Apple releases its semi-annual transparency report

The content of iPhones, when locked using a personal code or Face ID, becomes difficult to access for anyone who is not its owner. Despite everything, it happens that thepolice, the FBI or a judge seek to obtain evidence in a trial, for example when crimes are involved. So much so that beyondmulti-thousand dollar tools to hack any iOS smartphone, an administrative route also allows you to file a request with Apple directly.

The firm then takes charge of evaluating it and then responds favorably or not. In the first case, its teams can then unlock the iPhone and its content. From January to last June, 28,276 requests were sent to him by officials, includingeight out of ten were accepted. In total, more than 170,000 devices were affected. That is to say a decrease of a few points compared to the previous period.

Geographic disparities

To read the analysis,go to this address: the document is public. In particular, we learn that inFrance, 695 iPhones, 230 iCloud accounts, 360 financial identifiers as well as eleven emergencies were processed by Apple as part of its collaboration with the institutions. This is overall much less than in Germany, the United States or the United Kingdom for example. Clarifications also that the reasons for the requests are not specified.

L’App Store, it too, is sometimes affected by these measures, services deemed illegal can then be purely and deleted. This was the case for 278 of them during the first quarter of 2020. Let us also remember that the conditions imposed by Apple on developers are strict, with restrictions which can sometimes result in a ban when they are not respected.This is what happened to Fortnite, even before a lawyer has a say.

Confidentiality

At the dawn of potential new products, the Apple brand continues to increase its communication operations in favor of the protection of personal data. Features such asdisabling cross-app trackingsupport its marketing arguments.

However, like any mobile or computer, iPhones and Macs are not inviolable. They must therefore be used with full knowledge of the facts. An additional layer of security (cryptography, remote control, etc.) is therefore never too much.

i-nfo.fr - Official iPhon.fr app

By : Keleops AG