Here's how I've implemented digital minimalism into one of my phones to give you all an idea of how I keep my technology simple, focused, minimal, and working for me. NextDNS Affiliate Link: https://nextdns.io/?from=5v4be7mt NextDNS Standard Link: https://nextdns.io/ How To Clear Homescreen: https://www.idownloadblog.com/2022/02/21/how-to-create-iphone-home-screen-with-no-apps/ Punkt Review That Inspired This Video: https://youtu.be/QdYrBpBJRI4 🔐 Our Website: https://techlore.tech 🕵 Go Incognito Course - to learn about privacy: https://techlore.tech/goincognito 🏫 Techlore Coaching - to get direct support: https://techlore.tech/coaching 💻 Techlore Forum - to connect with other advocates: https://discuss.techlore.tech 🦣 Mastodon - to stay updated: https://social.lol/@techlore We cannot provide our content without our Patrons, huge thanks to: Afonso, Boori, BRIGHTSIDE, Casper, Clark, Cyclops, Eldarix, JohnnyO, Jon, kevin, Larry, love your content, NotSure, Poaclu, x 🧡 Join them on Patreon: https://www.patreon.com/techlore 💚 To see our production gear, privacy tools we use, and other affiliates: https://techlore.tech/affiliates 💖 All Techlore Support Methods: https://techlore.tech/support 00:00 Intro to digital minimalism 00:50 Phone choices 01:52 Delete unused applications 02:37 Clean your homescreen 04:32 Changing your navigation 06:48 Screentime/downtime and other controls 08:22 DNS Filtering 09:46 The little things 11:10 The mentality 13:02 Summarizing things #minimal #minimalist #techlore
Looking for an answer more detailed than just switch to pixel and use graphene or calyx.
What are the recommended changes to use in the Settings App to make Apple more secure and private?
Should I just use the Safari browser due to all the browsers being the same as they all use WebKit
I’m looking for suggested changes to staying minimal but increasing privacy and security on iPhone
If you do, you have to be very careful. SOME data is encrypted at rest in iCloud, not all. It doesn’t matter if it’s encrypted in transit if it’s readable on the servers. Also, while some iCloud services are encrypted remotely against your private key, other services can also be decrypted by an Apple support key.
You can go through each service to ensure it (currently) fits your privacy needs, or you can just go with the basic rule that data managed by others is not private.
Oh yeah, afaik the only services which don’t have end to end encryption are the mail, books, calendar and contacts storages. Most stuff is E2E (if you enable it)
E2E refers to data in transit: the data will be encrypted between its source and destination. It says nothing about how that data is protected once it has arrived.
E2E iCloud means a third party won’t be able to snoop on the data while you are reading from iCloud or writing to iCloud. But Apple employees can still log into your account and decrypt the data at rest on iCloud in many circumstances because the data at rest is encrypted against a key held by Apple.
A recent example of how this can go wrong was seen with Azure (which hosts some of iCloud) where a Microsoft dev key leaked and attackers were able to use it to generate a working decryption key for the US Government Azure service (a different product) and read terabytes of government data off the cloud services.
The attackers could have targeted iCloud hosting services instead of the US government and done the same thing for all data in all iCloud accounts not specifically encrypted against a personal key held only in your personal keychain.
And if you use iCloud Keychain of course, the same technique can be used to attack your keychain by pretending to be Apple Support and “recover” the contents of the keychain.
According to Apple they do not have the keys when you enable Advanced Data Protection, which is why they force you to have your own backup recovery methods (recovery key, recovery contacts). When they talk about E2E the endpoints they are referring to are user-owned devices.
iCloud Keychain recovery is also much more complex than you are describing.
Yes Apple has their iCloud key, if you live in China, the key is controlled by the Ccp, potentially dangerous for abuse from lea, highly recommend not to use Apple devices if you live there. The other problem is if they same set of keys for global users that it is possible to crack encryption for global users using the same keys, hence compromising security if one day Ccp want to access to the files of some American’s phone through iCloud.
Unlike Microsoft, Apple appears to use unique regional keys for iCloud, so this risk is significantly less than it could be.
Having said that, that means that the key associated with your iCloud account will be for the region you set when you set up the account— so if you move, I believe your data is still stored in the original region and the key is for the original region.
If you do, you have to be very careful. SOME data is encrypted at rest in iCloud, not all. It doesn’t matter if it’s encrypted in transit if it’s readable on the servers. Also, while some iCloud services are encrypted remotely against your private key, other services can also be decrypted by an Apple support key.
You can go through each service to ensure it (currently) fits your privacy needs, or you can just go with the basic rule that data managed by others is not private.
Oh yeah, afaik the only services which don’t have end to end encryption are the mail, books, calendar and contacts storages. Most stuff is E2E (if you enable it)
E2E refers to data in transit: the data will be encrypted between its source and destination. It says nothing about how that data is protected once it has arrived.
E2E iCloud means a third party won’t be able to snoop on the data while you are reading from iCloud or writing to iCloud. But Apple employees can still log into your account and decrypt the data at rest on iCloud in many circumstances because the data at rest is encrypted against a key held by Apple.
A recent example of how this can go wrong was seen with Azure (which hosts some of iCloud) where a Microsoft dev key leaked and attackers were able to use it to generate a working decryption key for the US Government Azure service (a different product) and read terabytes of government data off the cloud services.
The attackers could have targeted iCloud hosting services instead of the US government and done the same thing for all data in all iCloud accounts not specifically encrypted against a personal key held only in your personal keychain.
And if you use iCloud Keychain of course, the same technique can be used to attack your keychain by pretending to be Apple Support and “recover” the contents of the keychain.
According to Apple they do not have the keys when you enable Advanced Data Protection, which is why they force you to have your own backup recovery methods (recovery key, recovery contacts). When they talk about E2E the endpoints they are referring to are user-owned devices.
iCloud Keychain recovery is also much more complex than you are describing.
Yes Apple has their iCloud key, if you live in China, the key is controlled by the Ccp, potentially dangerous for abuse from lea, highly recommend not to use Apple devices if you live there. The other problem is if they same set of keys for global users that it is possible to crack encryption for global users using the same keys, hence compromising security if one day Ccp want to access to the files of some American’s phone through iCloud.
Unlike Microsoft, Apple appears to use unique regional keys for iCloud, so this risk is significantly less than it could be.
Having said that, that means that the key associated with your iCloud account will be for the region you set when you set up the account— so if you move, I believe your data is still stored in the original region and the key is for the original region.
You know some people like to hack real people’s phone for fun
And some for profit. I’m not sure what this has to do with iCloud security and EEE vs EAR though.
I suppose it’s easier to access the cloud storage than the phone given how secure the iPhone is and with lockdown mode, it’s even harder.
Ok