Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>Apple claim it is not accessible.

It doesn't matter what Apple claim. All their software and hardware is proprietary, including of course their "cloud" computers. You have no way of verifying anything they say.



We can take them at their word: they tell us what is end-to-end encrypted, plainly.

Everything not on that list is not, and thus readable by Apple. The critical items not end-to-end encrypted being device backups, photos, notes, email.

https://support.apple.com/en-us/HT202303


In practice the end-to-end encryption of Apple products isn't better than regular encryption (in transit and at rest) with Apple holding the key. In what I assume is an effort to make the services more user friendly they have done away with key verification (something you see in Signal and Matrix-based chat services) that means the user has no way of verifying the parties of the chat and users have no say in how session keys are shared to parties. This makes it trivial for Apple to participate in all E2E sessions. It's no more work that just decrypting your non-E2E data.


Trust but verify. Apples word is worth nothing.


How do us lesser technically minded verify?

Probably a question for a post all of its own.

Care to start it??

You will? Yes!

Awesome!!

A winking icon....

But, seriously, how...?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: