Have you verified their encryption method? Where is the source code? Where is the third party public audit that verifies that it’s implemented properly with no other means of access?
Blindly trusting that they say it’s encrypted is basically the same as no encryption
On top of being privacy focused themselves, they are only working with AI parters who also pass a third party code review verifying that zero user data is stored.
Shit on Apple for not being repairable, sure. Shit on Apple for their walled garden, sure. But shitting on Apple over privacy is insane. They are they only big tech company that actually cares.
I mean, None of these appeared to specifically be about the air tag. But it is at least does help show a general overall commitment to security. So it’s not as if it’s not a huge point in favor of trusting that the airtag data is safe
Have you verified their encryption method? Where is the source code? Where is the third party public audit that verifies that it’s implemented properly with no other means of access?
Blindly trusting that they say it’s encrypted is basically the same as no encryption
On top of being privacy focused themselves, they are only working with AI parters who also pass a third party code review verifying that zero user data is stored.
Shit on Apple for not being repairable, sure. Shit on Apple for their walled garden, sure. But shitting on Apple over privacy is insane. They are they only big tech company that actually cares.
Here is the documentation regarding third party verification of their security claims.
https://support.apple.com/en-ca/guide/certifications/apc3cea61877b/web
I’m assuming for some reason this is not good enough for you?
I mean, None of these appeared to specifically be about the air tag. But it is at least does help show a general overall commitment to security. So it’s not as if it’s not a huge point in favor of trusting that the airtag data is safe
Removed by mod
This is made up fantasy land paranoia. Charlie Day with a big board shit.
Yep apple is secretly grabbing data that not one privacy expert has found. Just like those sneaky Alexas that are always listening to me.