• AvailableCandidate@lemmy.one
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 year ago

    You’re confusing “being the worst” with “being bad”.

    Yes, facebook is way more toxic in its violation of its users’ privacy, that doesn’t make the methods Apple uses “good” by comparison.

    I still had to get go 5 menu’s deep to see those settings, and i’m fairly certain most of the tracking (like geolocation) is on by default.

    Also, their “do not track” equivalent is still entirely trust based as far as anything we can prove, and we saw how that went with the browser flag (it was added to the list of data to track, because people who enabled it were an ad target bucket)

    • beefcat@beehaw.org
      link
      fedilink
      English
      arrow-up
      5
      ·
      1 year ago

      I’m not confusing these two things. I’m firmly of the belief that when it comes to privacy, Apple is a C student doing the bare minimum. They are only notable because they are surrounded almost exclusively by dropouts.

      • AvailableCandidate@lemmy.one
        link
        fedilink
        English
        arrow-up
        3
        ·
        1 year ago

        That’s still a passing grade.

        From my perspective, their “commitment” to privacy is entirely marketing, and i have no reason on the code side to believe the things they say it does.

        Apple security has for decades been considered a joke, as well, coming from someone in the field. Safari in particular is considered the beginner browser to target for hacking contests.

        • beefcat@beehaw.org
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 year ago

          I also work in the field. While this assessment was pretty on point 10 years ago, particularly regarding security, I think the modern reality is a lot more nuanced.

          For example, the secure enclave (present since the iPhone 5S, and Macs with a T1 or newer) still hasn’t been fully broken. FIrmware has been dumped, and vulnerabilities found, but nothing publicly that is able to decrypt private keys held inside.