At Apple’s secretive Global Police Summit at its Cupertino headquarters, cops from seven countries learned how to use a host of Apple products like the iPhone, Vision Pro and CarPlay for surveillance and policing work.
At Apple’s secretive Global Police Summit at its Cupertino headquarters, cops from seven countries learned how to use a host of Apple products like the iPhone, Vision Pro and CarPlay for surveillance and policing work.
They’ll hand over unencrypted cloud data, but they are not decrypting E2EE cloud data. They literally can’t. They don’t have the key. If they had a key, it would be a monumental security vulnerability.
This is why governments and cops have dragging them into courts for years.
They’ve been doing it for data on device, not on iCloud (cloud data). They have full access to that.
Do you have a source for that?
Because Apple has had a lot of very prominent court cases about unlocking phones for cops, and they famously haven’t done that. They, like other cloud service providers, have forked over cloud storage data, that isn’t e2ee, when given a warrant.
Sure, here is the legal document from Apple by Apple of what they share with law enforcement.
Included inside is: