Or, put it on iCloud so it can leak all your private pictures and data to the world. Watched UFC 224 over the weekend and couldn't believe Raquel Pennington is also another iCloud victim. Apple now hosts on Google Cloud so that should tell you something.
Wow, even her partner Tecia Torres is another iCloud victim along with other UFC participants. The question is no longer who is affected but rather who isn't affected.
Sorry, but as someone above mentioned, this is factually untrue.
It was bad passwords and/or social engineering, and nothing to do with "hacking" (i.e. breaking a computer systems code) to gain data access.
And as for iCloud on Google servers, Apple encrypt the data on the servers, so Google has zero access to the user data stored there. (I remember a month ago Bart Busshots on Nosillacast mentioning how even in China, Apple are legally forced to store data/keys in Chinese owned data centres. So what they do is, store the data with one company's data centre, and the encryption keys in one of their competitors data centres, as the best option to keep them separate.) I'm sure they likely do similar in less restrictive countries by say storing the data with Google, and encryption keys in their own centres, as it'd obviously solve the privacy problems.
As for scanning user data, under the new GDPR EU rules beginning on 25 May 2018 (often expanded by many companies into their global policy; both for their own ease, and as said rules offer good guidance given they were drafted over many years to be solid and workable) they have tighter controls on sharing/using data, and have to
specifically allow user opt in/out without hiding it within blanket policies (such as "to use our services, you are opting in to us doing blah blah with your info/data").
I'd love to know if and how ANY cloud storage platform can search user data for illegal stuff (child porn, terrorist materials, sw, or anything else) given it's stored encrypted?
I can't see how that could possibly be true, as end-to-end encryption makes it not possible, unless said encryption becomes defeatable (so standard practice is to then use a newer better version).