Apple Security


Please review the attached file.

Apple Find My Protocol

Don't use plagiarized sources. Get Your Custom Essay on
Apple Security
Just from $13/Page
Order Essay

Objective: Understanding the cryptography features of Apples Find My protocol.

Submission: Answer the following questions within the word doc or create a separate document.

In June 2019, at the Worldwide Developers Conference (WWDC), Apple announced a new iOS and OSX feature called Find My. Combining the features of Find My iPhone and Find My Friends into a single application. The summarized steps below are a description of how the protocol functions.

1. With at least two Apple devices, the users Apple devices create a shared private key communicated among them via end-to-end encryption.

2. Each pair of devices periodically creates a new secret key and public key pair using a deterministic algorithm applied to the previous secret key. This is also referred to as rotation of keys.

3. If Find My is enabled on a device, it emits its current public key via Bluetooth and other Apple devices nearby can pick up on the broadcast.

4. A device that has picked up a public key will then check its own location, encrypt the location using the public key, and upload this to Apples servers along with a hash of the public key.

5. With a different Apple device, a user can then query Apples servers with hashes of the public keys it has used to get the encrypted location associated with the hashed public key.

6. Using the original secret key, the user can decrypt and get the location of their lost device.
Read the description of the Find My protocol in the 2021 Apples Platform Security Manual (p. 139 – 142)

Read the article explaining further detail of the protocol by The Wired

The questions below, consider potential attackers to include someone who has stolen the users device, other users who have Apple devices, and Apple employees with Find My database access.

Answer the following questions:

1.) In step 2, why are the public keys periodically updated? What security properties are provided by updating the public key?
2.) For the encryption in step 4, what security properties must the encryption algorithm have for this to be secure?
3.) Can you come up with ways to attack the Find My protocol even assuming that the cryptographic primitives used in the protocol are secure? Some ideas worth considering are who are the trusted parties/ devices in the protocol, and who generates what data in this protocol.


help with disc due in 24 hours

due in 24 hours

Discussion: Assessment at the Micro and Macro Levels
Assessment is a structured approach to gathering and analyzing information about the client system and their story. How is the assessment process different when the client system is an individual or family versus a community made up of individuals and families?
Assessment involves gathering the needed information in order to determine appropriate intervention. Thorough assessment allows social workers to identify the problems that need to be addressed. Complex social problems often mean that both the micro and macro level factors contribute to social work cases.
In this Discussion, you compare differences in the assessment stage at different practice levels.
By Day 3

Posta response to the following:

Describe the assessment process as related to individuals and families.
Briefly identify the types of information it is important to gather.
Compare how assessment at the macro level is similar and dissimilar than at the micro level.
Explain how you would gather the needed information at the macro level.
Identify a situation where a client system (micro or macro) may be reluctant to engage in the assessment process.

Support your post with examples from the course text and any other resources used to respond to this Discussion. Demonstrate that you have completed the required readings, understand the material, and are able to apply the concepts. Include a full reference of resources at the bottom of the post.

Learning Resources
Required Readings
Kirst-Ashman, K. K., & Hull, G. H., Jr. (2018).
Empowerment series: Understanding generalist practice (8th ed.). CENGAGE Learning.

Chapter 5, Engagement and Assessment in Generalist Practice (pp. 175223)

Document:Kaltura Personal CaptureGuide (PDF)

Follow these instructions to record/upload your video.

Kaltura – Posting your video to the classroom (PDF)

Follow these instructions to place your video in the desired location in the classroom.

Document: Kaltura Automatic Captioning (PDF)

Required Media

John Wiley & Sons, Inc. (2014).
Clinical interviewing: Intake, assessment & therapeutic alliance: With John Sommers-Flanagan, PhD and Rita Sommers-Flanagan, PhD (Playlist active listening). [Video].

Walden University. (2018, 2021).
Child welfare [Video].

Note: The approximate length of this media piece is 57 minutes.

Child Welfare Transcript [PDF]


Leave a Reply

Your email address will not be published.

Related Post


  Openness Reflection Creativity and Innovation in Business Introduction Openness is one of the big-five personality traits (alongside extraversion, conscientiousness, agreeableness, and neuroticism). It describes how much one welcomes new experiences,

Open chat
💬 Need help?
Hello 👋
Can we help you?