If you have a working iPhone, Googles-Android based device or Windows computer around you, it is blind trust they don't surveil you, unless you permanently monitor and control their communications.
The requests still have to go to Apple. The only way to verify if they’re logged or not would be to examine the servers themselves and the software running on them.