Today, in response to the U.K.’s demands for a backdoor, Apple has stopped offering users in the U.K. Advanced Data Protection, an optional feature in iCloud that turns on end-to-end encryption for files, backups, and more. Had Apple complied with the U.K.’s original demands, they would have been...
Troubling precedent, but I expect no one used this anyways. Anybody who needs this would be smart enough to know not to trust so proprietary a device and service.
Given how readily Apple has rolled over for law enforcement in the past loudly Apple has opposed working with law enforcement in the past, only for devices to be magically unlocked anyways, this is (probably) just security theater.
I don’t know about other countries, but Apple itself reports that it provided access to customer accounts at the US government’s request 90% of the time
Sure, but if that’s your only concern, then you aren’t really concerned that the toggle is removed in the UK, either
The report is that Apple is removing the user’s ability to disable Apple’s back door, and you asked for evidence that they roll over for law enforcement
If you want governments to have access to a backdoor to what Apple touts as “Privacy,” your initial question doesn’t make much sense
They don’t offer the government a “backdoor” to make it easy to decrypt user data.
Is what’s being discussed. Since Apple has a backdoor in the default configuration of their phone, they’re able to comply with 90% of all data requests.
The UK is demanding they remove the option to disable the backdoor in their encryption
You can kind-of sort-of use local only, but Apple makes that very inconvenient and almost 0 users do
Your definition of “rolling over” is different than mine.
…
What would you have them do differently when the warrants issued are valid in the legal sense/approved by a judge?
Again, your comments are agreeing with their decision to not allow full end to end encryption.
I would have them not able to decrypt my data at all
My recollection was erroneous, as I can’t (easily) find evidence of them rolling over. But the devices in question still got unlocked, so in the end it didn’t matter whether Apple (openly or surreptitiously) cooperated.
Troubling precedent, but I expect no one used this anyways. Anybody who needs this would be smart enough to know not to trust so proprietary a device and service.
Given how
readily Apple has rolled over for law enforcement in the pastloudly Apple has opposed working with law enforcement in the past, only for devices to be magically unlocked anyways, this is (probably) just security theater.Yeah, it’s 3rd party vendors like greykey and cellibrite that allow LEO to get around apples security.
To its credit, apple does a fairly decent job of staying ahead of the unlocking tech, but some older hardware and os are easily cracked.
https://cybersecuritynews.com/phones-cellebrite-tool-can-unlock/
Is this Hardware or software dependent when it comes to Android? Do you know? Curious about whether moving to graphene would even matter.
Edit: Found the following discussion. https://discuss.grapheneos.org/d/14344-cellebrite-premium-july-2024-documentation
It is both. But graphene is the way.
I was reading some of the Graphene forum discussion the other day. Basicaly, grapheme is the only os on any hardware that concerns LEO and courts.
Reading about the one country where when graphene is found on a phone they automatically declare it “uncontrolled” and a “criminal tool”.
https://discuss.grapheneos.org/d/7658-potential-appearances-of-grapheneos-in-mobile-forensic-reports/35
Do you have citations for “Apple has rolled over for law enforcement in the past”? I’m wondering if this is country-specific.
Fortunately you can still back up your devices locally, and store your photos locally, and these backups can be encrypted.
I don’t know about other countries, but Apple itself reports that it provided access to customer accounts at the US government’s request 90% of the time
https://www.apple.com/legal/transparency/us.html
@drop_and_run@sh.itjust.works
With a warrant. Fortunately end to end encryption is still available in the US (for now).
Sure, but if that’s your only concern, then you aren’t really concerned that the toggle is removed in the UK, either
The report is that Apple is removing the user’s ability to disable Apple’s back door, and you asked for evidence that they roll over for law enforcement
If you want governments to have access to a backdoor to what Apple touts as “Privacy,” your initial question doesn’t make much sense
Your definition of “rolling over” is different than mine.
What would you have them do differently when the warrants issued are valid in the legal sense/approved by a judge?
Is what’s being discussed. Since Apple has a backdoor in the default configuration of their phone, they’re able to comply with 90% of all data requests.
The UK is demanding they remove the option to disable the backdoor in their encryption
You can kind-of sort-of use local only, but Apple makes that very inconvenient and almost 0 users do
Again, your comments are agreeing with their decision to not allow full end to end encryption.
I would have them not able to decrypt my data at all
Apple-FBI encryption dispute
My recollection was erroneous, as I can’t (easily) find evidence of them rolling over. But the devices in question still got unlocked, so in the end it didn’t matter whether Apple (openly or surreptitiously) cooperated.