Hacker News new | past | comments | ask | show | jobs | submit login

Do you understand how Apple does true end-to-end encryption with trusted enclave device keys? Or how they can now allow you to prevent Apple themselves from being able to see any of your data?

Do you follow why e.g. third party password vault companies can enable certain key protocols on newer Macs and iOS devices they can't on most other devices?

Apple's not just software. It's not just hardware. It's an experience built from logic expressed in both bits and circuits that works together to provide a solution.

Clamoring to be let into the middle of the stack misunderstands the nature of Apple's product offering, which is a trusted curated experience.

Passing rules against this effectively removes this option from the consumer marketplace, depriving consumers of the full-product (software and hardware seamlessly united to offer a capability impossible when separate) choice.

To be clear, nothing stops anyone else from also offering a comprehensive product with stronger guarantees and richer experience. But it's easier to be mad that Apple's users stay in the walled garden (they are lovely places, btw, there's a reason wealthy people build them!) instead of wanting riff raff to come in hawking their wares strewing litter everywhere. It's easier to incite the pop pitchforks and "we're doing something here" government critters.

Lobbying and propaganda costs less than R&D.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: