• All new members please introduce your self here and welcome to the board:
    http://www.professionalmuscle.com/forums/showthread.php?t=259
Buy Needles And Syringes With No Prescription
M4B Store Banner
intex
Riptropin Store banner
Generation X Bodybuilding Forum
Buy Needles And Syringes With No Prescription
Buy Needles And Syringes With No Prescription
Mysupps Store Banner
IP Gear Store Banner
PM-Ace-Labs
Ganabol Store Banner
Spend $100 and get bonus needles free at sterile syringes
Professional Muscle Store open now
sunrise2
PHARMAHGH1
kinglab
ganabol2
Professional Muscle Store open now
over 5000 supplements on sale at professional muscle store
azteca
granabolic1
napsgear-210x65
esquel
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
ashp210
UGFREAK-banner-PM
1-SWEDISH-PEPTIDE-CO
YMSApril21065
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
advertise1
tjk
advertise1
advertise1
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store
over 5000 supplements on sale at professional muscle store

FBI unable to crack Apple's iMessage Encryption

bubbafrombama

Member
Registered
Joined
Jan 30, 2008
Messages
556
Don't like Big Brother snooping in on your text conversations? Try Apple's iMessage, and take back that liberty they've stolen from you.

http://www.macobserver.com/tmo/article/apples-imessage-encryption-too-tough-for-fbi

I've actually known this for quite some time, but it's certainly nice to see the FBI memo leaked proving it. Sorry Android fans, you'll have to continue with your insecure crap Google SMS platform. I still don't get why Google can't make a decent factory SMS app?! From terrible pic and vid quality to out of sync sent texts, from not being able to handle more than about 160 characters in a single text to stupid slide shows and MMS never received. Talk about shit.
 
Last edited:
Fuck yeah. You keep doing your thing Apple. Makes people like me feel safe haha.
 
More on this:

http://m.cnet.com/news/apples-imessage-encryption-trips-up-feds-surveillance/57577887

Encryption used in Apple's iMessage chat service has stymied attempts by federal drug enforcement agents to eavesdrop on suspects' conversations, an internal government document reveals.

An internal Drug Enforcement Administration document seen by CNET discusses a February 2013 criminal investigation and warns that because of the use of encryption, "it is impossible to intercept iMessages between two Apple devices" even with a court order approved by a federal judge.

The DEA's warning, marked "law enforcement sensitive," is the most detailed example to date of the technological obstacles -- FBI director Robert Mueller has called it the "Going Dark" problem -- that police face when attempting to conduct court-authorized surveillance on non-traditional forms of communication.

When Apple's iMessage was announced in mid-2011, Cupertino said it would use "secure end-to-end encryption." It quickly became the most popular encrypted chat program in history: Apple CEO Tim Cook said last fall that 300 billion messages have been sent so far, which are transmitted through the Internet rather than as more costly SMS messages carried by wireless providers.

A spokeswoman for the DEA declined to comment on iMessage and encryption. Apple also declined to comment.

The DEA's "Intelligence Note" says that iMessage came to the attention of the agency's San Jose, Calif., office as agents were drafting a request for a court order to perform real-time electronic surveillance under Title III of the Federal Wiretap Act. They discovered that records of text messages already obtained from Verizon Wireless were incomplete because the target of the investigation used iMessage: "It became apparent that not all text messages were being captured."

This echoes what other law enforcement agencies have been telling politicians on Capitol Hill for years. Last May, CNET reported that the FBI has quietly asked Web companies not to oppose a law that would levy new wiretap requirements on social-networking Web sites and providers of VoIP, instant messaging, and Web e-mail. During an appearance two weeks later at a Senate hearing, the FBI's Mueller confirmed that the bureau is pushing for "some form of legislation."

Andrew Weissmann, the FBI's general counsel, said last month at an American Bar Association event that enacting a new law to amend a 1994 law called the Communications Assistance for Law Enforcement Act is a "top priority" this year. CALEA requires telecommunications providers to build in backdoors for easier surveillance, but does not apply to Internet companies, which are required to provide technical assistance instead.

What's difficult, Weissmann said, "is trying to come up with the fairest and most sort of narrowly tailored means to do this." He added: "We don't want to have a system where you're needlessly imposing burdens on thriving industries or even budding industries... So what the bureau has been spending quite a bit of time on, and certainly has as a top priority this year, is coming up with a proposal with other members of the intelligence community that tries to balance all of that. That does tackle the problem of trying to modernize where we were from 1994, given how much technology has advanced."

'Not designed to be government-proof'
Apple has disclosed little about how iMessage works, but a partial analysis sheds some light on the protocol. Matthew Green, a cryptographer and research professor at Johns Hopkins University, wrote last summer that because iMessage has "lots of moving parts," there are plenty of places where things could go wrong. Green said that Apple "may be able to substantially undercut the security of the protocol" -- by, perhaps, taking advantage of its position during the creation of the secure channel to copy a duplicate set of messages for law enforcement.

Christopher Soghoian, a senior policy analyst at the American Civil Liberties Union, said yesterday that "Apple's service is not designed to be government-proof."

"It's much much more difficult to intercept than a telephone call or a text message" that federal agents are used to, Soghoian says. "The government would need to perform an active man-in-the-middle attack... The real issue is why the phone companies in 2013 are still delivering an unencrypted audio and text service to users. It's disgraceful."

The DEA says that "iMessages between two Apple devices are considered encrypted communication and cannot be intercepted, regardless of the cell phone service provider." But, if the messages are exchanged between an Apple device and a non-Apple device, the agency says, they "can sometimes be intercepted, depending on where the intercept is placed."

This isn't the first time that federal agencies have warned of surveillance woes. An FBI staff operations specialist in the bureau's Counterterrorism Division complained in 2010 of difficulties in "obtaining information from Internet service providers and social-networking sites." And a Homeland Security report obtained by the Electronic Frontier Foundation shows that a working group convened by an FBI office in Chantilly, Va. requested details about how "investigations have been negatively impacted" by companies' delays or inability to comply with surveillance requests.

Going Dark has emerged as a significant effort inside the FBI, which employed 107 full-time equivalent people on the project as of 2009, commissioned a RAND study, hired consultants from Booz, Allen and Hamilton, and sought extensive technical input from its secretive Operational Technology Division in Quantico, Va.

"There is a growing and dangerous gap between law enforcement's legal authority to conduct electronic surveillance, and its actual ability to conduct such surveillance," FBI director Mueller told a House of Representatives committee two weeks ago. "We must ensure that the laws by which we operate and which provide protection to individual privacy rights keep pace with new threats and new technology."

As CNET was the first to report in 2003, representatives of the FBI's Electronic Surveillance Technology Section in Chantilly, Va., began quietly lobbying the Federal Communications Commission to force broadband providers to provide more-efficient, standardized surveillance facilities. The FCC approved that requirement a year later, sweeping in Internet phone companies that tie into the existing telecommunications system. The regulations were upheld in 2006 by a federal appeals court.

But the FCC never granted the FBI's request to interpret the law to cover instant messaging and VoIP programs that are not "managed"--meaning peer-to-peer programs like Apple's Facetime and iMessage, Facebook Chat, Gmail's video chat, and Xbox Live's in-game chat that do not use the public telephone network.

If Congress does nothing, law enforcement still has options. Police can obtain a special warrant allowing them to sneak into someone's house or office, install keystroke-logging software, and record passphrases. The DEA adopted this technique in a case where suspects used PGP and the encrypted Web e-mail service Hushmail.com. They can also send a suspect malware, purchase a so-called zero day vulnerability to gain control of a target device and extract the contents, or obtain a warrant to seize the physical device and perform a traditional forensics analysis.

Apple's privacy policy authorizes the company to divulge customers' information about customers to law enforcement when "reasonably necessary or appropriate" or to "comply with legal process."
 
Great read but I wonder how long it will take for the Govt to secretly talk to Apple and say "hey, we need to be able to get to certain peoples texts..it's for national security." Then there goes the privacy. Hell I could see the Govt paying Apple a ton of money to get that approved....secretly
 
Great read but I wonder how long it will take for the Govt to secretly talk to Apple and say "hey, we need to be able to get to certain peoples texts..it's for national security." Then there goes the privacy. Hell I could see the Govt paying Apple a ton of money to get that approved....secretly

No doubt about this. I love my country, however we have become a bad scifi movie. 1984 is really upon us.
 
Oh yeah. I bet most of us no longer have copper for our phone lines. Why is it that our voice communications are not encrypted??? You think that would be a given right, and therefore a requirement for service providers.
 
The government will never pay money for something they could easily get authorized via Congress, and Apple would never accept money as a bribe, nor will they ever give out the encryption info for iMessage.

Being an "Internet" based company, they aren't required to give out anything other than technical assistance, due to the CALEA (Communications Assistance for Law Enforcement Act). As the 2nd article above I posted states:

"But the FCC never granted the FBI's request to interpret the law to cover instant messaging and VoIP programs that are not "managed"--meaning peer-to-peer programs like Apple's Facetime and iMessage, Facebook Chat, Gmail's video chat, and Xbox Live's in-game chat that do not use the public telephone network."

However, what I can see is Congress authorizing an update to the law that would basically require Apple to store copies of all iMessages as they are initially sent, for a period of time, then provide the messages when a warrant is authorized.

The thing is, Apple doesn't keep copies of iMessages at this time. Only the end-user has copies of them on their iDevice and backups (iCloud or on a computer). If using iCloud, Big Brother could get your backup data, BUT only if they know your Apple ID and password, then restore that backup to any iDevice that accepts the backup (iPhone, iPod, or iPad). If you don't use iCloud, and they get access to your computer, you're basically screwed, unless you've password protected the backup via iTunes (it gives you this option - highly recommended), and if they hopefully don't have a traceable keylogger on your computer. My suggestion would be to use iCloud and Find My iPhone at all times, as you can easily erase the backup on command from any iDevice and computer. Or just don't use backups altogether.

And FYI, you don't need an active cellular plan to use iMessage. You can easily use iMessage on any iDevice that accepts iOS 5.x or newer (3GS or newer iPhone, newer iPods, and any iPad), including Mac PCs, with nothing more than a simple wifi connection. Just keep in mind, you can have multiple devices with the same Apple ID logged in at the same time, and each iDevice will sync the iMessages to one another. This is why it is VERY IMPORTANT to have control of all your iDevices at all times, AND make sure you regularly change your Apple ID password (you can also easily change your Apple ID while keeping the same account).
 
Don't like Big Brother snooping in on your text conversations? Try Apple's iMessage, and take back that liberty they've stolen from you.

http://www.macobserver.com/tmo/article/apples-imessage-encryption-too-tough-for-fbi

I've actually known this for quite some time, but it's certainly nice to see the FBI memo leaked proving it. Sorry Android fans, you'll have to continue with your insecure crap Google SMS platform. I still don't get why Google can't make a decent factory SMS app?! From terrible pic and vid quality to out of sync sent texts, from not being able to handle more than about 160 characters in a single text to stupid slide shows and MMS never received. Talk about shit.

It's not the Google can't - Google is actually USED by the FBI and other various government agencies - so they get a lot of funding from them...

And it won't be long until Apple is forced by Homeland Security to provide them with the tools to use their platform...of course in the name of National Security...it's not the terrorists we need to be worried about, it's our own government!!!
 
It's not the Google can't - Google is actually USED by the FBI and other various government agencies - so they get a lot of funding from them...

And it won't be long until Apple is forced by Homeland Security to provide them with the tools to use their platform...of course in the name of National Security...it's not the terrorists we need to be worried about, it's our own government!!!

Good points all around. Just a matter of time
 
Perhaps for now the feds can't crack the encryption for that, but they have hackers working for them that will eventually crack it, I guarantee it.
 
or is that what they want you to think?
 
disinformation is a valuable tool.
 
Don't like Big Brother snooping in on your text conversations? Try Apple's iMessage, and take back that liberty they've stolen from you.

Apple's iMessage Encryption Too Tough for FBI - The Mac Observer

I've actually known this for quite some time, but it's certainly nice to see the FBI memo leaked proving it. Sorry Android fans, you'll have to continue with your insecure crap Google SMS platform. I still don't get why Google can't make a decent factory SMS app?! From terrible pic and vid quality to out of sync sent texts, from not being able to handle more than about 160 characters in a single text to stupid slide shows and MMS never received. Talk about shit.

being an Android fan I'd have to agree with the txt messaging, however there are plenty of 3rd party apps. The app textsecure uses aes 128 bit encryption. its open source and entirely free.

both parties have to use the app for end to end encryption if you are the only one with the app then your messages are in cryptid on your phone but could still obviously be intercepted

android phones come with phone and sd card encryption. Open source is the way to go,as people can ensure no backdoors are in the program that would allow access, something apple wouldn't DREAM of doing lol.
 
Isn't encryption the government can't crack technically illegal?
 
Maybe I missed it but from what I got from the article is it only protected from MIM (man in the middle attacks). Plus do not see what grade encryption used.
 
Last edited:
BINGO..



being an Android fan I'd have to agree with the txt messaging, however there are plenty of 3rd party apps. The app textsecure uses aes 128 bit encryption. its open source and entirely free.

both parties have to use the app for end to end encryption if you are the only one with the app then your messages are in cryptid on your phone but could still obviously be intercepted

android phones come with phone and sd card encryption. Open source is the way to go,as people can ensure no backdoors are in the program that would allow access, something apple wouldn't DREAM of doing lol.
 
research professor at Johns Hopkins University, wrote last summer that because iMessage has "lots of moving parts," there are plenty of places where things could go wrong. Green said that Apple "may be able to substantially undercut the security of the protocol" -- by, perhaps, taking advantage of its position during the creation of the secure channel to copy a duplicate set of messages for law enforcement

bottom line open source is the way to go. androids os is open source as is most of the good security 3rd party apps. I wouldn't trust Apple no farther than I could throw them. my fav apps are text secure, (free) safe camera(open source not free). with android encrypted phone and a 16 character pw.
 

Staff online

  • pesty4077
    Moderator/ Featured Member / Kilo Klub
  • Big A
    IFBB PRO/NPC JUDGE/Administrator
  • rAJJIN
    Moderator / FOUNDING Member

Forum statistics

Total page views
559,476,931
Threads
136,096
Messages
2,778,670
Members
160,439
Latest member
locoslave
NapsGear
HGH Power Store email banner
your-raws
Prowrist straps store banner
infinity
FLASHING-BOTTOM-BANNER-210x131
raws
Savage Labs Store email
Syntherol Site Enhancing Oil Synthol
aqpharma
YMSApril210131
hulabs
ezgif-com-resize-2-1
MA Research Chem store banner
MA Supps Store Banner
volartek
Keytech banner
musclechem
Godbullraw-bottom-banner
Injection Instructions for beginners
Knight Labs store email banner
3
ashp131
YMS-210x131-V02
Back
Top