Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
I don't use notes as a password manager. I do use it for some personal details with the note locked, requiring code/face ID to open, which I like. It's useful for certain details and having them to hand whenever I need them (doesn't answer the question though ;)).
 
  • Like
Reactions: LoveToMacRumors
Nobody knows. Only Apple knows. Lastly, if it's of concern to you, use a password manager and not a notes app to store sensitive data. Doesn't matter if it "locks" or not.
 
  • Like
Reactions: Ulenspiegel
whenever there's been one of these 'the FBI wants access to the stuff on a phone' stories it's mentioned that Apple gave them access to the person's account. that means whatever was syncing and any backups which could be loaded onto a blank device. (the kicker seems to be in all those cases the person wasn't using iCloud or the FBI etc thinks there might be more information than what is there, which is why they want into the phone itself.)

and if that's true then yes they have access. meaning the real question is whether they care to use it. and they say no they don't and no one has produced a smoking gun that says otherwise
 
  • Like
Reactions: Peter K.
In contrast to Google and Facebook, Apple’s business model is not to scrape as much user information as possible.

Just be sure to put a good password on the note, and always keep it locked.
 
Yep they do because a copy is stored on icloud . With an order, the gov can also get access to your data stored in the cloud. There have been cases where Apple has been forced to handle the gov some user's data, so matter how long your device's password is, if you use any cloud service to store your data it's no longer under your control.
 
Yep they do because a copy is stored on icloud . With an order, the gov can also get access to your data stored in the cloud. There have been cases where Apple has been forced to handle the gov some user's data, so matter how long your device's password is, if you use any cloud service to store your data it's no longer under your control.

You may want to check out the aforementioned link: https://support.apple.com/en-us/HT202303
 
Seen the link shared around but not sure if it’s been stated clearly: Notes isn’t end to end encrypted, which means it can be read by Apple.
 
While Passwords should be protected from nefarious sources (Keychain and 1Password for me) why is the OP concerned about Apple? Do you really think Apple is actively scanning the billions of Notes files saved on iCloud looking for passwords so Tim Cook can then log into Snapchat posing as you?:eek:

If you even remotely believe it is a possibility then it is proof you need to use a more secure method.
 
If you need a good password manager iCloud Keychain is a nice one, I personally use it and enjoy it.
 
https://support.apple.com/en-us/ht202303

If I read that correctly, Apple could theoretically have access to your Notes content as it is not end-to-end encrypted like the data for Home, Health, iCloud Keychain, Payment, Siri and your WiFi network.

If two factor is on it says to its all encrypted
[doublepost=1532163525][/doublepost]
Yep they do because a copy is stored on icloud . With an order, the gov can also get access to your data stored in the cloud. There have been cases where Apple has been forced to handle the gov some user's data, so matter how long your device's password is, if you use any cloud service to store your data it's no longer under your control.

You are wrong. Everything on the server is encrypted with your key. Apple can't not see and doesn't have access to your data
[doublepost=1532163570][/doublepost]
Seen the link shared around but not sure if it’s been stated clearly: Notes isn’t end to end encrypted, which means it can be read by Apple.

Wrong when two factor enabled it's end to end encrypted. If it isn't on its encrypted on the server and apple still cannot see the data
 
If two factor is on it says to its all encrypted
[doublepost=1532163525][/doublepost]

You are wrong. Everything on the server is encrypted with your key. Apple can't not see and doesn't have access to your data
[doublepost=1532163570][/doublepost]

Wrong when two factor enabled it's end to end encrypted. If it isn't on its encrypted on the server and apple still cannot see the data
That’s not what their page says. How is the data encrypted? With keys that Apple hold. They’re encrypted as a safety measure against breaches and so on. But Apple can read the data, and do in rare instances when government agencies ask for it.

Seriously, read the page, it makes a point about how not even apple can read end-to-end encrypted data. The implication being they can read the other encrypted data.

Two factor has nothing to do with the encryption method, you just have to have that enabled for end-to-end encryption
[doublepost=1532170009][/doublepost] https://www.apple.com/legal/privacy/law-enforcement-guidelines-us.pdf

This document makes clear that
a) they store the encryption keys. (This is the crucial thing which doesn’t happen with end to end and why only you can read it
b) they hand iCloud data over if there’s a warrant
 

Attachments

  • ECE0B12F-5387-4588-899A-2496C62194F5.jpeg
    ECE0B12F-5387-4588-899A-2496C62194F5.jpeg
    59.3 KB · Views: 185
  • 8A7628BF-7A27-4098-B04F-12D8AD335B4A.jpeg
    8A7628BF-7A27-4098-B04F-12D8AD335B4A.jpeg
    67.2 KB · Views: 189
Last edited:
You are wrong. Everything on the server is encrypted with your key. Apple can't not see and doesn't have access to your data

Right... Restoring from a new device must be a product of magic then, as well as accessing your data from another device or from a browser. You got the cloud concept wrong.
 
  • Like
Reactions: Mr. Heckles
That’s not what their page says. How is the data encrypted? With keys that Apple hold. They’re encrypted as a safety measure against breaches and so on. But Apple can read the data, and do in rare instances when government agencies ask for it.

Seriously, read the page, it makes a point about how not even apple can read end-to-end encrypted data. The implication being they can read the other encrypted data.

Two factor has nothing to do with the encryption method, you just have to have that enabled for end-to-end encryption
[doublepost=1532170009][/doublepost] https://www.apple.com/legal/privacy/law-enforcement-guidelines-us.pdf

This document makes clear that
a) they store the encryption keys. (This is the crucial thing which doesn’t happen with end to end and why only you can read it
b) they hand iCloud data over if there’s a warrant
You hit the nail on the head. Data stored on Apple’s servers can be accessed by Apple. If you want your data to be inaccessible you need to disable iCloud backup and not use any iCloud-related services (e.g., Notes only stored on-device and not accessible via iCloud from other devices), in addition to properly securing the device itself (Touch ID, password, etc.).

Of particular relevance is that enabling iMessage iCloud backup now stores a copy of all iMessages on Apple’s servers, regardless of whether they are end-to-end encrypted during transmission/receipt.
[doublepost=1532293560][/doublepost]
If two factor is on it says to its all encrypted
[doublepost=1532163525][/doublepost]

You are wrong. Everything on the server is encrypted with your key. Apple can't not see and doesn't have access to your data
[doublepost=1532163570][/doublepost]

Wrong when two factor enabled it's end to end encrypted. If it isn't on its encrypted on the server and apple still cannot see the data
Apple holds the encryption keys to data stored on Apple’s servers, which is why Apple handing over storage duties to a state-controlled company in China for iCloud users in the country was a big deal - they now hold the encryption keys.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.