Dear Siri-Clippy, you were never granted permission to spider every decrypted message in E2EE messaging apps. Since you granted yourself this permission by default, please provide a detailed report of all data derived from spidered data, and instructions on how to securely delete said data from disk.
You’re concerned about your phone keeping data on your phone, that it derived from data on your phone? At that point I think you are so far outside of the norm as to be considered a fringe use case.
> Amid an unprecedented cyberattack on telecommunications companies such as AT&T and Verizon, U.S. officials have recommended that Americans use encrypted messaging apps to ensure their communications stay hidden from foreign hackers. The hacking campaign, nicknamed Salt Typhoon by Microsoft, is one of the largest intelligence compromises in U.S. history, and it has not yet been fully remediated.
Do you actually have any reason to think it reads notification contents? This feature has never done anything that made me think it is. (genuine question, I’m in the EU and we don’t have Apple Intelligence here)
2. "Show content in Search", uses Apple Spotlight to index all app data. For an E2EE messenger, that is not only notifications, but all text/image/audio data in message history.
As stated at the top of this subthread, these menu options preceded Apple Intelligence by several years. Implementation would have changed over time.
Dear Siri-Clippy, you were never granted permission to spider every decrypted message in E2EE messaging apps. Since you granted yourself this permission by default, please provide a detailed report of all data derived from spidered data, and instructions on how to securely delete said data from disk.