Last but not least, the business is introducing a code system that enables users to confirm that their communications are sent to the appropriate destination and are not being tampered with by hackers.
In Apple's scenario, two users of the system will be able to share their individual codes, and their devices will automatically determine whether a third user has joined the chat using a different code.
If a highly skilled opponent, such as a state-sponsored attacker, ever succeeds in compromising cloud servers and inserting their own device to secretly listen to a conversation on these encrypted communications, automatic alerts will appear in discussions between users who have enabled this verification function.
Concerns About Apple’s Data Protection Initiatives
Despite all of this, privacy activists such as Albert Fox Cahn, the creator of the Surveillance Technology Oversight Project, assert that these modifications may have a more immediate impact on the kinds of user data that law enforcement and governmental organizations can obtain from Apple.
“This type of protection is most valuable in protecting against not cyber criminals, but people who are abusing government power to force the company to hand over data,” Albert Fox Cahn said. “Apple has long been in the position where it’s had to be the long arm of the police for years. Their law enforcement manual shows dozens of ways that they can help with investigations and now for people who opt into the protection [feature], there will be a safeguard going forward.”
That might be a problem for government organizations trying to protect people's information for use in their investigations. Regarding whether it has discussed the adjustments with the government or law enforcement organizations, Apple declined to comment.
However, the FBI has already voiced its displeasure with the amendments that would prevent the agency from accessing user data. The FBI expressed its worry about Apple's decision to encrypt all iCloud content in a statement to the Washington Post, adding that the organization needed a backdoor or alternative method of accessing such data.
“This hinders our ability to protect the American people from criminal acts ranging from cyber-attacks and violence against children to drug trafficking, organized crime and terrorism,” the FBI said. “In this age of cybersecurity and demands for ‘security by design’, the FBI and law enforcement partners need ‘lawful access by design’.”
Apple unveiled last year a system to scan for unlawful content, such as child sex abuse materials, using a convoluted approach that would still permit Apple to encrypt user images on its servers, apparently in an effort to placate law enforcement.
Privacy activists rejected the idea, claiming that it would essentially give Apple access to peoples' hard drives.
So what’s it gonna be this time? Will these new initiatives be accepted by privacy defenders?