Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
For data stored on Apple’s servers, yes. For the data stored on your devices, Apple could conceivably inject code on demand to siphon the locally unencrypted data, though I would assume they’ll only write (not to speak of deploy) such code once they’re legally forced to.
Apple doesn't have backdoors. There would be no way unless you hand over your recovery key. This is the right way to do it. There is no such thing as a backdoor only for the good guys.
 
You didn’t watch the video, did you?
Again, you can literally read what Apple has done and is currently doing to oppress the Chinese people to cater to the CCP. This isn't a mystery. They've also actively fought against legislation that would reduce slave labor in China while also investing half a trillion dollars and counting in infrastructure to become the most used smart phone in China in lieu of ethics. So please forgive me if I don't take what Apple says regarding encryption in China seriously. Apple says a lot of things about how privacy is a human right ... and then they do the exact opposite of everything they promise in China.
 
  • Like
Reactions: HaydenYouKnow
Apple will have separate rules for Timmy's Chinese mates.
When its comes to encryption not every country Laws permits that from being used. When you do foreign travel for business or as just a visitor with personal electronics such as phones/tablets/computers you need to be aware of their rules regarding encryption. See the map in this article.


Yes Apple is no different than all other businesses that need to obey their requirements in many countries. Take India for a example.
 
Why would I NOT want to enable this?
If you used iCloud.com (can't access the data through the website because it's encrypted and browsers won't be delegated access to encryption keys). Or if you aren't willing to setup a necessary recovery key or recovery contact. If you don't set up these you could lose access to your backups and your iCloud account if you lose access to your trusted devices. However they would let you decrypt with your device passcode so just remember what your passcode was. Or if you have older Apple devices that won't get the necessary update to use this, all devices need to be updated to the latest iOS and MacOS on your iCloud account to use this feature.
 
Really a huge step, they're E2E'ing the rest of things that weren't E2E in iCloud.

Apple was under alot of perceived pressure (correct there) from the government way back when they stopped the rollout of this originally....

So, a big deal and very cool. Users no longer have to do local backups for good encrypted backups once this is rolled out.
 
Why is everyone cheering this? Did people forget about iCloud Photo Library being publicly shared by Apple to other users, VPN does not even remotely secure or hide anything and lockdown mode is nothing but a marketing scheme?

Now you think this end to end encryption is for real!?!
 
Wow this is awesome! Great job Apple. Good to see the newly renewed emphasis and focus on privacy and security. The responses from Craig in the interview were great and appeared thought out this time around.
 
"Advanced data protection it's not available in your country or region"... Mexico
 
Why is everyone cheering this? Did people forget about iCloud Photo Library being publicly shared by Apple to other users, VPN does not even remotely secure or hide anything and lockdown mode is nothing but a marketing scheme?

Now you think this end to end encryption is for real!?!

Yawn. You’re trying too hard and just appear desperate for attention at this point.
 
Why is everyone cheering this? Did people forget about iCloud Photo Library being publicly shared by Apple to other users, VPN does not even remotely secure or hide anything and lockdown mode is nothing but a marketing scheme?

Now you think this end to end encryption is for real!?!
Why would bugs in the OS equate to a new feature not being real?
 
  • Like
Reactions: addamas and KeithBN
Wow this is amazing. Now, someone needs to check if VPN’s still leak data through tunnels. If so, this last major privacy flaw needs to be addressed.
 
This is really big, surprising move from Apple, probably part of the reason of dropping CSAM, ...
People keep referring to CSAM as if it were software written by Apple. It is not. It's Child Sexual Abuse Material. What Apple had was a proposal, design, and prototype software to scan for CSAM in a particular way. Stop conflating the two.
 
People keep referring to CSAM as if it were software written by Apple. It is not. It's Child Sexual Abuse Material. What Apple had was a proposal, design, and prototype software to scan for CSAM in a particular way. Stop conflating the two.
Semantics. We all know what he's referring to.
 
  • Like
Reactions: eltoslightfoot
Apple can say whatever they want to say. Their actions speak far louder than their words. They moved all of their Chinese iCloud data to servers in China so the CCP can monitor literally everyone. Apple shut down apps used by protestors when the CCP asked. They recently disabled the ability for protestors to use AirDrop with each other. Apple does whatever China wants. I feel with utmost confidence that Chinese citizens are going to get approximately zero of these encryption and privacy features. They already lack all of the privacy features that everyone else gets to enjoy outside of China. Apple isn't committed to Chinese citizens. They are committed to the CCP.

Can you point out a country were Apple refused to follow the law of the land and got away with it?

They even removed apps here in Norway after pressure from Norwegian authorities, but no-one cared.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.