34
you are viewing a single comment's thread
view the rest of the comments
[-] WhatAmLemmy@lemmy.world 2 points 11 months ago* (last edited 11 months ago)

There's also no way to validate that Apple's E2EE operates as stated. They could have added a backdoor for themselves or "intelligence" agencies, and we have no way of knowing other than "trust us". Even if the source code is ever leaked (or a backdoor exploited by hackers), it could be written with plausible deniability — in such a way that it could be interpreted as unintentional (a bug/error).

This is why you should never trust closed source code with your sensitive data, and encrypt it yourself using open source, widespread/trusted, audited tools before uploading it to someone else's computer.

this post was submitted on 02 Sep 2023
34 points (64.7% liked)

Apple

17117 readers
71 users here now

Welcome

to the largest Apple community on Lemmy. This is the place where we talk about everything Apple, from iOS to the exciting upcoming Apple Vision Pro. Feel free to join the discussion!

Rules:
  1. No NSFW Content
  2. No Hate Speech or Personal Attacks
  3. No Ads / Spamming
    Self promotion is only allowed in the pinned monthly thread

Lemmy Code of Conduct

Communities of Interest:

Apple Hardware
Apple TV
Apple Watch
iPad
iPhone
Mac
Vintage Apple

Apple Software
iOS
iPadOS
macOS
tvOS
watchOS
Shortcuts
Xcode

Community banner courtesy of u/Antsomnia.

founded 1 year ago
MODERATORS