> they can freely use it as a P2P computing device
Do you have any evidence of this, or are you just making up something that sounds good to you?
More likely it's doing the background on-device work that Apple has actively advertised for a long time, like analyzing photos to attach metadata to them. (There's a lot more to this than is obvious at first glance - I can text "penguin" or "sunset" in my Photos.app library and get a set of matching pictures back, for example.)
You reckon I would know of a way to gather an exact evidence unless I work for Apple? (In which case I'll likely be convicted and thrown in jail as well.)
Obviously I can't know for a fact. I also thought they likely analyze photos and that's my chief suspect even now. But critical thinking demands to keep an open mind -- and that's how I suspect they might use fully-charged iDevices (that are expected to sit on the charger for several more hours) for unsolicited and non-advertised P2P computations.
Yeah, sure, I can brute force encrypted traffic by eyeballing it in my router's dashboard UI. Come on, dude.
You seem to have an axe to grind here and I refuse to participate. I even objectively admitted that I can't know and that I only suspect yet you (a) offer a non-solution and (b) likely downvote a comment because you don't like it.
Do you have any evidence of this, or are you just making up something that sounds good to you?
More likely it's doing the background on-device work that Apple has actively advertised for a long time, like analyzing photos to attach metadata to them. (There's a lot more to this than is obvious at first glance - I can text "penguin" or "sunset" in my Photos.app library and get a set of matching pictures back, for example.)