Apple loves privacy!

Welcome to our community

Be a part of something great, join today!

magnifier661

B-A-N-A-N-A-S!
Joined
Oct 2, 2009
Messages
59,328
Likes
5,588
Points
113
http://news.investors.com/091714-71...e-model.htm?ven=yahoocp&src=aurlled&ven=yahoo

Apple Won't Unlock Your iOS8 iPhone, iPad For Police

Apple Won't Unlock Your iOS8 iPhone, iPad For Police
Apple (NASDAQ:AAPL) announced Wednesday night that it will no longer help law enforcement unlock iPhone, iPad and other devices running its new mobile operating system, iOS8. In fact, the tech titan says it can't.

"On devices running iOS 8, your personal data such as photos, messages (including attachments), email, contacts, call history, iTunes content, notes, and reminders is placed under the protection of your passcode," Apple said on its Web site . "Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data. So it's not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8."

The Supreme Court ruled earlier this year that police usually must get a search warrant to access suspects' cellphones. Apple's new encryption makes it impossible to comply.

The new privacy policy may be savvy move following the recent disclosure of leaked nude celebrity photos from iCloud accounts. More broadly, Edward Snowden's disclosure of widespread spying by the National Security Agency has heightened privacy concerns. Major tech companies have announced government requests for user information, with Yahoo (NASDAQ:YHOO) recently claiming that the government threatened major fines for noncompliance.

Meanwhile, Apple CEO Tim Cook took a swipe at rivals Google (NASDAQ:GOOGL) and Facebook (NASDAQ:FB), without actually naming them:

"A few years ago, users of Internet services began to realize that when an online service is free, you're not the customer. You're the product. But at Apple, we believe a great customer experience shouldn't come at the expense of your privacy. ... We don't 'monetize' the information you store on your iPhone or in iCloud. And we don't read your email or your messages to get information to market to you."

Of course, Facebook, Google, Twitter (NYSE:TWTR) and other consumer tech giants are able to offer many services for free. Apple charges premium prices for its products. It monetizes its customers from its customers.
 
Yeah. its fucking great, their latest security measure is to email your icloud email account everytime someone logs into the account via browser.
 
Yeah. its fucking great, their latest security measure is to email your icloud email account everytime someone logs into the account via browser.

The cops log on your account? Like are they hackers? How dare the policemen
 
That seems like a good feature to me. And how does this make apple not protect privacy? I like knowing that the government can't access my account, even with a warrant

Its one of their so-called security measures in the wake of the Fappening. Its basically overcompensating and being lazy at the same time by their security team.

And this is only for your device. the cloud is another matter.
 
Its one of their so-called security measures in the wake of the Fappening. Its basically overcompensating and being lazy at the same time by their security team.

And this is only for your device. the cloud is another matter.

I do like the reference that cook said about Google. "You are the product not the customer".

So it's nice knowing no government can't force apple to give access of my email or phone information
 
I don't ever remember logging into iCloud with a browser. Ok, maybe a couple of times.

If you are getting these emails, you've probably been hacked. Better to know about it than not.

Where's the beef?
 
I don't ever remember logging into iCloud with a browser. Ok, maybe a couple of times.

If you are getting these emails, you've probably been hacked. Better to know about it than not.

Where's the beef?

Exactly... I can't even remember when I logged in from a browser
 
I do like the reference that cook said about Google. "You are the product not the customer".

So it's nice knowing no government can't force apple to give access of my email or phone information

Sure they can. Just not your unlock code on your iOS based physical device. They can still access anything else, including your laptop or cloud information.
 
Sure they can. Just not your unlock code on your physical device. They can still access anything else.

The article said that apple set the new security to where even apple couldn't have access. Are you disagreeing with what they say?
 
The article said that apple set the new security to where even apple couldn't have access. Are you disagreeing with what they say?

The article is only referring to devices running iOS, which would only be an ipad or an iphone. So they can't get into your locked iphone or ipad. That's all it says.
 
The article is only referring to devices running iOS, which would only be an ipad or an iphone. So they can't get into your locked iphone or ipad. That's all it says.

That's all I care about. My personal computer, they must contact me to get the info. Then I will know I'm being watched
 
I'm pretty sure they can access cloud based information without your consent, which again, is probably almost everything on your cell phone.
 
https://www.apple.com/legal/more-resources/law-enforcement/

III. Information Available From Apple
A. Device Registration Information
Basic registration or customer information, including, name, address, email address, and telephone number is provided to Apple by customers when registering an Apple device. Apple does not verify this information, and it may not be accurate or reflect the device’s owner. Additionally, the date of registration, purchase date and device type may also be included. This information can be obtained with a subpoena or greater legal process.

B. Customer Service Records
Contacts that customers have had with Apple customer service regarding a device or service may be obtained from Apple. This information may include records of support interactions with customers regarding a particular Apple device or service. Additionally, information regarding the device, warranty, and repair may also be available. This information can be obtained with a subpoena or greater legal process.

C. iTunes Information
iTunes is a free software application which customers use to organize and play digital music and video on their computers. It’s also a store that provides content for customers to download for their computers and iOS devices. When a customer opens an iTunes account, basic subscriber information such as name, physical address, email address, and telephone number can be provided. Additionally, information regarding iTunes purchase/download transactions and connections, update/re-download connections, and iTunes Match connections may also be available. iTunes subscriber information and connection logs with IP addresses can be obtained with a subpoena or greater legal process. iTunes purchase/download transactional records can be obtained with an order under 18 U.S.C. §2703(d) or court order meeting the equivalent legal standard. A search warrant is required for Apple to provide the specific content purchased or downloaded.

D. Retail Store Transactions
Point of Sale transactions are cash, credit/debit card, or gift card transactions that occur at an Apple Retail Store. A subpoena or greater legal process is required to obtain information regarding the type of card associated with a particular purchase, name of the purchaser, email address, date/time of the transaction, amount of the transaction, and store location. When providing legal process requesting Point of Sale records, include the complete credit/debit card number used and any additional information such as date and time of transaction, amount, and items purchased. Additionally, law enforcement may provide Apple with the receipt number associated with the purchase(s) in order to obtain duplicate copies of receipts, in response to valid legal process.

E. Apple Online Store Purchases
Apple maintains information regarding online purchases including name, shipping address, telephone number, email address, product purchased, purchase amount, and IP address of where a purchase was made. A subpoena or greater legal process is required in order to obtain this information. When requesting information pertaining to online orders (excluding iTunes purchases), a complete credit/debit card number, an order number, reference number, serial number of the item purchased, or customer number is required.1

F. iTunes Gift Cards
iTunes gift cards have a sixteen-digit alphanumeric redemption code which is located under the “scratch-off” gray area on the back of the card, and a nineteen-digit code at the bottom of the card. Based on these codes, Apple can determine whether the card has been activated2 or redeemed as well as whether any purchases have been made with the card. When iTunes gift cards are activated, Apple records the name of the store, location, date, and time. When iTunes gift cards are redeemed through purchases made on the iTunes store, the gift card will be linked to a user account. iTunes Gift Cards purchased through the Apple Online Store can be located in Apple systems by their Apple Online Store order numbers (note: this only applies to iTunes Gift Cards purchased through Apple as opposed to third-party retailers). Information regarding the customer who redeemed the cards will require a subpoena, and information about online iTunes store purchases made with the card will require a court order or greater legal process.

G. iCloud
iCloud is Apple’s cloud service that allows customers to access music, photos, applications, contacts, calendars, and documents from their iOS devices and Mac or Windows personal computers. It also enables customers to back up their iOS devices to iCloud. With the iCloud service, customers can get an iCloud.com email account. iCloud email domains can be @icloud.com, @me.com3 and @mac.com. The following information is available from iCloud.

i. Subscriber Information
When a customer sets up an iCloud account, basic subscriber information such as name, physical address, email address, and telephone number may be provided to Apple. Additionally, information regarding iCloud feature connections may also be available. iCloud subscriber information and connection logs with IP addresses can be obtained with a subpoena or greater legal process.

ii. Mail Logs
iCloud mail logs are retained for approximately a period of 60 days. Mail logs include records of incoming and outgoing communications such as time, date, sender email addresses, and recipient email addresses. This information is available only through a court order under 18 U.S.C. § 2703(d) (or a court order with an equivalent legal standard) or a search warrant.

iii. Email Content
iCloud only stores the email a user has elected to maintain in the account while the customer’s account remains active. Apple is unable to produce deleted content. Apple will produce customer content, as it exists in the customer’s mailbox in response to a search warrant.

iv. Other iCloud Content. PhotoStream, Docs, Contacts, Calendars, Bookmarks, iOS Device Backups
iCloud only stores the content for these services that the customer has elected to maintain in the account while the customer’s account remains active. Apple does not retain deleted content once it is cleared from Apple’s servers. Apple will produce customer content in these categories only in response to a valid search warrant.

H. Find My iPhone
Find My iPhone is a customer-enabled feature by which a customer is able to locate his/her lost or misplaced iPhone, iPad, iPod touch or Mac and/or take certain actions, including locking or wiping the device. More information about this service can be found at https://www.apple.com/icloud/features/#fmip. Location information for a device located through the Find My iPhone feature is customer facing and Apple does not have records of maps or email alerts provided through the service. Find My iPhone connection logs may be available and can be obtained with a subpoena or greater legal process. Find My iPhone transactional activity for requests to remotely lock or erase a device may be available if utilized by the customer. Information about remote erase/wipe is available only through a court order under 18 U.S.C. § 2703(d) or a court order with equivalent legal standard, or a search warrant.

Apple cannot activate this feature on customers’ devices upon a request from law enforcement. The Find My iPhone feature has to have been previously enabled by the customer for that specific device. Apple does not have GPS information for a specific device.

I. Extracting Data from Passcode Locked iOS Devices
Upon receipt of a valid search warrant, Apple can extract certain categories of active data from passcode locked iOS devices. Specifically, the user generated active files on an iOS device that are contained in Apple’s native apps and for which the data is not encrypted using the passcode (“user generated active files”), can be extracted and provided to law enforcement on external media. Apple can perform this data extraction process on iOS devices running iOS 4 or more recent versions of iOS. Please note the only categories of user generated active files that can be provided to law enforcement, pursuant to a valid search warrant, are: SMS, photos, videos, contacts, audio recording, and call history. Apple cannot provide: email, calendar entries, or any third-party App data.

The data extraction process can only be performed at Apple’s Cupertino, CA headquarters for devices that are in good working order. For Apple to assist in this process, the language outlined below must be included in a search warrant, and the search warrant must include the serial or IMEI number of the device. For more information on locating the IMEI and serial number of an iOS device, refer to http://support.apple.com/kb/ht4061.

So basically they can no longer get item "I" in bold.
 
I'm pretty sure they can access cloud based information without your consent, which again, is probably almost everything on your cell phone.

http://news.investors.com/091714-71...e-model.htm?ven=yahoocp&src=aurlled&ven=yahoo

"On devices running iOS 8, your personal data such as photos, messages (including attachments), email, contacts, call history, iTunes content, notes, and reminders is placed under the protection of your passcode," Apple said on its Web site . "Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data. So it's not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8."

The Supreme Court ruled earlier this year that police usually must get a search warrant to access suspects' cellphones. Apple's new encryption makes it impossible to comply.

The iCloud is linked to the passcode. The encryption is the new update that doesn't allow anyone access.
 
The iCloud is linked to the passcode. The encryption is the new update that doesn't allow anyone access.

No it isn't. The passcode only lets you into the phone past the lock screen. You don't know what you're talking about.
 
No it isn't. The passcode only lets you into the phone past the lock screen. You don't know what you're talking about.

Duh.

The deal was the cops used to be able to pull you over for a broken tail light and then search your phone for incriminating pictures, browser history, text message history, voice mails, emails, Facebook posts, tweets, etc.

http://www.cnn.com/2014/06/25/justice/supreme-court-cell-phones/

Apple is securing the phone, though the cops might torture you to make you give up the password.
 
No. You're just interpreting what they are saying in their press release incorrectly.

If they were to ask me to unlock my phone and I tell them to eat a dick, they can't go to apple to unlock it with a warrant right?
 
Duh.

The deal was the cops used to be able to pull you over for a broken tail light and then search your phone for incriminating pictures, browser history, text message history, voice mails, emails, Facebook posts, tweets, etc.

http://www.cnn.com/2014/06/25/justice/supreme-court-cell-phones/

Apple is securing the phone, though the cops might torture you to make you give up the password.

They can still subpoena your pictures on icloud, browser history (which is synced I believe on Safari), text messages (may be on iMessage in the cloud), voice mails (through your cell phone provider), emails, facebook posts, tweets, etc. The process of getting the unlock code for any code for the phone is probably just as easy, if not easier than getting this information elsewhere. Everything is synced. Icloud and your keychain account. Its a false sense of security if you're serious about privacy.
 
Look at "The Fappening". None of that information was leaked by bypassing any of these privacy methods that a police officer or warrant could get off your phone, which you are so excited about. That was all extracted via iCloud vulnerabilities.
 
They can still subpoena your pictures on icloud, browser history (which is synced I believe on Safari), text messages (may be on iMessage in the cloud), voice mails (through your cell phone provider), emails, facebook posts, tweets, etc. The process of getting the unlock code for any code for the phone is probably just as easy, if not easier than getting this information elsewhere. Everything is synced. Icloud and your keychain account. Its a false sense of security if you're serious about privacy.

They could, unless you don't update them in iCloud. You have that option. So the only access would be through your phone.
 
They could, unless you don't update them in iCloud. You have that option. So the only access would be through your phone.

Sure, you can do that. That phone is pretty useless then.

The incoming/outgoing emails will still go through a server though. You'd have to use a pop email account through your own hosted server if you really want to be "secure".

Texts and voicemails are stored by your cell phone provider.

So I guess if you take photos on your phone, turn off icloud, turn off most features and never download or share them, don't log into facebook, twitter, or gmail and don't use your cell phone or accept voice mail or text messages they won't be able to access anything.
 
Last edited:
They can still subpoena your pictures on icloud, browser history (which is synced I believe on Safari), text messages (may be on iMessage in the cloud), voice mails (through your cell phone provider), emails, facebook posts, tweets, etc. The process of getting the unlock code for any code for the phone is probably just as easy, if not easier than getting this information elsewhere. Everything is synced. Icloud and your keychain account. Its a false sense of security if you're serious about privacy.

Right.

But they can't search it after pulling you over for a busted tail light. Fishing for something bigger to bust you on.

They actually need to get a warrant, which requires probably cause for the thing they want to bust you on.
 
Sure, you can do that. That phone is pretty useless then.

The incoming/outgoing emails will still go through a server though. You'd have to use a pop email account through your own hosted server if you really want to be "secure".

Texts and voicemails are stored by your cell phone provider.

So I guess if you take photos on your phone, turn off icloud, turn off most features and never download or share them, don't log into facebook, twitter, or gmail and don't use your cell phone or accept voice mail or text messages they won't be able to access anything.

Total hyperbole. The text and phone calls must be on your cellphone provider, but once you use the wifi calling, they won't be able to get them. Also, the phone numbers can only be accessed. They won't have access to the voice calls.

But whatever the case, it's more secure than google by far. I'm also very grateful that I'm a customer, not a product as Cook explained.
 
Total hyperbole. The text and phone calls must be on your cellphone provider, but once you use the wifi calling, they won't be able to get them. Also, the phone numbers can only be accessed. They won't have access to the voice calls.

But whatever the case, it's more secure than google by far. I'm also very grateful that I'm a customer, not a product as Cook explained.

Who do you use for email?
 

Users who are viewing this thread

Back
Top