A total canard with the inference being that the user is protected!
It's just not true.
The part about the IOS not transmitting ID signifiers is true, but the idea that the user is protected is false.
While I do not use smart phones today, that does not mean that I did not in the recent past. Even though I explained this once, I will do it again just for the benefit of you.
Any one missing data point, like a identifier does not make you secure. That information can be gleaned in other ways, and over a period of time. Once that is done, it does not have to be done again. For apple or it's millions of sycophants to claim that it is secure is the same sort of mental gymnastics Apple users employ to say that Apple is the most innovative.
Apparently you believe that encryption cannot be broken and the Chinese are too stupid to do it or cannot divine a "key".
I think I'll just leave that with you as it is a ludicrous assumption. That is exactly what the Germans thought in regard to their 4 wheel Enigma machine. The British broke it through data collection and then used what they had collected to assist the programming a rudimentary WWII era computer and crunched the numbers subsequently breaking the codes in spite of the fact that no one actually knew the key or what was in the key on either end. Like all coded messages, there has to be some sort of data located within the messages to identify what key is needed to decrypt. It does not matter where you store the other piece of the data. Eventually it will be found, seized, or in this case given to you. One would of course need to be able to recreate the algorithms needed to recreate the encryption sequence. Every bit of information you collect in this regard shortens the time needed to decrypt. (and computers are now blazing fast compared to what they successfully used in WWII)
The facts are that you are of the opinion that the Apple I-phone is secure and can be safely used by corporations who are highly sensitive to security issues. Apple has been trying to overcome these fears to expand their retail base, and have had some successes. But they still have a long way to go in convincing them and that is because it is not secure and everyone but you apparently knows it.
I would get your head out of the Apple techie blogs where you are immersed in a echo chamber and do a little independent thinking.
I did not originally come here to bash Apple, but that does not mean that they don't deserve bashing...they certainly do.
I only wanted to point out that Apple did something that even google would not do, and they did it because China threatened them and it worked. It did not work with Google as google is not a vertically integrated company like Apple is.
That is Apple's weakness internationally and after this, they will be sharing data or kowtowing to every State Actor on the planet.
There is no secure consumer smart phone. not Apple, not any of them.
Cloud????LOL!.....The cloud is just a server. In the case of China, that server farm is now under Chinese control and access. It's just a matter of time before they use it to add to their data collection base. As they add to to it. All things become exposed. The smart phone is now playing a part in that data collection. A pretty big part, I might add.
Gleaning location data of any singular individual from aggregated data of millions of data streams, again without identifiers, is NOT POSSIBLE.
. Just because YOU want to believe in magic does not mean I have to. My head is NOT "buried in Apple blogs" as you so quaintly seem to think. Yours is buried in paranoid fear.
256, 512, and 1024 bit random hexadecimal string passwords are nowhere as easy to "divine" or break, as you seem to think. There is nothing out there that can do. . . and neither the Chinese, nor even our vaunted NSA has that capability to do that in any reasonable time for any data to be useful.
The ludicrous one on this thread is you.