Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

How easy is it to crack into an Apple iCloud account? We tried to find out
The Guardian ^ | September 3, 2014 | Paul Farrell and Nick Evershed

Posted on 09/03/2014 11:51:20 PM PDT by Swordmaker

After the nude celebrity pictures leak, two Guardian Australia journalists try to break into each other’s iCloud accounts

Accessing someone’s Apple account requires only three things: their email address, their date of birth, and the answers to two out of three security questions. This is assuming they don’t have two-step verification enabled.

If you have all these, you’re able to reset their Apple ID password to one that only you know and then access their iTunes and iCloud accounts. You don’t require access to their email. Once you have access to their Apple ID, you can access recent photos and back-ups if they have these features enabled.

While we don’t know the exact method people used to access celebrities’ accounts, Apple did release a statement which appears to confirm that a method similar to that described above was used.

The main issue with this setup is that if you’re a celebrity, or are someone who has been using social media for a long time and revealed various details about your life, then the answers to the security questions could be available online. Here are a few of the 21 security questions you can choose:

The Guardian has seen forum threads where people have allegedly used the methods above to access people’s iCloud back-ups to obtain photos.

To see how difficult it is to crack someone’s account, we’re going to try and access each other’s accounts and see how far we get.

(Excerpt) Read more at theguardian.com ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: icloud
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081 next last

1 posted on 09/03/2014 11:51:20 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; altair; ...
Just how easy is it to break into Apple's iCloud accounts, even when you know things about the person whose account you are trying to break into and are professional researchers? Two Australian Journalists, friends, try to do just that—PING!

ANSWER: Not easy at all!


Apple iCloud SecurityPing!

If you want on or off the Mac Ping List, Freepmail me. http://www.worldwidehippies.com/wp-content/uploads/2011/04/Obama_Howdy_Doodat.jpg

2 posted on 09/03/2014 11:57:20 PM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Be sure and have two-step verification enabled.


3 posted on 09/04/2014 12:07:48 AM PDT by NoLibZone (The bad news: Hillary Clinton will be the next President. The Good news: Our principles are intact.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: NoLibZone

Or supply answers which don’t match the questions asked.

What’s your mothers maiden name? %7!%@#


4 posted on 09/04/2014 12:30:27 AM PDT by chulaivn66 (Meine antwort ist nein. Ende der Debatte. Macht euer Spiel.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: chulaivn66
  Or supply answers which don’t match the questions asked.

  Where was your least favourite job?
  The Death Star

  What was the first car you owned?
  DMC Flying Delorean

   Another method is to use the 'make up your own question' feature if it's offered. Put something like Page 57 where the question really means "What is underlined on page 57 of my favorite book?"
5 posted on 09/04/2014 12:55:56 AM PDT by Maurice Tift (Never wear anything that panics the cat. -- P.J. O'Rourke)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Swordmaker

There are a bunch of naked photos of people floating around that says it is easy enough.

But who cares about that when the real important task is to run cover for Apple?


6 posted on 09/04/2014 2:10:44 AM PDT by VanDeKoik
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I personally keep all the nude selfies I take of myself and all my passwords and account information on my government computer at work. (sarc for those who have difficulties thinking I’m serious).


7 posted on 09/04/2014 2:14:36 AM PDT by maddog55
[ Post Reply | Private Reply | To 1 | View Replies]

To: VanDeKoik
There are a bunch of naked photos of people floating around that says it is easy enough.

Read the article. But you'd rather believe the FUD, in your preferential bias. The photos did not get out because iCloud was cracked or hacked, VanDeKoik, what few accounts that got compromised were breeched because the users allowed themselves to be phished. Researchers have well established how the bad guys got these pictures. . . and one guy went undercover into the group that did it. Where it became apparent they were all upset that one guy broke their code and went "outside" of their trading circles to try and sell images from his collection. They've been getting into celebrity accounts for years. . . by "social engineering." That's why the photographs included long ago deleted pictures, pictures from Windows PC webcams, and photos taken with Android phones. They weren't all from iCloud. Were some massaged from accounts in Apple's iCloud, you bet, but others came from Google, emails, compromised personal computers, wherever these perverts could steal them.

You WANT it to be from Apple's iCloud because that would tie into your extreme case of anti-Apple derangement. That's known as confirmational bias. . . and you do it all the time on Apple threads.

8 posted on 09/04/2014 2:28:56 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 6 | View Replies]

To: maddog55
I personally keep all the nude selfies I take of myself and all my passwords and account information on my government computer at work. (sarc for those who have difficulties thinking I’m serious).

If you work for the IRS, you have nothing to worry about. They'll never be found.

If you work for the EPA, they'll just be lost among all the other porn the employees have been watching at work.

9 posted on 09/04/2014 2:32:34 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 7 | View Replies]

To: VanDeKoik

Read this thread and article VanDeKoik

http://www.freerepublic.com/focus/chat/3200266/posts


10 posted on 09/04/2014 2:41:25 AM PDT by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 6 | View Replies]

To: Swordmaker

Tell that to the Celebs who had their accounts hacked. Oh but that was probably through a security hole they recently patched. Time to move to one drive.


11 posted on 09/04/2014 3:43:35 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

“Were some massaged from accounts in Apple’s iCloud”

“what few accounts that got compromised were breeched because the users allowed themselves to be phished”

But of course it has nothing to do with iCloud. Apple said so, and some guys rushed in to give a demo of wha they think might have happened, and the church of the Jobs says amen.

It’s those stupid people “holding it wrong”.

“You WANT it to be from Apple’s iCloud because that would tie into your extreme case of anti-Apple derangement. That’s known as confirmational bias. . . and you do it all the time on Apple threads.”

LOL!

I dont care where it was from, but I can bet that you were clutching your iPhone waiting for someone to give some tortured cover for Apple so you can rush in and say “see, see, all is well. Apple is blameless”. Like you do whenever that company lands in hot water.


12 posted on 09/04/2014 3:54:51 AM PDT by VanDeKoik
[ Post Reply | Private Reply | To 8 | View Replies]

To: for-q-clinton

Users having guessable passwords is not a security flaw that any company, Apple or otherwise, can fix.


13 posted on 09/04/2014 4:01:25 AM PDT by Ramius (Personally, I give us one chance in three. More tea anyone?)
[ Post Reply | Private Reply | To 11 | View Replies]

To: VanDeKoik
But of course it has nothing to do with iCloud.

Well... It doesn't. I'm not here to defend Apple but when people are careless with their own passwords and security questions it's their own dumb fault when they get hacked.

14 posted on 09/04/2014 4:06:36 AM PDT by Ramius (Personally, I give us one chance in three. More tea anyone?)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Swordmaker

I never use actual answer.


15 posted on 09/04/2014 4:51:54 AM PDT by Raycpa
[ Post Reply | Private Reply | To 1 | View Replies]

To: chulaivn66
What’s your mother's maiden name? %7!%@#

Actually, some guys (and gals) might use such a name to describe their mother-in-law.
16 posted on 09/04/2014 4:58:19 AM PDT by Dr. Sivana ("If you're litigating against nuns, you've probably done something wrong."-Ted Cruz)
[ Post Reply | Private Reply | To 4 | View Replies]

To: chulaivn66

Exactly what I was thinking. Choose a different birthday, for instance. Just so long as you can remember.


17 posted on 09/04/2014 5:14:12 AM PDT by ops33 (Senior Master Sergeant, USAF (Retired))
[ Post Reply | Private Reply | To 4 | View Replies]

To: chulaivn66
What’s your mothers maiden name? %7!%@#

Hard to remember.

It's better to come up with a system that will generate replicable results, but will somewhat obscure the answers.

One method might be to run your answers through rot13.

echo Zeugma | rot13
Mrhtzn
 

Yeah rot13 isn't a secure encryption mechanism, but it obfuscates your answer enough to defeat some random joe from guessing it.

Alternately, use a hash program to generate a predictable hash.

echo Zeugma | sha1sum
4a8e7fd115c3b65b01f42fa64c58fc3e8abe960e  -

In this case, you can choose the first 8, last 8, or any combination thereof to create a pretty darn good random answer that is yet easily reproducable yet almost completely unguessable.

There are phone apps for hashing text using any of several different hash algorythms.

I'm a nerd, so stuff like this is pretty easy for you, but a little effort expended to obfuscate these kind of answers can go a long way towards ensuring your security from the casual hackers.

 

18 posted on 09/04/2014 11:24:29 AM PDT by zeugma (The act of observing disturbs the observed.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Ramius

No but security holes and unencrypted communications are.


19 posted on 09/04/2014 11:37:23 AM PDT by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 13 | View Replies]

To: All

20 posted on 09/04/2014 11:45:52 AM PDT by maggief
[ Post Reply | Private Reply | To 2 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson