You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

💡 Did you know?

⏺ If you can't accept iCloud Terms and Conditions... Learn more >

⏺ If you don't see your iCloud notes in the Notes app... Learn more >

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

is apple truly able to access the messages in my iCloud backup? or is that false?

I've heard it both ways... messages in iCloud are encrypted and cannot be read by anyone but you and who you send them to... I've also heard that apple keeps the encryption keys and can access messages in iCloud backups....


which is true?

iPhone 11 Pro Max, iOS 13

Posted on Nov 13, 2020 4:47 PM

Reply
Question marked as Top-ranking reply

Posted on Nov 13, 2020 6:23 PM

Don’t believe the internet FUD. See -> iCloud security overview - Apple Support (my emphasis added)


End-to-end encrypted data

End-to-end encryption provides the highest level of data security. Your data is protected with a key derived from information unique to your device, combined with your device passcode, which only you know. No one else can access or read this data.

These features and their data are transmitted and stored in iCloud using end-to-end encryption:

  • Apple Card transactions (requires iOS 12.4 or later)
  • Home data
  • Health data (requires iOS 12 or later) 
  • iCloud Keychain (includes all of your saved accounts and passwords)
  • Maps Favorites, Collections and search history (requires iOS 13 or later)
  • Memoji (requires iOS 12.1 or later)
  • Payment information
  • QuickType Keyboard learned vocabulary (requires iOS 11 or later)
  • Safari History and iCloud Tabs (requires iOS 13 or later)
  • Screen Time
  • Siri information
  • Wi-Fi passwords
  • W1 and H1 Bluetooth keys (requires iOS 13 or later)

To access your data on a new device, you might have to enter the passcode for an existing or former device.

Messages in iCloud also uses end-to-end encryption. If you have iCloud Backup turned on, your backup includes a copy of the key protecting your Messages. This ensures you can recover your Messages if you lose access to iCloud Keychain and your trusted devices. When you turn off iCloud Backup, a new key is generated on your device to protect future messages and isn't stored by Apple.”



Apple has no access to your encryption keys, because they don’t know your device screen lock passcode. If you want maximum security and privacy, switch to a complex passcode instead of a screen lock passcode (4 or 6 digit) and use FaceID or touchID for your own normal access. My device screen lack passcode is a ten alpha-numeric password with case change, letters and numbers and at least one special character. Since 99% of the time I’m using touchID or FaceID to get into my devices, I simply store that password in my encrypted password manager and Keychain in case I did ever forget it. Since I use the actually passcode so rarely, there is no reason not to make it a complex one.


There is also a wealth of information about Apple’s privacy policy and data access in the multiple documents at -> Legal - Privacy Policy - Apple


In particular, note this -> https://www.apple.com/privacy/government-information-requests/

Apple has never created a backdoor or master key to any of our products or services. We have also never allowed any government direct access to Apple servers. And we never will.


Apple has been saying that for years and years now, despite some very public government and law enforcement pressure to change that attitude, and their public annoyance that their pressure has not changed that statement.


4 replies
Question marked as Top-ranking reply

Nov 13, 2020 6:23 PM in response to haili114

Don’t believe the internet FUD. See -> iCloud security overview - Apple Support (my emphasis added)


End-to-end encrypted data

End-to-end encryption provides the highest level of data security. Your data is protected with a key derived from information unique to your device, combined with your device passcode, which only you know. No one else can access or read this data.

These features and their data are transmitted and stored in iCloud using end-to-end encryption:

  • Apple Card transactions (requires iOS 12.4 or later)
  • Home data
  • Health data (requires iOS 12 or later) 
  • iCloud Keychain (includes all of your saved accounts and passwords)
  • Maps Favorites, Collections and search history (requires iOS 13 or later)
  • Memoji (requires iOS 12.1 or later)
  • Payment information
  • QuickType Keyboard learned vocabulary (requires iOS 11 or later)
  • Safari History and iCloud Tabs (requires iOS 13 or later)
  • Screen Time
  • Siri information
  • Wi-Fi passwords
  • W1 and H1 Bluetooth keys (requires iOS 13 or later)

To access your data on a new device, you might have to enter the passcode for an existing or former device.

Messages in iCloud also uses end-to-end encryption. If you have iCloud Backup turned on, your backup includes a copy of the key protecting your Messages. This ensures you can recover your Messages if you lose access to iCloud Keychain and your trusted devices. When you turn off iCloud Backup, a new key is generated on your device to protect future messages and isn't stored by Apple.”



Apple has no access to your encryption keys, because they don’t know your device screen lock passcode. If you want maximum security and privacy, switch to a complex passcode instead of a screen lock passcode (4 or 6 digit) and use FaceID or touchID for your own normal access. My device screen lack passcode is a ten alpha-numeric password with case change, letters and numbers and at least one special character. Since 99% of the time I’m using touchID or FaceID to get into my devices, I simply store that password in my encrypted password manager and Keychain in case I did ever forget it. Since I use the actually passcode so rarely, there is no reason not to make it a complex one.


There is also a wealth of information about Apple’s privacy policy and data access in the multiple documents at -> Legal - Privacy Policy - Apple


In particular, note this -> https://www.apple.com/privacy/government-information-requests/

Apple has never created a backdoor or master key to any of our products or services. We have also never allowed any government direct access to Apple servers. And we never will.


Apple has been saying that for years and years now, despite some very public government and law enforcement pressure to change that attitude, and their public annoyance that their pressure has not changed that statement.


Nov 14, 2020 3:36 PM in response to Michael Black

Also,

In regards to iCloud "If Apple uses third-party vendors to store your data, we encrypt it and do not give them the keys, so they can’t access your data. Apple retains the encryption keys in our own data centers, so you can back up, sync, and share your iCloud data. iCloud Keychain stores your passwords and credit card information in such a way that Apple cannot read or access them."


https://www.apple.com/privacy/features/


Please help clarify.

Nov 14, 2020 3:10 PM in response to Michael Black

"If you have iCloud Backup turned on, your backup includes a copy of the key protecting your Messages. This ensures you can recover your Messages if you lose access to iCloud Keychain and your trusted devices"


"Apple has no access to your encryption keys, because they don’t know your device screen lock passcode. "


This doesn't make sense.


is apple truly able to access the messages in my iCloud backup? or is that false?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.