A Formal Analysis of Apple's iMessage PQ3 Protocol [pdf]

iMessage E2EE vs iCloud Backups

  • Main criticism: Apple markets iMessage as end‑to‑end encrypted, yet by default a copy of the Messages-in-iCloud encryption key is stored in iCloud backup, letting Apple decrypt message history.
  • Turning off “Messages in iCloud” doesn’t fully solve it: messages then go into standard iCloud backup, which is not E2EE.
  • Net effect: unless cloud backup is fully disabled or ADP is used, Apple can read most iMessages, and law enforcement can obtain them in plaintext.

Advanced Data Protection (ADP) and Defaults

  • ADP makes iCloud Backup and Messages keys truly E2EE, but it’s off by default and unavailable in some regions (e.g. UK).
  • Even if you enable ADP, your messages remain exposed if recipients don’t, since their backups still contain decryption keys.
  • Some see ADP as “overkill” and note Apple already E2E-encrypts keychain, health data, etc. without ADP; they argue iMessage should be treated similarly.
  • Others argue ADP can’t be default because it creates irreversible data loss when people forget credentials, generating massive support burden.

Comparison to Google/Android Backups

  • Several comments claim Google’s message/phone backups have been E2EE by default for years, using the device screen lock code plus server-side secure elements to prevent brute force.
  • There’s debate about how strictly attempts/timeouts are enforced and whether this is meaningfully secure given short PINs; some later concede Google does use HSM-style protections similar to Apple.

Usability, Recovery, and “Grandma Problem”

  • Many users prioritize effortless device migration and password recovery over strong secrecy.
  • Concerns include: people losing devices, forgetting passwords, or not understanding hardware keys.
  • Some argue the average Apple customer expects Apple to be able to restore their data at a store with ID, which is incompatible with strict E2EE.

Apple’s Privacy Branding and Government Pressure

  • Several participants see a growing gap between Apple’s “privacy champion” marketing and reality: extensive default data collection, non‑E2EE backups, and expanding ad business.
  • Others counter that Apple’s core business is not advertising and that it generally treats data as a liability, unlike ad-centric competitors.
  • UK policy pressure is cited as a likely reason ADP is disabled there and possibly under-promoted elsewhere.

Control Over Others’ Backups and Features

  • One camp argues ADP is “a joke” if your chats are still in contacts’ readable backups; they’d like messages excluded from non‑E2EE backups or more granular controls.
  • Others object to senders dictating what recipients can do with received messages, warning about abuse and accidental large-scale data loss.
  • iOS offers global auto-delete for messages, but not per-chat disappearing messages; this is contrasted with other messengers.

Workarounds and Power-User Approaches

  • Some users disable iCloud Backup entirely and instead:
    • Supervise devices via Apple Configurator,
    • Back up iOS devices locally to a Mac (or tools like iMazing),
    • Then back up the Mac to a NAS or chosen cloud provider.
  • These options are seen as realistic only for power users; most people will remain on iCloud defaults.

Relation to the PQ3 Paper

  • The linked paper is recognized as a formal analysis of Apple’s new post‑quantum iMessage protocol PQ3, with a prior ePrint version noted.
  • Discussion, however, largely focuses on backup and key-management realities that can undermine the theoretical security guarantees PQ3 aims to provide.