{"id":49625,"date":"2022-12-08T14:03:03","date_gmt":"2022-12-08T14:03:03","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/34124\/Apple-Adds-End-To-End-Encryption-To-iCloud-Device-Backups.html"},"modified":"2022-12-08T14:03:03","modified_gmt":"2022-12-08T14:03:03","slug":"apple-adds-end-to-end-encryption-to-icloud-device-backups","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/","title":{"rendered":"Apple Adds End-To-End Encryption To iCloud Device Backups"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/07\/2022-MacBook-Air-front-closed-760x380.jpeg\" class=\"ff-og-image-inserted\"><\/div>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a title=\"0 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/gadgets\/2022\/12\/apple-adds-end-to-end-encryption-to-icloud-device-backups-and-more\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">107<\/span> <span class=\"visually-hidden\"> with 0 posters participating<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p> <!-- cache hit 98:single\/related:b3baf23155fcd6a72090a70bf1d97199 --><!-- empty --> <\/p>\n<div class=\"gallery shortcode-gallery gallery-wide\">\n<ul>\n<li data-thumb=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/Apple-advanced-security-Advanced-Data-Protection-150x150.jpg\" data-src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/Apple-advanced-security-Advanced-Data-Protection.jpg\" data-responsive=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/Apple-advanced-security-Advanced-Data-Protection-980x1372.jpg 1080, https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/Apple-advanced-security-Advanced-Data-Protection.jpg 2560\" data-sub-html=\"#caption-1902772\">\n<figure><figcaption id=\"caption-1902772\"> <span class=\"icon caption-arrow icon-drop-indicator\"><\/span> <\/p>\n<div class=\"caption\"> The advanced data protection panel in iOS <\/div>\n<\/figcaption><\/figure>\n<\/li>\n<li data-thumb=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/Apple-advanced-security-Security-Keys-150x150.jpg\" data-src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/Apple-advanced-security-Security-Keys.jpg\" data-responsive=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/Apple-advanced-security-Security-Keys-980x1372.jpg 1080, https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/Apple-advanced-security-Security-Keys.jpg 2560\" data-sub-html=\"#caption-1902773\">\n<figure><figcaption id=\"caption-1902773\"> <span class=\"icon caption-arrow icon-drop-indicator\"><\/span> <\/p>\n<div class=\"caption\"> An iPhone screen showing instructions for using a physical security key. <\/div>\n<\/figcaption><\/figure>\n<\/li>\n<li data-thumb=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/Apple-advanced-security-iMessage-Contact-Key-Verification-150x150.jpg\" data-src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/Apple-advanced-security-iMessage-Contact-Key-Verification.jpg\" data-responsive=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/Apple-advanced-security-iMessage-Contact-Key-Verification-980x1372.jpg 1080, https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/12\/Apple-advanced-security-iMessage-Contact-Key-Verification.jpg 2560\" data-sub-html=\"#caption-1902774\">\n<figure><figcaption id=\"caption-1902774\"> <span class=\"icon caption-arrow icon-drop-indicator\"><\/span> <\/p>\n<div class=\"caption\"> iMessage Contact Key Verification promises to help protect journalists, politicians, and others. <\/div>\n<\/figcaption><\/figure>\n<\/li>\n<\/ul><\/div>\n<p>End-to-end encryption is coming to most of iCloud with a new optional feature called Advanced Data Protection, according to Apple&#8217;s <a href=\"https:\/\/www.apple.com\/newsroom\/2022\/12\/apple-advances-user-security-with-powerful-new-data-protections\/\">announcement<\/a> on Wednesday.<\/p>\n<p>Previously, 14 data categories within iCloud were protected. This new feature brings that count to 23, including photos, notes, voice memos, reminders, Safari bookmarks, and iCloud backups of the contents of your devices. Not everything is encrypted in this way, though. Critically, calendar and mail are untouched here. Apple says they are not covered &#8220;because of the need to interoperate with the global email, contacts, and calendar systems.&#8221;<\/p>\n<p>US-based participants in the Apple Beta Software Program can start using Advanced Data Protection today, and it will roll out to more Americans by year&#8217;s end. If you&#8217;re outside the US, you&#8217;ll have to wait until sometime in 2023, Apple says.<\/p>\n<p>Advanced Data Protection is the big news for most people, but Apple announced two other features related to privacy and security on iCloud. First, iCloud users may now use hardware security keys like YubiKeys. Both NFC keys and plug-in keys are supported.<\/p>\n<p>Second, there&#8217;s iMessage Contact Key Verification, which can alert &#8220;users who face extraordinary digital threats,&#8221; like journalists, if state-sponsored actors are hijacking or spying on their conversations, in some cases.<\/p>\n<p>In tandem with today&#8217;s announcements, <a href=\"https:\/\/www.wired.com\/story\/apple-photo-scanning-csam-communication-safety-messages\/\">Apple confirmed<\/a> something most of us already figured: It is no longer working on a <a href=\"https:\/\/arstechnica.com\/tech-policy\/2021\/08\/apple-photo-scanning-plan-faces-global-backlash-from-90-rights-groups\/\">controversial system<\/a> that was intended to identify child sexual-abuse material on users&#8217; iPhones\u2014the company changed course after a public privacy and security backlash.<\/p>\n<p><em>Listing image by Samuel Axon<\/em><\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/34124\/Apple-Adds-End-To-End-Encryption-To-iCloud-Device-Backups.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":49626,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[10301],"class_list":["post-49625","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlineprivacyapplecryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple Adds End-To-End Encryption To iCloud Device Backups 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Adds End-To-End Encryption To iCloud Device Backups 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-08T14:03:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/07\/2022-MacBook-Air-front-closed-760x380.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apple Adds End-To-End Encryption To iCloud Device Backups\",\"datePublished\":\"2022-12-08T14:03:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups\\\/\"},\"wordCount\":305,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups.jpg\",\"keywords\":[\"headline,privacy,apple,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups\\\/\",\"name\":\"Apple Adds End-To-End Encryption To iCloud Device Backups 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups.jpg\",\"datePublished\":\"2022-12-08T14:03:03+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups.jpg\",\"width\":760,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apple-adds-end-to-end-encryption-to-icloud-device-backups\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,privacy,apple,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlineprivacyapplecryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Apple Adds End-To-End Encryption To iCloud Device Backups\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple Adds End-To-End Encryption To iCloud Device Backups 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/","og_locale":"en_US","og_type":"article","og_title":"Apple Adds End-To-End Encryption To iCloud Device Backups 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-12-08T14:03:03+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2022\/07\/2022-MacBook-Air-front-closed-760x380.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apple Adds End-To-End Encryption To iCloud Device Backups","datePublished":"2022-12-08T14:03:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/"},"wordCount":305,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/12\/apple-adds-end-to-end-encryption-to-icloud-device-backups.jpg","keywords":["headline,privacy,apple,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/","url":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/","name":"Apple Adds End-To-End Encryption To iCloud Device Backups 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/12\/apple-adds-end-to-end-encryption-to-icloud-device-backups.jpg","datePublished":"2022-12-08T14:03:03+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/12\/apple-adds-end-to-end-encryption-to-icloud-device-backups.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/12\/apple-adds-end-to-end-encryption-to-icloud-device-backups.jpg","width":760,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apple-adds-end-to-end-encryption-to-icloud-device-backups\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,privacy,apple,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlineprivacyapplecryptography\/"},{"@type":"ListItem","position":3,"name":"Apple Adds End-To-End Encryption To iCloud Device Backups"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49625","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=49625"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/49625\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/49626"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=49625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=49625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=49625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}