Apple Photos phones home on iOS 18 and macOS 15
What the new Photos feature does
- iOS 18 / macOS 15 add “Enhanced Visual Search” in Photos.
- When enabled, the device creates feature vectors for suspected landmarks in photos, adds differential-privacy noise, encrypts them, and sends them via an OHTTP relay to Apple’s servers.
- Servers perform homomorphic-encrypted nearest‑neighbor search against a global landmark index, return encrypted results, and the device tags photos locally.
- Several users report the setting was enabled by default after upgrade; others say it was off or depends on other settings, so behavior is unclear.
Is this “sending your photos”?
- One side: this is not uploading photos or readable metadata but non‑reversible, noisy, homomorphically encrypted vectors that Apple cannot decrypt, and relays hide IPs.
- The other side: any derived data tied only to one’s photos is “my data”; exfiltrating it without explicit consent is a privacy violation regardless of cryptography.
- Some argue even if the design is sound, bugs, implementation mistakes, or future changes could leak real data.
Consent, defaults, and user agency
- Strong theme: anything leaving the device should require explicit, up‑front opt‑in; “privacy by math” does not replace informed consent.
- Others counter that most users won’t understand HE/DP and already suffer from consent fatigue; for features believed to be mathematically safe, default‑on may be acceptable.
- Many see default‑on as violating Apple’s own “what happens on your iPhone stays on your iPhone” marketing, and as a trust‑eroding pattern alongside other telemetry (e.g., “Help Improve Search”).
Trust, closed implementations, and threat models
- Pro‑Apple commenters emphasize multiple privacy layers, open‑sourced HE libraries, and Apple’s comparatively strong stance vs. Google/Meta/Microsoft.
- Skeptics point out:
- The OS and service code are closed; users cannot verify what actually runs.
- Cryptography can be misused or quietly repurposed (e.g., revived CSAM‑style scanning).
- Powerful actors or future Apple policies could weaken protections or exploit metadata over time.
Broader reactions and alternatives
- Some view the outrage as overblown “rage‑bait”; others see it as justified pushback against creeping client‑side scanning.
- A minority argue that owning a modern smartphone is already a fundamental privacy failure (cell towers, apps, clouds), so this is marginal.
- Coping strategies discussed:
- Turning the feature off where possible.
- Using self‑hosted photo solutions (Immich, LibrePhotos, PhotoPrism, Ente).
- Moving to privacy‑focused Android variants (e.g., GrapheneOS) or Linux, with firewalls and no cloud backups.