this post was submitted on 09 Jan 2024
256 points (96.4% liked)

Privacy

31914 readers
650 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS
 

The Beijing institute developed the technique to crack an iPhone’s encrypted device log to identify the numbers and emails of senders who share AirDrop content, the city’s judicial bureau said in an online post. Police have identified multiple suspects via that method, the agency said, without disclosing if anyone was arrested. “It improves the efficiency and accuracy of case-solving and prevents the spread of inappropriate remarks as well as potential bad influences,” the bureau said.

Further read: https://sfj.beijing.gov.cn/sfj/sfdt/ywdt82/flfw93/436331732/index.html

top 26 comments
sorted by: hot top controversial new old
[–] WhatsThePoint@lemmy.world 106 points 10 months ago* (last edited 10 months ago) (2 children)

Or China is just saying they cracked Air Drop to try to scare protestors from using this feature. If they cracked it, why would they make it public that they cracked it when they could catch dissidents using it without their knowledge? Not to mention making it public puts pressure on Apple to patch it, which would destroy their access. Doesn’t make much sense to make this public if it is true.

[–] drdabbles@lemmy.world 91 points 10 months ago (1 children)

Whenever a government or government agency announces a successful exploit, I presume they've already exhausted it and moved on to another one that won't be patched or publicly divulged for many years.

[–] possiblylinux127@lemmy.zip 5 points 10 months ago (2 children)

I don't buy it. This smells like a way of causing fear in those who want to share information.

[–] hangukdise@lemmy.ml 7 points 10 months ago

¿Por que no Los dos?

[–] BearOfaTime@lemm.ee 4 points 10 months ago* (last edited 10 months ago)

iMessage ~~is insecure~~ security isn't as robust as most people think, and this has been known for years.

People still use it

[–] beta_tester@lemmy.ml 20 points 10 months ago* (last edited 10 months ago) (3 children)

It would be easy for apple to debunk this if it wasn't true. I'd stay away from it and use proven secure means.

[–] TaviRider@reddthat.com 6 points 10 months ago (2 children)

There’s no way to prove that something is secure. (It reduces to the halting problem.)

[–] EngineerGaming@feddit.nl 5 points 10 months ago

You can still have more certainty or less. If it's open-source - it doesn't guarantee safety by any means, sure, but if it's proprietary like this one - you don't even get a chance to check what's going on.

Nothing is ever completely secure if it's connected to the internet. It just likely isn't worth it to hack into. That's why macs used to be "virus proof".

Well, yes, because Windows was a much more lucrative target.

[–] Aatube@kbin.social 3 points 10 months ago

Why would they? They have all their production logistics in China.

[–] Ferk@kbin.social 1 points 10 months ago (1 children)

How can Apple debunk it?

If I told you I know of a way by which I can "hack" the lock of your house to enter it, how can you prove whether I'm lying or not? Specially if I'm not willing to show you how I do it, and I haven't given you any proof of having actually done it that you can try to dispute.

[–] beta_tester@lemmy.ml 1 points 10 months ago (1 children)

sending email and phone number with each airdrop doesn't sound right. Apple isn't a good company but they aren't dumb. Why would you send that info?

[–] Ferk@kbin.social 1 points 10 months ago

They aren't saying that the email/number is part of the message. What the are saying is that they are able to decrypt the logs in order to identify the senders .

It could be they cross-reference matching some internal ids / tokens / physical addresses of the devices together with all the data the Chinese government already has (or can obtain) ...or it could be a bluff.. who knows... there's not enough information, and what we know is probably distorted.

[–] homesweethomeMrL@lemmy.world 20 points 10 months ago (1 children)

Usually when one of Apple’s security measures is breached, the company would issue an update to patch it. We’d hope this will happen here, but the Chinese government is likely to apply pressure on the iPhone maker to leave the exploit unpatched – at least, on Chinese devices.

WELL, Apple? ? . . . We're waiting

[–] rdri@lemmy.world 7 points 10 months ago

Too busy protecting iOS users from iMessages of unauthorized color.

[–] southernwolf@pawb.social 15 points 10 months ago (2 children)

While I have little respect for Apple's overall privacy practices, this sounds a lot like the CCP making something up to scare protesters and dissidents from using AirDrop. There's no sensible reason they would be advertising such an exploit openly, especially when it could potentially be used to secretly spy on dissidents, protesters, or even used in foreign espionage. Something doesn't sit right with this.

[–] BearOfaTime@lemm.ee 8 points 10 months ago

Well if Apple doesn't fix it, like they haven't fixed the iMessage flaws) they've known about for years, then it's still useful.

And most people won't even know of this issue, and they'd still use Airdrop anyway, saying "I'm not interesting enough to spy on".

iMessage lacks forward secrecy, so if I get your RSA key which never changes, I can read all your old messages and any new ones too. And that's just one issue with iMessage. And people don't know about it, and still use it, thinking it's secure. (it's pretty good in my opinion, just wish Apple would fix the issues linked article).

Totally agree. Their logic is to hide and deny everything, and if they say something openly, it's likely a lie.

[–] possiblylinux127@lemmy.zip 14 points 10 months ago* (last edited 10 months ago) (1 children)

Probably not a reliable source but you should still use Foss with strong encryption (RSA2048+ ideally)

[–] Scolding7300@lemmy.world 4 points 10 months ago

For airdrop? There's a foss airdrop?!

[–] ebits21@lemmy.ca 10 points 10 months ago

Oh China, you rascal.

[–] Apollo2323@lemmy.dbzer0.com 6 points 10 months ago

This is a great podcast about the vulnerabilities China has for their own only...

Click Here: 101. Bug bounties with Chinese characteristics

Episode webpage: http://www.recordedfuture.com/podcast

Media file: https://chrt.fm/track/DG79BE/traffic.megaphone.fm/RFEI8990516258.mp3?updated=1704745626

[–] yogthos@lemmy.ml 1 points 10 months ago
[–] kworpy@lemm.ee 0 points 10 months ago (2 children)

You guys are gullible as shit if you think this is real. This is yet another bullshit scare tactic by the Chinese government. Also these articles are hardly even sourced and are just copypasted from other news sites to farm clicks.

[–] possiblylinux127@lemmy.zip 1 points 10 months ago

Yeah this does smell fishy. The Chinese government is quick to manipulate and lie and I doubt they would want to get people not to use a service they can break.

[–] WebTheWitted@beehaw.org 1 points 10 months ago

Ahh, that makes sense. I was wondering, "Why the hell are they announcing their zero day to the Internet?"