john-berlin wrote:
Your argument would then basically apply to everything encrypted. If you are in possession of the encrypted data, you can always try brute force, sure. But by this logic you would need to declare everything encrypted insecure. Your encryption is always only as strong as your passphrase is.
Not true, because most encrypted data does NOT allow unlimited password attempts. For websites it usually locks after 3 or 4 failed attempts. For an iOS or Mac passcode it slows down at 6 attempts, and locks permanently after a few more. The fact that Apple allows unlimited attempts to guess the backup password is the true vulnerability, but they did that probably because enough people forget that they created a backup password, since it could have been years before. It only prompts for the password once, for the first encrypted backup.
The real problem for websites (and apps) is that if the server that the site runs on is hacked (which is VERY common; there have been hundreds just this year, and let’s not think about EquiFax in 2017 who had 120 million accounts stolen or the US Government Office of Personnel Management system hack of 2015) a brute force attack can be run on the downloaded passwords. That’s why there are stolen plaintext passwords and account IDs available for sale on the dark web. Want to see if yours has been hacked→https://haveibeenpwned.com/?
also you're probably mixing up two things. The passcode you use to unlock your device (the possibly 6 to 8 digit password you're talking about and the one this thread is about) is not the same as the one with which you decrypt your backups. It is a completely separate passphrase which you have to set up during your first backup. Apple could simply require stronger passphrases for this one if they wanted to make bruteforcing harder. And since it's not the same passcode you have to enter every time you take your phone out of your pocket, it wouldn't upset anyone.
I’m not mixing up anything. The backup password is not the same as the iPhone screen passcode (which is 4 or 6 digits, never 8)* OR the Apple ID password unless you make them the same. But it is just another password, probably 6-8 characters chosen by most people. And so far, in trying to help people unlock their encrypted backup, I’ve never encountered anyone who used the same password for their Apple ID or their screen passcode as their backup password.
*iOS allows you to choose an arbitrary length screen unlock passcode, but I suspect the number of people who choose that option can be countered on the thumbs of one hand. Although some devices under MDM do require it.