Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
So now the only way to back up your iPhone automatically is to pay Apple a subscription for iCloud storage. They better fix this or it'll go down (for me at least) as the most scumbag move in corporate history.
I'm on the Apple 2TB plan for my homekit cameras.

But it would take forever to back up or restore over a TB of data to the cloud. Plus I just prefer to keep my stuff local.
 
I'm working on automating this password entry with an emulated Bluetooth keyboard that connects to the iOS device and enters its password. Typeeto for macOS unfortunately no longer works after Big Sur, so this is going to have to be a Raspberry Pi that receives the command remotely and does not store the password on disk.

This solution has its own security issues, but I cannot compromise on daily automated backups or on local-only backups. iCloud Backup bypasses the end-to-end encryption of iMessage.
 
Last edited:
Add me to the list of users being driven nuts by this. It is affecting my iPhone and iPad.

I have long complex passwords and all my devices so having to type it in every device every morning when I backup is beyond PITA just to backup each day.

I started a forum for this with Apple.
Agreed. This is nutty. And I would have thought that when iOS 16.1.1 was released that this obvious bug would be resolved. Nope, it hasn't. Nutty!
 
  • Like
Reactions: 0924487
Is that right? iCloud does not offer end-to-end encryption for backups??

It's not E2E for most things iCloud.

Encryption "In transit & on server" means Apple has the keys and will comply with government requests. You can check what are E2E and what are not.

 
  • Wow
Reactions: msackey
It's not E2E for most things iCloud.

Encryption "In transit & on server" means Apple has the keys and will comply with government requests. You can check what are E2E and what are not.

Very interesting. So documents that we store via iCloud, essentially Apple can snoop around and look at them de-crypted. Hmm... I think everything should be E2E and that way, Apple can never be tempted to snoop around or be compelled to snoop around.
 
Very interesting. So documents that we store via iCloud, essentially Apple can snoop around and look at them de-crypted. Hmm... I think everything should be E2E and that way, Apple can never be tempted to snoop around or be compelled to snoop around.

The biggest problem is not Apple employees snooping around, but rather, governments, police and intelligence agencies getting full access to private device backup data.

Apple will comply with iCloud data requests.
 
The biggest problem is not Apple employees snooping around, but rather, governments, police and intelligence agencies getting full access to private device backup data.

Apple will comply with iCloud data requests.
Of course the biggest problem would be gov't institutions snooping around.
 
I think everything should be E2E and that way
Agreed, but it is not just Apple. The major cloud services are not E2E encrypted. In general: Data is encrypted in transit (often https), and data is encrypted at rest on cloud servers (but encrypted by the cloud provider, not you!).
 
I swear this morning, for the first time, my iPhone only stopped to request my passcode once (at initial connect), instead of the usual twice (initial connect and at the start of the backup portion of sync).
 
I swear this morning, for the first time, my iPhone only stopped to request my passcode once (at initial connect), instead of the usual twice (initial connect and at the start of the backup portion of sync).

I think it will only ask once, unless your first backup attempt fails.
 
EXCELLENT

It's fixed in Sonoma & IOS 17.

🎉🎉🎉🎉🎉🎉🎉🎉🎉
 
Last edited:
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.