this post was submitted on 21 Feb 2025
132 points (99.3% liked)

Technology

63134 readers
3514 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
top 12 comments
sorted by: hot top controversial new old
[–] Ulrich@feddit.org 47 points 2 days ago* (last edited 2 days ago)

Apple's decision to disable the feature for U.K. users could well be the only reasonable response at this point

Hard disagree. The most reasonable response would be to refuse to comply, organize, and fight it in court. But that would cost them money. And they don't care about their users that much.

E: Meta says they will not comply

[–] drop_and_run@sh.itjust.works 4 points 2 days ago* (last edited 2 days ago) (2 children)

Troubling precedent, but I expect no one used this anyways. Anybody who needs this would be smart enough to know not to trust so proprietary a device and service.

Given how ~~readily Apple has rolled over for law enforcement in the past~~ loudly Apple has opposed working with law enforcement in the past, only for devices to be magically unlocked anyways, this is (probably) just security theater.

[–] masterofn001@lemmy.ca 18 points 2 days ago* (last edited 2 days ago) (1 children)

Yeah, it's 3rd party vendors like greykey and cellibrite that allow LEO to get around apples security.

To its credit, apple does a fairly decent job of staying ahead of the unlocking tech, but some older hardware and os are easily cracked.

https://cybersecuritynews.com/phones-cellebrite-tool-can-unlock/

[–] JigglySackles@lemmy.world 2 points 17 hours ago* (last edited 17 hours ago) (1 children)

Is this Hardware or software dependent when it comes to Android? Do you know? Curious about whether moving to graphene would even matter.

Edit: Found the following discussion. https://discuss.grapheneos.org/d/14344-cellebrite-premium-july-2024-documentation

[–] masterofn001@lemmy.ca 1 points 12 hours ago* (last edited 12 hours ago)

It is both. But graphene is the way.

I was reading some of the Graphene forum discussion the other day. Basicaly, grapheme is the only os on any hardware that concerns LEO and courts.

Reading about the one country where when graphene is found on a phone they automatically declare it "uncontrolled" and a "criminal tool".

https://discuss.grapheneos.org/d/7658-potential-appearances-of-grapheneos-in-mobile-forensic-reports/35

[–] reddig33@lemmy.world 14 points 2 days ago* (last edited 2 days ago) (2 children)

Do you have citations for “Apple has rolled over for law enforcement in the past”? I’m wondering if this is country-specific.

Fortunately you can still back up your devices locally, and store your photos locally, and these backups can be encrypted.

[–] ozymandias117@lemmy.world 1 points 19 hours ago* (last edited 19 hours ago) (1 children)

I don't know about other countries, but Apple itself reports that it provided access to customer accounts at the US government's request 90% of the time

https://www.apple.com/legal/transparency/us.html

@drop_and_run@sh.itjust.works

[–] reddig33@lemmy.world 1 points 18 hours ago* (last edited 18 hours ago) (1 children)

With a warrant. Fortunately end to end encryption is still available in the US (for now).

[–] ozymandias117@lemmy.world 1 points 16 hours ago* (last edited 16 hours ago) (1 children)

Sure, but if that's your only concern, then you aren't really concerned that the toggle is removed in the UK, either

The report is that Apple is removing the user's ability to disable Apple's back door, and you asked for evidence that they roll over for law enforcement

If you want governments to have access to a backdoor to what Apple touts as "Privacy," your initial question doesn't make much sense

[–] reddig33@lemmy.world 1 points 14 hours ago (1 children)

Your definition of “rolling over” is different than mine.

  • They’re requiring a warrant for the information. They don’t just hand over stuff at any request.
  • They review the warrant before handing over the data. They don’t provide data in 100% of cases.
  • They offer users end to end encryption, which would certainly make it difficult for the data recipient to decrypt if the data is handed over.
  • They don’t offer the government a “backdoor” to make it easy to decrypt user data.
  • They offer users the option to encrypt and store the data locally rather than uploading it to Apple.

What would you have them do differently when the warrants issued are valid in the legal sense/approved by a judge?

[–] ozymandias117@lemmy.world 1 points 13 hours ago* (last edited 13 hours ago)
  • They don’t offer the government a “backdoor” to make it easy to decrypt user data.

Is what's being discussed. Since Apple has a backdoor in the default configuration of their phone, they're able to comply with 90% of all data requests.

The UK is demanding they remove the option to disable the backdoor in their encryption

You can kind-of sort-of use local only, but Apple makes that very inconvenient and almost 0 users do

Your definition of “rolling over” is different than mine. ... What would you have them do differently when the warrants issued are valid in the legal sense/approved by a judge?

Again, your comments are agreeing with their decision to not allow full end to end encryption.

I would have them not able to decrypt my data at all

[–] drop_and_run@sh.itjust.works 3 points 2 days ago

Apple-FBI encryption dispute

My recollection was erroneous, as I can't (easily) find evidence of them rolling over. But the devices in question still got unlocked, so in the end it didn't matter whether Apple (openly or surreptitiously) cooperated.