How to restore deleted photos in iCloud

With cloud integration, it is easier than ever to share the same file across multiple devices. Once you have enabled your iCloud Photo Library, you can see the photo that you just took on your iPhone, on your Mac computer as well. However, once you delete a photo on an iOS device or Mac computer, the photo is also deleted everywhere. Can you restore photos? If you delete a photo from your iCloud Photo Library, can you restore it? These are two frequently asked questions about photo syncing and storage in the iCloud Photo Library.

By default, a photo deletion on any device is also deleted on all devices that are connected to the cloud. So for example, if you had retained high resolution images on your desktop computer’s iPhoto library, you would lose those images if you delete them from your iCloud Photo Library intentionally or by accident.

The best way to prevent a deletion would be to set up a separate user account on your desktop computer with limited access. This would prevent accidental deletions by family members, friends or even yourself.

However, even after you have deleted a photo, you still have it temporarily in a folder called your ‘Recently Deleted’ album. The media is typically retained in here for a maximum of 30 days and shows how may days you have access to any item in here. After 30 days, the file is gone forever. Thus you can restore any item in here by clicking on Recover located in the upper right corner or also via the Control button on your Mac and pressing Recover. Then the photo is added back into your library.

For your iOS device (iPhone or iPad), follow these steps

  1. Go to Photos > Albums > Recently Deleted. If you see the missing photo, you can move it back into your All Photos album.

  2. Tap Select.
  3. Tap the photo or video > Recover.
  4. Confirm that you want to recover the photo.

Check that Your iCloud Photo Library is turned on

If you took a photo on your iPhone or iPad, but don’t see it on your other devices, check your settings.

  1. Go to Settings > [your name] > iCloud. If you’re using iOS 10.2 or earlier, go to Settings > iCloud.
  2. Tap Photos.
  3. Turn on iCloud Photo Library.

On your Mac:

  1. Go to System Preferences > iCloud.
  2. Next to Options, click Photos.
  3. Select iCloud Photo Library.

After you have turned on iCloud Photo Library, connect to Wi-Fi and wait a few minutes. Then look for your photos again.

Next, Sign in with the Same Apple ID

  1. In order to keep the same photos and videos on all your devices, be sure to sign in to iCloud with the same Apple ID on every device.
  2. Check which Apple ID your device is using in Settings or System Preferences. You’ll see your name and email address. Your email address is your Apple ID.

Unhide Your Photos

Finally, find any photos and videos that you hide previously in your Moments, Years, and Collections view iin your Hidden album. You can easily unhide your photos and videos from the Hidden album.

On your iPhone or iPad:

  1. Open the Photos app and go to the Albums tab.
  2. Tap the Hidden album.
  3. Select the photo or video that you want to unhide.
  4. Tap > Unhide.

On your Mac:

  1. Open Photos and in the menu bar, click View > Show Hidden Photo Album.
  2. Open Albums view, then open the Hidden Photos Album.
  3. Select the photo or video that you want to unhide.
  4. Press Control and click on the photo.
  5. Click Unhide Photo.

Also if you use iCloud Photo Library, the photos that you hide on one device are hidden on your other devices too.

AI Usage Transparency Report

Pre-AI Era · Written before widespread use of generative AI tools

AI Signal Composition

Struct List Instr
Repetition: 0%
Tone: 0%
Structure: 33%
List: 28%
Instructional: 52%
Emoji: 0%

Score: 0.05 · Low AI Influence

Summary

iCloud Photo Library allows you to share photos across multiple devices, but deleted photos are also deleted everywhere. You can restore photos from the 'Recently Deleted' album within 30 days.

Related Posts

Leaving Flickr: Migrating 20,000+ Photos to Synology and Taking Back Control

There’s a certain kind of friction you start to notice when you’ve been using a service for a long time. Not enough to make you leave immediately, but enough to make you pause. Flickr had been that kind of service for me. It quietly held years of photos, uploads from old phones, albums I hadn’t looked at in ages, and a massive "Auto Upload" collection that had grown into something I didn’t fully understand anymore.

Read more

How I Finally Passed the PMP Exam (After 12 Years of Waiting)

Back in 2013, I registered for a PMI membership with every intention of pursuing my PMP certification. I downloaded the handbook, bookmarked the eligibility requirements, and even told a few friends that I was going to do it "soon." At the time, I thought getting certified would be a straightforward process, but little did I know what lay ahead in terms of studying and preparation.

Read more

The Evolution of Apple Certification: A Journey Through Versions, Challenges & Growth

When I recently passed the Apple Certified Support Professional (ACSP) exam again, I paused to reflect — not just on this milestone, but on the long path I’ve walked through Apple’s certification landscape. My first certification dates back to macOS 10.5, and over the years, I’ve earned credentials across nearly every version since. In that time, the exams — and Apple itself — have transformed significantly.

Read more

Secure Software, Secure Career: How I Passed the CSSLP

After passing the CISSP earlier this year, I decided to follow it up with the **Certified Secure Software Lifecycle Professional (CSSLP)** certification. For those unfamiliar, CSSLP is an ISC2 certification that focuses specifically on secure software development practices across the full SDLC—from requirements and design to coding, testing, deployment, and maintenance. My goal in pursuing this certification was to further develop my skills in ensuring the security of software throughout its entire lifecycle.

Read more

Managing Bring Your Own Device (BYOD) for Android with Microsoft Intune

Alright, so today we're going to be talking about the management of bring your own device BYOD for Android devices. There's a lot of information out there for the management of iOS devices and you can do that with pretty much any Apple MDM on the market. We just happen to use Jamf where I work, but you could use anything from Braavos to SimpleMDM to Kanji or JumpCloud. Mosyle is also a great option.

Read more

BYO with me in 2025: iOS with User Enrollment in JAMF Pro

It really depends on your company's needs. For example, many companies need to hire 1099 contractors and in such a case they come with their own devices but not the correct security settings or enforcements. Remember BYOD is a security construct. The idea here is that you should be securing the company's sensitive data in all forms. This may involve implementing policies for contractor-owned devices, ensuring that all devices accessing company data meet minimum security standards, and regularly reviewing and updating these standards to stay ahead of emerging threats.

Read more

Securing BYOD Email Access: Exploring Strategies in Microsoft 365

In today’s mobile-first world, organizations increasingly rely on Bring Your Own Device (BYOD) programs to empower employees while optimizing costs. However, this flexibility introduces unique challenges, particularly around securing email access. To mitigate risks, we are implementing a comprehensive strategy to block email access on non-company devices by default and ensure only sanctioned apps can access organizational email accounts. This approach will help prevent unauthorized access and data breaches, aligning with our commitment to maintaining the security and integrity of company communications.

Read more

How I Conquered the CISSP Exam: 9 Months, Top Resources, and Proven Strategies

Passing the CISSP (Certified Information Systems Security Professional) exam is no small feat. It’s known for its breadth, depth, and ability to test not just your knowledge but your practical understanding of cybersecurity. After nine months of intense preparation, I’m thrilled to say I’ve joined the ranks of CISSP-certified professionals! Here's a detailed account of my experience, including the resources I used, some tips that helped me along the way, and what I learned from the process itself.

Read more

Get more out of scripting than you may expect

Expect is an extension to the Tcl scripting language written by Don Libes. The program automates interactions with programs that expose a text terminal interface. Expect, originally written in 1990 for the Unix platform, has since become available for Microsoft Windows and other systems. Its functionality allows users to interact with these programs through scripted commands, eliminating the need for manual input.

Read more