Escrow Security for iCloud Keychain

· hardware · Source ↗

TLDR

  • Apple’s iCloud Keychain escrow uses HSM clusters with SRP protocol, a 10-attempt hard limit, and destroyed admin keys to protect keychain recovery.

Key Takeaways

  • HSM clusters behind iCloud encrypt escrow records; the iCloud security code is verified via SRP, never sent to Apple.
  • Recovery requires iCloud account password plus SMS verification, then the iCloud security code to unlock the HSM cluster.
  • After 10 failed attempts, the HSM cluster permanently destroys the escrow record; keychain data is unrecoverable.
  • HSM firmware policy is immutable: admin access cards have been destroyed, and any firmware tampering or private key access triggers key deletion.
  • Keychain owners are notified if their escrow record is destroyed and can reenroll.

Hacker News Comment Review

  • Commenters flagged that SMS as a recovery factor is a significant weak point, vulnerable to SS7 attacks or state-level interception.
  • The exact meaning of “iCloud security code” is unclear to readers – whether it is the standard 6-digit Apple ID verification code or a separate credential.

Notable Comments

  • @dannyw: raises concern that SMS interception makes the scheme accessible to nation-state actors by design or as a side effect.

Original | Discuss on HN