deciphertools.com

Encryption Bugs in iPhone Backups

Tap here to send yourself this article and receive a 10% coupon code!

I've been investigating a pretty cruddy iPhone backup bug this past week. The bug goes something like this:

What has silently happened behind the scenes is complicated, but I'll try to summarize:

I've seen this issue in other backups, that were not made immediately following an incomplete backup. There are a few other causes for backups to stop midstream that may cause this issue. But also, more importantly, the issue will remain in old data as future backups are made incrementally on top of this buggy backup.

I'm going to file this in my (growing) set of unintended consequences of large capacity iPhones making larger and larger backups.

Decipher Backup Repair will fix the backup so it can restore, but some data will be lost in the repaired backup (the files encrypted with the keys that we don't have). On a happy note, there are a lot of similar scenarios that we fully fix the backup with no data loss in Decipher Backup Repair. But back to this specific case, I'd like to take a second to address the question: why can't we just rebuild the missing encryption keys?

The short answer is that if we could rebuild the missing encryption keys, these encrypted backups wouldn't be very secure ☹ (someone wanting to get into your encrypted backup would just rebuild the keys!) The longer answer is that the keys are randomly generated, and given how strong the encryption is, it would take approximately the lifetime of the known universe to guess one of the keys. And we would need to guess two or three keys at least.

If I can just toss out a quick public service announcement: If you get an error that you've run out of disk space while making an iPhone backup, go in and delete your partial iPhone backup before clearing out some space and trying again!

Write A Comment

Decipher Tools Home

San Francisco / Phoenix, USA

© 2024 Decipher Media, LLC. · Privacy