iOS Encryption and Data Protection
Ask iLounge offers readers the opportunity to get answers to their iPod-, iPhone-, iPad-, iTunes-, or Apple TV-related questions from a member of the iLounge editorial team. We'll answer several questions here each week, and of course, you can always get help with more immediate concerns from the iLounge Discussion Forums. Submit your questions for consideration using our Ask iLounge Submit Form. We reserve the right to edit questions for grammar, spelling, and length.
Q: I’m a bit confused about encryption on the iPad, as I’ve read a few conflicting reports about whether the iPad is actually encrypted at a hardware level or not. I’m looking to deploy a number of iPads in my company that would need to be used to store confidential data, but I can’t seem to find a straight answer to whether I need to find or buy an additional encryption app or whether simply protecting the iPad with a passcode is enough.
A: Technically speaking, the iPad and other current iOS devices provide full hardware encryption of all data stored on the device. However, taken at face value this is actually dangerously misleading in terms of the actual security of information stored on the device, since even the strongest cryptographic algorithms in the world are only as secure as the keys that are being used to manage them.
The problem is that the intent of the default hardware encryption is not to actually secure your data, but instead to simply facilitate a fast secure erase of the device in the event that it needs to be re-provisioned for another user or has been lost/stolen and needs to be remotely erased. The standard hardware encryption essentially uses a device-based encryption key that has no connection to your password or passcode whatsoever—it’s a device-specific key. Data is encrypted in the flash memory in such a way that somebody who removed the flash chips would not be able to read them, which does provide some theoretical security, but this is meaningless in reality unless you’re dealing with a device that is otherwise damaged beyond access through normal means, since a simple jailbreak to bypass the passcode on a functional device will provide open access to everything on the device—it is decrypted transparently as soon as the OS requests access to it.
The real purpose behind the built-in hardware encryption is to allow a device to be securely erased in seconds, rather than hours. Prior to iOS 3.0 and the iPhone 3GS, doing an “Erase all content and settings” operation on an iPhone or iPod touch could take an hour or more, depending on the amount of storage involved. This was because the device actually needed to go through and securely overwrite every bit of flash memory. The hardware encryption introduced with the iPhone 3GS, and found in all subsequent models, allowed a device to be wiped simply by invaliding the encryption key and generating a new one. In this case, all of the data technically remained exactly where it was in flash memory but became inaccessible as the key itself was wiped. This became crucially important particularly with the Remote Wipe features introduced in iOS 3.0, since the alternative was for a remote wipe to take hours, during which time data remained theoretically recoverable.
There is some slightly good news, however, in terms of actual data security. With iOS 4.0, Apple added a new feature known as Data Protection, which does in fact provide secure encryption of data on the device. This is handled by encrypting the selected data using a key derived from your device passcode, meaning that without knowing your passcode, the data truly is inaccessible to all but serious cryptographic attacks. Even if somebody were to jailbreak your device and bypass your passcode, information protected by the Data Protection API would remain encrypted and therefore inaccessible, since your passcode—the important piece of the decryption key, is not known.
Data Protection is enabled automatically simply by setting a passcode on the device. The catch, however, is that the Data Protection feature only secures data in applications that have been specifically designed to use the Data Protection APIs. In terms of built-in applications, that’s only the Mail app, and third-party apps that actually make use of the Data Protection features are surprisingly rare; GoodReader and Box.net come to mind as good examples, but many other file storage apps such as Dropbox do not provide this support, meaning that your cached data is no more secure than your physical possession of the device. This means that if you’re concerned about storing confidential data with secure encryption you will need to look to exclusively using third-party apps that support the Data Protection APIs.
It’s also important to keep in mind that any apps that use iCloud storage cannot use Data Protection, as the two are mutually exclusive due to the requirement for background synchronization of iCloud data when the device is locked. Even GoodReader, for example, notes that documents you choose to store in the “iCloud” section of the app will not be protected by the Data Protection encryption.
Of course even Data Protection is only as secure as the passcode on the device. Using the Apple Configurator you can configure requirements for more complex passcode policies on devices to help improve security in this regard, as well as enabling an automatic erase of the device after a specified number of failed attempts.
- Will removing a credit card from Safari also remove it from Apple Pay?
- Can I mute Handoff calls coming into my Mac from my iPhone?
- How do I keep my iPhone calls from ringing on my Mac?
- Why doesn’t Traffic show up on my Today Notifications Screen?
- Why doesn’t my iPhone reconnect to Wi-Fi after I turn it on?
- Why can’t I see the iPad-style landscape view on my iPhone 6 Plus?
- FTC files complaint against Qualcomm citing royalty deal with Apple
- India mulling manufacturing regulation changes which could woo Apple
- Apple Music creative team discusses the service’s exclusives, future
- Apple raising UK App Store prices by more than 25 percent
- Iovine fuels speculation about Apple’s interest in scripted TV shows
- Report: ‘iPhone 8’ to include upgraded water resistance
- U.S. appeals court resurrects App Store antitrust lawsuit against Apple
- Apple increases maximum tvOS app size to 4GB
- Apple releases fourth iOS 10.2.1 beta
- Apple looking to produce original TV content for Apple Music subscribers
- Revogi Smart Lightbulb, Smart Lightstrip, Smart Candle + Smart Meter Plug
- Audeze iSine10 In-Ear Headphones
- MOCACARE MOCACuff Connected Blood Pressure Monitor
- Apple AirPods
- Elgato Eve Motion
- Olloclip Core Lens Set for iPhone 7/7 Plus
- Logitech Pop Home Switch Starter Pack
- Elgato Eve Light Switch
- iHome iPLWBT5 Docking Clock Radio for iPhone and Apple Watch
- Brydge 12.9 iPad Pro Keyboard
- Top Five: The Best Products for Building a Smart Home with HomeKit
- Instant Expert: Secrets & Features of watchOS 3
- Instant Expert: Secrets & Features of tvOS 10
- Instant Expert: Secrets & Features of iOS 10
- Inside the betas: iOS 10 Photos gets Advanced Computer Vision
- Inside the betas: iOS 10 Music app delivers ‘clarity and simplicity’
- Inside the betas: iOS 10 Maps gets a major redesign
- Inside the betas: iOS 10 shakes up the user experience
- Inside the betas: watchOS 3 promises a real speed boost
- Inside the betas: A sneak peek at what’s new in tvOS 10