As is often the case with these uneducated uninformed unintelligent iKooks,
Jolly Roger hasn't read the news since, oh, half a decade ago, based on his
one cite above, which is so old as to be laughably arcane in its content.
Just two years after the ancient artifact unearthed by Jolly Roger is this:
*Apple's iOS Devices Are Vulnerable to Location-Based Snooping*
<
https://www.inc.com/jason-aten/a-new-security-flaw-affects-15-billion-apple-ios-devices-puts-your-personal-information-at-risk.html>
"A pair of security researchers pointed out the vulnerability
on January 2, 2020, submitting it to Apple"
I didn't check the status of that vulnerability but I found other cites
from later that year which argued it's a vulnerability waiting to happen in
terms of the functionality privacy convenience tradeoff being a bad bet.
*Why You Should Stop This 'Hidden' Location Tracking On Your iPhone*
<
https://www.forbes.com/sites/zakdoffman/2020/10/04/apple-iphone-12-location-tracking-in-ios-14-upgrade/>
"Many iOS users are surprised when some of Apple's own location tracking
is explained. Yes, maybe what happens on an iPhone stays on an iPhone,
but some data should not be captured in the first place. Nothing more
so than the significant invasiveness of Apple's significant locations
concept-a perfect illustration of just because you can, doesn't mean
you should. This is a continually building data repository of the
locations you visit, along with times and dates, detailed maps,
even the mode of transport to get you there and how long it took.
As ESET cyber guru Jake Moore warns, "significant locations is one
of those features ... I cannot think of a positive or useful reason
why Apple would include this feature on any of their devices."
Hmmm... cyber gurus and security experts are saying the little
functionality that it provides isn't worth the loss in privacy that can be
expected to occur now, and in the future (since you will never know).
Certainly, if we fast forward two more years, we acutely become aware there
is no other mobile platform more vulnerable to zero-day holes than iOS is.
Worse, the iPhone is vulnerable even when the thing is (supposedly) off!
*Your iPhone Is Vulnerable to a Malware Attack Even When It's Off*
<
https://www.wired.com/story/iphone-find-my-malware-attack-vulnerability/>
"Researchers found a way to exploit the tech which could allow attackers
to track location even when an iOS device is (supposedly) powered down.
It turns out that the iPhone's Bluetooth chip has no mechanism for
digitally signing or even encrypting the firmware it runs.
Academics at Germany's Technical University of Darmstadt figured
out how to exploit this lack of hardening to run malicious firmware
that allows the attacker to track the phone's location or run
new features when the device is turned off."
In summary, and in keeping with my adult logical discussion with
badgolferman (quite unlike any discussion with Jolly Roger), is that
decisions have to be made keeping in check the various tradeoffs between
FUNCTIONALITY <===> PRIVACY
In this thread, badgolferman kindly exposed a specific setting in the
iPhone that I personally was unaware of, and when I read badgolferman's
article, I learned from his efforts - which I appreciated as the whole goal
of being on Usenet is to learn from others who know more than we do.
Then Jolly Roger, whose entire ego is intertwined with Apple propaganda,
digs up a fantastically ancient article that opines what the state of
affairs was thought to be an entire half a decade ago (which is very old!).
For my part, and knowing Jolly Roger to be almost always wrong in so much
as he believes all propaganda fed to him at the same time he holds views
that are based on data that is more than a half decade old... I dug up some
references which I helpfully provided above, to further the adult
conversation with badgolferman (and with anyone owning adult conversational
skills).
--
Posted out of the goodness of my heart to disseminate useful information
which in this case was to point out the age of Jolly Roger's references.