Skip to main content

Apple promises to patch iMessage encryption flaw with iOS 9.3

how to save text messages
Kritchanut/Shutterstock
Although Apple’s encryption standards are quite high, the company’s software is not immune to hacks. Recently, a group of Johns Hopkins University researchers found a flaw in Apple’s iMessage platform that would allow a skilled hacker to decrypt photos and videos.

The flaw stems from the way in which iMessages are encrypted and how they’re then sent through Apple’s servers. Professor Michael Green, a computer scientist at JHU who led the research, told the Washington Post that he first began to suspect issues with the iMessage encryption last year after reading an Apple security guide on the encryption process. To test out his theory, he began poking around with iPhones that were not using the latest operating system on iMessage.

“We appreciate the team of researchers that identified this bug and brought it to our attention so we could patch the vulnerability.”

Green and his colleagues attempted to intercept iMessages by writing software that pretended to be an Apple server. The encrypted transmission the team targeted was photo stored on Apple’s iCloud server and the 64-digit key needed to decrypt the photo. Although the researchers were unable to actually see the key’s digits, they could use a process of trial and error to figure it out. The team changed a single digit or letter in the key and resubmitted it to the target phone. Every time they guessed right, the phone accepted it. After thousands of attempts, they had the complete key.

Once the researchers had the key, they were able to grab the photo directly from Apple’s server in a move that would’ve been totally undetectable by the user. Of course, this hack requires a great deal of skill and dedication, so it’s unlikely that your iMessages are under attack.

Even so, Apple responded quickly to the news, thanking the researchers for alerting the company about the flaw in iMessage.

“Apple works hard to make our software more secure with every release,” the company said in a statement. “We appreciate the team of researchers that identified this bug and brought it to our attention so we could patch the vulnerability … Security requires constant dedication and we’re grateful to have a community of developers and researchers who help us stay ahead.”

Apple promised a full fix with the release of iOS 9.3 on March 21. In order to fully protect iMessages from this hack, Green urges users to update their software as soon as iOS 9.3 comes through.

“It scares me that we’re having this conversation about adding back doors when we can’t even get basic encryption right.”

He also referred to the importance of sealing holes in encrypted products in light of the upcoming Apple vs. FBI court case.

For those who haven’t been following the saga, the case revolves around Apple’s refusal to create a back door for the government and U.S. law enforcement. The back door would allow the FBI to circumvent iOS security features and hack into one of the San Bernardino shooters’ iPhones. Apple argues that creating a back door would be dangerous and open up its devices to greater attacks from hackers. It could also set a dangerous precedent that would allow law enforcement to demand access to any Apple device.

Based on his statements, Green agrees with Apple in the encryption debate. He stated that the iMessage flaw would not have helped the FBI gain access to the shooter’s iPhone and warned that creating unassailable encryption is hard enough without there being a pre-existing back door for hacking into a secure device.

“Even Apple, with all their skills — and they have terrific cryptographers — wasn’t able to quite get this right,” says Professor Michael Green, who led the team responsible for discovering the bug. “So it scares me that we’re having this conversation about adding back doors to encryption when we can’t even get basic encryption right.”

Green’s team is slated to publish a paper on their findings in the near future.

Editors' Recommendations

Lulu Chang
Former Digital Trends Contributor
Fascinated by the effects of technology on human interaction, Lulu believes that if her parents can use your new app…
An Apple insider just revealed how iOS 18’s AI features will work
An iPhone 15 Pro Max laying face-down outside, showing the Natural Titanium color.

As Apple’s Worldwide Developers Conference (WWDC) inches closer, the chatter around the company’s AI work has taken a feverish turn. In a year when smartphone and computing brands have focused solely on AI niceties, Apple has been uncharacteristically silent around the AI hype — eliciting concern about the brand missing the train.

However, a new report has given us a closer look at how Apple's AI dreams may come to fruition with its iOS 18 update later this year.
New details on Apple's AI plans

Read more
This one thing could make iOS 18 the best iPhone update in years
The Home Screen on the iPhone 15 Pro Max.

Apple’s WWDC 2024 is just a couple of months away. As with every WWDC, we’ll see what Apple has in store for the next generation of software across its hardware portfolio, including the iPhone with iOS 18.

Rumors have been swirling about iOS 18 and how it will be “one of the biggest updates yet.” We know some features like RCS support in Messages are definitely coming, with other whispers of big home screen customization changes and more.

Read more
When will Apple release iOS 18? Here’s what we know
An iPhone 14 laying face-down on a wood table.

Apple's annual Worldwide Developers Conference (WWDC) will start on Monday, June 10. During the conference keynote, the company is expected to unveil new software updates for its major products, including iOS 18 for iPhones.

iOS 18 is expected to be a major iPhone update, likely ushering in a new design and AI features. If you are wondering when you can get your hands on the latest software version, here's everything you need to know about iOS 18's release date.
When will the iOS 18 beta be released?

Read more