Skip to main content

iMessage Contact Key Verification blocks the ‘ghost proposal’ plan by government spy agency

Apple’s new iMessage Contact Key Verification at first glance seems to be a rather niche security feature, likely to be of interest only to the most paranoid or highly-targeted individuals. But it could turn out to be a privacy feature which protects us all from government spying.

That’s because it seems almost custom-designed to prevent a plan developed by the UK’s equivalent to the NSA – GCHQ …

What does iMessage Contact Key Verification do?

iMessage uses end-to-end encryption, which means that only the intended message participants can read messages.

Or, more specifically: Only devices used by intended message participants can decrypt messages. That’s an important distinction, because an Apple server keeps note of which specific devices are allowed to decrypt messages, and if that server were compromised, someone could add another authorized device to those owned by participants. That device would then be able to decrypt messages the same way you currently get copies on your iPhone, iPad, and Mac.

What Contact Key Verification does is to enable message participants to check that this hasn’t happened.

You’d think Apple’s iMessage servers being compromised seems like a rather low risk – but the company is likely less concerned about private hackers, and more concerned about government spy agencies.

This is the reason that WhatsApp and Signal already have similar protections of their own.

The ‘ghost proposal’ by government spy agencies

All of this goes back to ‘the ghost proposal’ made in 2019 by the UK’s Government Communications Headquarters (GCHQ) – the UK equivalent of the NSA.

Governments around the world have been trying to compromise end-to-end encryption for a great many years, but have so far been stopped by the argument that you can’t create a backdoor for use by the good guys without that weakness being detected and exploited by the bad guys.

But GCHQ came up with a plan with I think qualifies for the term ‘evil genius.’ Here’s how the ACLU described it.

“It’s relatively easy for a service provider to silently add a law enforcement participant to a group chat or call. The service provider usually controls the identity system and so really decides who’s who and which devices are involved — they’re usually involved in introducing the parties to a chat or call…. In a solution like this, we’re normally talking about suppressing a notification on a target’s device… and possibly those they communicate with.”

In short, Apple — or any other company that allows people to privately chat — would be forced to allow the government to join those chats as a silent, invisible eavesdropper.

In other words, GCHQ or the NSA tells Apple to add an extra device which would appear to belong to you or another participant in the chat, and that device would get decrypted copies of all the messages, without anyone in the chat being any the wiser.

Apple, Google, Microsoft, and 44 other organizations and security experts signed an open letter condemning the ghost proposal, but there remained the possibility that they could be secretly forced to do it – with a classified court order, for example.

Contact Key Verification makes this detectable

Normally, there would be no way for any of us to know it had happened.

But Contact Key Verification changes that; now we have a method to verify each individual device in the chat.

Apple is effectively protecting all of us

It’s unlikely that many people will bother to use the new feature, but now that it exists, it essentially makes the ghost proposal pointless – because anyone who’s likely to be targeted by government surveillance would use it.

Because Contact Key Verification renders the ghost proposal useless, Apple is effectively telling government spy agencies not to bother trying it – and that ultimately protects all of us, by maintaining the integrity of end-to-end encryption.

Photo: Petr Sidorov/Unsplash

FTC: We use income earning auto affiliate links. More.

You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel

Comments

Author

Avatar for Ben Lovejoy Ben Lovejoy

Ben Lovejoy is a British technology writer and EU Editor for 9to5Mac. He’s known for his op-eds and diary pieces, exploring his experience of Apple products over time, for a more rounded review. He also writes fiction, with two technothriller novels, a couple of SF shorts and a rom-com!


Ben Lovejoy's favorite gear

Manage push notifications

notification icon
We would like to show you notifications for the latest news and updates.
notification icon
Please wait...processing
notification icon
We would like to show you notifications for the latest news and updates.
notification icon
Please wait...processing