Well, pure PR from the Security Researcher....As I partially suspected: pure PR to tout to the masses as to feel “safe” about iPhone.
Well, pure PR from the Security Researcher....As I partially suspected: pure PR to tout to the masses as to feel “safe” about iPhone.
Where did Apple lie?So it's been all a lie.
That's worse than using a device that's known to not be secure.
There's zero reason to believe apple's narrative (aka lies) on privacy from here on out.
Just remember: The data on your iPhone and everything you've ever done with it can be accessed by skilled adversaries
How are you using calDAV?
Or just long-press the power button, until you get the "slide to power off". If you hit cancel, it will remain on, and accept phone calls. But you will need to enter the Passcode to wake up the computer aspects of the phone again. The same end result, but at least in my opinion more convenient.You don't have to restart your phone. Hitting the power button 5 times in a row forces the phone into the Complete Protection mode as well.
Anyone that believes that virtue signalling needs a slap around the face. I'm not saying they're any worse than anyone else either, just that they aren't the angelic company they market themselves to be.So much for Tim Cook's "spin" about Privacy !
This method also prevents the emergency SOS call from being triggered, which you definitely need to be careful about.Or just long-press the power button, until you get the "slide to power off". If you hit cancel, it will remain on, and accept phone calls. But you will need to enter the Passcode to wake up the computer aspects of the phone again. The same end result, but at least in my opinion more convenient.
It doesn’t matter. Because the law seems to allow your contacts to agree to sell your personal contact information without your consent. And if enough of your contacts do that, those third parties have a pretty good idea of who you are and who you know anyway.I use a NextCloud server who respects privacy. I prefer not to mention the server I'm using.
There's many options including setting your own and using wireless sync.
And don't give access to your Contact List to apps like WhatsApp!
What ”spin”? (edit: please be specific and cite facts)So much for Tim Cook's "spin" about Privacy !
What lie? (edit: please be specific and cite facts)So it's been all a lie.
...
So much for Tim Cook's "spin" about Privacy !
What virtue signaling? I ask because virtue signaling is about looking good, not doing good.Anyone that believes that virtue signalling needs a slap around the face. I'm not saying they're any worse than anyone else either, just that they aren't the angelic company they market themselves to be.
To be clear. You have plenty of privacy if you use iCloud. Just not when you use the backup portion of iCloud.The biggest problem for me is that Apple planned to make iCloud backups end to end encrypted but this was thwarted.
Thus really even on Apple devices we have little privacy if we use iCloud.
The biggest problem for me is that Apple planned to make iCloud backups end to end encrypted but this was thwarted.
Thus really even on Apple devices we have little privacy if we use iCloud.
Never gonna happen. Apple's target demographic is teenagers and twenty-somethings, which Apple considers total idiots that must be protected. Only Apple knows what is safe and what is not.
You think Apple is lying?Does anyone actually believe Apple surrounding message privacy? It’s like Snowden never happened... what, did the NSA just give up after that?
Why have you sent that link in response to people who question things?iCloud data security overview – Apple Support (UK)
iCloud uses strong security methods, employs strict policies to protect your information and leads the industry in using privacy-preserving security technologies, such as end-to-end encryption for your data.support.apple.com
The generic "other people" cannot access your icloud backup. Your icloud backup can be made available to authorized parties with the proper legal documentation. "Hackers" cannot decrypt your icloud backup, unless they hack the server where the keys are stored.Why have you sent that link in response to people who question things?
iCloud Device Backups are NOT end to end encrypted. This is indisputable. Therefore if you use iCloud Device Backups on iOS, in theory these are accessible to people other than yourself.
Furthermore: "Messages in iCloud also uses end-to-end encryption. If you have iCloud Backup turned on, your backup includes a copy of the key protecting your Messages." so if you use iCloud Backup and Messages in iCloud, neither are really that protected.
I wasn't disputing the (non) E2EE claim. My point is that comments such as "neither are really that protected" are misleading. This isn't Facebook or one of its "partners." Apple has implemented layers, almost all encrypted in some way.Why have you sent that link in response to people who question things?
iCloud Device Backups are NOT end to end encrypted. This is indisputable. Therefore if you use iCloud Device Backups on iOS, in theory these are accessible to people other than yourself.
Furthermore: "Messages in iCloud also uses end-to-end encryption. If you have iCloud Backup turned on, your backup includes a copy of the key protecting your Messages." so if you use iCloud Backup and Messages in iCloud, neither are really that protected.
P.S. As you say, "in theory these are accessible to people other than yourself." True, but how many news reports of Apple being breached, which doesn't include phished iCloud/Apple ID accounts, or evidence of employee misconduct with user data have we seen? I don't recall any.Apple reduces the amount of data that goes into iCloud backups as opposed to being synchronized across devices via a different mechanism. As of iOS 14 (14.4 beta at the time of this writing), the following data is (or may be) missing in cloud backups:
- Health records
- Call logs
- Safari browsing history
- Media files (pictures and videos), if synced
- Messages (iMessage and SMS), if synced
- Keychain
It doesn’t matter. Because the law seems to allow your contacts to agree to sell your personal contact information without your consent. And if enough of your contacts do that, those third parties have a pretty good idea of who you are and who you know anyway.
Here's the gist about (today's digital) security. Everything can be hacked/breached given enough time. The trick is convenience, providing a fair level for the user and unreasonable for the attacker. With a moderate to strong encryption algorithm and a very long password/key, even if it is a chain of words, will require a long time to decrypt. Long enough and it could require weeks to months to process. In which case, hackers will be deterred. It's because of this you see a lot more automated passwords having 50+ characters and being hexadecimal as well as the increased popularity of phishing attacks -- much more efficient to dupe a person than try all of the possible permutations of a key.
Well, pure PR from the Security Researcher....![]()
Genuinely curious, such as...? Are we mainly talking "end-to-end" encryption for all cloud-type services?But they should offer higher levels of security (with appropriate warnings about the risks of total data loss) to those who want it.
End to end encryption of everything in the cloud (opt in) would be a start.Fair counter.
Genuinely curious, such as...? Are we mainly talking "end-to-end" encryption for all cloud-type services?
Again, I get the need and that there are many possible implementations, and Apple could look into improving theirs (possibly).
For example, in the first full-scale programming course assignment/project we had, I implemented a system with three links of security. Basically, the only way to reveal user encrypted data was if you had the full database, client software source code, and user's password. Not even the database owner could easily view users' passwords. In fact, they'd need the client software source code and full database just to start decryption attempts. Was it flawless? Probably not, but I thought it was good for an initial, basic implementation.
I can agree with that.End to end encryption of everything in the cloud (opt in) would be a start.
As an option. You would turn it on and have 10 pages of "If you lose this key, your data is lost" "Are you absolutely certain you've noted down that key? If you lose it and forget your password, your data is lost" "Please type 'I understand my data will be lost forever if I lose this encryption key and forget my password'" "Please click confirm"...
This whole argument that it's to balance ease of use with security falls apart when the option isn't given to users who do desire 100% encrypted data. iCloud Backups should at the very least have an end-to-end encrypted option. But quite frankly I think things like Notes, Photos should too.
My data is my data. It's not interesting, but it's personal. It absolutely should be possible for me to end to end encrypt data, with encryption using a key I alone possess.
In case I didn't make it clear enough, it should be an optional choice and informed decision people can make to have full end to end encryption for everything in iCloud, including iCloud Backups. If they forget their key and password, they've f**ed it and it's their fault.
From what I recall reading, the primary complaint wasn't for people forgetting their password but about accessing the accounts of deceased family members and other loved ones. However, my counter to that argument is if the now deceased wanted others to access their stuff, they could have included the password or something similar in a will, etc.If they forget their key and password, they've f**ed it and it's their fault.
I agree!I can agree with that.
By the way...
From what I recall reading, the primary complaint wasn't for people forgetting their password but about accessing the accounts of deceased family members and other loved ones. However, my counter to that argument is if the now deceased wanted others to access their stuff, they could have included the password or something similar in a will, etc.