Hacker News new | past | comments | ask | show | jobs | submit login

On the other hand, tying everything to iCloud and then losing all your data because you replaced your sole device and forgot your password would be disastrous. This is the scenario that requires Apple to retain the keys to your iCloud, and as long as they have those keys, they can be compelled to decrypt it under lawful government order.



The thing is, once data is in iCloud, there are other ways you can retrieve it and back it up yourself as long as you do have working authentication, and I can see no good argument for not offering E2E encryption across the board that is tied to such identification.

Worst case, you generate a suitably robust key that is used for authentication and encryption, and you provide a means to export it and back it up however you want without sending it to any third party. You can still use all the snazzy secure enclaves and facial recognition and so on to protect a copy of that key that is held on each of your personal devices to enable easy but reasonably secure access, but the underlying technology is tried and tested, it does not have the lock-in problem, and it does not require data in iCloud to be accessible to anyone but the keyholder.

Also note that this needn't necessarily be mandatory. If users are OK with trusting Apple, they could still use the current approach. But if you're going to claim to be a strong supporter of privacy and security, you should really have at least the option for proper encryption of everything for those people and businesses that want it.


These days I have enough other apple devices tied in (family settings etc) that i could lose one device and still be authenticated via another

I think the secure enclave is the winning technology - whilst not everyone has to have a smartphone in the brave new digital world,everyone will have to have at least one secure enclave (HSM probably tied to biometrics)


Yes, although this is hardly unique to Apple. Play mad-libs with this statement and it applies to the vast majority of cloud solutions.

___ have your ____, and as long as they have those ____, they can be compelled to ____ it under lawful government order.


That's true, and most cloud solutions also do the same thing as Apple and retain the keys necessary to regain access to the account.


How do you prove that it is your account then?




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: