This Week's Sponsor:

DEVONTHINK

Store, Organize, and Work the Smart Way


Posts tagged with "Privacy"

Apple’s Data Collection in iOS 10

Ina Fried, writing for Recode, got more details from Apple on how the company will be collecting new data from iOS 10 devices using differential privacy.

First, it sounds like differential privacy will be applied to specific domains of data collection new in iOS 10:

As for what data is being collected, Apple says that differential privacy will initially be limited to four specific use cases: New words that users add to their local dictionaries, emojis typed by the user (so that Apple can suggest emoji replacements), deep links used inside apps (provided they are marked for public indexing) and lookup hints within notes.

As I tweeted earlier this week, crowdsourced deep link indexing was supposed to launch last year with iOS 9; Apple’s documentation mysteriously changed before the September release, and it’s clear now that the company decided to rewrite the feature with differential privacy behind the scenes. (I had a story about public indexing of deep links here.)

I’m also curious to know what Apple means by “emoji typed by the user”: in the current beta of iOS 10, emoji are automatically suggested if the system finds a match, either in the QuickType bar or with the full-text replacement in Messages. There’s no way to manually train emoji by “typing them”. I’d be curious to know how Apple will be tackling this – perhaps they’ll look at which emoji are not suggested and need to be inserted manually from the user?

I wonder if the decision to make more data collection opt-in will make it less effective. If the whole idea of differential privacy is to glean insight without being able to trace data back to individuals, does it really have to be off by default? If differential privacy works as advertised, part of me thinks Apple should enable it without asking first for the benefit of their services; on the other hand, I’m not surprised Apple doesn’t want to do it even if differential privacy makes it technically impossible to link any piece of data to an individual iOS user. To Apple’s eyes, that would be morally wrong. This very contrast is what makes Apple’s approach to services and data collection trickier (and, depending on your stance, more honest) than other companies’.

Also from the Recode article, this bit about object and scene recognition in the new Photos app:

Apple says it is not using iOS users’ cloud-stored photos to power the image recognition features in iOS 10, instead relying on other data sets to train its algorithms. (Apple hasn’t said what data it is using for that, other than to make clear it is not using its users photos.)

I’ve been thinking about this since the keynote: if Apple isn’t looking at user photos, where do the original concepts of “mountains” and “beach” come from? How do they develop an understanding of new objects that are created in human history (say, a new model of a car, a new videogame console, a new kind of train)?

Apple said at the keynote that “it’s easy to find photos on the Internet” (I’m paraphrasing). Occam’s razor suggests they struck deals with various image search databases or stock footage companies to train their algorithms for iOS 10.


Apple’s ‘Differential Privacy’ and Your Data

Andy Greenberg, writing for Wired, has a good explanation of differential privacy:

Differential privacy, translated from Apple-speak, is the statistical science of trying to learn as much as possible about a group while learning as little as possible about any individual in it. With differential privacy, Apple can collect and store its users’ data in a format that lets it glean useful notions about what people do, say, like and want. But it can’t extract anything about a single, specific one of those people that might represent a privacy violation. And neither, in theory, could hackers or intelligence agencies.

And:

Differential privacy, Roth explains, seeks to mathematically prove that a certain form of data analysis can’t reveal anything about an individual—that the output of an algorithm remains identical with and without the input containing any given person’s private data. “You might do something more clever than the people before to anonymize your data set, but someone more clever than you might come around tomorrow and de-anonymize it,” says Roth. “Differential privacy, because it has a provable guarantee, breaks that loop. It’s future proof.”

Permalink

Tim Cook on Encryption, Public Safety, and Right to Privacy

TIME’s Nancy Gibbs and Lev Grossman have published the full transcript of a Tim Cook interview that will be the subject of the magazine’s March 28 cover story.

It’s a lengthy interview, with Cook discussing a variety of issues related to the FBI’s requests in the San Bernardino case. Cook comments on his views on encryption in the modern technological landscape, how the US Congress should approach this debate, and why Apple views the FBI’s demands as a threat to civil liberties. It’s a great read with some fantastic passages.

The thing that is different to me about Messages versus your banking institution is, the part of you doing business with the bank, they need to record what you deposited, what your withdrawals are, what your checks that have cleared. So they need all of this information. That content they need to possess, because they report it back to you.

That’s the business they’re in. Take the message. My business is not reading your messages. I don’t have a business doing that. And it’s against my values to do that. I don’t want to read your private stuff. So I’m just the guy toting your mail over. That’s what I’m doing. So if I’m expected to keep your messages, and everybody else’s, then there should be a law that says, you need to keep all of these.

Now I think that would be really bad. I think it would be really bad because in order for me to keep them, I have to have a way to see them. If I have to have a way to see them and a place to copy them, you can imagine—if you knew where the treasure was buried at, and everybody else did, then it puts a bull’s eye on that target. And in the world of cyber security, the last thing you want is to have a target painted on you.

Permalink

Apple, FBI, and iPhone Security: A Roundup of News and Links

Apple made headlines around the world last week when Tim Cook announced, in an open letter to their customers, that Apple would oppose a court order requiring it to circumvent iOS security features. Since then, new developments in the story have broken and many have contributed with explanations of why the outcome of this battle between Apple and the FBI is significant.

Our relative silence on this topic at MacStories is not because we don’t think this story is important. To the contrary, we believe it is incredibly important and we applaud the principled stand that Cook’s Apple has decided to make. But we are hesitant to wade into this important debate, which can be incredibly technical, when there are far smarter minds out there who better deserve your time and attention.

To that end, we’ve compiled a list of useful news articles, opinion pieces, and other resources that we believe are worth a few minutes of your time.

Read more