Close X
Sunday, November 24, 2024
ADVT 
Tech

Johns Hopkins Researchers Find Flaw In iMessage Encryption

The Canadian Press, 22 Mar, 2016 12:23 PM
    NEW YORK — Much has been made of both the benefits and dangers that come with strong encryption, especially the methods used by Apple to secure its devices. But new research shows that Apple's security isn't as impenetrable as both the company and its critics claim.
     
    A team from Johns Hopkins University says it found a security bug in iMessage, the encrypted messaging platform used on Apple's phones and other devices. The bug would allow hackers under certain circumstances to decrypt some messages.
     
    The team's paper is extremely critical of iMessage's encryption technology, citing "significant vulnerabilities that can be exploited by a sophisticated attacker." And it argues that in the long term, the technology needs to be replaced with a more modern mechanism.
     
    The paper was published on Monday after Apple's release of a patch fully fixing the bug. The John Hopkins team reported its findings to Apple in November.
     
    But perhaps more significantly, the discovery is a blow to government arguments that Apple's encryption technology makes it impossible for law enforcement to access information stored on devices connected to criminal investigations. Apple itself maintains that iMessage's encryption is top-of-the-line and the same kind used by banks and the military.
     
    "The main point is that encryption is hard to get right," said Ian Miers, a computer science doctoral student at Johns Hopkins in Baltimore and one of the paper's authors. "Imagine the number of things that could go wrong if you have more complicated requirements like a back door."
     
     
    Some government and law enforcement officials argue that companies that use encryption in their products and services should be required to include a so-called "back door," which would give law enforcement officials armed with warrants a way to access encrypted information as part of investigations. But efforts to pass legislation that would do that have failed to gain traction.
     
    Apple has come under fire for refusing to create and provide the government with a software tool that would help investigators unlock an encrypted iPhone used by one of the killers in the San Bernardino mass shooting. The company and its supporters have argued that doing so would threaten data security for millions by creating essentially a master key that could later be duplicated and used against other phones.
     
    A federal magistrate will hear arguments from both sides on Tuesday.
     
    Apple Inc. released a statement Monday saying that it appreciated the John Hopkins team's efforts in identifying the bug and bringing it to its attention. It also noted that some of the problems identified in the paper were fixed with the fall release of iOS 9. Monday's release of iOS 9.3 included additional protections.
     
     
    "Security requires constant dedication and we're grateful to have a community of developers and researchers who help us stay ahead," Apple said.

    MORE Tech ARTICLES

    App That Stops You From 'Drunk' Calling Your Girlfriend

    App That Stops You From 'Drunk' Calling Your Girlfriend
    Described as a "condom for your phone", Drunk Mode stops you from doing foolish things with your phone when you have had a few drinks, IBTimes reported.

    App That Stops You From 'Drunk' Calling Your Girlfriend

    Teenagers Not Hooked To Facebook Anymore

    Teenagers Not Hooked To Facebook Anymore
    A study involving 170,000 internet users across 32 countries has found that more and more teenagers are spending more time on instant messaging apps than on Facebook.

    Teenagers Not Hooked To Facebook Anymore

    Gift Guide: How To Choose A Tablet From The Vast Array Of iOS, Android And Windows Choices

    Gift Guide: How To Choose A Tablet From The Vast Array Of iOS, Android And Windows Choices
    Time for a tablet? People tend to hold onto tablets longer than smartphones, so take time to weigh your options. A major consideration is what phone you or your gift recipient already has.

    Gift Guide: How To Choose A Tablet From The Vast Array Of iOS, Android And Windows Choices

    Unboxing Videos On The Rise, Freezing That Big Reveal Of Anything From New Phone To Happy Meal

    Unboxing Videos On The Rise, Freezing That Big Reveal Of Anything From New Phone To Happy Meal
    NEW YORK — Rrrrip goes the packing tape and squeak goes the protective foam. Are there sweeter, more seductive sounds than the opening of a new toy or gadget?

    Unboxing Videos On The Rise, Freezing That Big Reveal Of Anything From New Phone To Happy Meal

    Most Internet Users Know What A Hashtag Is, But Are Less Clear On How Internet Works

    Most Internet Users Know What A Hashtag Is, But Are Less Clear On How Internet Works
    A new Pew Research Center survey released Tuesday found most people can recognize Microsoft founder Bill Gates and know that hashtags belong in tweets, but are confused about whether having a privacy policy means that a company actually keeps consumer information confidential.

    Most Internet Users Know What A Hashtag Is, But Are Less Clear On How Internet Works

    Hidden computer virus found after six years

    Hidden computer virus found after six years
    Computer security firm Symantec has discovered a hidden virus that has been spying on computers across the globe, including in India, for at least six years....

    Hidden computer virus found after six years