They HAVE to, when accompanied by a Court Order.Just anyone defending Apple loving user privacy please read the article:
"Apple received 4,450 requests for 15,168 devices. Apple provided data in 3,548 cases, or approximately 80 percent of the time. Worldwide, Apple received a total of 29,718 requests covering 309,362 devices, providing data 79 percent of the time"
In summary in the USA Apple gave up the data "80 percent of the time", worldwide they gave it up "79 percent of the time".
So overall Apple gives up user data 4/5 of the time. Boy they're great aren't they?
Where did they say they weren’t collecting private data? That’s a far cry from Tim Cook reiterating the customer is not the product. But one can’t be naive, between Apple and the telco provider there is a bunch of data waiting for legal law enforcement requests.
Or make the Requesters smarter.If you need online training for people to use your website, make your website better.![]()
Interesting coming from a company that is actively advocating they are NOT collecting private data about us through their services.
Interesting coming from a company that is actively advocating they are NOT collecting private data about us through their services.
With regard to 2., they are encrypting it at rest.
Exactly.
Apple PR at it's best. Either they DO have our data and have been lying to us all these years,
Exactly.
I'm okay with cooperation when requested. I'm not okay with broken or backdoors to encryption.
I suspect that comes down to troubles in syncing the data between multiple devices and/or the iCloud.com website - the actual web interface to your mail, calendar, photos, and such (this is perhaps something that could be redesigned in order to keep more of the data encrypted with user-only keys). Possibly also to deal with customers who come in with a recently destroyed phone and need to restore their iCloud backup onto a new phone but they don't remember their password - Apple has a page/service for resetting your password for your AppleID; if your iCloud backups were encrypted (only) with your Apple ID, in such situations, every non-metadata bit of your information (backup contents, iMessages, photos, calendar, notes/reminders, etc.) would be scrapped. I'm not saying that the way Apple's doing it is ideal (if that is, indeed, what they're doing), but I can see how there'd be compelling reasons to do so.Those iCloud backups however, which is where the bulk of the non-metadata information that can be subpoenaed is retrieved from, should be encrypted without Apple having the key imo. I don't know of any valid technical reason for them to have the key for those. I may be missing something about the nature of them and restoring from them but even that is surely not insurmountable.
They may be encrypting it, but they are not encrypting it using the keys on your iphone/ipad/mac. Encrypting it while retaining the keys whether at rest or in transit is worthless.
The problem with that is that they are encrypting using their keys, not your keys as they do on iOS (or potentially macOS). Encrypting it while retaining the keys is worth as little as encrypting your iPhone or iPad and then sending the keys to Apple to retain.
I suspect that comes down to troubles in syncing the data between multiple devices and/or the iCloud.com website - the actual web interface to your mail, calendar, photos, and such (this is perhaps something that could be redesigned in order to keep more of the data encrypted with user-only keys). Possibly also to deal with customers who come in with a recently destroyed phone and need to restore their iCloud backup onto a new phone but they don't remember their password - Apple has a page/service for resetting your password for your AppleID; if your iCloud backups were encrypted (only) with your Apple ID, in such situations, every non-metadata bit of your information (backup contents, iMessages, photos, calendar, notes/reminders, etc.) would be scrapped. I'm not saying that having the way Apple's doing it is ideal (if that is, indeed, what they're doing), but I can see how there'd be compelling reasons to do so.
Or make the Requesters smarter.
Now which do YOU think is more practical?
Yup, just like Google, Facebook, Microsoft, Amazon etc etc. In short no better than any other company so why the high regard for them?They HAVE to, when accompanied by a Court Order.
Period.
Apple is using current State of the Art Encryption. In a very real sense, they can do no better than this. And in the end, considering the sheer amount of data they are encrypting, it quickly becomes a matter of diminishing returns time-wise, to start using gigantic keys.Saying something is encrypted gives the end-user a nice warm feeling of reassurance, however having weak encryption that can be easily broken by law enforcement agencies is what is concerning.
Apple can advertise that it is using 256bit encryption, when any an agency such as NSA can easily break that is working on 512bit encryption. In this scenario the law enforcement are ahead of the encryption game, vice companies willfully keeping pace with encryption technology.
It is a slippery slope, no back door needed if the encryption is compromised to begin with. Next Apple will incorporate 512bit encryption when government agencies are working on 1024bit encryption. It is a dance, where it is legal however there are compromises.
Anything stored in the cloud is something Apple can and will give away to the authorities. I don't understand why people are so surprised about this.
Because they don't collect information "just because". You ELECT to hand-over data to Apple. Hint: You don't HAVE to. I don't. AFAICT, Apple has ZERO of my photos, emails, unencrypted iMessages, etc, because I ELECT to "Opt Out" of iCloud services across ALL my Apple devices.Yup, just like Google, Facebook, Microsoft, Amazon etc etc. In short no better than any other company so why the high regard for them?
This is true IF they are using their keys to encrypt it.
Apple is using current State of the Art Encryption. In a very real sense, they can do no better than this. And in the end, considering the sheer amount of data they are encrypting, it quickly becomes a matter of diminishing returns time-wise, to start using gigantic keys.
Face it: If the NSA has got your encrypted data, you might as well consider it cleartext. However, if some rando LEO has it, then THEIR decryption capabilities are generally FAR less advanced.
You know what, that's a fun argument. "I don't have to use a computer therefore no-one has any computer based information on me" /s.Because they don't collect information "just because". You ELECT to hand-over data to Apple. Hint: You don't HAVE to. I don't. AFAICT, Apple has ZERO of my photos, emails, unencrypted iMessages, etc, because I ELECT to "Opt Out" of iCloud services across ALL my Apple devices.