• Ghostalmedia@lemmy.world
      link
      fedilink
      English
      arrow-up
      78
      ·
      6 months ago

      Yeah, but ignoring the delete requests, and storing the data puts them out of compliance with European and American deletion and retention laws. And if they were lying, and were using user photos to train models, they have more than enough non-deleted photos already.

      I’m not pulling out my jump to conclusions mat quire yet. The database corruption issue sounds more reasonable. That stuff happens, and Apple isn’t zeroing data. Most people aren’t. Because the data isn’t zeroed, a file can resurrect when a corruption issue is remedied.

    • Possibly linux@lemmy.zip
      link
      fedilink
      English
      arrow-up
      18
      ·
      6 months ago

      I learned that things you post online can never be deleted way in school.

      The difference here is that the files aren’t on Apples servers, they are on your phones internal disk. It is especially dangerous with Apple as you can’t even run third party software.

      • NeoNachtwaechter@lemmy.world
        link
        fedilink
        English
        arrow-up
        24
        ·
        edit-2
        6 months ago

        The difference here is that the files aren’t on Apples servers

        Why would you think so?

        The very first thing in the article photo goes like “delete from iCloud”

      • Ghostalmedia@lemmy.world
        link
        fedilink
        English
        arrow-up
        6
        ·
        6 months ago

        The difference here is that the files aren’t on Apples servers, they are on your phones internal disk.

        ?

        This is about files that are on iCloud servers. Specifically, some photos on iCloud servers don’t get properly flagged for deletion when the user requests it. Something was getting corrupted.

        Apple fixed the corruption issue, so now a handful of photo files affected by it appeared to rise from the dead. The files were always there in the cloud, but something like a corrupted DB entry was hiding them from view. Users thought they were deleted, but they were in some sort of corruption purgatory. Not visible to the user, but still taking up storage space.

        Once the corruption issue was remedied, the photo app recognized the files, didn’t realize they were previously flagged for deletion, then started to sync them to the device. AKA, download them.

        And yes, you can run third party software on Apple’s operating system. There are quite a few third party apps for managing iOS and MacOS’s file system.

        Big complaint isn’t a lack of 3rd party apps, it’s that it’s hard to side load apps that aren’t signed.

      • Petter1@lemm.ee
        link
        fedilink
        English
        arrow-up
        5
        ·
        6 months ago

        iPhone Storage is encrypted, photos should not reappear if the encryption keys changed. Unless the keys never change, which would be very strange, especially after total reset.

      • Petter1@lemm.ee
        link
        fedilink
        English
        arrow-up
        2
        ·
        6 months ago

        The bits written on mass sorage that are deleted remain there and are just marked as free storage until they get overridden by another file, this is how datarecovery works. Here, we have a similar case, where iOS hat a problem deleting the file from storage but managed to remove it from photos app index (storage is not marked as free, file could still be accessed if we had root file access but the link which pointed the photos app to the picture got removed). Now after some time, it can happen that the photo somehow gets detected (most likely as a safety measurement so that user don’t lose a picture if said link gets corrupted) and instead of deleting the file, de link gets repaired.

        (Warning only a noob assumption)

        Source: https://www.iphone-ticker.de/foto-panne-unter-ios-kein-fremdzugriff-aber-peinlich-fuer-apple-234979/

        • Possibly linux@lemmy.zip
          link
          fedilink
          English
          arrow-up
          5
          ·
          edit-2
          6 months ago

          That’s not how it should work. A wipe should do a secure wipe either by writing random data to every bit or by doing a flash erase

          It isn’t practical to do that on a per file basis but when the device changes ownership it is necessary

          • Petter1@lemm.ee
            link
            fedilink
            English
            arrow-up
            3
            ·
            6 months ago

            Yes, it should, but is mostly not done. But better approach is to use an encrypted filesystem like iOS and macOS(only with fileVault enabled) does. You can not recover encrypted data.

            What happened here did not happen to phones that got wiped but only to phones where one logged logged off iCloud and logged into new iCloud account. Still the same encryption keys for filesystem.

            There is no proof that it ever happened to a phone that was wiped completely.

            Performing secure wipes reduces the lifetime of the storage device, if you sell a PC with removable storage device, it is better to just replace it with a new one for selling, and of course use fileVault on mac, bitlocker on windows and LUKS on linux (of course on linux there are more ways and LUKS is a partition and not a filesystem)