this post was submitted on 09 Jan 2024
271 points (96.6% liked)

Privacy

32130 readers
861 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

The Beijing institute developed the technique to crack an iPhone’s encrypted device log to identify the numbers and emails of senders who share AirDrop content, the city’s judicial bureau said in an online post. Police have identified multiple suspects via that method, the agency said, without disclosing if anyone was arrested. “It improves the efficiency and accuracy of case-solving and prevents the spread of inappropriate remarks as well as potential bad influences,” the bureau said.

Further read: https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html

all 47 comments
sorted by: hot top controversial new old
[–] [email protected] 113 points 10 months ago* (last edited 10 months ago) (2 children)

Or China is just saying they cracked Air Drop to try to scare protestors from using this feature. If they cracked it, why would they make it public that they cracked it when they could catch dissidents using it without their knowledge? Not to mention making it public puts pressure on Apple to patch it, which would destroy their access. Doesn’t make much sense to make this public if it is true.

[–] [email protected] 97 points 10 months ago (1 children)

Whenever a government or government agency announces a successful exploit, I presume they've already exhausted it and moved on to another one that won't be patched or publicly divulged for many years.

[–] [email protected] 5 points 10 months ago (2 children)

I don't buy it. This smells like a way of causing fear in those who want to share information.

[–] [email protected] 7 points 10 months ago

¿Por que no Los dos?

[–] [email protected] 4 points 10 months ago* (last edited 10 months ago)

iMessage ~~is insecure~~ security isn't as robust as most people think, and this has been known for years.

People still use it

[–] [email protected] 36 points 10 months ago (2 children)

Apple has been taking massive Ls after Ls wrt the security of their iPhones in recent times. It's almost as if magically branding your products "private and secure" doesn't work.

[–] [email protected] 17 points 10 months ago (2 children)

Finding an exploit created by state-level actor is not a massive L. They have shown in the past that they are able to hack air gaped systems, weaken commonly used security standards and implant vulnerabilities into commercial software. I don't think you will find a company that is immune to this. Other than that, did they really have so many security issues recently?

[–] [email protected] 5 points 10 months ago* (last edited 10 months ago) (1 children)

Read the article. The exploit was found by the state actors not created by them. Apple is ultimately responsible for the mishap due to the insecure design of the aforementioned feature.

Even though China partially had a hand in the creation of this flaw according to the history of the feature.

And yes, Apple has been a constant feature on the news for such privacy leaks of late. You just haven't been paying attention.

[–] [email protected] 6 points 10 months ago

If state actor would create it it would be a backdoor. Exploits are by definition bugs/security issues that can be.... well, exploited and state-level actors are really good at finding them. Still, if it takes resources of state actor to find an exploit I don't think it's a massive L. Yes, it's totally possible they had some other serious security issues recently and I haven't been paying attention. That's why I'm asking.

[–] [email protected] 3 points 10 months ago* (last edited 10 months ago) (1 children)

Ordering your hardware from China makes it a tad bit easier to shoehorn backdoors in it.

[–] [email protected] 7 points 10 months ago (1 children)

That's... basically all hardware these days...

[–] [email protected] 1 points 10 months ago

Indeed 😬

[–] [email protected] 20 points 10 months ago (1 children)

Usually when one of Apple’s security measures is breached, the company would issue an update to patch it. We’d hope this will happen here, but the Chinese government is likely to apply pressure on the iPhone maker to leave the exploit unpatched – at least, on Chinese devices.

WELL, Apple? ? . . . We're waiting

[–] [email protected] 7 points 10 months ago

Too busy protecting iOS users from iMessages of unauthorized color.

[–] [email protected] 15 points 10 months ago* (last edited 10 months ago) (1 children)

Probably not a reliable source but you should still use Foss with strong encryption (RSA2048+ ideally)

[–] [email protected] 5 points 10 months ago

For airdrop? There's a foss airdrop?!

[–] [email protected] 15 points 10 months ago (1 children)

While I have little respect for Apple's overall privacy practices, this sounds a lot like the CCP making something up to scare protesters and dissidents from using AirDrop. There's no sensible reason they would be advertising such an exploit openly, especially when it could potentially be used to secretly spy on dissidents, protesters, or even used in foreign espionage. Something doesn't sit right with this.

[–] [email protected] 9 points 10 months ago

Well if Apple doesn't fix it, like they haven't fixed the iMessage flaws) they've known about for years, then it's still useful.

And most people won't even know of this issue, and they'd still use Airdrop anyway, saying "I'm not interesting enough to spy on".

iMessage lacks forward secrecy, so if I get your RSA key which never changes, I can read all your old messages and any new ones too. And that's just one issue with iMessage. And people don't know about it, and still use it, thinking it's secure. (it's pretty good in my opinion, just wish Apple would fix the issues linked article).

[–] [email protected] 11 points 10 months ago

Oh China, you rascal.

[–] [email protected] 7 points 10 months ago

This is a great podcast about the vulnerabilities China has for their own only...

Click Here: 101. Bug bounties with Chinese characteristics

Episode webpage: http://www.recordedfuture.com/podcast

Media file: https://chrt.fm/track/DG79BE/traffic.megaphone.fm/RFEI8990516258.mp3?updated=1704745626

[–] [email protected] 3 points 10 months ago* (last edited 10 months ago)

only reason that I can see why they're saying they've done this has to be some kind of scare tactic

would be a bit stupid to reveal this hand otherwise

[–] [email protected] 2 points 10 months ago