SJ ( 13711 )

          Actually... The passphrase only decrypts the key that is used to protect the data.

          Plus, each app is sandboxed and can not access other apps data. (with a few controlled exceptions)

          Plus, warnings a thrown up if your app starts trying to access things. (Contacts, Microphone, Photos etc)

  • Is iCloud encrypted under the consumer's key? That seems like the smart thing to do, though I imagine it could make sharing folders across devices a bit tricky.

    Plus solving the brute-force problem, of course.
  • by Mister Liberty ( 769145 ) on Monday October 06, 2014 @07:30PM (#48079017)

    Encryption can be rock solid -- still the pass phrase be sniffed
    Anything typed into a device that has connectivity is floating out there.

  • Here's how it works (Score:3, Interesting)

    by koan ( 80826 ) on Monday October 06, 2014 @10:25PM (#48079991)

    The NSA (and other agencies) have noticed a significant drop in data, and an increase in the use of encryption/VPN/proxies/TOR since Snowden went public.

    They realized more people were starting to take care with their data, so how to fix (read stop) it?

    OK, first we have the NSA complaint corps (Apple, Google, Facebook, Twitter) code some "encryption" made out of tissue paper, then they send out the FBI (and other agencies) talking heads to publicly denounce this "encryption" as though they were seriously concerned.

    Now people thinking they have encrypted their devices and are safe will once again become complacent.

    But the real story is even more absurd, the fact that the average person believes they are of any interest to anyone but marketers.

    • by AmiMoJo ( 196126 ) *

      Seems like a very risky strategy. Android and iOS encryption have already come under a lot of scrutiny, not least from companies that make software to extract data for law enforcement. If there were weaknesses there is a good chance they would be found, as they were when problems like Goto Fail were discovered.

      Even if the encryption is compromised, it would be effective against corrupt law enforcement agencies. The FBI isn't going to start cracking iOS encryption and then going to court with the evidence be

      • by koan ( 80826 )

        Seems like a very risky strategy

        Like hiring outside contractors while you violate the letter of the law and gather up everyone's Internet and phone communications, including sticking backdoors into firmware, hardware, and major brands of software? Some of said brands were working with the NSA.
        Risky like that?

        Think about it.

    • by dargaud ( 518470 )

      But the real story is even more absurd, the fact that the average person believes they are of any interest to anyone but marketers.

      Nobody is of interest until something happens that makes you commited.

    • Cool, I don't know about iOS for sure, except that iOS 8 fucking lags on an iphone 4s, so I have to assume it's doing *something*.

      In addition, enabling encryption on my i9300 (android, of course), led to tangible lag in device usage. If you're going to make "tissue paper" encryption, you'd at least omit the lag, surely? Not that I'm fully refuting your claim -- just saying that if it's true, someone went to a lot of effort to waste cpu cycles so it seems as if there's something happening.

      • by koan ( 80826 )

        I have no proof of what I say, I am basing everything off previous experience and the obvious "conspiracy" between governmental agencies and certain corporations.

        I would bet a large amount of money that I am close to, or right on top of the truth of the matter.
        Your mileage may vary.

        • Like I say, I'm not disputing that there are a bunch of nefarious fucks trying to run the world; just that, if iOS and Android encryption are bunk, they either went to a great deal of effort to make them resource-intensive or they just plain hired a bunch of PHB's, pointed them at Scratch and said "go code encryption, 'cos you can!". Because seriously, Apple's planned obsolesence is working and I had to turn off encryption on my s3 after I started getting the urge to smash it.

          • by koan ( 80826 )

            Additionally consider Apple's security track record of late, (get fail?) and frankly I don't think Google/Android were ever designed to keep things private.

  • Encryption is only one part of the announcement. Apple also said that they're not going to sell your data, for the most part. What did google say about that?

    • Encryption is only one part of the announcement. Apple also said that they're not going to sell your data, for the most part. What did google say about that?

      Google is an advertising company. Of course their going to sell your "anonymous" data.

  • by Anonymous Coward

    What's now required in laptops and mobile phones is a "dead-man" switch where if the user stops doing something after a certain period of time, the device switches off and all crypto keys in memory are lost. That may not be convenient for mobile phones, but if you look at how the Dread Pirate Roberts was caught - in a library by FBI determined to not let him turn off the laptop - then a dead man switch (software or hardware) could have shut his laptop down before they had time to dump its RAM to disk or sim

  • the other day. Here's what happened:
    1) Performance sucked ass, despite reports to the contrary (i9300 -- I know it's no G3, but hey, it should damn well be enough, at quad-1.2 gHz with a gig of RAM)
    2) My TWRP restore didn't include my home partition so I lost all data on there. Sucks to be me.

    I'd welcome this if it didn't come at the massive lag that I experienced on a device which is normally quite spritely. I get that encryption doesn't come for free, but adding 1-3 seconds lag to every tap is not, in my

  • Try to change it with vpc. You are NOT asked for your old password.
    With for example LUKS this is not possible, as the linux kernel does not give you the password of the unlocked device, which is needed to encrypt it with the new key.

Genius is ten percent inspiration and fifty percent capital gains.

Working...