Hacker News new | past | comments | ask | show | jobs | submit login

> Cryptographers who design these systems do consider the threat of a malicious future iteration of the company and thus try to reduce the trust in a centralized authority.

It’s no use. All the opaqueness to Apple relies on

> This private key pair and the secret are never sent to Apple and are synced only among the user’s other devices in an end-to-end encrypted manner using iCloud Keychain.

Which is trivial to compromise from Apple. They do their best to minimize trackability from third parties though.




> Which is trivial to compromise from Apple.

Explain this? Since both Apple and security researchers have worked on provable trust.


Provable how? iOS software is closed source and unverifiable. New code can be added to send any data anywhere at any point. Explain to me how you prove closed source software won’t send data under its control ever.

And we don’t even need to go as far as key exchanges, and forget about Find My. Maybe those are better protected and it’s harder for them to pull a sneaky without someone noticing. The location data of your phone isn’t in Secure Enclave and the OS can do whatever the hell it likes with it, good luck verifying a huge closed source OS which phones home all the time isn’t sending your location home. At the end of the day you’re trusting them (or just don’t care because you probably aren’t pissing off TLA, which is certainly true in my case), provable security is extremely limited.


iCloud Keychain escrow data is encrypted by HSM clusters that have administrator keys destroyed; if Apple tried to compromise a keychain by installing malicious HSMs users would first get notified that their data had been lost due to failed/destroyed HSMs.


See my response to sibling. Explain to me how you prove iOS software can’t be malicious.


Explain to me how you can prove…

1. You aren’t a troll posing as a human

2. That if you are a human, that you won’t die in the next hour.

3. That if you don’t die today, that the Earth won’t be impacted by an asteroid this year.


Trusted computing is a technical concept. People use Bitcoin because it’s provably secure against clearly outlined threats, not because they trust some vendor. Apple and a certain group of fans want to present iOS as a trusted computing platform for certain use cases, but it’s not.

Anyway, I see you’re just trolling here, so there’s no point talking to you.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: