Apple Platform Security
- Welcome
- Intro to Apple platform security
-
- Encryption and Data Protection overview
- Passcodes and passwords
-
- Data Protection overview
- Data Protection
- Data Protection classes
- Keybags for Data Protection
- Protecting keys in alternative boot modes
- Protecting user data in the face of attack
- Sealed Key Protection (SKP)
- Activating data connections securely in iOS and iPadOS
- Role of Apple File System
- Keychain data protection
- Digital signing and encryption
-
- Services security overview
-
- Apple Pay security overview
- Apple Pay component security
- How Apple Pay keeps users’ purchases protected
- Payment authorisation with Apple Pay
- Paying with cards using Apple Pay
- Contactless passes in Apple Pay
- Rendering cards unusable with Apple Pay
- Apple Card security
- Apple Cash security
- Tap to Pay on iPhone
- Secure Apple Messages for Business
- FaceTime security
- Glossary
- Document revision history
- Copyright
iCloud Private Relay security
iCloud Private Relay helps protect users primarily when browsing the web with Safari, but it also includes all DNS name resolution requests. This helps ensure that no single party, not even Apple, can correlate the user’s IP address with their browsing activity. It does this by using different proxies — an ingress proxy managed by Apple, and an egress proxy managed by a content provider. To use iCloud Private Relay, the user must be using iOS 15, iPadOS 15 or macOS 12.0.1, or later, and be signed in to their iCloud+ account with their Apple ID. iCloud Private Relay can then be turned on in Settings > iCloud or System Settings > iCloud.
For more information, see iCloud Private Relay Overview.
Thanks for your feedback.