Stupid sexy crack head
I’m from space!
Stupid sexy crack head
https://www.apple.com/customer-letter/answers/
Quote below
No.
We regularly receive law enforcement requests for information about our customers and their Apple devices. In fact, we have a dedicated team that responds to these requests 24/7. We also provide guidelines on our website for law enforcement agencies so they know exactly what we are able to access and what legal authority we need to see before we can help them.
For devices running the iPhone operating systems prior to iOS 8 and under a lawful court order, we have extracted data from an iPhone.
We’ve built progressively stronger protections into our products with each new software release, including passcode-based data encryption, because cyberattacks have only become more frequent and more sophisticated. As a result of these stronger protections that require data encryption, we are no longer able to use the data extraction process on an iPhone running iOS 8 or later.
Hackers and cybercriminals are always looking for new ways to defeat our security, which is why we keep making it stronger.
This is for non e2ee cloud data. If you turn e2ee cloud encryption on, only you can access your cloud data. A government or police agency can’t access it, but you’re also kind of fucked if you need Apple’s support to access backup. So maybe leave it off for old parents.
That key is not for locally encrypted data, locked devices or e2ee data.
https://support.apple.com/en-gb/guide/security/sec973254c5f/web
If you turn this on, Apple can’t not decrypt anything you have stored in the cloud with that key.
Do you have a source for that?
Because Apple has had a lot of very prominent court cases about unlocking phones for cops, and they famously haven’t done that. They, like other cloud service providers, have forked over cloud storage data, that isn’t e2ee, when given a warrant.
They’ll hand over unencrypted cloud data, but they are not decrypting E2EE cloud data. They literally can’t. They don’t have the key. If they had a key, it would be a monumental security vulnerability.
This is why governments and cops have dragging them into courts for years.
Once you get 3/4 through this article, and get to the actual content, it’s pretty underwhelming. Apple was basically just showing cops that they could be querying their existing databases with iOS mobile and or CarPlay experiences.
After reading the article, it doesn’t look like any of this contradicts what they’re been selling. Encrypted data is still locked down. IMHO, this title is fairly clickbaity.
A lot of this looks like iOS / CarPlay versions of policing / public records database software that was previously on platforms like Windows.
This title seems kind of clickbaity. Most of the native apps are for querying existing government and police databases. We’re talking about accessing records via CarPlay, as opposed to using a bulky Window’s laptop docked in a center console.
Apple is still not offering governments a backdoor into encrypted content.
As someone who works in data privacy, I don’t think the DS crazy ever died down. It’s bigger and more complex than ever. People just got tired of saying “big data” at Silicon Valley bars.
This probably can’t be great news for Chinese-owned Volvo.
Is that a delivery service’s marked up price? Their site has them for much less.
The Marriotts are mormon.
So maybe a hot chocolate.
If anyone is wondering, searches for Firefox have gone up a hair, but it’s no hockey stick curve.
There is Portlandia weird, and then there’s “I want the government to track your menstrual cycles” weird.
For those out of the loop.
Good point. Could be like MS and Apple in the late 90’s. When Apple was on death’s door, Gates invested in Apple so MS would have faux competition for regulators.
I can’t unpause