Two points.In any kind of security scheme, there has to be a trusted party. If you care about software security, there has to be an agency that verifies signatures and synchronizes certificates. The question is, do you trust Apple to do this or not? If not, you shouldn’t use Apple products.
Apple is aggressively moving forwards with their security policies. Personally, I don‘t have any problem with that. If I wanted to tinker I’ll buy a Raspberry Pi.
By the way, I call BS on “every time you open an app macOS calls home”. More likely there is a local database that is checked first and only in some cases does the data gets synchronized.
Patrick Wardle identified the requests that get sent to Apple. It would wise to take a moment to understand his credentials before challenging his findings. You might be humbled.
Your point about sending the application hashes is valid, until you consider that the traffic is not encrypted. At that point it falls apart and one has to wonder why it's not.