{"id":4142,"date":"2014-09-23T13:00:41","date_gmt":"2014-09-23T17:00:41","guid":{"rendered":"http:\/\/www.kaspersky.co.in\/blog\/?p=4142"},"modified":"2020-02-26T20:28:23","modified_gmt":"2020-02-26T14:58:23","slug":"apple-new-user-data-policy","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.in\/blog\/apple-new-user-data-policy\/4142\/","title":{"rendered":"Does Apple protect its users from the NSA?"},"content":{"rendered":"<p>Like it or not, we are living in a world where governments have ample opportunity and reasons to either control the whole digital space or at least closely monitor its inhabitants. Specifically, the notorious National Security Agency, according to some rumors, is very well funded and has boundless possibilities for research, development, bribery and other activities that contribute to effective surveillance. Fortunately, there are forces that can withstand organizations of this kind.<\/p>\n<p>In the current situation, all we can do is use <a href=\"https:\/\/www.kaspersky.com\/blog\/vpns-use\/\" target=\"_blank\" rel=\"noopener nofollow\">VPN<\/a>, <a href=\"https:\/\/www.kaspersky.com\/blog\/tor-faq\/\" target=\"_blank\" rel=\"noopener nofollow\">Tor<\/a>, or some other <a href=\"https:\/\/www.kaspersky.com\/blog\/secure-iphone\/\" target=\"_blank\" rel=\"noopener nofollow\">tools<\/a> that tend to make Big Brother\u2019s job a bit more difficult. Corporations are able to keep the NSA and other pro-government organizations away from us and help to protect our privacy. Only a year ago this \u201cprotection\u201d consisted mainly of weak statements like \u201cwe are not affiliated with the NSA\u201d or \u201cwe are acting within the law\u201d, but now the companies have finally moved from words to actions.<\/p>\n<p>A striking example is <a href=\"https:\/\/www.apple.com\/privacy\/\" target=\"_blank\" rel=\"noopener nofollow\">Apple Inc.<\/a>, which recently published Tim Cook\u2019s open letter about the new user data policy as well as other privacy and security oriented documents. One of these <a href=\"https:\/\/www.apple.com\/privacy\/government-information-requests\/\" target=\"_blank\" rel=\"noopener nofollow\">papers stated<\/a> that since the release of iOS 8, \u201cit\u2019s not technically feasible\u201d for the company to extract any personal data from devices running the newest iOS and give it to any third parties, including law enforcement organizations.<\/p>\n<h3>What exactly has Apple done?<\/h3>\n<p>To put it simply, according to the official documents posted on the website, Apple actually got rid of the spare key to your safe, making you the only person who can access its content: on iOS 8 devices, all of your personal data like photos, messages, emails, contacts, notes, etc. is protected by the user\u2019s passcode, which Apple now cannot bypass. This means that the company cannot access the data on your device and therefore cannot transfer it to any one else. Here comes the tricky part: all of this does not necessarily mean that authorities don\u2019t have a way to see what you\u2019re keeping on your iPhone or iPad. But I\u2019ll come back to that a bit later.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/09\/05084605\/ios-security-guide-sept-2014-10-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6095\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/09\/05084605\/ios-security-guide-sept-2014-10-2.png\" alt=\"ios-security-guide-sept-2014-10 (2)\" width=\"600\" height=\"210\"><\/a><\/p>\n<p>There are more security and privacy additions to the new iOS worth discussing. For example, there\u2019s a feature that randomizes MAC addresses, so they can\u2019t be used to persistently track a device by passive observers of Wi-Fi traffic. Additionally, the Always-on VPN option makes corporate IT security guys\u2019 jobs way easier.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#Apple claims that it can\u2019t access your personal data and can\u2019t give it to authorities, but this may not be the whole truth.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F4uR2&amp;text=%23Apple+claims+that+it+can%26%238217%3Bt+access+your+personal+data+and+can%26%238217%3Bt+give+it+to+authorities%2C+but+this+may+not+be+the+whole+truth.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>In his message, Tim Cook stated that Apple \u201chas never worked with any government agency from any country to create a backdoor\u201d in any of its products or services, and has never allowed access to Apple\u2019s servers and never will.<\/p>\n<div class=\"pullquote\">It doesn\u2019t matter if Apple has worked with the NSA or not. Now it\u2019s all about if Apple can protect its customers from surveillance.<\/div>\n<h3>Why did Apple do all this?<\/h3>\n<p>The infamous <a href=\"https:\/\/www.kaspersky.com\/blog\/celebrity-photos-leaked\" target=\"_blank\" rel=\"noopener nofollow\">leak of celebrities\u2019 photos<\/a> wasn\u2019t the only reason why Apple decided to emphasize its concerns about user privacy. There is something more important. Of course, you remember Edward Snowden: a bunch of NSA documents that he declassified last year featured a number of large companies including Apple. That story left a pretty notable smudge on the company\u2019s reputation, and Apple had to do something to change that. Now it doesn\u2019t matter if Apple has worked with the NSA or not, it\u2019s now all about if Apple can protect its customers from surveillance. The trend is quite simple these days: if a company doesn\u2019t care enough about users\u2019 privacy and personal data, then something is wrong with that company and it may not be trustworthy. You\u2019re either with users, or against users.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/09\/05084604\/008-2-225x300.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6093\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/36\/2014\/09\/05084604\/008-2-225x300.jpg\" alt=\"008 (2)\" width=\"400\" height=\"533\"><\/a><\/p>\n<p>Obviously, Apple is too beloved and too respected to instantly become an enemy to millions of customers, but it doesn\u2019t mean that it should not act as soon as possible. Especially, when the company is about to launch the smart watch and a <a href=\"https:\/\/www.kaspersky.com\/blog\/apple-pay\/\" target=\"_blank\" rel=\"noopener nofollow\">payment system<\/a>\u2014 two developments that many security experts have concerns about.<\/p>\n<h3>What does it mean for customers?<\/h3>\n<p>Besides some improvements, such as enhanced data protection, there is another, far more significant positive factor to all this. By changing its user data policy, Apple is likely to inspire other companies to move in the same direction, i.e. paying more attention to security and the privacy of their customers. Of course, no company will declare war on the NSA or the authorities, but it may not actually be necessary: all they need to do is make personal data more secure and more difficult to collect or steal.<\/p>\n<div class=\"pullquote\">All of these changes in the user data policy are about making your data more difficult to reach, but not about making it unavailable to the police or other forms of law enforcement.<\/div>\n<h3>What is the catch then?<\/h3>\n<p>To answer this question you need to understand two important things. Apple, like any other corporation, will always think about the bottom line first. It will always act within the local laws if breaking them can somehow damage the business. Therefore, if local authorities come to Apple and legally ask for a user\u2019s personal data, the company has a pretty simple choice: obey or experience problems. It\u2019s not a secret that the vast majority of companies choose the first option, and Apple is not likely to be an exception.<\/p>\n<p>This doesn\u2019t mean that Apple lied when it said, \u201cit\u2019s not technically feasible\u201d to transfer personal data to police. It\u2019s really not, but there are some details that are still very important.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The new Apple user data policy looks good, but it won\u2019t stop authorities from getting what they need.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F4uR2&amp;text=The+new+Apple+user+data+policy+looks+good%2C+but+it+won%26%238217%3Bt+stop+authorities+from+getting+what+they+need.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>First, all of these changes in the user data policy are about making your data more difficult to reach, but not about making it unavailable to the police or other forms of law enforcement. This added security applies only to iOS devices but doesn\u2019t work for cloud storage (which now has <a href=\"http:\/\/support.apple.com\/kb\/HT5570\" target=\"_blank\" rel=\"noopener nofollow\">two-factor authentication<\/a>). Therefore, as soon as your data backs up in iCloud, copying itself onto Apple\u2019s servers, it can be legally reached by the government. It will take some time and effort, but it works.<\/p>\n<p>Second, Tim Cook\u2019s speech about the integrity of the servers does mean that Apple won\u2019t allow anybody to access them, but at the same time no one says that Apple won\u2019t take the data into its own hands and share it with authorities if need be. It is like your bank account: it\u2019s safe and secure, but everyone can take money from it if you allow it to happen.<\/p>\n<p>So did Apple make your personal data a bit more secure? Yes, without a doubt! Did it make it unavailable for NSA and other authorities? Definitely not.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the release of iOS 8, Apple claims it can\u2019t access the personal data on your iPhones and iPads and it can\u2019t give it to authorities. But it seems there\u2019s a catch. <\/p>\n","protected":false},"author":214,"featured_media":4143,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[14,781,747,714,43,97],"class_list":{"0":"post-4142","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-apple","9":"tag-icloud","10":"tag-law","11":"tag-nsa","12":"tag-privacy","13":"tag-security-2"},"hreflang":[{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/apple-new-user-data-policy\/4142\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/apple-new-user-data-policy\/4048\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/apple-new-user-data-policy\/4554\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/apple-new-user-data-policy\/4805\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/apple-new-user-data-policy\/5309\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/apple-new-user-data-policy\/6091\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/apple-new-user-data-policy\/4924\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/apple-new-user-data-policy\/5309\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/apple-new-user-data-policy\/6091\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/apple-new-user-data-policy\/6091\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.in\/blog\/tag\/apple\/","name":"apple"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4142","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/comments?post=4142"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4142\/revisions"}],"predecessor-version":[{"id":19188,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/posts\/4142\/revisions\/19188"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media\/4143"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/media?parent=4142"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/categories?post=4142"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.in\/blog\/wp-json\/wp\/v2\/tags?post=4142"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}