Apple’s encryption is not enough

Apple encrypts your data but Apple also can easily look at your files and information, exactly like FBI, CIA, NSA, and other agencies. Apple can look at your photos, read your private notes, save a copy of your messages and chats, and follow up your communications easily.

Apple does encrypt your data but only with its own private key. Your sensitive data are not encrypted with your own key, rather with what Apple controls. It means whoever encrypts the data (in this case, Apple) can also decrypt them.

Apple is very proud of its privacy policies and advertises a lot about it but what Apple doesn’t explain about this encryption, is how it works.

Apple dances around the encryption saying that your data are encrypted “in transit” and “on server” but this encryption is as unacceptable as Zoom’s, Facebook’s, or Google’s encryption.

While ago, Zoom announced that it’s going to encrypt users’ data “end-to-end” only for paying users and a lot of people complained about it. If what Zoom does is wrong, so is Apple.

iCloud and our device backups hold a lot more of our sensitive, private data than our video calls do, and over a much longer time-span.

Zoom doesn’t end-to-end encrypt the contents of individual calls. Apple fails to end-to-end encrypt your entire device backup, which contains your complete message history for every single iMessage and SMS conversation you have ever had on the device, without time limitation.

Published by

Avatar photo

Ali Reza Hayati

Entrepreneur, hacker, cypherpunk.