Hacker News new | past | comments | ask | show | jobs | submit
+1 on your comment.

I think having a description of Apple's threat model would help.

I was thinking that open source would help with their verifiable privacy promise. Then again, as you've said, if Apple controls the root of trust, they control everything.

Their threat model is described in their white papers.

But essentially it is trying to get to the end result of “if someone commandeers the building with the servers, they still can’t compromise the data chain even with physical access”

They define their threat model in "Anticipating Attacks"