1010
you are viewing a single comment's thread
view the rest of the comments
[-] lseif@sopuli.xyz 6 points 8 months ago

e2ee is almost meaningless on a closed source app or system... whats stopping them from sending a copy of your files unencrypted?

[-] heavyboots@lemmy.ml -1 points 8 months ago* (last edited 8 months ago)

Well, it would most likely show up in the network traffic if they were doing that for starters. And no one doing security analysis on iOS has ever mentioned that AFAIK. And since Apple bases about 90% of their marketing on protecting your privacy, that would be very bad for them as a company.

I mean, what’s stopping someone poisoning a library on open source? That’s actually provably happened.

Which is not to ding open source, which I quite like too. Just saying you are running certain risks no matter what you choose and in a phone OS, if you just want it to work and not think about it, I personally feel like Apple is a decent risk still.

[-] ArcaneSlime@lemmy.dbzer0.com 2 points 8 months ago

Apple bases about 90% of their marketing on protecting your privacy,

LOL "We have access to all your data and use it to target ads and any goddamn thing else we want to do, but we don't sell it to third parties, we just take the third party's wishes and shove them down customer throats ourselves! It's not much better, but it is better."

[-] lseif@sopuli.xyz 1 points 8 months ago

you think apple wouldnt abuse customer data just because of its brand image? thats awfully trusting of a comany which has been proven to scan 'private' icloud images. most of their customers either 1) don't care 2) will believe it's somehow justified 3) will forget soon enough

the great thing about open source is that people can audit it. and for a big project like android (aosp, grapheneos, etc -- as a parallel), people will. any new commits will be analyzed by maintainers. of course its not impossible, but its a lot less likely than anything closed source, where developers are forbidden to disclose any details to the public.

but if youre willing to use siri and icloud despite the privacy concern, that is fine; every solution is a compromise.

[-] heavyboots@lemmy.ml 2 points 8 months ago

*blink blink*

Scan private iCloud images? What part of the E2E did you miss? Also, if this is the plan I think you’re talking about for CSAM, they actually abandoned that, even though it was a pretty decent plan…

[-] lseif@sopuli.xyz 1 points 8 months ago

so because they say that they wont scan your images, you just trust them? the fact that Apple had planned to is evidence enough that they could and possibly do. again, there is no way to prove that they don't.

do you understand what i'm saying when i say "e2ee is almost meaningless on a closed source app"? you are taking their word on whether they know your private key, or even encrypt your data at all. to encrypt a file properly, use a local opensource program (gpg) before ever letting Apple touch it.

btw, have you heard of the case where a persons picture was flagged as csam, when it was sent to the kids doctor in lockdown? these filters are not perfect, and can ruin someones reputation. any pedophile with even a glint of common sense would avoid proprietry spyware (iCloud) anyway, or at the very least encrypt manually.

again, your privacy is being eroded in the name of "saving the children".

[-] heavyboots@lemmy.ml 0 points 8 months ago

Everything you’ve said aside from the CSAM scan doctor thing has absolutely nothing to back it up so far. (And for the record, I absolutely agree CSAM scanners can be wrong—a human needs to be involved at some level, which they were in the system Apple devised. At any rate, I guess this convo is over as we obviously inhabit very different worlds.

[-] lseif@sopuli.xyz 1 points 8 months ago

well if youre not willing to accept that Apple does not have your best interest at heart, then I suppose this conversation is over

this post was submitted on 15 Mar 2024
1010 points (94.8% liked)

linuxmemes

21281 readers
12 users here now

Hint: :q!


Sister communities:


Community rules (click to expand)

1. Follow the site-wide rules

2. Be civil
  • Understand the difference between a joke and an insult.
  • Do not harrass or attack members of the community for any reason.
  • Leave remarks of "peasantry" to the PCMR community. If you dislike an OS/service/application, attack the thing you dislike, not the individuals who use it. Some people may not have a choice.
  • Bigotry will not be tolerated.
  • These rules are somewhat loosened when the subject is a public figure. Still, do not attack their person or incite harrassment.
  • 3. Post Linux-related content
  • Including Unix and BSD.
  • Non-Linux content is acceptable as long as it makes a reference to Linux. For example, the poorly made mockery of sudo in Windows.
  • No porn. Even if you watch it on a Linux machine.
  • 4. No recent reposts
  • Everybody uses Arch btw, can't quit Vim, and wants to interject for a moment. You can stop now.
  •  

    Please report posts and comments that break these rules!


    Important: never execute code or follow advice that you don't understand or can't verify, especially here. The word of the day is credibility. This is a meme community -- even the most helpful comments might just be shitposts that can damage your system. Be aware, be smart, don't fork-bomb your computer.

    founded 1 year ago
    MODERATORS