Of course it would work. It works for 50 years already. And it’s like 5 lines of code.
Last edited:
That’s kind of rude. I never have any Apple Stores geniuses I visited told me something like this. They always tried their best to help. Sounds like a scam to me (on what this Louis said, if he tried to sell his repair business).if you visited a Apple store, and they told you your whole machine was scrap, and you would lose all your data, then you took your machine to his company and they were able to do a component level board repair, which ended up with your machine back up and running and your data saved.
BUT BUT... I heard some folks talking one time about encryption. And, based on what I heard in that one conversation, EVERYTHING should be encrypted and cleartext is scary! Besides, I told all my YouTube subscribers I'd NEVER use Keynote... I don't need that critical information getting out to the government! /sIt seems that Apple is simply using https://en.m.wikipedia.org/wiki/Online_Certificate_Status_Protocol to validate certificates. There is no data being sent that can be used to identify you and it is certainly not sent every single time you open an application.
You can be identified by your IP most of the times. And yes everything should be encrypted especially if it’s even remotely sensitive. Especially if your bragging about your users privacy left and right.BUT BUT... I heard some folks talking one time about encryption. And, based on what I heard in that one conversation, EVERYTHING should be encrypted and cleartext is scary! Besides, I told all my YouTube subscribers I'd NEVER use Keynote... I don't need that critical information getting out to the government! /s
That’s kind of rude. I never have any Apple Stores geniuses I visited told me something like this. They always tried their best to help. Sounds like a scam to me (on what this Louis said, if he tried to sell his repair business).
BUT BUT.. It's Apple, they are benevolent, and I'm not a criminal, I have nothing to hide. Apple never made mistakes. Their security is top notch!No traffic should be able to bypass a user’s VPN. The End.
Doesn't run every time yes but still often enough. I've just checked my dns logs and it's about 50 times per day on average.Like I posed upthread (and was attacked for), this is FUD. OCSP is routine stuff and it does not run on Macs every time you open a tool. @leman has it correct.
Like I posed upthread (and was attacked for), this is FUD. OCSP is routine stuff and it does not run on Macs every time you open a tool. @leman has it correct.
Sort of off topic but I actually converted to back to linux as my desktop almost two years ago and was impressed with the progress made for gaming. I can actually play Microsoft's games they sell on Steam (Halo MCC, Halo Wars, Gears of War, and many others) and they run just as good if not better on linux using Proton/Wine. I use wine to play Star Craft, etc... I use wine to run iTunes so I can keep my played podcasts synced with Podcasts app on iPhone/iPad.You're correct, there are unknown unknowns. In that case the choice is between Big Sur which I know for a fact does things that I don't like, my current Mac OS which as far as I know gives me a fair amount of control over everything I want control over, and finally Linux which I know for a fact does only what I tell it to do because almost everything is open source and customizable.
If it's between Big Sur and my current Mac OS, the choice is not hard at all.
My future setup will be a gaming PC with Windows that is stripped of most analytics BS (so long as it can run some games, I'm happy), my current Mac for work related applications that don't run on Linux, and a Linux machine for everything else (personal, work stuff that runs on it, etc.). If the current Mac conks out, I'll get a second hand Apple Silicon one and only use it for Mac specific applications (I won't even be logged into iCloud or anything else on it, it will only be used in exceptions).
This is my own opinion, but I think its because of control/money. The bypassing VPN stuff just seems like some sort of corporate agreement to verify that the customer is actually where they should be to access certain content or something. It just seems like Apple created this locked down environment where they control everything and made a bunch of money from it with iOS. Any developer wants to create an App for those devices they have to pay apple to do so, and then if they want to distribute their software or services Apple wants their cut. Now they are looking and taking the Mac, which is (was?) a general purpose computing platform and trying to do the same thing. They want complete control. They removed the option in gate keeper to allow install from anywhere and you have to know how to get around it to install from someone who isn't paying apple to sign their software. Its just not the same Apple as it was almost 20 years ago when I switched to Mac OS from Linux/BSD.So, for the sake of argument, let's say this is greatly overblown (I don't believe it is). So why not give a user the ability to turn it off? Why don't they openly disclose that the computer is doing this? Why does it bypass VPNs?
It'd be one thing if they said "We have this great new security feature enabled that verifies app security by phoning home before an app launches. For the sake of privacy, you have the ability to opt-out the same way that you can opt out of sending Apple your analytics."
Instead you have a situation where a lot of very informed users (if you're here you're probably in the top 1%) are surprised to find out that this is going on at all. If they ever communicated that this was happening, they did a piss poor job, and I'd venture a guess that it largely has to do with the optics of this contradicting their public stance on privacy.
It’s not practical to encrypt everything. If everything coming out of your computer was encrypted, I wouldn’t be able to read your reply!You can be identified by your IP most of the times. And yes everything should be encrypted especially if it’s even remotely sensitive. Especially if your bragging about your users privacy left and right.
For the specific case of "checking apps' OCSP", encrypting the traffic could make sense. Namely because an eavesdropper can eventually know every app that you run through OCSP request hashes on those. In combination with the IP address given by your ISP, this could be used to fingerprint you.From what I've read, OCSP requests are sent over HTTP. This is standard practice. Using an SSL layer doesn't make much sense because then you would need to send another OCSP request to verify that layer's certificate and so on... and since the data does not contain any sensitive information, it's perfectly fine to sent it unencrypted.
View attachment 1668783
Apples clarifies the OSCP concern.
Macrumours article: https://forums.macrumors.com/thread...rounding-app-authentication-in-macos.2268634/
Source: https://support.apple.com/en-us/HT202491
scroll down till u see "privacy protections"
And yet it was encrypted by HTTPS and you were able to read itIt’s not practical to encrypt everything. If everything coming out of your computer was encrypted, I wouldn’t be able to read your reply!
THEN IT WASN’T ENCRYPTED ENCRYPTILY ENOUGH!! MOAR NCRIPSHUN! ?And yet it was encrypted by HTTPS and you were able to read it
It was encrypted enough. If they did it in a similar way no one would have complained. The world is a different place now. HTTP and FTP were also considered acceptable before. What was considered paranoia before is a common sense now.THEN IT WASN’T ENCRYPTED ENCRYPTILY ENOUGH!! MOAR NCRIPSHUN! ?
But, looks like Apple’s going to work to create a new better-than-OSCP standard. Which is not a bad way to handle this. While it’s better than a proprietary Apple Only one-off without scrutiny from the wider security world, it’s good to remember that the same wider security world that felt that OSCP was acceptable in the first place.
No we don't realise. Can you elaborate please?Oh the concerns! No doubt you all realize that every Intel and AMD processor has a remote management system that can access everything on your system? You have no control over it. Apple M1 probably has similar capabilities.
There never was and never will be any such thing as "internet privacy" because the underlying technologies were built for collaboration not privacy.
There's an enclave in AMD and Intel's processors that's basically a black box, it's also known that the NSA has requested backdoors on a hardware level.No we don't realise. Can you elaborate please?