←back to thread

398 points djoldman | 1 comments | | HN request time: 0.246s | source
Show context
lukev ◴[] No.42071345[source]
There's something missing from this discussion.

What really matters isn't how secure this is on an absolute scale, or how much one can trust Apple.

Rather, we should weigh this against what other cloud providers offer.

The status quo for every other provider is: "this data is just lying around on our servers. The only thing preventing a employee from accessing it is that it would be a violation of policy (and might be caught in an internal audit.)" Most providers also carve out several cases where they can look at your data, for support, debugging, or analytics purposes.

So even though the punchline of "you still need to trust Apple" is technically true, this is qualitatively different because what would need to occur for Apple to break their promises here is so much more drastic. For other services to leak their data, all it takes is for one employee to do something they shouldn't. For Apple, it would require a deliberate compromise of the entire stack at the hardware level.

This is very much harder to pull off, and more difficult to hide, and therefore Apple's security posture is qualitatively better than Google, Meta or Microsoft.

If you want to keep your data local and trust no-one, sure, fine, then you don't need to trust anyone else at all. But presuming you (a) are going to use cloud services and (b) you care about privacy, Apple has a compelling value proposition.

replies(7): >>42072229 #>>42073673 #>>42073693 #>>42074841 #>>42075160 #>>42075432 #>>42078451 #
roca ◴[] No.42073693[source]
> For other services to leak their data, all it takes is for one employee to do something they shouldn't.

This is not true for Google, at least. I know because I work at Google.

So I wonder how accurate your knowledge of Meta, Microsoft etc is.

replies(3): >>42074031 #>>42078210 #>>42082138 #
abalone ◴[] No.42078210[source]
PCC is a whole different level. For example, you still have to trust that Google is doing what it says to control access. PCC makes it auditable and verifiable by clients when connecting to a node.

You can also audit that the binaries don’t leak any data in, say, debug logs, which is definitely possible on GCP/Borg. PCC nodes are “cryptographically airtight.”

replies(1): >>42081448 #
roca ◴[] No.42081448[source]
I'm only here to correct the parent's false claims.
replies(1): >>42092437 #
1. ◴[] No.42092437[source]