-
@maxzks @matthew_d_green Congrats on the paper! However, I can't avoid a nitpick: Android backup has been fully E2EE with strong keys derived from HSMs locked with the user's LSKF (lockscreen knowledge factor) for 3 years (since Android 9), including insider attack resistance: research.nccgroup.com/wp-content/uploads/2020/07/Final_Public_Report_NCC_Group_Google_EncryptedBackup_2018-10-10_v1.0.pdf
-
@maxzks @matthew_d_green That is, Google cannot decrypt backups without knowledge of the user's LSKF, and the HSMs have brute force protection baked into their firmware. Forcibly overwriting this firmware will erase the stored keys, which is the insider attack resistance (IAR) part also used on-device.
-
@maxzks @matthew_d_green Some more details can be found e.g. in security.googleblog.com/2018/10/google-and-android-have-your-back-by.html, usenix.org/conference/enigma2019/presentation/mayrhofer, and dl.acm.org/doi/10.1145/3448609