{"id":17372,"date":"2020-01-08T08:30:03","date_gmt":"2020-01-08T16:30:03","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/01\/08\/news-11108\/"},"modified":"2020-01-08T08:30:03","modified_gmt":"2020-01-08T16:30:03","slug":"news-11108","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/01\/08\/news-11108\/","title":{"rendered":"Apple\u2019s wants privacy laws to protect its users"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/09\/cio_cw_social_engineering_security_privacy_breach_fraud_hands_keyboard_network_avatars_financial_data_by_chainarong_prasertthai_gettyimages-1057890202_2400x1600-100811822-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Wed, 08 Jan 2020 06:54:00 -0800<\/strong><\/p>\n<p>Your iPhone (like most smartphones) <a href=\"https:\/\/blogs.computerworld.com\/article\/3451986\/apple-updates-its-privacy-pages-and-you-should-take-a-look.html\" rel=\"nofollow\">knows when it is picked up<\/a>, what you do with it, who you call, where you go, who you know \u2013 and a bunch more personal information, too.<\/p>\n<p>The snag with your device knowing all this information is that once the data is understood than that information can be shared or even used against you.<\/p>\n<p>Jane Horvath, Apple&#8217;s senior director for global privacy, appeared at CES 2012 to discuss the company\u2019s approach to smartphone security.<\/p>\n<p>She stressed the company\u2019s opposition to the creation of <a href=\"https:\/\/www.nbcnews.com\/news\/us-news\/fbi-seeks-apple-s-help-unlocking-phones-suspected-pensacola-naval-n1111636\" rel=\"noopener nofollow\" target=\"_blank\">software backdoors<\/a> into devices, and also <a href=\"https:\/\/www.cnbc.com\/2020\/01\/07\/apples-jane-horvath-defends-iphone-encryption-on-ces-panel.html\" rel=\"noopener nofollow\" target=\"_blank\">said<\/a>:<\/p>\n<p>\u201cOur phones are relatively small and they get lost and stolen. If we&#8217;re going to be able to rely on our health data and finance data on our devices, we need to make sure that if you misplace that device, you&#8217;re not losing your sensitive data.\u201d<\/p>\n<p>Her approach is correct, of course. After all, once you create a security backdoor for one government, you\u2019ll be forced to share them with every government.<\/p>\n<p>Once this happens it\u2019s only a matter of time before that information leaks into the hands of bad actors, with the result that no one\u2019s data is safe.<\/p>\n<p>Enterprise data will also become less safe, which threatens the security of connected infrastructure across the board.<\/p>\n<p>Think of a security backdoor as being a hole in a bucket that only gets larger over time.<\/p>\n<p>Eventually the bucket stops working, water gets everywhere and all your secrets slip.<\/p>\n<p>Apple\u2019s approach to security:<\/p>\n<p>What\u2019s important to understand with this model is that while much of the information your device gathers is protected (unless you grant permission to specific apps to access it), data held in iCloud is not subject to the same protection and can be made available subject to warrant.<\/p>\n<p>At the same time, Apple\u2019s privacy protections can be confusing \u2013 it\u2019s recent decision to make it possible for people to opt out of sharing Siri recordings for \u2018grading\u2019 was welcome, but the <a href=\"https:\/\/www.applemust.com\/how-to-use-apples-new-anti-siri-snooping-tools\/\" rel=\"noopener nofollow\" target=\"_blank\">tools are still rather opaque<\/a>.<\/p>\n<p>This is why Apple has teams whose job it is to help law enforcement with criminal\/security queries.<\/p>\n<p>The information on your device is impossible to access, while data held in your iCloud is accessible once a warrant is presented and agreed.<\/p>\n<p>Not only can a great deal of information concerning location also be gathered by request from cellular providers, but some of the most incriminating information is almost certainly available in the less-secured iCloud account.<\/p>\n<p>Horvath referred to this during her CES 2020 appearance when she confirmed the company uses a set of tools to <a href=\"https:\/\/www.macobserver.com\/analysis\/apple-scans-uploaded-content\/\" rel=\"noopener nofollow\" target=\"_blank\">scan iCloud Photo libraries for child pornography<\/a>.<\/p>\n<p>To me it seems reasonable to assume that those aren\u2019t the only egregious acts Apple might monitor accounts for. That Apple actively already works to protect the public rather undermines the argument that even more access to personal data is required.<\/p>\n<p>On an industry-wide basis, there\u2019s still too much confusion.<\/p>\n<p>Internet services have been offering convenience in exchange for personal information for so long that many people have become accustomed to sharing data.<\/p>\n<p>Added to which, the lack of a consistent set of principle or access protocols with regard to user privacy makes for a\u00a0lack of a core set of agreed consumer privacy standards.<\/p>\n<p>Apple seems to believe government regulation is required in order to help promote a more consistent approach to privacy.<\/p>\n<p>&#8220;We should consider a strong privacy law that is consistent across all 50 states that provides all consumers, regardless of where they live, the same protections,&#8221; said Horvath.<\/p>\n<p>We\u2019ve some way to go, as those continued attempts to force tech firms to create those security backdoors in their products prove some in government don\u2019t grasp the challenge of privacy in a digital age. (Though some <a href=\"https:\/\/eandt.theiet.org\/content\/articles\/2020\/01\/privacy-is-not-protected-ftc-tells-apple-and-facebook\/\" rel=\"noopener nofollow\" target=\"_blank\">do get it<\/a>).<\/p>\n<p>While we wait for the industry and government to figure out a consistent approach, here are some guides to help iOS users manage their privacy using the tools Apple provides:<\/p>\n<p>Finally, I currently recommend iPhone users take a look at the <a href=\"https:\/\/blog.jumboprivacy.com\/jumbo-launches-today.html\" rel=\"noopener nofollow\" target=\"_blank\">incredibly useful Jumbo app.<\/a> This provides a range of privacy management and monitoring tools designed to easily put you in charge of what entities such as Apple, Facebook, Google or others are doing with your information.<\/p>\n<p>Please follow me on<em>\u00a0<a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow\">Twitter<\/a>, or join me in the\u00a0<a href=\"https:\/\/mewe.com\/join\/appleholics_bar_and_grill\" rel=\"nofollow\">AppleHolic\u2019s bar &amp; grill<\/a>\u00a0and\u00a0<a href=\"https:\/\/mewe.com\/join\/apple_discussions\" rel=\"nofollow\">Apple Discussions<\/a>\u00a0groups on MeWe.<\/em><\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3512889\/apple-s-wants-privacy-laws-to-protect-its-users.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2019\/09\/cio_cw_social_engineering_security_privacy_breach_fraud_hands_keyboard_network_avatars_financial_data_by_chainarong_prasertthai_gettyimages-1057890202_2400x1600-100811822-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Wed, 08 Jan 2020 06:54:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>Your iPhone (like most smartphones) <a href=\"https:\/\/blogs.computerworld.com\/article\/3451986\/apple-updates-its-privacy-pages-and-you-should-take-a-look.html\" rel=\"nofollow\">knows when it is picked up<\/a>, what you do with it, who you call, where you go, who you know \u2013 and a bunch more personal information, too.<\/p>\n<h2><strong>Information is power<\/strong><\/h2>\n<p>The snag with your device knowing all this information is that once the data is understood than that information can be shared or even used against you.<\/p>\n<p>Jane Horvath, Apple&#8217;s senior director for global privacy, appeared at CES 2012 to discuss the company\u2019s approach to smartphone security.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3512889\/apple-s-wants-privacy-laws-to-protect-its-users.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[2211,10480,8826,10554,714],"class_list":["post-17372","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple","tag-ios","tag-iphone","tag-mobile","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17372"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17372\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17372"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}