Apple's iOS 8 is so secure, even the police can't get hold of your details, Tim Cooke says
comments
Alongside the new keyboards, messaging tools and photo features of iOS 8, Apple has also updated the software's security features.
In an open letter to customers, Apple's chief executive Tim Cook announced the firm has changed the way encryption works in iOS 8.
As a result the company can no longer bypass a user's passcode, making it impossible for it to hand over data to law enforcement officers and governments.
Apple has changed the way encryption works in iOS 8 (pictured), and as a result the company can no longer bypass a user's passcode. This makes it impossible to hand over data to law enforcement and governments and is the case even if a search warrant is served on the firm or customer
This is the case, even if a search warrant is served on the firm or customer.
These new rules, however, only apply to data stored on the device, locked by a passcode, and Apple will be able to access data stored on iCloud if presented with a warrant for it.
And because these new features only apply to iOS 8, data can be extracted where necessary on devices running older versions of the software, from iOS 4 to iOS 7, as has always been the case.
The announcement is part of a wider privacy and security push being made by Apple to protect its users.
In the letter, on Apple's new Privacy page, Mr Cook wrote:
'At Apple, your trust means everything to us.
'We're publishing this website to explain how we handle your personal information, what we do and don't collect, and why.
'A few years ago, users of internet services began to realise that when an online service is free, you're not the customer. You're the product.
'But at Apple, we believe a great customer experience shouldn't come at the expense of your privacy.'
According to the new privacy site, on devices running iOS 8, personal data including photos, messages - including attachments - email, contacts, call history, iTunes content, notes, and reminders are placed under the protection of a user's passcode.
'Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,' continued the firm.
'So it's not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.'
And as part of Apple's updated Legal Process Guidelines, used by the police and governments, the firm said: 'For all devices running iOS 8.0 and later versions, Apple will no longer be performing iOS data extractions as the data sought will be encrypted and Apple will not possess the encryption key.'
The announcement is part of a wider privacy push being made by Apple to protect users. In an open letter, on Apple's new Privacy site (pictured) Mr Cook wrote: 'Apple cannot bypass your passcode and therefore cannot access this data. So it's not technically feasible for us to respond to warrants from devices running iOS 8'
Mr Cook (pictured) also explained that updates about privacy will be added to the new site 'at least once a year and whenever there are significant changes to policies.' These new rules do mean that Apple's support staff will not be able to bypass a locked device if a users has forgotten the code, for example
The only files that can be provided as part of official requests, when served a search warrant, are SMS, iMessage, MMS, photos, videos, contacts, audio recording, and call history.
Apple will not provide email, calendar entries, or any third-party app data.
Mr Cook also explained that updates about privacy will be added to the new site 'at least once a year and whenever there are significant changes to our policies.'
These new rules do mean that Apple's support staff will not be able to bypass a locked device if a users has forgotten the code, for example.
The rules only apply to data stored on the device, locked by a passcode (left), and Apple will still be able to access data stored on iCloud if presented with a warrant for it. But, because these new features only apply to iOS 8, data can be extracted on devices running older versions of the software, from iOS 4 to iOS 7 (right)
Earlier this week, Apple began rolling out changes to its two-step verification process to include iCloud data. This means that when the service is enabled, iCloud users will need to enter a four-digit code, (pictured) that is sent to a separate, trusted device before getting access to files on a web browser
Apple continued: 'The most common requests we receive for information come from law enforcement in the form of either a Device Request or an Account Request.
'Our legal team carefully reviews each request, ensuring it is accompanied by valid legal process. All content requests require a search warrant.
'If we are legally compelled to divulge any information and it is not counterproductive to the facts of the case, we provide notice to the customer when allowed and deliver the narrowest set of information possible in response.'
Earlier this week, Apple began rolling out changes to its two-step verification process to include iCloud data.
This means that when the service is enabled, iCloud users will need to enter a four-digit code, that is sent to a separate, trusted device, before getting access to files on a web browser.
Put the internet to work for you.
Recommended for you |
0 comments:
Post a Comment