The bigger concern for me here is less that Apple is verifying developer signatures through OCSP - although they should be doing it more transparently and the requests should be encrypted - and more that Big Sur seems to have a list of 56 Apple processes that are excluded from the new network filter API.
In Apple's response to this issue they addressed concerns about the app verification but completely ignored the network filter issue.
Pretty obviously this is a major security issue... Apple has just given themselves license to bypass firewalls and VPNs for an arbitrary list of their own processes. Users are not alerted of this by the OS. Someone who sets up a VPN and a firewall on Big Sur is likely to have no idea that a large number of processes are hiding their traffic from the firewall and silently bypassing the VPN.
Why is a bigger deal not being made of this? I can understand the reasoning behind verification of app signatures. I cannot understand why Apple is giving 56 of its processes free reign to bypass firewalls and VPNs.
Not only is this terrible for privacy, but also for security - if an exploit is found in one of those 56 programs, a malicious actor can now piggyback off it to do whatever they like without security software knowing anything about it. Previously, malware has often uninstalled itself if it detects Little Snitch is installed. I suspect now malware authors will be looking for exploits in one of the many whitelisted programs Apple does not let third party firewalls see.
I hope this is either fixed by Apple or a solid workaround is found that does not require disabling system security features. Little Snitch devs say they're "currently investigating a solution in Little Snitch to make these whitelisted connections visible by means of alternative techniques" and I hope they succeed. This is ridiculous from Apple.
Get all the help you need for Little Snitch Mini, Little Snitch, LaunchBar and Micro Snitch.
obdev.at
And Apple "cares about privacy."
Meanwhile I'll be using Little Snitch in Catalina and my Pi Hole logs to work out the domains those processes are phoning home to and if they aren't necessary for the system to function I will be blocking them with my Pi Hole. For now at least this will give me at least some level of control outside of Apple's locked down OS restrictions.