Comment by tsunamifury

10 days ago

Im referring to the legal and cooperation loopholes Apple has put behind those.

Each one allows for access, at times warrant less, at any moment.

It’s bizarre that you think this is “Ok”. Insane you are defending it. Combined it makes a hard hard take that they are security oriented.

Beyond that Apple has cooperated with data turnover at the personal request of President Trump multiple times. So pull your head out of the sand.

Okay, can you express the “legal and cooperation loopholes Apple has put behind those” clearly enough for me to understand what you mean? Are you alleging that iCloud E2EE is compromised? Are you saying that Apple promised RCS would do something more than the carriers designed it to do? It’s hard to assess vague, unsourced claims.

  • There obviously will be no sources. I’m telling you as someone who worked directly On iMessage and Google messages.

    Apple not only gives keys they often provide access with no legal requirement at all. They also DO NOT e2ee all sources they claim to depending on what regions the messages pass through to devices they end up at. There are also massive cooperation and caching going on of messaging and push notifications which access is provided to several governments. Aka as the Wyden leaks