this post was submitted on 01 Mar 2024
48 points (75.0% liked)

Asklemmy

43847 readers
696 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_[email protected]~

founded 5 years ago
MODERATORS
 

I‘m a little shocked rn. I am using fluffychat on ios since my legacy iphone is still working and I dont want to throw it out until its done.

But this happened the first time: I wrote „then I might need to take a taxi“ to someone and an installed taxi app immediately popped up via notifications saying „get off 25% today“ or something.

This freaks me out big time since it could mean every word I write on this phone gets checked by something/someone.

Anyone else? (It was literally the second I wrote the sentence)

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 8 months ago (5 children)

No. If someone is telling you that Apple is doing that, they are lying to you. Demand proof, because no one can provide that. Because Apple is not doing that, and if they’re telling you they are, they are lying.

[–] [email protected] -1 points 8 months ago

Until it's proven the data is E2E encrypted, it's a fair assumption it can be read by a 3rd party, either now or in the future. E2EE is the only proof that matters, everything else is just a corporate "trust me bro".

[–] [email protected] -2 points 8 months ago (1 children)

While I get the initial claim that proof is necessary, your argument is self-evident as well.

Nobody can provide proof does not mean its not true, just that its not proven. Its very suspicious that I got this notification the exact second I wrote the text and no other notifications for days before and after.

It is statistically very likely that someone or something triggered this in that moment. Either on the phone through siri for example who is supposed to select apps by usage, in the chat app (unlikely because open source) or in the notification provider, as mentioned by another commenter.

[–] [email protected] 2 points 8 months ago (1 children)

So you admit that you can’t back up your claims. Don’t expect reasonable or rational people to believe you. 

[–] [email protected] -1 points 8 months ago

Are you joking? When did I claim anything? I said this happened, not that I know why.

[–] [email protected] 5 points 8 months ago

From an article about a recent lawsuit

The App Store appeared to harvest information about every single thing you did in real time, including what you tapped on, which apps you search for, what ads you saw, and how long you looked at a given app and how you found it. The app sent details about you and your device as well, including ID numbers, what kind of phone you’re using, your screen resolution, your keyboard languages, how you’re connected to the internet—notably, the kind of information commonly used for device fingerprinting.

Notably, knowing keyboard language and monitoring tap locations allows for reconstruction of text the user types (as detailed in this article

I do think you are correct that Apple probably isn't actively keylogging every iOS device (just because there's easier ways with less legal concerns that ultimately get the same outcomes), but it's not like there's "no evidence".

[–] [email protected] 1 points 8 months ago (1 children)

If you demand proof to state they do, you should provide proof when stating they don't. It's not like Apple is the most trustworthy company in the world. With big tech it's always reasonable (definitely not certain) to assume they could be spying on your activity, and unless you are able to download your software source code, check it and compile it yourself, it's almost impossible to tell.

[–] [email protected] 8 points 8 months ago (1 children)

That's a burden of proof fallacy. 😕

It's no one's job to prove the opposite. The burden is on the initial claim.

[–] [email protected] 1 points 8 months ago

The only thing we know without a proof is that they might be doing it. We don't have a proof they do it but we also don't have any proof they are incapable of doing so. A reasonable course of action would be to take precautions against it while not condemning them either, until they are either proven actually guilty or actively unwilling to up their security, which would also strongly imply the former.

[–] [email protected] -1 points 8 months ago