• ☂️-@lemmy.ml
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        edit-2
        28 minutes ago

        yes. we all know.

        apple fanboys are the people who don’t think this shit happens to them.

        the only halfway private smartphones are unlocked androids that can be used with a degoogled OS. and even then.

        • thequickben@lemm.ee
          link
          fedilink
          arrow-up
          1
          arrow-down
          1
          ·
          6 minutes ago

          All fanboys are alike. I just find it ridiculous to think that only android users are aware of privacy issues. I’ve used both, currently run an iPhone but with end to end encryption turned on. Yet I know that not all things are private.

        • Ulrich@feddit.org
          link
          fedilink
          English
          arrow-up
          1
          ·
          4 minutes ago

          apple fanboys are the people who don’t think this shit happens to them.

          I say this as an Apple hater: this is a false narrative. Apple fanboys say that their devices are more private, not completely private, and they are (assuming a stock Android OS). That’s not really up for debate. The mistake you’re making is positing privacy as a binary concept. Privacy is a spectrum.

    • mic_check_one_two@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      2
      ·
      edit-2
      1 day ago

      And the secure “lockdown” mode on iOS disables push notifications for exactly this reason. But the vast majority of people don’t use lockdown mode in their day to day, because it kills a lot of the functionality of the phone. Lockdown mode is intended for people who may actually be targeted by laser-focused hacking attempts. Politicians, celebrities, people with high security clearance, etc… It’s not something that the average person would use.

      Apple even publishes this as a known vulnerability. It’s due to the way push notifications work. Similar to SMS, push notifications default to unencrypted because there isn’t a single unified system. Each carrier and cell manufacturer handles push notifications differently, so they’re kept unencrypted so that the public encryption key doesn’t get lost during transit; That would just result in scrambled junk messages.

  • Ulrich@feddit.org
    link
    fedilink
    English
    arrow-up
    58
    arrow-down
    1
    ·
    2 days ago

    We’ve known about this for a long time. Google too. Apple publishes it in their transparency reports now.

      • Luke@lemmy.ml
        link
        fedilink
        English
        arrow-up
        19
        arrow-down
        1
        ·
        edit-2
        2 days ago

        Data breaches should always be news, even if it is unsurprising to you personally. There’s literally always going to be someone out there who doesn’t have the same information that you do.

        Edit: yes, I do think it ought to be considered a data breach when data is shared with additional parties, even (or maybe especially) when that party is the government.

        • Ulrich@feddit.org
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          7
          ·
          2 days ago

          There’s literally always going to be someone out there who doesn’t have the same information that you do.

          And there’s going to be people who have information I don’t. That doesn’t mean they should run the same article over and over.

          • Luke@lemmy.ml
            link
            fedilink
            English
            arrow-up
            8
            ·
            2 days ago

            I say, keep talking about it until it gets fixed. Reporting it once in 2023 and then never again just enables sweeping things under the rug.

        • outhouseperilous@lemmy.dbzer0.com
          link
          fedilink
          arrow-up
          3
          arrow-down
          10
          ·
          2 days ago

          Yeah, fucking linux cucks, living outsiee the proprietary ecosystem with their unmarked up har$ware. Thorsten veblen would be ashamed.

  • stupid_asshole69 [none/use name]@hexbear.net
    link
    fedilink
    English
    arrow-up
    14
    ·
    2 days ago

    This sounds like news but it is not. It is also not unique to apple. If you use push notifications on any platform you’re susceptible to this.

    Push notifications are often unencrypted beacons that are used by cops to corroborate surveillance between devices even when the content transferred between devices isn’t available or incriminating.

    It’s the old “you say you weren’t involved but call records indicate you communicated with the suspect despite being in another county at the time of the crime” but updated to digital. When cops want cause for a warrant or some kind of wiretap they use push notifications to establish it.

    If you’re doing crimes or whatever, turn off push notifications. They can be used to establish that you communicated with someone or that you were in a specific area.

    Again, this is not unique to apple devices.

  • aizakku@waterloolemmy.ca
    link
    fedilink
    English
    arrow-up
    22
    ·
    2 days ago

    It’s paywalled for me so can’t see this all. But does this mean signal, rcs and other encrypted messages are being logged? Kind of defeats the purpose of privacy based use cases if so

    • dev_null@lemmy.ml
      link
      fedilink
      arrow-up
      6
      ·
      edit-2
      10 hours ago

      A push notification, from a technical standpoint, is just a way to wake up an app. It doesn’t have to contain any information.

      So when you get a message, the messaging service sends a push notification through Apple/Google, which is a way of saying “Hey messaging app, wake up”. The app then starts running in the background on your phone, connects to it’s server, asks if there is anything new to know about, and the server tells it about a new message, if any. This can then generate a notification on your phone, but importantly what you are seeing in the notification did not come through Apple/Google, all that did was the “Hey messaging app, wake up!”.

      If authorities then request this data from Apple/Google, all they can see is the times at which your messaging app was asked to wake up. Not whether any message was actually received, or what it contained, or from who. Because all that never touched Apple/Google’s systems, not even in an encrypted form.

      That being said, some data can be sent directly through the Apple/Google system along with the wake up message, so it’s not impossible that some apps include some metadata there. In theory they shouldn’t. For example simple marketing notifications or ads often are just included with the push, because it’s simple to do.

      • Ulrich@feddit.org
        link
        fedilink
        English
        arrow-up
        1
        ·
        edit-2
        45 seconds ago

        all they can see is the times at which your messaging app was asked to wake up. Not whether any message was actually received, or what it contained, or from who.

        Here’s what Senator Ron Wyden had to say on the matter:

        The data these two companies receive includes metadata, detailing which app received a notification and when, as well as the phone and associated Apple or Google account to which that notification was intended to be delivered. In certain instances, they also might also receive unencrypted content, which could range from backend directives for the app to the actual text displayed to a user in an app notification.

        So they know:

        • What app received the notification
        • when it was received
        • who it was sent to
        • dev_null@lemmy.ml
          link
          fedilink
          arrow-up
          1
          ·
          44 minutes ago

          I don’t know, are they? As far as we know they could only get unsent notifications, which are obviously still with Apple/Google because the target phone is offline and so they couldn’t be delivered yet. Which would explain why they only got thousands of them, not billions.

    • plz1@lemmy.world
      link
      fedilink
      English
      arrow-up
      13
      arrow-down
      1
      ·
      2 days ago

      Signal is E2EE. While it does use notifications, there is no meaningful unencrypted content in them. The content of the notification you see is decrypted on-device.

    • Ulrich@feddit.org
      link
      fedilink
      English
      arrow-up
      25
      ·
      edit-2
      2 days ago

      Yes. 100%. Some app creators will encrypt the contents but I don’t think they can encrypt the metadata.

      Even the most “private” of companies like Signal and Proton don’t provide any alternative either. Third-party fork Molly adds UnifiedPush support to Signal.

      From Signal CEO:

      PSA: We’ve received questions about push notifications. First: push notifications for Signal NEVER contain sensitive unencrypted data & do not reveal the contents of any Signal messages or calls–not to Apple, not to Google, not to anyone but you & the people you’re talking to.

      In Signal, push notifications simply act as a ping that tells the app to wake up. They don’t reveal who sent the message or who is calling (not to Apple, Google, or anyone). Notifications are processed entirely on your device. This is different from many other apps.

      What’s the background here? Currently, in order to enable push notifications on the dominant mobile operating systems (iOS and Android) those building and maintaining apps like Signal need to use services offered by Apple and Google.

      Apple simply doesn’t let you do it another way. And Google, well you could (and we’ve tried), but the cost to battery life is devastating for performance, rendering this a false option if you want to build a usable, practical, dependable app for people all over the world.

      So, while we do not love Big Tech choke points and the control that a handful of companies wield over the tech ecosystem, we do everything we can to ensure that in spite of this dynamic, if you use Signal your privacy is preserved.

      (Note, if you are among the small number of people that run alt Android-based operating systems that don’t include Google libraries, we implement the battery-destroying push option, and hope you have ways to navigate.)

      https://mastodon.world/@Mer__edith/111563865413484025

      • jasonthedragon442@lemmy.ml
        link
        fedilink
        arrow-up
        10
        ·
        2 days ago

        PSA: We’ve received questions about push notifications. First: push notifications for Signal NEVER contain sensitive unencrypted data & do not reveal the contents of any Signal messages or calls–not to Apple, not to Google, not to anyone but you & the people you’re talking to.

        Doesn’t this mean there is nothing to log? You got me confused

        • icelimit@lemmy.ml
          link
          fedilink
          arrow-up
          12
          ·
          2 days ago

          I guess it’s possible to log the fact that a push notification was received and the time of it?

            • Ulrich@feddit.org
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 hour ago

              They could, very easily, by implementing UnifiedPush. Let the users decide if they want/need to use it. But as of now the only way to do that is by installing a third-party app.

        • Ulrich@feddit.org
          link
          fedilink
          English
          arrow-up
          9
          ·
          edit-2
          2 days ago

          Not necessarily. I’m not some sort of tech genius but she’s using some choice language here:

          push notifications for Signal NEVER contain sensitive unencrypted data & do not reveal the contents of any Signal messages

          metadata is not “contained” in the notification.

          When pushed on this she basically changed the subject to “there’s no alternative”:

          Another Twitter user pointed out that rather than the exposure of the text, the bigger issue is that “the push gets sent at all, not what’s in it. It lets an attacker identify somebody by when they get messages, messages the attacker may even have sent.”

          To this, Whittaker replied, “So this is an issue worth clarifying. It’s not possible [right now] to build a mass [communications] app [without] push notifications, [especially with] calling. This is a problem, we agree.”

          https://www.medianama.com/2023/12/223-signal-push-notifications-content-meredith-whittaker/

          I could be misinterpreting these statements but that’s how it reads to me. Seems like encrypting metadata would require Google’s involvement and I’m sure that’s the opposite of what they want.

          • dev_null@lemmy.ml
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            1 hour ago

            You are trying to read what isn’t there. Push notifications just don’t contain any messages, at all, in any form, whether you want to call it data or metadata. They are just telling the Signal app to wake up, and then it securely checks with the server what’s up.

            The only think authorities are getting then, is the fact your Signal app was told to wake up at time X. Not whether you actually received a message, let alone any information about any messages.

            It is confusing the system is called “push notifications”, because it has nothing to do with the actual notifications you are seeing on your phone. It’s just a mechanism to wake up sleeping apps so that they can check up with their server.

            • Ulrich@feddit.org
              link
              fedilink
              English
              arrow-up
              1
              ·
              1 hour ago

              The only think authorities are getting then, is the fact your Signal app was told to wake up at time X

              That’s called metadata.

              It’s just a mechanism to wake up sleeping apps so that they can check up with their server.

              So why do the authorities want it?

                • Ulrich@feddit.org
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  13 minutes ago

                  It’s because it’s used in tandem with other data they collect to profile you. To profile all of us.

    • irotsoma@lemmy.blahaj.zone
      link
      fedilink
      arrow-up
      5
      arrow-down
      1
      ·
      2 days ago

      Yes, these are not “private” services, they are “secure messaging” services. Commonly confused issue. Privacy requires controlling the communication infrastructure. Security only requires controlling the items being shared.

  • unexposedhazard@discuss.tchncs.de
    link
    fedilink
    arrow-up
    13
    arrow-down
    1
    ·
    2 days ago

    And that is why we use ntfy :)
    Not the main instance ofc because then you have one big silo again, but there are plenty of publicly hosted servers.

  • sunzu2@thebrainbin.org
    link
    fedilink
    arrow-up
    6
    arrow-down
    1
    ·
    2 days ago

    Didn’t we already go through this Google?

    It is amazing how these companies design these services in a way that enables them to view the contents. They act as if they own the device you paid for. And most people will just accept this.

    • TaviRider@reddthat.com
      link
      fedilink
      arrow-up
      11
      ·
      2 days ago

      Part of that is the responsibility of the app developer, since they define the payload that appears in the APNs push message. It’s possible for them to design it such that the push message really just says “time to ping your app server because something changed”. That minimizes the amount of data exposed to Apple, and therefore to law enforcement.

      For instance the MDM protocol uses APNS. It tells the device that it’s time to reach out to the MDM server for new commands. The body of the message does not contain the commands.

      That still necessarily reveals some metadata, like the fact that a message was sent to a device at a particular time. Often metadata is all that law enforcement wants for fishing expeditions. I think we should be pushing back on law enforcement’s use of broad requests (warrants?) for server data. We can and should minimize the data that servers have, but there’s limits. If servers can hold nothing, then we no longer have a functional Internet. Law enforcement shouldn’t feel entitled to all server data.

    • scratsearcher 🔍🔮📊🎲@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      2 days ago

      android vs linux: round 2 electric bugaloo

      • android: comes preinstalled with google play services
      • linux: comes preinstalled with whatever package manager your distro uses
      • sunzu2@thebrainbin.org
        link
        fedilink
        arrow-up
        3
        arrow-down
        1
        ·
        2 days ago

        GPS is root access to your device no check or controls.

        Package manager at least requires password input to make modifications.

        Strong handle, btw

  • shortwavesurfer@lemmy.zip
    link
    fedilink
    arrow-up
    3
    arrow-down
    1
    ·
    2 days ago

    I’m actually surprised this came up again. Wasn’t this a thing back like a year and a half ago or something as well? I remember a big push to get on unified push about then.

    • floo@retrolemmy.com
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      2
      ·
      edit-2
      2 days ago

      Exactly. Out of the trillions that they probably process every day, over several years, they only had to turn over “thousands”. If the government can find a bunch of loopholes to get what they want, then that’s hardly the fault of Apple.

      If the worst you can say about Apple is that they still, very rarely, are forced to turn over data to the government due to bureaucratic loopholes and are no fault of their own, then I still stand behind them.

      And if they got anything useful out of that data? Then it is the fault of the actors for not properly encrypted their data when they have the opportunity.

      • sunzu2@thebrainbin.org
        link
        fedilink
        arrow-up
        7
        arrow-down
        4
        ·
        2 days ago

        Both google and apple designed notification services that enble spying on your activities on the device.

        Also, that’s the requests that were done by “law enforcement”

        Anything “national security” won’t be reported there.

        The story here is that mega corps collect this information. This information can be used against you.

        Don’t be naive.

        • floo@retrolemmy.com
          link
          fedilink
          English
          arrow-up
          5
          arrow-down
          3
          ·
          edit-2
          2 days ago

          It’s hilarious that you could equate, Google and Apple as both being evil, even though Apple specifically and explicitly keeps all of its specific and private user data private, and it always has. Apple has even gone up against the FBI and the Supreme Court in United States on several locations to maintain their ability to obvious skate and anonymize specific user data.

          But, I know let me love to hate on Apple, regardless of if it’s even true, so hate on!

          Of course, if you have any meaningful evidence of the contrary, go on and present it. Let’s see what silly excuses you use to rationalize murder. I’m very interested!