ICloud: Difference between revisions
+template |
SinexTitan (talk | contribs) ProductLine |
||
| (5 intermediate revisions by 4 users not shown) | |||
| Line 1: | Line 1: | ||
{{ | {{lowercase title}} | ||
| | {{ProductCargo | ||
| | |ArticleType=Service | ||
| | |Category=Cloud | ||
| | |Company=Apple | ||
| | |Description= | ||
|InProduction=Yes | |||
}} | |Logo=ICloud.svg | ||
|ProductLine=2011 | |||
|ReleaseYear=Yes | |||
|Website=https://icloud.com | |||
}} | |||
'''{{wplink|iCloud}}''' is a cloud storage and cloud computing service provided by [[Apple]]. It offers various internet-based services, including iCloud Photos, device backups, and the Find My network. | |||
==Consumer-impact summary== | |||
{{Ph-C-CIS}} | |||
==Incidents== | ==Incidents== | ||
This is a list of all consumer-protection incidents related to this product line. Any incidents not mentioned here can be found in the [[:Category:{{PAGENAME}}|{{PAGENAME}} category]]. | |||
===2014 Celebrity Photo Leaks=== | ===2014 Celebrity Photo Leaks=== | ||
In August 2014, a series of brute-force attacks targeted iCloud accounts, leading to the unauthorized access and release of private photographs belonging to multiple celebrities.<ref>[[wikipedia:2014_celebrity_nude_photo_leak|2014 celebrity nude photo leak]]</ref> Apple denied that a breach of iCloud itself had occurred, attributing the incident to weak user passwords and phishing attacks.<ref>https://www.theverge.com/2014/9/2/6098107/apple-denies-icloud-breach-celebrity-nude-photo-hack</ref> However, vulnerabilities allowing brute-force attacks remained unaddressed the following year, raising concerns over iCloud’s security measures.<ref>https://www.ibtimes.co.uk/icloud-accounts-risk-brute-force-attack-hacker-exploits-painfully-obvious-password-flaw-1481623</ref> | In August 2014, a series of brute-force attacks targeted iCloud accounts, leading to the unauthorized access and release of private photographs belonging to multiple celebrities.<ref>[[wikipedia:2014_celebrity_nude_photo_leak|2014 celebrity nude photo leak]] ([https://web.archive.org/web/20260404193845/https://en.wikipedia.org/wiki/2014_celebrity_nude_photo_leak Archived])</ref> Apple denied that a breach of iCloud itself had occurred, attributing the incident to weak user passwords and phishing attacks.<ref>https://www.theverge.com/2014/9/2/6098107/apple-denies-icloud-breach-celebrity-nude-photo-hack ([http://web.archive.org/web/20250831150803/https://www.theverge.com/2014/9/2/6098107/apple-denies-icloud-breach-celebrity-nude-photo-hack Archived])</ref> However, vulnerabilities allowing brute-force attacks remained unaddressed the following year, raising concerns over iCloud’s security measures.<ref>https://www.ibtimes.co.uk/icloud-accounts-risk-brute-force-attack-hacker-exploits-painfully-obvious-password-flaw-1481623 ([http://web.archive.org/web/20251230054034/https://www.ibtimes.co.uk/icloud-accounts-risk-brute-force-attack-hacker-exploits-painfully-obvious-password-flaw-1481623 Archived])</ref> | ||
===Data Hosting in China=== | ===Data Hosting in China=== | ||
In 2018, Apple transitioned Chinese users’ iCloud data to local servers in compliance with Chinese data laws.<ref>https://thehackernews.com/2021/05/how-apple-gave-chinese-government.html</ref> The move raised concerns regarding government surveillance, as the encryption keys for the data were also stored within China.<ref>https://thehackernews.com/2021/05/how-apple-gave-chinese-government.html</ref> Apple stated that this change only affected users residing in mainland China; however, it did not specify how it distinguishes between residents and visitors.<ref>https://support.apple.com/en-us/111754</ref> | In 2018, Apple transitioned Chinese users’ iCloud data to local servers in compliance with Chinese data laws.<ref>https://thehackernews.com/2021/05/how-apple-gave-chinese-government.html ([http://web.archive.org/web/20260209094941/https://thehackernews.com/2021/05/how-apple-gave-chinese-government.html Archived])</ref> The move raised concerns regarding government surveillance, as the encryption keys for the data were also stored within China.<ref>https://thehackernews.com/2021/05/how-apple-gave-chinese-government.html ([http://web.archive.org/web/20260209094941/https://thehackernews.com/2021/05/how-apple-gave-chinese-government.html Archived])</ref> Apple stated that this change only affected users residing in mainland China; however, it did not specify how it distinguishes between residents and visitors.<ref>https://support.apple.com/en-us/111754 ([http://web.archive.org/web/20251128142647/https://support.apple.com/en-us/111754 Archived])</ref> | ||
===End-to-End Encryption Restrictions in the United Kingdom=== | ===End-to-End Encryption Restrictions in the United Kingdom=== | ||
In February 2025, Apple disabled Advanced Data Protection (also known as ADP), its end-to-end encryption feature for iCloud, for users in the United Kingdom. The decision followed a request from the UK government, which sought access to encrypted user data.<ref>https://www.zdnet.com/article/why-apples-disabling-of-icloud-encryption-in-the-uk-is-bad-news-for-everyone/</ref> | In February 2025, Apple disabled Advanced Data Protection (also known as ADP), its end-to-end encryption feature for iCloud, for users in the United Kingdom. The decision followed a request from the UK government, which sought access to encrypted user data.<ref>https://www.zdnet.com/article/why-apples-disabling-of-icloud-encryption-in-the-uk-is-bad-news-for-everyone/ ([http://web.archive.org/web/20251229142653/https://www.zdnet.com/article/why-apples-disabling-of-icloud-encryption-in-the-uk-is-bad-news-for-everyone/ Archived])</ref> | ||
==See also== | |||
{{Ph-C-SA}} | |||
==References== | ==References== | ||
{{Reflist}} | {{Reflist}} | ||
[[Category:Apple]] | [[Category:Apple]] | ||