Readit News logoReadit News
lapcat · a year ago
A crucial point to understand: unbeknownst to me, my passwords ended up on a device that I didn't specifically authorize to download them.

The good news is that the device is owned by me and under my control. However, since it's just a test machine with no personal data—or so I believed—it's less protected than my other devices. For example, it has a weak login password, no Filevault, and no biometrics (Mac mini).

In general, the presence of my passwords in the cloud is an unwanted and unnecessary liability for me. I understand that for other people, cloud storage is a benefit, and I don't wish to deprive them of that choice. Nonethless, Apple deprived me of a choice in this case.

npteljes · a year ago
>[manufacturer] deprived me of a choice in this case

This seems to be the industry trend with these remotely managed machines, like Apple or Windows PCs. The update mechanism, for better or worse, takes power from the user and assigns it back to the manufacturer / service provider. It's something that the software world would have considered a Trojan horse some 20 years ago, an extension of control to the end users machine, for someone other than the end user themselves.

I'm not sure where I'm going with this. What's for sure is that the IT zeitgeist really changed over the decades.

mixmastamyk · a year ago
The war on general purpose computing has already been won, over the average consumer.

Pray they don’t finish the job. </Vader>

adamc · a year ago
Might be good for some "average" user but strikes me as bad for software developers or other folks with particular need for tight control.
jesseendahl · a year ago
@lapcat I noticed this part of your post:

>The only way to see the contents of iCloud Keychain is on an Apple device with iCloud Keychain enabled. You can't even see anything on the icloud.com website.

FYI this is because of all contents of iCloud Keychain are end-to-end encrypted, such that only your devices are able to decrypt the data. Apple’s servers do not have access to the contents of a user’s iCloud Keychain.

You might find this article interesting:

https://support.apple.com/guide/security/icloud-keychain-sec...

Also the second part of this Blackhat talk, titled “Synchronizing Secrets” is very interesting and details the design and security architecture of iCloud Keychain: https://youtu.be/BLGFriOKz6U

The relevant part of the talk starts at 22:40.

claviska · a year ago
I had a similar but more concerning experience. I enabled family sharing (years ago when it was newer) and suddenly my spouse had access to many (all?) of MY passwords in HER keychain. I never knowingly granted access or put any passwords in a non-personal group — it just happened like magic.
mcsniff · a year ago
The device isn't "owned by you and under your control" if your passwords were synced without your doing or permission.
lapcat · a year ago
> The device isn't "owned by you and under your control" if your passwords were synced without your doing or permission.

Why are you being repeatedly, needlessly pedantic? Everyone knows what I meant (including you, who chose to misinterpret). Your other comment was also pointless: "that's still choosing Mac over Linux and every day you continue to make that choice." https://news.ycombinator.com/item?id=42016888

You can play with your own ultra-strict definitions of "own" and "choose", but please do it in your own mind, and don't pester us with them in these comments. It adds absolutely nothing to the conversation.

EasyMark · a year ago
wouldn't you assume that if you log into a machine with your apple "cloud" credentials that various programs would sync up? I don't see how it could happen any other way? It would be nice if they had a pop up like they do for app permissions though. Perhaps submit a radar on it as a regular user? https://lickability.com/blog/5-tips-for-filing-radars/
retrochameleon · a year ago
No. Not without allowing me to configure what gets synced and what does not.
neuralRiot · a year ago
I don’t know if it’s true but when backing up locally via Itunes it warns you that if you don’t encrypt the backup, passwords won’t be saved. I don’t save backups on icloud.
tonyedgecombe · a year ago
> Apple deprived me of a choice in this case.

Settings -> Apple ID -> iCloud -> iCloud Passwords & Keychain -> Sync this Mac

In general though having a weak password on a device logged in to iCloud is a bad idea.

lapcat · a year ago
> Settings -> Apple ID -> iCloud -> iCloud Passwords & Keychain -> Sync this Mac

You clearly didn't even read the article. The whole point was that Apple silently toggled this on without my knowledge or consent.

ellisv · a year ago
Apple refers to this as escrow and is a feature* of their secure iCloud Keychain recovery.

[*] They consider it a feature; you may not.

[1] https://support.apple.com/guide/security/secure-icloud-keych...

[2] https://support.apple.com/guide/security/escrow-security-for...

InMice · a year ago
The most obnxious aspect of owning an iphone for me. Apple turns icloud syncing on by default for everything, not just password management. Photos, browsing history etc. there should be an account setting that lets you turn this off completely no matter what device you sign into with your icloud account. Completely obnoxious, my icloud photos is a total mess of triple and double copies of photos going back decades i recently had no idea it was even syncing. All from signing in then having stop automatic syncing. I now only sign in when the device has fresh reset so i can immediately turn all the syncing off. This should be an account wide option that applies to any all current and future device sign ins.
musicale · a year ago
I hate default on for cloud sync. It should be opt-in.
musicale · a year ago
To clarify, Apple is often good about requiring opt-in for a bunch of features, especially privacy-related features, and I appreciate that. Unfortunately there are some annoying corner cases, such as having to manually disable iCloud sync for photos (etc.), or the issue that OP ran into with having iCloud keychain re-enable itself after being turned off. It also used to be easier to actually turn off wi-fi and bluetooth without them reactivating automatically. I understand why they made it harder (to reduce complaints and support calls/appointments for AirDrop/AirPods/Apple watch/etc. not working due to user settings) but I would have preferred an alternative approach of making it simple and obvious how to fix any AirDrop or other issues while preserving the ability to easily turn off wi-fi.
rkagerer · a year ago
The blurring distinction between local and cloud has gotten so bad that not even a nerd can tell if their device is respecting the privacy border.
atoav · a year ago
It begins with the choice of operating system. Getting Windows/OSX to not phone home is one thing, ensuring it stays that way as the updates come in is another can of worms entirely.
hhh · a year ago
It’s pretty easy in macos, you turn off the features explicitly labeled as such in the nice icloud settings menu, or you never log into icloud in the first place
Refusing23 · a year ago
thats how cloud stored password managers work..
coldtea · a year ago
They silently enable the option to store in the Cloud on OS update?

They offer no option to delete your passwords from the Cloud once there?

If that's indeed how they all/always work, we shouldn't just Stockholm-syndrome accept it!

gruez · a year ago
>They offer no option to delete your passwords from the Cloud once there?

Seems pretty trivial to download the icloud windows client (which has password manager support), and modify/delete the passwords there?

threeseed · a year ago
You just open Keychain/Passwords and delete the passwords.

Has been this way for at least a decade.

nicce · a year ago
> They offer no option to delete your passwords from the Cloud once there?

Does it matter tho. Like in general internet, once something is posted, it will not disappear with certainty. We can never be certain that there is a copy of the encrypted password on some log file when we have no visibility into that sytem. Since it is encrypted, it passes the regulation checks.

That is just a UI bug if passwords keep coming back in the cloud/you still see them. Unless there is a system in place that can transparently verify that indeed, the passwords are deleted, does it matter?

a2128 · a year ago
Normally you have to explicitly install and use a cloud stored password manager, automatically making the choice for you is a big no-no
stouset · a year ago
If you don’t want it, don’t store your passwords in it?
acdha · a year ago
A decade ago this was more true but all of the major browsers include a cloud password manager now, and this is very popular with normal people because it means a lost or failed device doesn’t mean they have to go through a bunch of password resets.

The big question here is whether there’s a reproducible way that the opt-in changes. iCloud Keychain has robust end to end encryption but it still needs to inform the user.

hello0904 · a year ago
Well, the real problem is iCloud Keychain is essentially a "black box" system. Apple does use AES encryption in various parts of their security architecture, as documented in their security white papers. But we can't confirm the specific implementation details for iCloud Keychain.

And you should also know...

Best practices for password storage use one-way hash functions (like bcrypt, Argon2, or PBKDF2).

chrisBob · a year ago
> Best practices for password storage use one-way hash functions (like bcrypt, Argon2, or PBKDF2) rather than encryption algorithms like AES.

That is true if you are running a service that USES passwords. In that case you just need to confirm they match. That is not true if you are running a password manager where the user needs to be able to get their plain text password back out of the system.

threeseed · a year ago
Keychain is documented here and is encrypted using AES-256-GCM:

https://support.apple.com/en-au/guide/security/secb0694df1a/...

It’s then stored in iCloud as a SQLite file and encrypted as it does for your other synced data.

nicce · a year ago
The whole OS is a blackbox. We trust that keyloggers are not everywhere. We need to trust completely or not at all. I think there is nothing between when the same vendor also supplying the underlying closed-source OS.
neilv · a year ago
All the trust-us data-grabby pushes by Apple products creeped me out, until I finally got rid of their products.

For example, although I laboriously went through a ton of settings to make it less privacy-invading, I knew, for example, that I was still only one fumbled touch to a piece of glass away from Apple saying, "Oh, hey! I just grabbed all of your photos! Forever!" (Then Apple would say "Thanks!" in a sunny Californian way that normally is not every meaningful, but accidentally takes on meaning in the era of surveillance capitalism and AI training data.)

rkagerer · a year ago
What do you use now instead?
neilv · a year ago
For smartphone, GrapheneOS.

For tablet, I was using a PocketBook ereader (which works fine airgapped, and is friendly towards DRM-free ebooks, and doesn't need jailbreaking).

For most purposes, Debian Stable on my laptop, and on my GPU server.

thunky · a year ago
Passwords should be going the way of the dodo anyway.

They've been mostly reduced to single-use tokens thanks to password change policies.

And they're no better than email verification codes, which can be used to change the password anyway.

Veen · a year ago
This may be annoying, but it’s uploading encrypted versions of passwords, not passwords themselves. Keychain is end-to-end encrypted so no one else can read them.
kevincox · a year ago
End-to-end encrypted but Apple issues the keys when you log in and I don't think they offer any way to require explicit verification of new devices.
mabedan · a year ago
When importing the passwords into a new devices you’re required to enter the device password of whatever device created the password initially.

Still no proof that there’s no back door, but as far as the system on the surface goes, it does make sense.

quyleanh · a year ago
Are you sure Apple can’t read them too?
Veen · a year ago
They say they can’t, but it’s impossible to be certain. Although, if you distrust Apple enough to think they might lie about it, you probably wouldn’t want to use any Apple device or services. They already have privileged access to the software and hardware.
blitzar · a year ago
Are you sure AES 256-bit hasn't been broken?
leephillips · a year ago
How do you know?
gruez · a year ago
https://support.apple.com/en-us/102651

>Passwords and Keychain (6): End-to-end

misja111 · a year ago
Why do you want to know?
avazhi · a year ago
If they are uploading the PW and not the hash then… they are uploading the passwords themselves, encrypted or not.

And guess who has the decryption keys…?

threeseed · a year ago
Of course. Apple has to decrypt the passwords when it pre-fills the browser.

And the decryption keys are stored on your devices in the Secure Enclave. Apple doesn’t have the keys on their servers.

Deleted Comment