By saying that, aren’t you also saying “screw you” to the victims of crimes that could be solved with just a little more information? Maybe that last missing piece to solve a kidnapping or worse?Haha. Sorry, screw you, FBI.
Definitely. I have a friend who works in this field and he says a lot of apps on the App Store sell all kinds of data. That’s one of the reasons I’m a bit suspicious of Apple’s privacy marketing. If they really cared about privacy, they wouldn’t allow any apps to collect or sell anything. My friend says a lot of the weather apps are really bad when it comes to privacy. He said the weather channel is by far the worst when it comes to selling location data. Personally I don’t really trust anything any of these companies say, including Apple. The privacy ship sailed a looooong time ago.Most apps pull some kind of location data. Google is the worst offender.
I think most people can see it both ways. The problem is, how do you not collect data but also collect it for when it might be lifesaving? We might all be able to see it both ways, but we can’t have it both ways.This is a weird thing to unambiguously celebrate. Sure, it's good that Apple isn't tracking me and sending my data to the NSA 24/7 just for kicks, but what if Danelo Cavalcante had had an iPhone on him? Would've been nice if Apple could assist law enforcement in narrow cases like that, right?
Is there anyone out there who can kinda see this both ways? Just me?
Yall really believe this??this is why I am an Apple sheep
Yes, it is the same thing. That ‘unreadable data’ is unreadable, as you put it. There’s nothing that law enforcement can do with it. I don’t see your point.What about “significant locations”?
Settings > Privacy > Location Services > System Services > Significant Locations
The note says it’s ”end-to-end encrypted and cannot be read by apple”. So… if this is enabled, Apple could be storing location data on your behalf that they allegedly cannot read.
Unreadable data is not the same thing as “Apple does not have any data to provide in response to geofence requests.”
Yes. Why would they lie? If there’s anything misleading about this it’s definitely by omission. Outright making a false statement seems like a weird liability, especially in this kind of document that few people are interested in and even fewer will read.Yall really believe this??
lol Apple & all these corporations all with the US corporation I mean Gov
For full phone access, as if they had the passcode? I'd heard that as long as you have a passcode, and have touch/face ID disabled, they can't force you to share your passcode and thus they can't get in.
In this scenario, law enforcement could quickly and easily get a warrant to track his location via cell carriers. We have to always balance the line between government overreach and privacy.This is a weird thing to unambiguously celebrate. Sure, it's good that Apple isn't tracking me and sending my data to the NSA 24/7 just for kicks, but what if Danelo Cavalcante had had an iPhone on him? Would've been nice if Apple could assist law enforcement in narrow cases like that, right?
Is there anyone out there who can kinda see this both ways? Just me?
I appreciate you taking the time to explain. So when in doubt, turn the phone off.Incorrect. There are tools that can instantly access the device as long as the device is in what is called "after first unlock" or AFU mode. There are tools that can brute force the device to obtain the passcode. Some phones can be accessed in seconds. Some take months. Using an alpha-numeric passcode pretty much guarantees your phone will take millions of years to unlock unless the passcode is common. Give a search to AFU and BFU mode.
As far as access, once the device is accessed, the entire phone is fair game. Even things like Snapchat's "My Eyes Only" can be obtained easily without the passcode for that part of the Snapchat application.
I know where they are!Good now the government won’t know where I hid my funko pops
Not so much that they are happy to. They have to as geofence requests require a search warrant. But sometimes cell providers object to large geofence areas with tens of thousands of devices within the zone.
Source: am retired detective who wrote/served these warrants
LE needs people's permission take their data without a search warrant. And by the time they have enough on someone for that, it's too late to go back and track them. However, people click "agree" on terms and conditions that give companies permission to collect their data. And now when LE has reason to get a search warrant there is already a treasure trove of data to retrieve.Oh yeah, and more. Data that's illegal for law enforcement to collect is legal for corporations to collect and sell to LEOs. 🙃
Some of those requests require an unreasonable amount of manpower and thus they object to the warrant being too broad. They require a smaller time frame or location data.Why would they object? Is it because they can’t charge for it? After all it’s no more effort, it’s just lines of data for them to send.
Not a problem. I'm a firm believer in law enforcement playing by the rules (Constitution) when doing their jobs. I taught 4th Amendment issues in the academy and specialized in electronic search law.I appreciate you taking the time to explain. So when in doubt, turn the phone off.
Any insights on equivalent vulnerabilities to a Mac with a long password and FileVault turned on?
I am not sure if it counts as an answer to your question but I am heard that there are proprietary mobile OS's that are being used usually by the government officials.So...are there people who in 2023 use their mobile phone as a device that might be secure and safe?
It’s materially the same.Unreadable data is not the same thing as “Apple does not have any data to provide in response to geofence requests.”
Unknown, depending on hardware and iOS. Doing so will be via exploits, and those are patched over time. New ones sometimes show up and are used.They can do this even with an iPhone? Even without the passcode?
This is speculation, as for current devices and iOS.Yes
Edit: it’s more nuanced that that but in many cases yes they can. You can do things to make it more difficult.
Speculation, see above. This has definitely been done in the past.Incorrect. There are tools that can instantly access the device as long as the device is in what is called "before first unlock" or BFU mode. There are tools that can brute force the device to obtain the passcode.
Keep in mind that the other person is speculating. We don’t have that information. Apple isn’t interested in such access, obviously, so the means used to get it are closed with updates.I appreciate you taking the time to explain. So when in doubt, turn the phone off.
Ah - so you think. I sneak in to your home and take your phone with me when I am doing MY crimes, then sneak back to return it later!! 🤣🤣🤣this is why i leave my phone at home while i’m out doing my crimes
T-Mobile would be first in line with the security breaches always happeningIt’s great to have confirmation that Apple does not collect this data. However, I’m sure the cell service providers are more than happy to turn it over, so I’m not sure it matters whether Apple collects it or not.