TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Is there something different about Apple's end-to-end encryption?

3 pointsby thinkloopover 2 years ago
We have signal, Whatsapp, matrix, telegram, ssh, file sync, file backup, and a whole host of other services that have all been end-to-end encrypted for the laymen for years. But authorities seem especially &quot;deeply concerned&quot; with Apple&#x27;s attempt [1].<p>Is there something different or special about Apple&#x27;s strategy that makes it harder to hack, or is this a case of Apple news selling?<p>[1] https:&#x2F;&#x2F;futurism.com&#x2F;the-byte&#x2F;fbi-apple-new-encryption-deeply-concerning

1 comment

phillipseamoreover 2 years ago
What&#x27;s special about is that it kind of fails the E2E test. Apple keeps a lot of metadata available to themselves, including but not limited to: filenames, checksums before encryption, file type (from e.g. magic bytes so that a PNG called stuff.txt won&#x27;t fool them), creation, modification and access timestamps and access counters. It&#x27;s also seems that files are encrypted using their own checksums as the key (so Apple can de-duplicate files).<p>So I&#x27;m not sure what LEO&#x27;s are worried about, the metadata available to them from Apple is more than enough for most of their needs.