{"id":453,"date":"2012-04-19T13:00:00","date_gmt":"2012-04-19T13:00:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/2250413"},"modified":"2012-04-19T13:00:00","modified_gmt":"2012-04-19T13:00:00","slug":"in-apples-icloud-one-key-to-rule-them-all","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/in-apples-icloud-one-key-to-rule-them-all\/","title":{"rendered":"In Apple\u2019s iCloud, One Key to Rule Them All"},"content":{"rendered":"<p>Earlier this month it became widely publicized that Apple maintains complete control over the master encryption key to their marquee cloud offering, iCloud. Now, to anyone familiar with security and encryption this should come as no surprise. In order for nearly all consumer cloud services to provide anywhere access to data the provider must be able to encrypt and decrypt data on the fly. But it brings up the bigger question of, who should I trust with my data?<br \/>\nTo even begin to answer that question, we need to first look at what types of data are being stored inside Apple\u2019s iCloud. For our purposes, we\u2019ll break the data into two sets: general media files and personal files. The first group consists of music, movies, books, and mobile apps \u2013 not exactly what you\u2019d call sensitive data. If a third-party were to gain access to your music library, it wouldn\u2019t be the end of the world. The second group, however, is made up of much more personal documents, including notes, calendar events, mail, contacts, and user settings. This is personal information, there\u2019s no question about it, but would a hacker or rogue Apple employee really go through the effort to read your email, text messages, and photos? Maybe if you are Scarlett Johansson \u2013 but that\u2019s a different story\u2026<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/2250413\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Earlier this month it became widely publicized that Apple maintains complete control over the master encryption key to their marquee cloud offering, iCloud. Now, to anyone familiar with security and encryption this should come as no surprise. In order &#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-453","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=453"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/453\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}