(no title)
fouric | 2 years ago
This is massively misinformed. The majority of privacy controls exist in iOS itself completely independently of the distribution method, and many more unimplemented potentially beneficial privacy controls can also be implemented at that level. This has been true for years.
nodamage|2 years ago
Many of the App Store privacy rules relate to what you are allowed to do with the user data after access is granted by the user. In other words they relate to data retention rather than access in the first place.
For example they recently added a rule saying if a user can create an account inside your app you have to also give them an option to delete the account from the app as well. This is a behavior enforced by app review, not by operating system privacy controls.
throw10920|2 years ago
Sure, I never claimed that they were a panacea - just that the majority of privacy controls implemented by iDevices are actually in iOS and not Apple's App Store review process.
Additionally, those privacy controls are more fundamental than those in the App Store. It's more important that the app not be able to toggle the microphone at will than for you to be able to control what it does with that audio after capture.
> Many of the App Store privacy rules relate to what you are allowed to do with the user data after access is granted by the user
That's not an iOS problem, and Apple fundamentally cannot regulate that, App Store or no - after your personal information goes to a third party's servers, Apple has zero visibility into what happens.
This is also not an Apple-specific issue - this happens with Android, Windows, Chrome, and random online websites. Apple cannot and should not be responsible for fixing this - we need a good set of government regulations designed to restrict how your personal data is collected or used. Otherwise, just like you said, an entity (e.g. a bank) can ask for your personal data, then store it, and it gets leaked.
Txmm|2 years ago
throw10920|2 years ago
> You can deny the permission all you want but that won’t stop them blocking features unless you tick the box
Many permissions (camera, mic, location, etc.) are trivial for the OS to spoof and don't require app store vetting.
roamerz|2 years ago