iLoungeiLounge
  • News
    • Apple
      • AirPods Pro
      • AirPlay
      • Apps
        • Apple Music
      • iCloud
      • iTunes
      • HealthKit
      • HomeKit
      • HomePod
      • iOS 13
      • Apple Pay
      • Apple TV
      • Siri
    • Rumors
    • Humor
    • Technology
      • CES
    • Daily Deals
    • Articles
    • Web Stories
  • iPhone
    • iPhone Accessories
  • iPad
  • iPod
    • iPod Accessories
  • Apple Watch
    • Apple Watch Accessories
  • Mac
    • MacBook Air
    • MacBook Pro
  • Reviews
    • App Reviews
  • How-to
    • Ask iLounge
Font ResizerAa
iLoungeiLounge
Font ResizerAa
Search
  • News
    • Apple
    • Rumors
    • Humor
    • Technology
    • Daily Deals
    • Articles
    • Web Stories
  • iPhone
    • iPhone Accessories
  • iPad
  • iPod
    • iPod Accessories
  • Apple Watch
    • Apple Watch Accessories
  • Mac
    • MacBook Air
    • MacBook Pro
  • Reviews
    • App Reviews
  • How-to
    • Ask iLounge
Follow US

Articles

Articles

Can Digital Forensics Tools Bypass iCloud Advanced Data Protection?

Last updated: Apr 17, 2024 5:31 pm UTC
By Lucy Bennett
Can Digital Forensics Tools Bypass iCloud Advanced Data Protection?

Apple’s iCloud has long served as a primary platform for users to back up and store their device data, including photos, documents, application backups, and more. As these backups can contain sensitive information, many wonder whether they are secure. In 2014, a major scandal unfolded: hundreds of celebrities’ personal photos were leaked to the public, all stolen from their iCloud accounts. The investigation into the causes of this breach revealed weak account protection. In those days, a malicious actor could gain access to an account using solely the user’s Apple ID and password,


Apple learned this lesson and in the following years implemented two-factor authentication that made unauthorized access to an iCloud account nearly impossible. But their efforts didn’t end there. In version 16.2, they introduced the Advanced Data Protection (ADP) option that provides one more layer of security for iCloud.

Can Digital Forensics Tools Bypass iCloud Advanced Data Protection?

In this article, we will explore how Advanced Data Protection affects iCloud storage and what it implies for legitimate third-party access to iCloud data—during a digital forensic investigation.

Can Digital Forensics Tools Bypass iCloud Advanced Data Protection?

iCloud security: Standard and advanced

iCloud security employs a robust set of safeguards, starting with two-factor authentication (2FA), a prerequisite for syncing with Apple devices. Upon activating 2FA, iCloud instantly enhances data protection standards.


Standard data protection measures ensure sensitive user information, including keychain access, health details, and payment data, are encrypted from end to end. This guarantees that such data can be decrypted exclusively on trusted devices, enhancing security. In contrast, other types of information such as contacts, iCloud emails, calendars, and device backup data are encrypted only while being transmitted. Once on Apple’s servers, this data resides alongside the encryption keys. This setup poses a potential risk, as the encryption keys could be downloaded with the data, allowing for decryption.


Advanced Data Protection provides an additional authentication factor. To enable ADP, users must generate a recovery key or assign a trusted contact who can assist in regaining access to iCloud data.

Forensic extraction of iCloud data

iCloud data is vital in investigations for its ability to uncover communication logs, including emails and messages, which can provide evidence of criminal or corporate wrongdoing. Additionally, iCloud backups often contain contacts, calendars, and photos, that help reconstruct events.

To access iCloud data, digital investigators legally obtain iCloud credentials and use devices they are linked to for authentication. To extract and analyze data from iCloud, they use mobile forensics tools. For example, Belkasoft X offers several cloud extraction methods, including two options for iCloud:


  • iCloud: this method helps acquire iCloud mail, calendars, media files, and other data accessible when logging in to an Apple account on icloud.com
  • iCloud backup: This option efficiently retrieves the necessary data for restoring an Apple device. It covers system files, iMessage conversations, and data from iOS and various applications that use iCloud for backup purposes, such as WhatsApp and Viber, among others.

These methods require Apple ID credentials used to access iCloud and a device tied to this Apple ID to pass 2FA.


When ADP is enabled, extra security measures are in place. For authentication in iCloud, Apple will require the third element—the recovery key created on the device or an authorization from the recovery contact. Will a digital forensics tool be able to bypass this requirement?

Can Digital Forensics Tools Bypass iCloud Advanced Data Protection?

Acquisition of iCloud with enabled ADP 

Here is a comparison of the iCloud data types that were acquired with Belkasoft X before and after enabling Advanced Data Protection for an iCloud account:

As you can see, both extractions include mail, calendar, and some geolocation data. However, once ADP is enabled, the tool cannot retrieve media files, notes, or contacts (except for the account owner’s one). Another important point to mention is that after ADP activation, forensic extraction of iCloud backup is no longer possible.


How digital investigators can bypass ADP

Even with Advanced Data Protection enabled, mobile forensics software can extract some part of iCloud data. However, at this point, it still needs to learn how to deal with ADP to obtain all data it secures.

If you look for ways to override iCloud ADP, one viable option is to switch it off in the device settings. This action does not require the recovery key—just the device passcode. However, it may not be forensically sound since it will trigger an iCloud backup that can potentially overwrite important data.


Latest News
The AirPods Pro 3 is $20 Off
The AirPods Pro 3 is $20 Off
1 Min Read
Exynos 2600 Chip 2nm Process Revealed by Samsung
Exynos 2600 Chip 2nm Process Revealed by Samsung
1 Min Read
New Celebrity Ad Campaign Featuring Travis Scott Released by Beats
New Celebrity Ad Campaign Featuring Travis Scott Released by Beats
1 Min Read
Australia Getting Hypertension Notification Feature
Australia Getting Hypertension Notification Feature
1 Min Read
The 14-inch MacBook Pro with M5 Chip 16GB RAM/512GB is $250 Off
The 14-inch MacBook Pro with M5 Chip 16GB RAM/512GB is $250 Off
1 Min Read
Noise and Static on AirPods Pro 3 Still Unfixed
Noise and Static on AirPods Pro 3 Still Unfixed
1 Min Read
New iMac with 24-inch OLED Display May be Brighter With 600 Nits
New iMac with 24-inch OLED Display May be Brighter With 600 Nits
1 Min Read
The 15-inch M4 MacBook Air 256GB Is $250 Off
The 15-inch M4 MacBook Air 256GB Is $250 Off
1 Min Read
Internal Kernel Debug Kit from Apple Reveals Tests for a MacBook with A15 Chip
Internal Kernel Debug Kit from Apple Reveals Tests for a MacBook with A15 Chip
1 Min Read
Apple Currently In Talks With Suppliers for Chip Assembly & Packaging of iPhones in India
Apple Currently In Talks With Suppliers for Chip Assembly & Packaging of iPhones in India
1 Min Read
Apple Allows Easier Battery Replacement For M5 MacBook Pro with 14-inch Display
Apple Allows Easier Battery Replacement For M5 MacBook Pro with 14-inch Display
1 Min Read
The Apple Watch SE 3 44mm GPS is $50 Off
The Apple Watch SE 3 44mm GPS is $50 Off
1 Min Read

iLounge logo

iLounge is an independent resource for all things iPod, iPhone, iPad, and beyond. iPod, iPhone, iPad, iTunes, Apple TV, and the Apple logo are trademarks of Apple Inc.

This website is not affiliated with Apple Inc.
iLounge © 2001 - 2025. All Rights Reserved.
  • Contact Us
  • Submit News
  • About Us
  • Forums
  • Privacy Policy
  • Terms Of Use
Welcome Back!

Sign in to your account

Lost your password?