← Back to context

Comment by JustExAWS

1 month ago

In what world is Netflix for instance not going to know your watch history?

How many people are going to say in 2024 that they don’t want continuous cloud backup? You want Windows Vista style pop ups and permissions?

How many times are you going to shift the goalposts? This is getting tiresome, so I’ll make it my last reply.

I don’t have Netflix but neither is that relevant to the point, you’re obviously and embarrassingly grasping at straws.

No one is arguing against continuous cloud backups, they’re arguing about sending data without consent. Which, by the way, is something Apple used to understand not to do.

https://www.youtube.com/watch?v=39iKLwlUqBo

Apple’s OS are already filled with Windows Vista style popups and permissions for inconsequential crap, people have been making fun of them for that for years.

  • If you are doing continuous cloud backups and using Apple services - you are already giving Apple your data and your solution is to add even more permissions? You are not going to both use any Apple service that requires an online component and keep Apple from having your data.

    Isn’t it bad enough that I have a popup every time I copy and paste between apps?

    • > Isn’t it bad enough that I have a popup every time I copy and paste between apps?

      For me, not really no. It reminds me I am copying information and not from some phishing app, I find it informative.

      And I'm probably one of the few who actually click "Reject" to the cookie pop ups having to click no on 3742 legitimate consents.

      The simple answer is everything should be opt-out. I'll opt-in if I require it because frankly, regardless to how Fort-Knox my data is $CORP still cannot be trusted.

      2 replies →

Netflix being unable to know your watch history on their service is exactly the goal of homomorphic encryption. The technology to make that work at that scale does not exist, however for smaller bits of data, eg phone numbers, that's entirely possible!

With PIR, an Apple phone recieving a phone call queries Apple's database with that phone number, but because it's using homomorphic encryption, Apple doesn't know the number that called despite looking it up in their database to provide caller id info, so they can't tie your phone number and the callers phone number together.

https://machinelearning.apple.com/research/homomorphic-encry...

As a general principle, I think computers should execute commands that users issue, and then wait for the next command. That's it.

Computers should not be sneakily doing things in the background without my commanding them to do so. But if they insist that the only way they can work is by doing things in the background, then I expect the computer to at the very least obtain my consent before doing those things. And computers should definitely not be exfiltrating anything over to the network without my explicit command to do so. This shit world we are living in where your computer just does whatever the application developer wants it to do rather than what the user wants it to do has to come to an end!