Is Apple Notes actually private?
Updated May 14, 2026
Apple Notes has a stronger privacy posture than most cloud notes apps, but with three important caveats. Here's the 2026 reality.
What's private:
- On-device storage is encrypted with your device passcode. Apple cannot read notes stored only on-device.
- iCloud sync with Advanced Data Protection (ADP) enabled — your notes are end-to-end encrypted in iCloud. Apple cannot decrypt them even with a subpoena.
- Locked notes (a per-note password) — encrypted with that password regardless of ADP status. Apple cannot unlock them.
What's not fully private:
- iCloud sync without ADP — Apple holds the encryption keys for your notes. They cannot routinely read them, but can hand over decrypted notes under valid legal process (subpoenas, warrants). ADP is opt-in and most users never enable it.
- Shared notes / collaboration — when you share a note with someone, Apple's servers handle the sync. The note is encrypted in transit but decrypted on Apple's infrastructure for collaboration. Shared notes are excluded from end-to-end encryption even with ADP on.
- Apple Intelligence features (iOS 18+) — when you use the rewrite, summarize, or transcription features, the content is processed either on-device or on Apple's Private Cloud Compute servers. Apple says PCC servers have no persistent storage and use verifiable code, but you're still trusting Apple's infrastructure.
How to maximize Notes privacy:
- Enable Advanced Data Protection: Settings → [Your Name] → iCloud → Advanced Data Protection. Requires iOS 16.2+ and you'll need to set up a recovery contact or recovery key.
- Lock sensitive notes: tap a note → share icon → Lock Note. Use a unique password not stored in your iCloud Keychain.
- Disable cloud sync for the most sensitive notes: Settings → [Your Name] → iCloud → Notes → off. Notes stay on the device only.
- Avoid shared notes for anything sensitive.
How does Apple Notes compare to other apps in 2026?
- Better than: Notion (closed-source, cloud-only, sells aggregated data), Evernote (sold to Bending Spoons, history of breaches), Google Keep (Google can read everything).
- About the same as: Bear (iCloud sync, same Apple infrastructure).
- Worse than: Obsidian (local-only by default, no cloud reads possible), Standard Notes (zero-knowledge encryption by design).
- Better in some ways than: Némos — Némos uses CloudKit (same Apple infrastructure as Notes) but additionally uses Apple's on-device Foundation Models for AI processing, so even AI features stay on your device.
Bottom line: Apple Notes is private *enough* for 95% of users if you enable ADP. For the 5% who need true zero-knowledge encryption (journalists, lawyers, activists), Standard Notes or Obsidian with local-only sync is safer.
## Why this question gets asked so often
Apple's marketing positions privacy as a brand pillar — "Privacy. That's iPhone." — which makes the question of whether Notes specifically lives up to that promise high-stakes for the trust the entire ecosystem rests on. The privacy posture of Apple Notes has actually changed three times since 2016: per-note password protection introduced 2016, end-to-end encryption added 2017, Advanced Data Protection (full E2E for all iCloud) opt-in launched December 2022. Each change shifted what "private" means. The recent surge in this question correlates with two events: (1) the 2024 FBI vs Apple court filings (which revealed which categories Apple can decrypt on request), and (2) the 2024 launch of Apple Intelligence, which raised new questions about whether AI processing changes the privacy story. Reddit's r/privacy, r/Apple, and r/AppleHelp all carry weekly threads on this question, often with conflicting answers from confident commenters.
## The deeper story
Apple Notes' encryption architecture is a Russian-doll structure. Each note has a per-note key. That key is wrapped with the user's iCloud Keychain key. That key is wrapped with the device passcode (Secure Enclave) and iCloud account credentials. Without ADP, Apple's iCloud servers hold a copy of the unwrap key for recovery purposes — Apple can decrypt with valid legal process. With ADP, that recovery key is removed from Apple's possession entirely — only your devices can decrypt. The trade-off is recovery: forget your passcode without ADP, Apple can help restore access; with ADP, you need your recovery contact or recovery key or your data is gone forever. This is why ADP is opt-in: Apple's stated rationale is that the average user is more at risk of forgotten-password lockout than of subpoena. Security researchers like Matthew Green and Bruce Schneier have validated that Apple's claimed cryptographic architecture matches reality based on the public technical documentation Apple has published since 2022.
## Edge cases and gotchas
- Shared notes: lose E2E encryption even with ADP enabled. The shared note is decrypted on Apple's servers for collaboration.
- Apple Intelligence processing: on-device AI keeps content local; Private Cloud Compute requests leave the device but Apple says no persistent storage. Trust required.
- Notes from before E2E (pre-2017): may still be in legacy storage formats. Re-saving migrates to current encryption.
- Locked notes vs Hidden notes: locked notes have an extra password layer; hidden notes are just out of view. The privacy guarantees differ.
- iCloud backup of device: backs up Notes locally to your Mac/PC. If that backup isn't encrypted, your notes aren't protected at rest on the disk.
- Notes shared via Mail Drop: leave Apple's encrypted infrastructure entirely.
## What competitors say
Notion is unencrypted at rest — staff can technically read your content. Evernote had a 2016 breach exposing notes; their current encryption is server-side only. Google Keep can be read by Google for ML and ad targeting (per their ToS). Bear uses iCloud with the same Apple infrastructure as Notes — comparable privacy. Standard Notes is the privacy maximalist — zero-knowledge encryption by design, even for sync. Obsidian with local-only vault has no sync surface to attack. Joplin with E2E sync is open-source and audited. Notesnook is similar to Standard Notes. Némos is comparable to Apple Notes with ADP for storage but goes further on AI: only on-device Foundation Models, never PCC. This eliminates the "trust Apple's verifiable code" question that Apple Intelligence introduces.
## The 2026 verdict
Apple Notes with ADP enabled is among the most private mainstream notes apps. For users where privacy is a default-on requirement (most journalists, lawyers, therapists, activists, healthcare workers), enable ADP and you get E2E encryption that's been independently validated. For the small group with extreme threat models (state-level adversaries, sources who need zero-knowledge), move to Standard Notes or local-only Obsidian. The catch is that 80% of iPhone users have never enabled ADP — they're getting Apple's "good but not best" privacy default. Enabling ADP takes 90 seconds; it's the single highest-impact privacy change most users can make.