No, they do not. They claim it is encrypted, but nowhere do they claim those types of files are end-to-end encrypted.
Some iCloud data is e2e (keychain, health) but not most of it. Critically, device backups, containing all of your chat history for all time, are not e2e. Cryptographically, you would not be incorrect in describing this as a backdoor in iMessage’s end to end encryption.
It’s encrypted in transit with Apple keys and it’s encrypted at rest with Apple keys. Apple can always decrypt it without you, and you would have no way of knowing if they had done so.
They are vulnerable to subpoena or search warrant, but due to Apple’s participation in PRISM, they often turn over the data to military intelligence without a warrant at all.
So when there are public spats between law and Apple about unlocking Apple devices, and talk of universal rule changes on how big tech must add backdoors in the U.S. political arena, and Apple vocally saying 'Never', it's all (bare faced lies) theatre - because there already is virtually, or as I'm reading here, easy, access to any Apple service when requested by U.S. law?
Some iCloud data is e2e (keychain, health) but not most of it. Critically, device backups, containing all of your chat history for all time, are not e2e. Cryptographically, you would not be incorrect in describing this as a backdoor in iMessage’s end to end encryption.
It’s encrypted in transit with Apple keys and it’s encrypted at rest with Apple keys. Apple can always decrypt it without you, and you would have no way of knowing if they had done so.
They are vulnerable to subpoena or search warrant, but due to Apple’s participation in PRISM, they often turn over the data to military intelligence without a warrant at all.
https://sneak.berlin/20200604/if-zoom-is-wrong-so-is-apple/
Apparently they were going to fix it, but decided to leave it the way it is because the FBI was complaining.
https://www.reuters.com/article/us-apple-fbi-icloud-exclusiv...