Apple loves privacy!

Welcome to our community

Be a part of something great, join today!

Show me where "We cannot obtain the information" applies to items store in iCloud and not on your phone. Everything is encrypted everywhere. Listen: If served with a government request for information, chances are, apple will provide any data they need that is stored in the icloud. On the phone itself, they won't be able to because the passcode lock doesn't have a current workaround.

http://support.apple.com/kb/HT4865

SIGH.... The data is encrypted on the server as well. Apple can hand over the files, but they are encrypted files. Unless they have some geek that can break 256-bit AES then it is as worthwhile as shit in a bun.
 
less than 0.00385% of customers had data disclosed due to government information requests.

If what you're saying is true, it would be 0%.
 
They'll just open the account. They even state in that link they comply with supplying data.

You can open the account all you want, but the token for encryption is only for that computer that has the password. So once again, your information is encrypted.
 
They'll just open the account. They even state in that link they comply with supplying data.

The pass phrase to encrypt the data is on the phone. They don't have access to that pass phrase to decrypt.

The "data" in question are encrypted files that they don't have the pass phrase for.
 
http://support.apple.com/kb/HT4865

SIGH.... The data is encrypted on the server as well. Apple can hand over the files, but they are encrypted files. Unless they have some geek that can break 256-bit AES then it is as worthwhile as shit in a bun.

Encryption is only good for UNAUTHORIZED access. Government requests are AUTHORIZED and they will get what they want.
 
The pass phrase to encrypt the data is on the phone. They don't have access to that pass phrase to decrypt.

The "data" in question are encrypted files that they don't have the pass phrase for.

ON THE PHONE. Not on the icloud. Like I said, if they really wanted stuff on your icloud or any web services, they'd still be able to get it unless you kept your phone off the grid.
 
Encryption is only good for UNAUTHORIZED access. Government requests are AUTHORIZED and they will get what they want.

Bro, cannot give access unless you have the password. I've actually had this happen to me. Apple took me through steps before I was even able to have access. All, in which, I needed to know all the security questions in process. They didn't even know the security questions... If I got it wrong, they couldn't help me.
 
http://support.apple.com/kb/HT4865

SIGH.... The data is encrypted on the server as well. Apple can hand over the files, but they are encrypted files. Unless they have some geek that can break 256-bit AES then it is as worthwhile as shit in a bun.

They are required by law to provide the data they store - they have a different key in the cloud and on the device. It's the law.
 
I would not go there ever. Google's security credentials are superb - there has never been any kind of a breach the kind Apple had with Google.

I think google accounts get hacked all the time.

There are similar breeches going on all the time.

In fact, Google has been breeched multiple times where millions of accounts were compromised.

This latest Apple issue was a handful of individual accounts hacked by guessing the user's password, not by gaining access to the systems themselves.

http://www.washingtonpost.com/world...330428-be34-11e2-89c9-3be8095fe767_story.html

http://m.huffpost.com/us/entry/4383950

2million Google passwords posted online.
 
Bro, cannot give access unless you have the password. I've actually had this happen to me. Apple took me through steps before I was even able to have access. All, in which, I needed to know all the security questions in process. They didn't even know the security questions... If I got it wrong, they couldn't help me.

Again, you miss the obvious - the encryption on the device can be different from the encryption in the cloud, using different keys.
 
Everything might be encrypted, but Apple does not have access to the device password only. I assure you they have the cloud password - as they are required to, by law, given the patriot act.

http://www.theverge.com/2014/9/18/6409575/apple-warrant-canary-patriot-act

That is a suggestion...

https://gigaom.com/2014/09/18/apples-warrant-canary-disappears-suggesting-new-patriot-act-demands/

And just because it could be served, they said they would fight it.

“Apple has never received an order under Section 215 of the USA Patriot Act. We would expect to challenge such an order if served on us.”
 
Actually, this was not a Google breach, this was a 3rd party breach where reused userids and passwords on other services.


It doesn't matter if its third party. It effected Google the same. Just like some of you are blaming apple for individuals able to find the log in for the celebrities accounts. It wasn't apple's breach, it was the user's inability to have a secure account
 
Actually, this was not a Google breach, this was a 3rd party breach where reused userids and passwords on other services.

Apple wasn't breeched either.

2M > ~150 targeted celebrities.
 

Yes, I am sure.

“It's important to note that in this case and in others, the leaked usernames and passwords were not the result of a breach of Google systems,” the blog post said. “Often, these credentials are obtained through a combination of other sources. For instance, if you reuse the same username and password across websites, and one of those websites gets hacked, your credentials could be used to log into the others. Or attackers can use malware or phishing schemes to capture login credentials,” Google said.

--

If people are stupid and reuse user-ids and passwords between services - it is not a Google breach.

I will remind you again that I work in financial software - and security issues are our #0, #1, #2 and #3 concerns - while I am not a security expert in my job, I have a pretty solid background in Entropy, Cryptology and the like and go over security issues with real security experts on a constant basis.

Google's security credentials are extremely high, definitely much higher than Apple. If this will change, we will see, but Google has been at the job of massive scale online services a whole lot longer than Apple - and it shows.
 
Apple wasn't breeched either.

2M > ~150 targeted celebrities.

2M not on Google's servers == 0 on Google's servers < whatever amount was breached in iCloud.

The math is simple, Google was not breached.
 
2M not on Google's servers == 0 on Google's servers < whatever amount was breached in iCloud.

The math is simple, Google was not breached.

This is a google breach no?

AdWords Accounts Hacked
A user-side breach of security occurred on AdWords accounts in April 2007. Somehow, a malicious file was installed on users' systems. This file was used to steal the users' AdWords passwords and gain access to their accounts. The program then set up ads that changed the users' AdWords campaigns. Most notably, the changes included setting up links that would install a post logger, a type of malware, on the computer of anyone who clicked the link. The malicious program also modified credit card information and prevented the users' computers from accessing AdWords to see all of the changes on their accounts.

Roger Thompson of Exploit Prevention Labs points out that the hackers took advantage of the lack of a URL preview on Google's sponsored results. Meaning, if users hover over a sponsored result link, a preview of the address is not shown in the user's browser. See Thompson's screen shot for an visual explanation. A lack of this feature means that users have no idea where the links will actually take them, leaving them vulnerable to visiting Web sites with malicious code.

Google responded to the attack by reporting that they had canceled the accounts that were compromised and assured users that they were taking the steps necessary to keep something like this from happening again. Google also encouraged users to keep their computer's security up to date as the vulnerability was only successful because victims had not incorporated recent patches into their Internet Explorer browsers.
 
It doesn't matter if its third party. It effected Google the same. Just like some of you are blaming apple for individuals able to find the log in for the celebrities accounts. It wasn't apple's breach, it was the user's inability to have a secure account

Explain to me, why did Apple have to toughen iCloud security after this breach and Google's blog referred to how their security measures ensured that they were not breached.

Was it a targeted attack? Sure. Were these accounts insecure? Sure. Was the data downloaded from Apple's server's because they did not properly implement 2-way authentication? Yes.
 
Explain to me, why did Apple have to toughen iCloud security after this breach and Google's blog referred to how their security measures ensured that they were not breached.

Was it a targeted attack? Sure. Were these accounts insecure? Sure. Was the data downloaded from Apple's server's because they did not properly implement 2-way authentication? Yes.

That was a marketing campaign. Obviously people that aren't in the know think apple was hacked. Come to find out, the celebrities were hacked on their end, not apple's. Show me the proof that apple was hacked?

Also, look at Apple's marketing campaign on the link I provided. It shows you steps on being more secure. About having a strong password, what to set, etc. All of that is user side, not apple side.
 
This is a google breach no?

Of course, from 7 years ago. Not from this year.

If you look at transparency reports for security flaws in competitor's product - you will see that Google engineers are among the most prolific providing it, because they work so much on security issues. This in itself should tell you something.
 
Also, look at Apple's marketing campaign on the link I provided. It shows you steps on being more secure. About having a strong password, what to set, etc. All of that is user side, not apple side.

Actually, no, the attack was on Apple's end using brute force - and the problem was that Apple did not force 2-step verification.

hackers breached the accounts of celebrities by writing brute-force software programs to attempt many passwords for email addresses deemed likely to be used in association with the account. It is a technique that Apple says “has become all too common on the Internet.” Two-step verification, or requiring multiple authentication methods to access an account from a new computer, is available to address this problem.

You can not do brute-force attack on that many client devices - this means you have access to them for long periods of time. You can do it however, on servers, so it is clear that the brute force attack was on the server side.

Apple basically admitted that it was a problem on their side:

Speaking to the Wall Street Journal, Apple CEO Tim Cook (pictured) also revealed that the company is going to add more password protection, called two-step verification, which will send an extra code to a person’s mobile phone after a password is entered.

Look, I understand that you are very excited that they are adding security measures, I am too, it makes my life easier and makes it a lot harder for people to crack our services that are accessed via Apple devices, but let's be real here, Apple has a long way to go to get to where Google (or Microsoft) is - as far as protecting user's data is. Accept it, Apple is not the first in everything, they more often than not, are better at marketing it.
 
Last edited:
Explain to me, why did Apple have to toughen iCloud security after this breach and Google's blog referred to how their security measures ensured that they were not breached.

Was it a targeted attack? Sure. Were these accounts insecure? Sure. Was the data downloaded from Apple's server's because they did not properly implement 2-way authentication? Yes.

PR
.
 
securitybreaches_25.png
 
Btw, Google clearly reads all my emails. So they can put up ads in Gmail for stuff mentioned in the messages.

God knows what other indexing they do, including the sites you visit that have ga tracking codes, purchases, any emails or texts sent via android devices, etc.

If they can read your email, they can hand it over unencrypted.
 

Users who are viewing this thread

Back
Top