If he has good reasons to believe his actual data is being sold, he needs to say so. If he is concerned they scan, well sure. If they can, they do. they all do. And, apple went further than many with on-handset scanning. But they are at some pains to disclaim they can recover stuff if you lose your keys. That goes against the idea they can see all things.
What I believe remains that apple can't see inside a lot of things easily, and if they could, they'd incur massive liabilities. What they can see, what is un-encrypted at rest, they reserve the right to look at and monetise in some ways.
Genuine question: what “on-handset scanning” does Apple do?
https://www.wired.com/story/apple-communication-safety-nude-...
If you follow the links it describes it as both on device and in the cloud.
I'm way more happier reading stuff that has citations and references to supplement their research - try to publish a research paper without any of these and you get laughed out the door.
This seems like speculation as well? Do you know that “they coded to it”? Do you have a citation?