... except for Apple of course... things are becoming quite clear here. They're blocking everyone else from collecting information (which is good), but at the same time they're the ones who can still do it. They finally figured out that in the days of AI and data mining, the data is the most important element.Private Relay works by sending web traffic to a server that is maintained by Apple to strip the IP address. Once IP info has been removed, Apple sends the traffic to a second server maintained by a third-party company that assigns a temporary IP address and then sends the traffic to its destination, a process that prevents your IP address, location, and browsing activity from being used to create a profile about you.
Correct, and the sooner people realize that and stop moaning and groaning, wringing their hands, castigating, denigrating companies over the issue the better. We are ALL being watched no matter what steps one takes. Your only hope is that you’re in a big enough school of fish that the predators don’t single you out.Privacy is only an illustion!
It seems to take the location from the device. A VPN does not change the situation. Most probably it would work if I was physically in a supported country.Does this depend on what country your iCloud/Apple account is set to or is it the country the IP address your device is using?
Has anyone ever tried to bypass this geo-restriction?
This is unrelated to iCloud storage and has a different focus. No one can read HTTPS traffic in the first place, but with this they can't see what destination you're reaching either."......designed to encrypt all of the traffic leaving your device so no one can intercept it or read it"
wait a minute... does this mean someone has always been able to read the traffic between my iPhone and iCloud in the last several years? I've been paying extra for iCloud for years and never realized that.
It is completely unrelated to iCloud storage.Exactly my thoughts. All this time Apple was making privacy their image but you have to pay for it now? I ask the same question as you. Does it mean that they lied about their efforts amd iCloud wasn’t private? Why do I have to pay extra for privacy now? I was already paying for iCloud until the CSAM debacle. Apple is just full of you know what. Don’t trust them.
This is incorrect. Apple doesn't see the website either, as it's a two-layer onion-style encryption. Also, all Apple can see, or anyone could see before, is the websites you connect to. Not any data sent, since that will be encrypted with HTTPS.... except for Apple of course... things are becoming quite clear here. They're blocking everyone else from collecting information (which is good), but at the same time they're the ones who can still do it. They finally figured out that in the days of AI and data mining, the data is the most important element.
****! Living in Bangkok with a European Apple ID/Account, I was hoping to use it. What a shameand also Thailand
I think you probably do not understand how Apple's Private Relay works?They're blocking everyone else from collecting information (which is good), but at the same time they're the ones who can still do it.
Kinda spotlights the concerns we had during the csam debate, ultimately Apple will do what governments tell them to do
My thoughts exactly. Anyway, it is sad to see Apple caving in to Russia, but short of not providing products and services there I doubt there is anything they can do. I guess this highlights that you cannot trust either technologies or companies to protect your privacy - the thing you can do is be careful who you elect to government (if you have a choice).Don’t tell me that Apple wouldn’t bend the knee to a country’s demand for CSAM tech to expand to whatever “offensive” material they want to detect.
Who cares? Rasha is parasha.People, I hope you get it right: this service is unavailable not for Russians or users of Russian version of AppStore or what. It is unavailable in Russia. So if you arrive to Russia, it will stop working for you. If any Russian arrives to other (non restricted) country, PR will be available to them. At least this is how it was written on Apple's screenshots.
This is incorrect. Apple doesn't see the website either, as it's a two-layer onion-style encryption. Also, all Apple can see, or anyone could see before, is the websites you connect to. Not any data sent, since that will be encrypted with HTTPS.
I think you probably do not understand how Apple's Private Relay works?
Apple only knows the device's users are accessing the Internet (from the device's source IP address), but Apple will not know what the target IP/URL that the device's user is requesting. This makes the information effectively useless for Apple. Unless my understanding is wrong, there's no way Apple can harvest anything useful from the Private Relay servers they are maintaining.
Kinda spotlights the concerns we had during the csam debate, ultimately Apple will do what governments tell them to do
I’ll try to explain as best as I understand it, with simplification of course.So let's say I request amazon.com (for shopping), that information is encrypted, then sent off to Apple servers, then to a 3rd party server and then the content of amazon.com is returned to me. If my information is encrypted (the URL amazon.com) how to they they requested the content from amazon? Someone has to know I want to visit amazon. Please not I'm not talking about the actual site content here, only the information that I want to visit the amazon site. If everything I sent over to Apple is encrypted and safe, then they can't know what website I want to visit.
That's correct, sorry for my mistake. But that really is not satisfying for me. How does it make any sense for a company that prides itself in privacy? You already pay premium for the supposedly private devices, but you'll not be protected if you don't need a higher iCloud plan? What kind of logic is that other than that Apple tries to trick you to pay them even more for the thing you were promised to have just by using their devices?You’re not paying extra. iCloud+ is a free upgrade for already paying for storage.
And Apple is using what as a egress proxy? Surely some CDN provider… Amazon CloudFront makes sense. They’re already a AWS customer. That allows to physically keep ingress and egress proxies separate while having access to both. Now combine the information… it’s simple data mining.I’ll try to explain as best as I understand it, with simplification of course.
Your device has the 2nd stage proxy’s (i.e. not Apple) public key. When your device request for Amazon, your device encrypts the request with said public key. Part f the request will contain your device’s public key. Your device then sends this encrypted payload to Apple’s first stage proxy.
Apple’s server doesn’t have the private key of the second stage proxy to decrypt the payload, so it remains a secret to Apple. Apple scrubs your device IP and replaces with its own IP and sends your device’s request to the 2nd stage server. You can think of Apple’s 1st stage proxy as your home’s IPv4 broadband router, as they essentially uses the same technique to NAT internal IP to external IP.
The 2nd stage proxy servers only know that the request comes Apple, but it has the private key to decrypt your device’s request to Amazon, and sends it off to Amazon. When the results returns, it uses your device’s public key to encrypt the results and sends it back to Apple.
Now, Apple doesn’t have your device’s private key, so cannot decrypt the results. It can only send it back to your device.
So, in short, Apple knows your device is requesting for something but doesn’t know what.
The third party knows someone is requesting for Amazon but don’t know exactly who. It only knows it’s from Apple.
And no, this is not a VPN implementation. A VPN server knows and must know your source and destination, or it can’t work its magic.