Categories: Data Security InfoSec News Trending

End 2 End Encryption (E2EE) Is Finally here, kind of, for Apple Device Backups

Published by
RiSec.n0tst3

According to a new optional feature called Advanced Data Protection, end-to-end encryption will soon be available for the majority of iCloud.

iCloud previously had 14 kinds of protected data. With the addition of this new feature, there are now 23 items, including pictures, voice memos, notes, reminders, Safari bookmarks, and iCloud backups of the data on your devices.

However, not all data is encrypted in this manner. Importantly, the mail and calendar are unaffected.

Apple says they are not covered “because of the need to interoperate with the global email, contacts, and calendar systems.”

Advanced-Data Protection is now available to Apple Beta Software Program users in the US, and it will be made available to additional US citizens before the end of the year. According to Apple, anyone living outside of the US will have to wait until around 2023.

Advanced-Data Protection is the major news for most people, but Apple also revealed two other iCloud privacy and security features. First, YubiKeys-style hardware security keys are now permitted for usage with iCloud. Plug-in and NFC keys are both supported.

Second, there is iMessage Contact Key Verification, which, in some circumstances, can warn “people who confront extraordinary digital threats,” such as journalists, if third parties with governmental backing are intercepting or listening in on their talks.

Along with today’s announcements, Apple confirmed something that most of us already knew: the company is no longer working on a contentious system that was designed to find user-owned iPhones that contained child sexual abuse material. The company changed its mind in response to public concerns about privacy and security.

Suggest an edit to this article

Cybersecurity Knowledge Base

Homepage

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Please login to bookmark Close
Social Comments Box
Connect
Share the word, let's increase Cybersecurity Awareness as we know it

This post was last modified on 8 December 2022 2:35 PM

RiSec.n0tst3

Hello! I'm Steve, an independent security researcher, and analyst from Scotland, UK. I've had an avid interest in Computers, Technology and Security since my early teens. 20 years on, and, it's a whole lot more complicated... I've assisted Governments, Individuals and Organizations throughout the world. Including; US DOJ, NHS UK, GOV UK. I'll often reblog infosec-related articles that I find interesting. On the RiSec website, You'll also find a variety of write-ups, tutorials and much more!

Leave a Comment
Published by
RiSec.n0tst3
Tags: apple Backups

Recent Posts

  • Data Breach News
  • InfoSec News

WH Smith Announces Cyber-Attack: Employee Data Stolen

British high street chain WH Smith has recently revealed that it was hit by a…

2 years ago
  • InfoSec News
  • World Affairs

Voice ID: How Secure is it Really?

As banks worldwide roll out Voice ID as a means of user authentication over the…

2 years ago
  • Cybersecurity Academy
  • InfoSec News

What distinguishes Application Security from API Security?

In the era of digital transformation, cybersecurity has become a major concern for businesses. When…

2 years ago
  • Cybersecurity Academy
  • InfoSec News

The Top 5 Cybersecurity threats facing Businesses Today

In today's digital age, cybersecurity threats have become a significant concern for businesses of all…

2 years ago
  • InfoSec News
  • World Affairs

Enterprise users infected by RIG Exploit Kit thanks to Internet Explorer

The RIG Exploit Kit is currently in the midst of its most productive phase, attempting…

2 years ago
  • Cybersecurity Academy

The Rise and Rise of AI

One of the most transformational technologies of our time, artificial intelligence (AI), has quickly come…

2 years ago