Hacker News new | past | comments | ask | show | jobs | submit login

Disabling end to end encryption is always “one configuration change” away, presumably by substituting keys. How closely do you keep track of which keys are used to encrypt Health data - which is end to end encrypted - versus photos - which are not?



If Apple substitutes keys, then that is a detectable event (by jailbroken devices) and that would make news.

This is Apple explicitly announcing they are actively backdooring all iOS and Mac devices, and using your CPU cycles to determine whether you should be reported to the government.


Not really. Key management is done by the SEP, which can’t be introspected. And again, database updates take an iOS update so the back door threat is the exact same.


> database updates take an iOS update

macOS already supports silent database updates, for example for Gatekeeper and MRT signatures.

Why wouldn’t Apple use this feature on iOS, too?


Because it’s bad for privacy.


What do you mean by that?




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: