+template
Bananabot (talk | contribs)
Added archive URLs for 2 citation(s) using CRWCitationBot
 
(2 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{InfoboxProductLine
{{ProductCargo
| Title = iCloud
|ArticleType=Service
| Release Year = 2011
|Category=Cloud
| Product Type = Subscription Service
|Company=Apple
| In Production = Yes
|Description=
| Official Website = https://icloud.com
|InProduction=Yes
| Logo = ICloud.svg
|Logo=ICloud.svg
}}{{lowercase title}}
|ProductLine=2011
|ReleaseYear=Yes
|Website=https://icloud.com
}}
{{lowercase title}}
[[wikipedia:ICloud|'''iCloud''']] is a cloud storage and cloud computing service provided by [[Apple]]. It offers various internet-based services, including iCloud Photos, device backups, and the Find My network.
[[wikipedia:ICloud|'''iCloud''']] is a cloud storage and cloud computing service provided by [[Apple]]. It offers various internet-based services, including iCloud Photos, device backups, and the Find My network.


Line 13: Line 17:
===2014 Celebrity Photo Leaks===   
===2014 Celebrity Photo Leaks===   


In August 2014, a series of brute-force attacks targeted iCloud accounts, leading to the unauthorized access and release of private photographs belonging to multiple celebrities.<ref>[[wikipedia:2014_celebrity_nude_photo_leak|2014 celebrity nude photo leak]]</ref> Apple denied that a breach of iCloud itself had occurred, attributing the incident to weak user passwords and phishing attacks.<ref>https://www.theverge.com/2014/9/2/6098107/apple-denies-icloud-breach-celebrity-nude-photo-hack</ref> However, vulnerabilities allowing brute-force attacks remained unaddressed the following year, raising concerns over iCloud’s security measures.<ref>https://www.ibtimes.co.uk/icloud-accounts-risk-brute-force-attack-hacker-exploits-painfully-obvious-password-flaw-1481623</ref>
In August 2014, a series of brute-force attacks targeted iCloud accounts, leading to the unauthorized access and release of private photographs belonging to multiple celebrities.<ref>[[wikipedia:2014_celebrity_nude_photo_leak|2014 celebrity nude photo leak]]</ref> Apple denied that a breach of iCloud itself had occurred, attributing the incident to weak user passwords and phishing attacks.<ref>https://www.theverge.com/2014/9/2/6098107/apple-denies-icloud-breach-celebrity-nude-photo-hack ([http://web.archive.org/web/20250831150803/https://www.theverge.com/2014/9/2/6098107/apple-denies-icloud-breach-celebrity-nude-photo-hack Archived])</ref> However, vulnerabilities allowing brute-force attacks remained unaddressed the following year, raising concerns over iCloud’s security measures.<ref>https://www.ibtimes.co.uk/icloud-accounts-risk-brute-force-attack-hacker-exploits-painfully-obvious-password-flaw-1481623 ([http://web.archive.org/web/20251230054034/https://www.ibtimes.co.uk/icloud-accounts-risk-brute-force-attack-hacker-exploits-painfully-obvious-password-flaw-1481623 Archived])</ref>


===Data Hosting in China===   
===Data Hosting in China===   


In 2018, Apple transitioned Chinese users’ iCloud data to local servers in compliance with Chinese data laws.<ref>https://thehackernews.com/2021/05/how-apple-gave-chinese-government.html</ref> The move raised concerns regarding government surveillance, as the encryption keys for the data were also stored within China.<ref>https://thehackernews.com/2021/05/how-apple-gave-chinese-government.html</ref> Apple stated that this change only affected users residing in mainland China; however, it did not specify how it distinguishes between residents and visitors.<ref>https://support.apple.com/en-us/111754</ref>
In 2018, Apple transitioned Chinese users’ iCloud data to local servers in compliance with Chinese data laws.<ref>https://thehackernews.com/2021/05/how-apple-gave-chinese-government.html ([http://web.archive.org/web/20260209094941/https://thehackernews.com/2021/05/how-apple-gave-chinese-government.html Archived])</ref> The move raised concerns regarding government surveillance, as the encryption keys for the data were also stored within China.<ref>https://thehackernews.com/2021/05/how-apple-gave-chinese-government.html ([http://web.archive.org/web/20260209094941/https://thehackernews.com/2021/05/how-apple-gave-chinese-government.html Archived])</ref> Apple stated that this change only affected users residing in mainland China; however, it did not specify how it distinguishes between residents and visitors.<ref>https://support.apple.com/en-us/111754 ([http://web.archive.org/web/20251128142647/https://support.apple.com/en-us/111754 Archived])</ref>


===End-to-End Encryption Restrictions in the United Kingdom===   
===End-to-End Encryption Restrictions in the United Kingdom===   


In February 2025, Apple disabled Advanced Data Protection (also known as ADP), its end-to-end encryption feature for iCloud, for users in the United Kingdom. The decision followed a request from the UK government, which sought access to encrypted user data.<ref>https://www.zdnet.com/article/why-apples-disabling-of-icloud-encryption-in-the-uk-is-bad-news-for-everyone/</ref>
In February 2025, Apple disabled Advanced Data Protection (also known as ADP), its end-to-end encryption feature for iCloud, for users in the United Kingdom. The decision followed a request from the UK government, which sought access to encrypted user data.<ref>https://www.zdnet.com/article/why-apples-disabling-of-icloud-encryption-in-the-uk-is-bad-news-for-everyone/ ([http://web.archive.org/web/20251229142653/https://www.zdnet.com/article/why-apples-disabling-of-icloud-encryption-in-the-uk-is-bad-news-for-everyone/ Archived])</ref>


==References==
==References==
{{Reflist}}
{{Reflist}}
[[Category:Apple]]
[[Category:Apple]]