Apple not to blame for leaked pics; keep the cloud out of it

finger pointing

Cloud doesn’t impinge on public consciousness too often, but - when it does - it’s often an excuse for a barrage of misinformation, confusion and idiocy.

The reported appearance of nude pictures of Jennifer Lawrence and various other celebrities (using the term loosely) online has sent commentators into a frenzy of finger pointing at iCloud, and cloud more generally, with the the national press, in particular, having a field day with the news.

This is an odd phenomenon. It seems there are ranks of commentators just itching to stick the boot into anything closely resembling a cloud service. I’m irresistibly drawn to the vision of Senna, the hapless soothsayer from the TV series Up Pompeii, perennially predicting disaster and woe.

But what makes this particular blamefest more bizarre is that it’s not even clear whether there’s been a hack or not. We do know that a certain number of photos have found themselves in the public domain, but it’s also apparent that at least some of them are fakes. But this uncertainty hasn’t stopped all the speculation about cloud security, with experts seemingly queuing up to tell us that iCloud security is dodgy.

What’s especially peculiar about this case is all the signs suggest iCloud was not at fault. Apple has, finally, admitted that customers’ accounts were compromised, but the indications are there was no hacking, no sophisticated gangs of cyber-criminals or shadowy Russians, just a lot of publicly available information and some guesswork. You could say that Apple has been lax in allowing repeated attempts to get into accounts without blocking access but are there other flaws?

Details are still sketchy, however,there’s always the possibility of some disaffected friend, ex-lover or entourage member looking for a quick buck who is prepared to leak personal details.

This may not have been necessary when it comes to celebrities, there’s plenty of personal information available in the public domain: children’s names, pet names, mother’s maiden name, and more all out there.

We still don’t know 100 per cent. Apple may be putting out that statement as a means of protecting itself and the attacks may have come from some other direction. It may well be that Apple was wide open and that the security measures were inadequate: we just don't know.

We do know that Apple surreptitiously fixed a flaw in its Find My IPhone feature, although that could have been just a coincidence. There is also some speculation the information wasn’t garnered in one attack but over a long period – and it could have involved different methods. To repeat: we just don’t know

There have been pages of speculation in the press in the last couple of days. I don’t want to comment on the ins and outs of the attack - plenty of other people have done that - but I do want to mention the amount of misinformation, confusion and just plain deceit that I have read about recently.

It’s galling to discover just how many nay-sayers were lined up ready to attack the fallibility of cloud. Of course, there are risks attached to using cloud services and anyone using these services has to be absolutely certain about what’s being uploaded to cloud servers, who’s looking after the data and, not to over-stress the point, ensure that you have decent password protection.

Apple has implemented plenty of security around iCloud - maybe not enough - but it's designed for consumers, not for businesses with corporate data to protect. When it comes to corporate cloud services, the protection is going to be even tougher. Cloud companies are obsessive when it comes to security, it’s their livelihood after all

And that’s why I inwardly groan whenever a cloud story breaks out of the specialist press or websites and into the nationals. It was only a couple of months ago the film Sex Tape was launched, complete with more misunderstanding about cloud services (remember that ‘hilarious’ trailer? “No-one understands the cloud”).

Such misapprehension will make it harder for cloud to be adopted. We don't know the ins and outs of this latest attempts - maybe Apple was at fault, maybe not - but the point is that various bodies were leaping out of their seats and talking about lax security before we knew what was going on.

There’s a big leap from the weaknesses of iCloud to the sort of services provided by Amazon, Google, Microsoft, IBM, Rackspace, HP etc but that won’t matter to the CEO whose only knowledge of the cloud will be of Jennifer Lawrence flashing her boobs. Such reporting does a disservice to all of us.

Max Cooter

Max Cooter is a freelance journalist who has been writing about the tech sector for almost forty years.

At ITPro, Max’s work has primarily focused on cloud computing, storage, and migration. He has also contributed software reviews and interviews with CIOs from a range of companies.

He edited IDG’s Techworld for several years and was the founder-editor of CloudPro, which launched in 2011 to become the UK’s leading publication focused entirely on cloud computing news.

Max attained a BA in philosophy and mathematics at the University of Bradford, combining humanities with a firm understanding of the STEM world in a manner that has served him well throughout his career.

Latest in Cloud Security
AI chatbot text dialogue boxes in difference colours above a digital circuit board with lines of light emanating from it
Enterprise AI is surging, but is security keeping up?
Cloud storage concept image showing digitized cloud symbol with data flows.
AI is putting your cloud workloads at risk
Logo of Google Cloud, which recently announced the Wiz acquisition, pictured at Mobile World Congress 2025 in Barcelona, Spain.
The Wiz acquisition stakes Google's claim as the go-to hyperscaler for cloud security – now it’s up to AWS and industry vendors to react
Wiz logo pictured on a laptop screen.
Google confirms Wiz acquisition in record-breaking $32 billion deal
A multicolored, CGI padlock set against blue and yellow glowing slabs representing SWG and next-gen SWG in a cloud environment.
What is a secure web gateway (SWG) and next-gen SWG?
Cloud computing concept image showing a cloud symbol with electricity flowing to it, signifying cloud uptime capabilities.
Surging CNAPP investment is a big opportunity for the channel
Latest in Feature
Matt Clifford speaking at Treasury Connect conference in 2023
Who is Matt Clifford?
Open source vulnerabilities concept image showing HTML code on a computer screen.
Open source risks threaten all business users – it’s clear we must get a better understanding of open source software
An abstract CGI image of a large green cuboid being broken in half with yellow, orange, and red cubes to represent ransomware resilience and data encryption.
Building ransomware resilience to avoid paying out
The words "How effective are AI agents?" set against a dark blue background bearing the silhouettes of flowchart rectangles and diamonds to represent the computation and decisions made by AI agents. The words "AI agents" are yellow, while the others are white. The ITPro Podcast logo is in the bottom right-hand corner.
How effective are AI agents?
An illustration showing a mouth with speech bubbles and question marks and a stylized robot alien representing an AI assistant chirping away with symbols and ticks, to represent user annoyance with AI assistants.
On-device AI assistants are meant to be helpful – why do I find them so annoying?
A range of HP devices set on pedestals on the keynote stage at HP Amplify 2025 in Nashville, with a large screen in the background bearing the HP logo against a white background. The devices include AI PCs, laptops, and printers.
HP hones its edge AI ambitions at Amplify 2025