They still operate under US law so cannot really enforce user privacy.
Code is closed and proprietary hence relies on blind trust.
Depending on your threat model Apple might not provide the kind of privacy you need.
They still operate under US law so cannot really enforce user privacy.
Code is closed and proprietary hence relies on blind trust.
Depending on your threat model Apple might not provide the kind of privacy you need.