2

EXPOSED! The timeline of a rotten Apple!

 2 years ago
source link: https://decentralize.today/exposed-the-timeline-of-an-rotten-apple/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
EXPOSED! The timeline of a rotten Apple!

EXPOSED! The timeline of a rotten Apple!

4 hours ago by Privacy Advocate • 13 min read

All the recent talk about Apple, 'the guys who care about your privacy', has seen them go from "what happen on your iPhone stays on your iPhone" to "but it's all about the children!"

So let's start with CSAM (child sexual abuse material), of course we need to protect our children, and I am sure Apple is trying to do just that, however, the road to hell is paved with good intentions. And let's get this out of the way, Apple was never your friend. And this is where things getting tricky with CSAM.

By doing this on a country by country basis, the hashed file being uploaded to your phone was not prepared by, nor can it be verified by Apple, but it was given to them!. Now let's assume for now that the file only has CSAM hashes on it at this time, what guarantees that this will be the case in the future?

What if a government gives Apple a file that includes other hashes. Perhaps a picture of Winnie the Pooh in China or a picture of an activist they want to locate?

Let's rewind to the mass demonstrations in Hong Kong 2 years back. Apple pulled an app from the store that tracked the locations of both police and demonstrators. Apple's justification was that the app encouraged illegal activities. This, unsurprisingly, was after a vitriolic piece in the People’s Daily (the mouthpiece newspaper of the Chinese Communist Party) stating that:

“Letting poisonous software have its way is a betrayal of the Chinese people’s feelings”.

It showed that Apple would bend to the Chinese Government, after all profits before people, right? However, consider that people could have used the app to avoid getting in to the clashes on their way to work or a Mother not wanting their children to get teargassed?

Consider also that Apple makes most of its hardware in China, and they can't just pull out of their largest market (with the cheapest child labor!) And it didn't stop with the 'crowd' app  as the New York Times app, VPN apps and other news apps were also removed from the Chinese app store.

The new iCloud + Privacy Relay has just launched, but has already been removed in some countries. It shows Apple follows the dictats pf oppressive Governmental 'requests' and guidelines.

Working condition violations have never been a big concern for Apple as these date back so far it is almost ignored yet numerous pieces have appeared over the years exposing these and data manipulation. Below are a selection of some of these, just to give you a flavor for their 'hidden' corporate culture:

Apple's rotten timeline

finfish.png
og-image-logo-social.png
pegatron.jpg?quality=75&strip=all&w=1200&h=630&crop=1

https://www.washingtonpost.com/news/the-switch/wp/2013/12/18/research-shows-how-macbook-webcams-can-spy-on-their-users-without-warning/

timcookimessage-100009671-large.png
_79816738_sleep2.jpg
icloud-hack-tools-inline.jpg

Also in 2014 FSecure discovered - Bob and Alice Discover a Mac OPSEC Issue

yosemite-phone-home
Most-vulnerable-operating-systems-and-applications-in-2014_LK.jpg
iphone-6-plus-321.jpg?quality=70&strip=all
aa93927b-201d-41db-9f25-88df1b434699-2060x1236.jpeg?width=1200&height=630&quality=85&auto=format&fit=crop&overlay-align=bottom%2Cleft&overlay-width=100p&overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctZGVmYXVsdC5wbmc&enable=upscale&s=f8de4267f36b9d53005fbc0ff2eb013b
af47e6a2dc28adcf28eb89b60771d4d7.jpg?auto=compress%2Cformat&ixlib=php-3.3.0
ios-iphone-hacking-password-bypass.jpg
458171393_wide-f3e46c6f88d765d7799ca36607aeef92b532a4e4.jpg?s=1400
https%3A%2F%2Fblogs-images.forbes.com%2Fthomasbrewster%2Ffiles%2F2015%2F03%2FScreen-Shot-2015-03-16-at-10.25.04-1940x1031.png
?m=02&d=20140815&t=2&i=964276686&r=LYNXMPEA7E0AL&w=800
devilrobber-keychain-code.png
NewSafariIconX-150x150.png

https://www.blackhat.com/presentations/bh-usa-09/CHEN/BHUSA09-Chen-RevAppleFirm-PAPER.pdf

apple-siri-voice-data-sharing.jpg
applefoxconnworkers.jpeg?quality=75&strip=all&w=1200&h=630&crop=1
https%3A%2F%2Fspecials-images.forbesimg.com%2Fimageserve%2Fd5c78fad91e44259b17017216cb1ae7a%2F0x0.jpg%3Ffit%3Dscale
3685.jpg?width=1200&height=630&quality=85&auto=format&fit=crop&overlay-align=bottom%2Cleft&overlay-width=100p&overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdG8tZGVmYXVsdC5wbmc&enable=upscale&s=dabbe57def912d002d4fdae6a502c5c1
apple-sign-event-tim-cook.jpg?quality=70&strip=all
TELEMMGLPICT000150619862_trans_NvBQzQNjv4BqpVlberWd9EgFPZtcLiMQfyf2A9a6I9YchsjMeADBa08.jpeg?impolicy=logo-overlay
32bdc1d864fd586094cebc01f10b8ec2?impolicy=wcms_crop_resize&cropH=675&cropW=1207&xPos=630&yPos=400&width=862&height=485
1200x800.jpg
_109052404_hk.jpg
hkmap-live.jpg
3500.jpg?width=1200&height=630&quality=85&auto=format&fit=crop&overlay-align=bottom%2Cleft&overlay-width=100p&overlay-base64=L2ltZy9zdGF0aWMvb3ZlcmxheXMvdGctYWdlLTIwMTkucG5n&enable=upscale&s=9b635c9a118db24d784d900161f8af60
Apples-relationship-with-China.jpg?resize=1200%2C628&quality=82&strip=all&ssl=1

The Washington Post in 2019 - It’s the middle of the night. Do you know who your iPhone is talking to?

The Verge reported in 2019 Apple’s hired contractors are listening to your recorded Siri conversations, too

https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F494297ae-d861-418e-81bf-d667ea881999_764x900.png

https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_garman.pdf

Also in 2020 TheNextWeb reported The FBI is cracking iPhone 11s without Apple’s help, so why does it need a backdoor?

Interesting discussion about facebook and others apps capabilities inside iOS, take it with a grain of salt.

?m=02&d=20200121&t=2&i=1479328224&r=LYNXMPEG0K12X&w=800
1f8fae73-8c2c-4716-b7dd-12e254e97cbf.png?width=780&height=520&rect=2199x1466&offset=1x0
_110809785_mediaitem110809784.jpg

The issue doesn't end if a Government request comes in, but also with false positives.

perchash_source.jpg

Of course this then goes to a human review, but do you feel comfortable that your private pictures, perhaps even of your own children, are being reviewed by someone at Apple? And it does lead to the next big question "if our pictures are E2EE and "not even Apple can see them" how is the human reviewing even possible?"

Let's not forget Pegasus…

pegasus.png

All in all this is not a flattering look at your 'privacy partner', Apple! No, Apple is not your friend, Apple is great at marketing, it started in 1984 where Apple claimed this is why 1984 will never be like 1984. The problem is that them now in 2021 is so much further ahead of Orwell's nightmarish Blueprint! Do you really want to trust Apple in its closed garden setup with this new method to 'protect children'?

Don't get me wrong, I want to believe, but a lot of things can be going awry. I am not saying it will, and if it is only "appropriate and approved" CSAM hashes that are scanned by the phone or device and nothing else can ever be added then all well and good, Apple claims there is "almost no way to get a false positive" and that sounds good but in the end we need to trust that Apple will not add anything else, nor that governments will force them to send one more hash...

Apple addressed these concerns in a rushed FAQ file:

https://www.apple.com/child-safety/pdf/Expanded_Protections_for_Children_Frequently_Asked_Questions.pdf

However, all I read out of this is "trust us"! But why would we? They failed people in Hong Kong before where one wrong hash reported to a bad government can cost lives. And it is something I just don't feel comfortable recommending. Thankfully we have options, such as Linux, GrapheneOS or CalyxOS.

Till we meet again in another episode of EXPOSED!

The link has been copied!

About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK