Apple’s iCloud Keychain escrow uses HSM clusters with SRP protocol, a 10-attempt hard limit, and destroyed admin keys to protect keychain recovery.
Key Takeaways
HSM clusters behind iCloud encrypt escrow records; the iCloud security code is verified via SRP, never sent to Apple.
Recovery requires iCloud account password plus SMS verification, then the iCloud security code to unlock the HSM cluster.
After 10 failed attempts, the HSM cluster permanently destroys the escrow record; keychain data is unrecoverable.
HSM firmware policy is immutable: admin access cards have been destroyed, and any firmware tampering or private key access triggers key deletion.
Keychain owners are notified if their escrow record is destroyed and can reenroll.
Hacker News Comment Review
Commenters flagged that SMS as a recovery factor is a significant weak point, vulnerable to SS7 attacks or state-level interception.
The exact meaning of “iCloud security code” is unclear to readers – whether it is the standard 6-digit Apple ID verification code or a separate credential.
Notable Comments
@dannyw: raises concern that SMS interception makes the scheme accessible to nation-state actors by design or as a side effect.