New here, love Bear and wanted to add a comment.
I think there is an angle not mentioned yet that I believe is big threat to the average user of Bear. The folks that are non-technical and just expect that their data is safe, not fully understanding the risk of having such troves of personal data and not being fully in control of its custody.
Criminal bad actors gaining access to data and using it to facilitate their malicious intentions is a bigger day to day threat, IMO. The miscreants that may or may not be sponsored by state entities, but have incredible resources, expertise and attack at scale.
Look at the past few years, the number of our top technology firms that have been compromised. Microsoft was breached to the point that actors had access to all Outlook mail including government agencies that use their services. Six months after the breach, there was still no confirmation that MS had control of the breach or even knowing if the actors were still within their systems. Take a look at the CISA report publicly reprimanding MS in very harsh language about their lackluster attitude to security practices. The rebuke was a real eye opener.
That’s only the tip of the iceberg. Every entity is under attack, many high level sucessful breaches. Many of us have been victims of data breaches, from the credit bureaus to the telecoms to the data aggregation firms. Reading Security Week archives would stun the average computer user to learn just how bad our state of cyber security and data protection is.
Apple having the key to iCloud data is not protection. It is merely a set of policies, procedures, and access control to the data. Teams of well funded bad actors are work 24 to compromise just those types of controls. Most breaches are the result of some type of social engineering, knowledge of the target, then manipulation of the target to gain trust.
Apple is not an exception, rather it is a prime target. I personally feel that Apple has some of the best security and policies of the big tech companies, but that doesn’t fully mitigate the risk.
The only way that a business or user can mitigate risk to an acceptable level is by having control and custody of the data, and when that data is stored on a third party system, they must have the only key. ADP is a very good level of protection. Bear not taking advantage of it is a big weak spot. It’s the their non-technical users at the most risk. Its implementation really should be a priority, the top priority.