Remix.run Logo
ffsm8 an hour ago

Prism targeted network communication to my knowledge, hence the data wouldn't be siphoned from at rest encrypted devices. Instead it would've been leaked before it was copied to that local encrypted device, whenever it was transmitted over the wire. Eg when your background task uploaded it to iCloud or similar.

dcrazy an hour ago | parent [-]

It’s worth remembering that since Snowden, much of iCloud is now end-to-end encrypted using keys that Apple cannot unwrap: https://support.apple.com/guide/security/secure-icloud-keych...

ffsm8 an hour ago | parent [-]

Fwiw, that's a clear statement - but only that.

There is no way for us, the users, to know wherever they have the capability to add additional keys to decrypt the data because the platform isn't open source and doesn't have attestation wrt what's actually serving the requests.

And it's worth remembering that apple had similar articles published before prism too which were ultimately proven to be groundless by prism.

otterley an hour ago | parent [-]

What, exactly, was proven to be groundless?