Are there even viable alternatives to iCloud or cloud in general?

Some folks are treating this more like a drama show rather than a serious issue.

That wasn’t necessary. What are they doing wrong?

4 Likes

If they want to scan files for pedophilia activity, they need to approach a judge with sufficient probable cause to issue a warrant. The US Constitution protects us from unreasonable searches and seizures.

The potential abuses are mind boggling if you have ever studied civil liberties in depth.

Just research Edward Snowden if you think we have much of a right to privacy left.

I highly recommend Carolyn Kennedy’s well-written and well researched book “The Right to Privacy”.

6 Likes

dismantle all your working cloud systems over something that has not yet been implemented

So your idea of when to complain is once you’re sitting down in the last row? Not when the airline proposes downgrading you three classes? :man_facepalming:

I’m likely leaving Apple permanently due to this change. Sure, if you aren’t downloading child porn then you have nothing to worry about. As long as you got your COVID vaccine and don’t question election results and don’t compare Xi to WInnie the Pooh and don’t question where Saudi Arabian journalists dissapeared to after visiting the embassy.

Because the next step after querying for CP images is to query for anti-vaxx information and for selifies from the Capitol building from Jan 6 and for any pro-Hong Kong propaganda.

And maybe you have nothing they’re scanning for on your system. This new feature of iOS 15 will allow a third party like Cellebrite to inject a file with a collision hash onto your device, which triggers iOS to decrypt your files and activate a backdoor.

Yes, that’s literally what Apple said in their press release. The files remain encrypted in iCloud, and Apple cannot see them, unless your local iOS device matches a hash value from the no no list, and then iOS will hand over a decryption key to Apple. Or to Cellebrite. Or to whomever knows how to ask iOS for it. That’s how backdoors work.

There is no slippery slope of what might come next. It’s here. It’s this. An oppressive government can change the hash database lookup values that iOS is looking for. And now it can look for anything they want to find. Or just backdoor the entire phone now based on forcing a hash match. It’s not what might happen in 10 years, it’s what will happen immediately. Of course, by then no one will be able to speak out against it, lest any kind of opposition to this scanning will be part of the no no list as well.

I’ll not be updating iOS anymore and will be exploring Linux and Graphene OS options going forward.

7 Likes

It is so exhausting to see, year after year, “the sky is falling” shouts online where simply nothing happens in the end, especially in Apple-land, and often turns out beneficial (too many examples, also on this forum, to count). Nobody seems to notice that the Gruber piece hypothesizes this could actually pave the way to E2EE in iCloud, which could not have been done before this measure. But sure, cry wolf like all the Internet does. I had thought this forum would be immune to some extent to such knee-jerk reactions, supposedly being more thoughtful and willing to inform itself before crying bloody murder.

Well, I neither have the desire nor the energy for this. Have fun among yourselves – and sincerely, all best wishes. I’m out of this place.

6 Likes

I think it is important to learn to live with opinions you do not like. You are not forced to participate. We probably do not agree on many things, but if we met in person, why should we only argue about things we do not agree on? We could talk about something else, we both enjoy, and just have a good time. Why not just “ignore” topics like this and participate only in ones you do not feel the urge to slam opposing views? There are plenty of topics here, where we can just talk about Apple related stuff without any political overreach.

4 Likes

Just FYI since the announcement academics in the infosec and cryptography space agree that the introduction of this technology will require a redefinition of what can even be called E2EE.

3 Likes

I would have thought knee-jerk reactions are to support Apple for this great cause. But anyway, it’s your choice to not react when the sky is actually falling. Sorry this is not the Apple fanboy circle you imagined.

1 Like

Everyone is entitled to their opinion, let’s please all respect that and keep this place a safe place to discuss the things we enjoy.

2 Likes

They aren’t treating Apple’s misuse of data seriously. This is a major privacy issue that can be addressed without putting on a show in a random internet forum. Some people here are acting like the world is about to collapse on itself over this issue.

I’m so confused by that statement. But go off…

1 Like

But this is the second time you’ve chosen not to participate. Graber’s opinion is just that, an opinion. Perhaps some of us have read and understand the technical underpinnings of what is being implemented. Obvious reasons aside much of the outrage is due to the fact that Apple is implementing a “just trust us” policy that hasn’t adequately been scrutinized by the scientific community. There are PLENTY of examples of poorly implemented encryption; remember the DVD encryption that a kid circumvented with a highlighter? You know, the whole “security through obscurity” thing. Many of us are invested in the Apple ecosystem because of the privacy measures that have been put in place until now.

Assuming that everyone here is reacting out of ignorance or a lack of understanding isn’t fair. Some of us might have a clue…

3 Likes

Which “scientific community” are you referring to?

Let’s be kind to each other. :wink: KillerWhale has a different opinion and has referenced/summarized the point of view as extracted or interpreted from Gruber’s post which he finds more agreeable than “our” position. That’s fine and I think it would definitely be worth discussing in the original thread, if that hadn’t been closed for… I don’t know, reasons. Even if we’d still disagree after a proper discussion of the facts, at least we’d better understand where each other is coming from.

But that discussion should be kept separate from this thread. Let’s try to keep this one focused on the technical side of things.

Graphene OS sounds intriguing from a privacy point of view. One obvious shortcoming seems to be that only Pixel phones are supported for 3 years after their release, officially, which is apparently how long Google offers update support for its own phones. But since Graphene can apparently still be used for other phones to, this probably is not as much of a problem in practice? Since most security issues could probably be fixed by Android/Graphene updates, whereas the risk of security holes from the hardware/firmware level (which is what we couldn’t update ourselves) is hopefully not as impactful?

1 Like

I wasn’t being mean. @anon85228692 if it came off that way it wasn’t my intention. I just think it’s extremely unfair to assume that people are being alarmists (my word not his) because they don’t understand the technology.

1 Like

Chemists… 20 characters…

1 Like

It’s not because they don’t understand the technology. It’s because they’re trying to push their own opinionated agenda on others.

I’m not sure which is grosser? Apple pushing for spyware, or people opposing it have made some technical mistakes in the letter?

It’s ironic that all of the major Apple influencers are defending Apple. First, Apple is trying to gaslight opposing people as pedos, or screeching noises of the minority.

Now these influencers are doing similar things by labelling people as spreading misinformation. The problem is, most of the things in the letter are facts, which none is acknowledged.

I hope we can all agree the intent of the CSAM scanning technology is a good thing. Whether it turns out to be a breach of privacy probably won’t be known for some time, possibly years, IMO.

End-to-end encryption, by common definition, “ensures that a message is turned into a secret message by its original sender, and decoded only by its final recipient”. Apple has announced they will be installing technology to monitor the Messages app. And regardless of the reason why or how it will be used that will break E2E encryption. That is significant because up to now Apple has fought governments to avoid doing that.

The Times They Are a-Changin’

2 Likes