Just want to caution that RFCs are simply uniform standards that are expected to be followed. We don’t really know how data on Apple’s end is inferred from what it receives. Sure, it’s borderline conspiracy, but if you have ever implemented a RFC, you would know there is always a possibility.
I believe the irony out of all this is Apple preaches privacy but are not fully transparent about what dependencies are involved. The mere fact that something as simple as this can halt businesses from being productive is very concerning. It certainly caught a lot of IT and users offguard globally.
I have implemented various RFCs. Sure, I could have tried to get the ATM to actually put 0.0002 cent into a secret account out of every transaction fee, but reality does not quite work that way, or it does for a short time before catching up with you. We have code audits to prevent that sort of thing and people are just really bad at keeping secrets.
At some point you have to trust someone digitally speaking and if you do not feel comfortable trusting the maker of the operating system that you are using, then you should be looking for a different one.
There are a few things here though that we must consider. This isn't a new thing. It's been going on since Catalina was released. Jeff from the op's link isn't the only one concerned about this kind of thing. There are many people who are far more qualified that would have raised privacy flags a long time ago. The only reason why Jeff picked this up is because of the issue with Apple's servers last week. He then did some thinking and decided that 2 + 2 = 5.
It's silent and invisible, but also everyone can see. Pick a lane and stick with it. The link to
https://en.wikipedia.org/wiki/Room_641A was a beautiful and alarmist touch. The author needs to capture the info and show what he has captured. He hasn't. It should be really simple, especially for someone claiming to be hacker and a security specialist. Capture the traffic and show a screenshot of the information to add some substance to the alarmist article.
Instead the author then proceeds down some country lane on a destinatin to I have no idea where.
He's just making things up at this point in time. What is this? He is saying that because you have an IP address you can now make this table. Notice he isn't saying that Apple is doing this. He is saying that it allows for this. Well, having a car allows me to drive it off a bridge.
Application hash? No, it's not sending "application hashes". That's not how any of this works. Like I've already said above, the author is welcome to actually prove his case by capturing the traffic and showing his work. But he does not. He also claims that Apple is then storing the requests in a table, like he suggested, and is doing *something* with this information.
I did giggle at the mention of "Akamai" as if he's just letting people in on a big secret conspiracy. Look, if you are not going to trust Akamai, then you may as well stop using the internet immediately.
What about the fact that this is unencrypted?
From wikipedia:
If you are truly the target of a MIM attack, then, believe me, you have far bigger concerns than somebody finding out what apps you are using at what time.
There are control issues / concerns here. I do not see privacy issues. The control concern is that Mac OS is moving towards a controlled ecosystem like iDevices. How much further it will go is something that we don't know yet.