Night — before 6:47 AM

While you sleep: Apple Watch on your wrist

Night
from 11 PM
Apple Watch · HealthKit
Sleep under observation

The Apple Watch measures throughout the night: heart rate, sleep stages, respiratory rate, blood oxygen levels. This data is stored locally on the iPhone in the Health app — and is technically set up differently from Fitbit or Wear OS devices.

What Apple actually does: Health data is stored locally with encryption. iCloud synchronisation uses end-to-end encryption — but only if two-factor authentication is active and no standard iCloud backup is running that also contains the key. Apple's guidelines prohibit using HealthKit data for advertising. Third-party apps you've granted access to are subject to their own privacy policies.

What this means in practice: In 2021, over 61 million fitness tracker records were leaked via a third-party provider (GetHealth) — including HealthKit data. Names, dates of birth, weight, height, gender and geographic location, all stored in an unencrypted, publicly accessible database.

Heart rate Sleep stages Respiratory rate Third-party risk
6:47 AM

Morning: iPhone unlocked

6:47
Wake up
iPhone · iCloud
Face ID unlocks the iPhone — and connects it to Cupertino

On first unlock, the iPhone syncs automatically: iMessages, photos, contacts, calendar, notes, health data — all routed through iCloud. The data is stored on Apple's servers in the USA, and in part with Amazon AWS, Google Cloud and Microsoft Azure as third-party providers.

Standard Data Protection (the default): Your data is encrypted — but Apple holds the key. Apple can theoretically access photos, contacts, calendar and mail. Under a court order, this data is handed over to US authorities.

Advanced Data Protection (must be activated manually): With this option, only you hold the key. Photos, notes and backups are end-to-end encrypted. Exception: contacts, calendar and iCloud Mail remain accessible by Apple for technical compatibility reasons.

What almost nobody knows: Standard Data Protection is pre-selected. Most users are running it — without realising it. This means: in standard mode, Apple can decrypt your entire iCloud backup, including iMessages whose key is also stored there.

Photos Messages Contacts US servers Cloud Act
7:30 AM

School and nursery: Apple Maps knows the way

7:30
School run
Apple Maps · Location Services
7:38 nursery. 7:52 school.

You navigate with Apple Maps — or simply have the iPhone logging GPS data on the go. Apple Maps does not permanently store routes linked to your account. Personalised features like "Significant Locations" are created locally on the device.

What Apple actually records: When Location Services are active, your iPhone sends anonymised, encrypted location data to Apple when opening apps near a place — for information on opening hours and visit frequency. Route data for navigation is processed anonymously, "not linked to your identity". Apple converts precise locations to less precise ones within 24 hours.

But: When Siri is active and you ask for directions, with Location Services enabled the approximate location of your device is sent to Apple. The "Significant Locations & Routes" feature — which knows the nursery route after just a few weeks — is end-to-end encrypted, yet still stored on Apple's servers.

Location Route Significant locations
8:15 AM

iMessage to a friend

8:15
Message
iMessage · Apple
Blue bubble. End-to-end. And yet.

You send your friend an iMessage. The content is end-to-end encrypted — Apple cannot read it. That's the famous difference from WhatsApp. But iMessage is more complex than it appears.

What Apple has officially confirmed: iMessage stores metadata for up to 30 days: who messaged whom and when, timestamps, the sender's IP address (from which location can be inferred). Under a court order, this data is handed over to US authorities.

The iCloud backup problem: If your iPhone creates a standard iCloud backup (the default setting), the key to your encrypted iMessages is also stored in iCloud — and therefore with Apple. End-to-end encryption protects the transmission, not the backup. Only with "Advanced Data Protection" activated is your backup truly yours alone.

Metadata 30 days IP address Backup key held by Apple
10:00 AM

Amazon purchase via Apple Pay

10:00
Online purchase
Apple Pay · Wallet
Paying without a card number — but not without data

You buy a birthday present on Amazon and pay with Apple Pay. Apple does not store the actual card number and, according to its own statements, has no access to the contents of your purchase. In physical shops, Apple sees even less.

What Apple actually sees: When adding a card to Apple Pay, card-related information, your device location, and usage patterns are sent to Apple. For online purchases, Apple stores anonymised transaction data "to improve the service". When Location Services are active, in-store purchases transmit location anonymously to Apple.

The key difference from PayPal: Apple does not build detailed profiles from Apple Pay data and does not share it with hundreds of third-party companies. Apple Pay is significantly better for privacy than PayPal — but usage data still flows to Cupertino, USA.

Usage data Location Device information
10:30 AM

"Hey Siri" — and what happens next

10:30
Voice assistant
Siri · Apple
"Hey Siri, remind me at 2 PM about the doctor's invoice."

You call up Siri. Apple emphasises that many requests are processed directly on the device. Simple functions like reading out messages or widget suggestions stay local. For more complex requests, encrypted data is sent to Apple's servers — via an anonymous, rotating ID, not your Apple account.

What Apple officially stores: Transcripts of your Siri interactions are stored for up to 2 years — linked to a random device ID. Apple employees manually review a small portion of these transcripts. If you use Siri with Location Services enabled, your approximate location is also stored.

The Siri scandal: In 2019 it emerged that Apple subcontractors were listening to private conversations — unintentionally triggered Siri recordings, including doctor's conversations and intimate moments. In early 2025, Apple agreed to a $95 million settlement following a class action lawsuit. The lawsuit covered the period from September 2014 to December 2024. Apple denied any wrongdoing.

"Hey Siri" is always listening: The iPhone must continuously listen for the activation phrase. According to Apple, the recognition happens locally. But: sounds resembling the activation phrase could accidentally trigger Siri — that was the core of the multimillion-dollar lawsuit. Conversations from guests and children in the room were captured in this way too.

Transcripts 2 years Location Manual review $95M settlement
12:30 PM

Supermarket — no loyalty scheme, still data

12:30
Shopping
Supermarket · Offline
Kids' yoghurt, vegetables, cold remedy tea — this time without Apple

Apple has no involvement in the supermarket shop — as long as you pay with cash or a debit card. If you use Apple Pay, Apple sends anonymised location data for merchant identification in the Wallet app. The contents of your shopping remain unknown to Apple.

That shopping list you dictated to Siri earlier? The transcript is on Apple's servers.

Offline Location (with Apple Pay)
3:00 PM

App Store: A children's game for iOS

15:00
App purchase
App Store · Apple
"Privacy. That's iPhone." — and Apple's own tracking

You buy a learning app for the children. Apple requires every app to carry a privacy nutrition label. Since iOS 14.5, apps must ask the user for permission for cross-app tracking (App Tracking Transparency). A genuine step forward for third-party apps. But Apple itself is exempt.

Apple's own ecosystem: Apple collects purchase behaviour, search queries, apps used and usage times in the App Store — all linked to your Apple ID. This data feeds into Apple's own advertising business: Apple Search Ads, prominently placed within the App Store. Apple does not have to follow its own ATT rules for this. Germany's Federal Cartel Office and European regulators have criticised this double standard.

Purchase behaviour App usage Apple Search Ads
7:30 PM

Apple TV+: Evening film with tracking

19:30
Streaming
Apple TV · iCloud
What you watch, when you stop

You watch a film on Apple TV+. Apple knows: which content you started, paused, finished — when and for how long. Search terms, interactions with the interface, device model and operating system. Nothing unusual for streaming services — but still data that maps your daily rhythm and tastes, stored on US servers.

Playback history Search terms Usage time
9:00 PM

HomePod in the living room

21:00
Smart home
HomePod · Siri
"Hey Siri, play something calm."

The HomePod listens continuously for the activation phrase. Once triggered, your request is processed — locally where possible, otherwise encrypted via Apple's servers. Unlike Amazon's Alexa, Apple does not store audio recordings permanently by default.

But: The HomePod can also be accidentally triggered — by similar-sounding noises or conversations. That was the core issue in the $95 million lawsuit. And: everything you say after an activation is stored as a transcript for up to 2 years on Apple's servers — including the approximate location of the device.

Transcripts Accidental activation No permanent audio (default)
Night — again

Back to the start: Apple Watch sleeps alongside you

23:00
Night
Apple Watch · HealthKit
By morning, the iPhone knows more about your night than you do

The Apple Watch keeps recording. When your heart rate drops. When you fall asleep. How deeply you sleep. The data is stored locally, synchronised with encryption — via iCloud on US servers.

Sleep stages Heart rate Respiratory rate
The crucial detail

Standard vs. Advanced Data Protection

Apple offers genuine privacy improvements — but most users don't use them because they're hidden away. The default settings give Apple significantly more access than necessary.

Data category Standard (default) Advanced Data Protection
iCloud Backup Apple holds key End-to-end
Photos Apple holds key End-to-end
Notes Apple holds key End-to-end
Health data End-to-end End-to-end
iMessage backup Key in backup End-to-end
Contacts & Calendar Apple holds key Apple holds key*
iCloud Mail Apple holds key Apple holds key*
Siri transcripts 2 years, anonymous 2 years, anonymous

* Apple justifies this on the basis of interoperability requirements with external services.

A perfectly ordinary Tuesday — with Apple

Apple is not Google. That's not an empty phrase. Apple does not make money by selling your behavioural profile to ad networks. The end-to-end encryption of iMessage is real. Using HealthKit data for advertising is prohibited. Siri transcripts are not linked to your Apple account.

But: Apple is a US corporation. Your data sits on US servers. The Cloud Act of 2018 gives US authorities far-reaching access to data held by American companies — even when the user is based in Europe. GDPR does not fully protect you here.

And the core of the problem: The privacy Apple actually enables is optional. Advanced Data Protection. Two-factor authentication. Declining ATT tracking. All of it exists — but none of it is switched on. The default settings let Apple see significantly more than necessary.

At the end of an Apple Tuesday, no advertising algorithm has built a detailed behavioural profile on you. But Apple itself, US authorities with a court order, and potentially third-party apps you once granted HealthKit access to, know quite a lot about you.

You haven't done anything wrong. Using a device that tells you it protects your privacy — and in many respects, that's true. In many respects, though, it isn't.
The Apple user isn't smiling for nothing.
Even if it reads that way — this is not meant to be an Apple ad. 😂
Sources & References
01
Apple – iCloud Data Security: Standard vs. Advanced Data Protection
Official overview of which data categories are encrypted how, and who holds the key.
support.apple.com/en-us/102651
02
Apple Legal – Siri, Dictation & Privacy
Official Apple privacy page: transcripts stored for up to 2 years, manual review by employees possible.
apple.com/legal/privacy/data/de/ask-siri-dictation/
03
heise online – Apple pays $95 million in Siri privacy case
Settlement following class action lawsuit over unintentional Siri recordings and sharing with third parties (2014–2024).
heise.de – Siri lawsuit
04
Apple Legal – Apple Pay & Privacy
What Apple stores during setup and at the point of transaction: card information, location, anonymised usage data.
apple.com/legal/privacy/data/de/apple-pay/
05
watson.ch / ZDNet – iMessage metadata: Apple stores and discloses it
Leaked document confirms: Apple stores iMessage metadata (timestamps, IP, contacts) for 30 days and shares it with authorities.
watson.ch – iMessage metadata
06
Apple Legal – Apple Maps & Privacy
With Location Services active, location data is sent anonymously to Apple; precise locations are generalised within 24 hours.
apple.com/legal/privacy/data/de/apple-maps/
07
Apple Legal – Location Services & Privacy
Describes exactly which location data is sent, when and to whom, including crowdsourcing for traffic data.
apple.com/legal/privacy/data/de/location-services/
08
heise online – iCloud security: what is encrypted, how, and where
Detailed analysis of iCloud encryption layers: contacts, calendar and mail remain accessible to Apple even with Advanced Data Protection.
heise.de – iCloud security
09
dr-datenschutz.de – Apple's iCloud: a privacy check
Comprehensive analysis: server locations, Cloud Act, GDPR compatibility, standard vs. advanced data protection.
dr-datenschutz.de – iCloud check
10
Mozilla Foundation – Apple Watch Privacy & Security Guide
2021: GetHealth data breach exposing over 61 million fitness tracker records including HealthKit data.
mozillafoundation.org – Apple Watch
11
Apple – Protecting access to user's health data (HealthKit)
Official technical documentation: local encryption, iCloud sync only with E2E if 2FA is active.
support.apple.com – HealthKit Security
12
proliance.ai – Apple Privacy: How safe is our data?
iCloud backup and the iMessage key contradiction: content is E2E, but the backup key is held by Apple.
proliance.ai – Apple privacy
13
Apple Newsroom – Our longstanding privacy commitment with Siri
Apple's official statement following the Siri lawsuit: on-device processing, no marketing profile, Private Cloud Compute.
apple.com/newsroom – Siri Privacy
14
ionos.com – Is iCloud safe to use?
Cloud Act 2018: US authorities have far-reaching powers over data on US servers, including data belonging to non-US citizens.
ionos.com – iCloud safety
15
Apple Support – Enable Advanced Data Protection for iCloud
Step-by-step activation of advanced data protection — and why it is not the default setting.
support.apple.com/en-us/108756