Google has introduced a new feature called Restore Credentials which saves your app login info and restores it seamlessly on new devices.
I feel like I read a new article with Apple IDs being leaked every year.
looks like there there have been six major apple data leaks since the 2014 incident you’re talking about, so a major leak based on exploits every year and a half, and then there’s also all the individual articles that pop up with someone saying they received notification that they’re iCloud data or Apple ID was leaked, which I don’t know the frequency of but I see all the time.
https://firewalltimes.com/apple-data-breach-timeline
https://discussions.apple.com/thread/254140360?sortBy=rank
seems to happen fairly often.
I think these are different. They mostly find vulnerability in the iOS system as opposed to try to crack the backup system.
I think iOS or Android backup system are rather secure compared to other components because of the following: hacker will also need to break into a cloud drive to retrieve them, which adds extra work; the backup is simple, just bunch of files and a password, apple/google can use standard well-tested encryption to encrypt them.
However, guaranteeing there is no way to break into an operating system, especially with all the features that a modern system requires, is much harder.
yeah, these data leaks are all about break into iOS specifically to access iCloud data and accounts, I don’t know about their backup servers.
If they can get the data up front, why go around the back?
The iCloud leak from 2014 was all leaked login information also, it’s why they finally implemented encryption.
oh but Apple officially says that the 2014 attack was only due to fishing and brute Force attacks.
idk, enforcing encryption directly after that was a good idea, but I doubt they would do it unless it was necessary or vulnerable.
Thanks for the links! apparently apple seems to deal with breaches quite well, and at least in the firewall times article most of the Breaches were not on really caused by apple and they reacted anyways. Exceptions are the pegasus hack, but no software is secure, and the exploit got patched.
surr… that’s how breach timelines go in general, it’s a lot easier to “hack” lax security procedures directly or for third parties that Apple or Microsoft shares sensitive information with than it is to attack any database directly.