Sunday , January 17 2021

"When it comes to privacy protections, we’re very happy to see our competitors copy our work," says Apple software chief Craig Federighi.

VP Craig Federighi wants competitors to copy Apple’s privacy protection

By ,

Computerworld

|

Appleholic, (noun), æp·əl-hɑl·ɪk: An imaginative person who thinks about what Apple is doing, why and where it is going. Delivering popular Apple-related news, advice and entertainment since 1999.

Apple VP Software Engineering, Craig Federighi discussed his company’s thoughts on ad tracking and more at the European Data Protection and Privacy Conference December 8.

It is “absolutely possible to design technology that respects [customer] privacy and protects their personal information,” he stressed. 

“When it comes to privacy protections, we’re very happy to see our competitors copy our work, or develop innovative privacy features of their own that we can learn from,” he said during this speech.

But it’s under assault

Apple believes privacy to be a fundamental human right and builds privacy into all the operating systems used in its products.

“We’re responsible not only for upholding Apple’s commitments to privacy, but for actually embodying those commitments as code,” he said.

Echoing CEO Tim Cook’s 2018 warning on the evolution of privatized surveillance, the VP stressed the danger we face: “Never before has the right to privacy – the right to keep personal data under your own control — been under assault like it is today,” he said.

Federighi spoke a little on the history of computing, pointing out that data was originally kept on floppy discs in a box beside the desk, not in the cloud.

Today, he warned, “The mass centralization of data puts privacy at risk—no matter who’s collecting it and what their intentions might be. So, we believe Apple should have as little data about our customers as possible.

“Now, others take the opposite approach. They gather, sell, and hoard as much of your personal information as they can. The result is a data-industrial complex, where shadowy actors work to infiltrate the most intimate parts of your life and exploit whatever they can find—whether to sell you something, to radicalize your views, or worse,” he explained.

Apple’s response to this is not to collect the data in the first place, which it calls data minimization.

He pointed to another strand in Apple’s strategy: To process what data is collected on the device, rather than in the cloud. This approach is designed to keep private data under the user’s control.

Apple also continues to work to make it as transparent as possible when it is collecting data, and to provide users with control over that process. Apple watchers know this is a continuing process. Maintaining data security is also critical to the entire attempt.

Federighi told the conference that every single product and feature is developed in collaboration with Apple’s teams of privacy engineers. That’s not unusual, he conceded, but:

“What makes us different is that Apple’s privacy engineers are not trying to find justifications to collect as much data as possible.

“Quite the opposite. If we can’t say that we’ve ensured the best outcome for privacy and the user’s experience, we won’t ship that software to our customers. Period.
”

Apple’s software chief looked at the evolution of the iPhone and the need for end-to-end encryption.

Observing that the device is used to share some of the most important personal and enterprise information users have, Apple saw the need for privacy as paramount which is why it put end-to-end encryption inside these devices.

He said:

“The problem is that communication over the internet is rarely so direct as that. When you communicate with another person online, your message doesn’t reach them until it has traveled through a number of intermediaries—from the free Wi-Fi you might use to the internet service providers that are the backbone of the Internet. If the data you send is unprotected, those intermediaries and others are able to listen in on your conversation. And they can exploit what you say for their own purposes.”

Apple put this kind of protection inside FaceTime from the start. It has taken almost ten years, but “now even the most data-hungry tech companies have started building encryption into their communication products,” he said.

“Where you go says a lot about who you are. Like whether you go to a particular place of worship. Or a particular medical clinic that specializes in a particular illness. There is an enormous potential for this kind of data to be misused. And the way some apps are designed, users may have no idea that they’re giving it away,” Federighi said, before explaining Apple’s continued work to protect this kind of information, including use of Approximate Location technologies.

Federighi also discussed Apple’s work to prevent rapacious ads firms tracking users across the internet.

Stopping briefly to observe that, far from breaking the ads economy, ads revenue has climbed every year since Apple began to limit this practise on its platforms, he said:

“When we launched ITP, other companies—the ones that had grown very attached to invasive tracking—said that users didn’t deserve to have these protections. And they claimed that ITP would, quote, “sabotage the economic model of the internet.”

This didn’t happen.

The VP also discussed the forthcoming App Tracking Transparency protection the company is building, which will prevent apps tracking user’s without express permission.

“Of course, some advertisers and tech companies would prefer that ATT is never implemented at all. When invasive tracking is your business model, you tend not to welcome transparency and customer choice,” he said.

Some have already begun to make outlandish claims, like saying that ATT—which helps users control when they’re tracked—will somehow lead to greater privacy invasions.

To say that we’re skeptical of those claims would be an understatement. But that won’t stop these companies from making false arguments to get what they want. We need the world to see those arguments for what they are: a brazen attempt to maintain the privacy-invasive status quo.

Federighi also had a lot to say concerning the way regulators and tech firms can work together.

“Yet on their own, even the most visionary laws are not enough in themselves. These principles behind the regulation have to find expression in the technology that companies like Apple create. So as policymakers look at the evolving landscape and decide what steps are essential, we do the same, with the unique tools at our disposal.

“Speaking again as an engineer: we are never content. Old solutions become out-of-date pretty quickly; the pace of change is relentless. But so, I think, is the pace of progress. Every day, we’re working to expand the frontier of what’s possible. To deliver great product experiences and great privacy, without compromising either.

“Of course, the tools available to engineers and policymakers are very different. But our efforts can inform and reinforce one another—as they must. Together, we achieve results that would be impossible alone.”

You can read the complete transcript here.

Please follow me on Twitter, or join me in the AppleHolic’s bar & grill and Apple Discussions groups on MeWe.

Jonny is a freelance writer who has been writing (mainly about Apple and technology) since 1999.

Copyright © 2020 IDG Communications, Inc.

Copyright © 2020 IDG Communications, Inc.

This Article was first published on itnews.com

About IT News Ug

Check Also

Apple’s Macs glide into the fast lane with M1 Apple Silicon

Apple leads the industry as personal computing moves to ARM.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

//luvaihoo.com/afu.php?zoneid=2572107