All Posts by Date or last 15, 30, 90 or 180 days.
also by Lloyd: diglloyd.com photography and WindInMyFace.com

Thank you for buying via links and ads on this site,
which earn me advertising fees or commissions.
As an Amazon Associate I earn from qualifying purchases.

Other World Computing...
B&H Photo...
Amazon
As an Amazon Associate I earn from qualifying purchases.
877-865-7002
Today’s Deal Zone Items... Handpicked deals...
$2799 $2549
SAVE $250

$1499 $1399
SAVE $100

$1499 $1399
SAVE $100

$7999 $7249
SAVE $750

$2799 $2599
SAVE $200

$250 $220
SAVE $30

$399 $269
SAVE $130

$1199 $1099
SAVE $100

$799 $599
SAVE $200

$999 $949
SAVE $50

$1099 $999
SAVE $100

$1999 $1499
SAVE $500

$1349 $1149
SAVE $200

$1099 $999
SAVE $100

$2799 $2549
SAVE $250

$449 $389
SAVE $60

$400 $310
SAVE $90

$1699 $999
SAVE $700

Upgrade the memory of your 2020 iMac up to 128GB

Apple Spyware in macOS Big Sur Cannot be Disabled (“sneak.berlin: Your Computer Isn’t Yours”)

Welcome to the Brave New World @AMAZON of Apple macOS Big Sur. Or is it “macOS Big Sure”, as in “we are sure we know all about when and where you use your Mac”?

The propaganda that Apple has been promulgating about respecting user privacy and security are now laid bare for the world to see. All goodwill that Apple has EVER generated with respect to privacy is obliterated by this new spyware in macOS Big Sur. Bound into the innards of macOS Big Sur so securely that programs like Little Snitch cannot block it.

Totalitarian states will just love this new spyware “feature”.

Has this spyware has been backported? Meaning, did recent security updates to macOS Mojave really bake-in spyware as part of the update? Dunno, but this may have been going on for two years.

sneak.berlin by Jeffery Paul: Your Computer Isn't Yours

12 November 2020

...in the current version of the macOS, the OS sends to Apple a hash (unique identifier) of each and every program you run, when you run it. Lots of people didn’t realize this, because it’s silent and invisible and it fails instantly and gracefully when you’re offline, but today the server got really slow and it didn’t hit the fail-fast code path, and everyone’s apps failed to open if they were connected to the internet.

Because it does this using the internet, the server sees your IP, of course, and knows what time the request came in. An IP address allows for coarse, city-level and ISP-level geolocation, and allows for a table that has the following headings:

Date, Time, Computer, ISP, City, State, Application Hash

Apple (or anyone else) can, of course, calculate these hashes for common programs: everything in the App Store, the Creative Cloud, Tor Browser, cracking or reverse engineering tools, whatever.

This means that Apple knows when you’re at home. When you’re at work. What apps you open there, and how often. They know when you open Premiere over at a friend’s house on their Wi-Fi, and they know when you open Tor Browser in a hotel on a trip to another city.

Well, it’s not just Apple. This information doesn’t stay with them:

This data amounts to a tremendous trove of data about your life and habits, and allows someone possessing all of it to identify your movement and activity patterns. For some people, this can even pose a physical danger to them.

...

...If you’ve the most efficient high-res laptop in the world, you can’t turn this off.*

Let’s not think very much right now about the additional fact that Apple can, via these online certificate checks, prevent you from launching any app they (or their government) demands be censored.

...

Was Apple really this wantonly incompetent, or did they get caught and now realize they got caught Toobinating things?

The good news is that Apple has, just today, publicly committed, presumably in response to this page, to:

  1. deleting the IP logs
  2. encrypting the communication between macOS and Apple to prevent the privacy leak
  3. giving users an option of disabling these online checks that leak what apps you’re opening and when.

They use deliberately confusing language here to lead you into conflating Gatekeeper with Notarization, so that you will believe that the connections are currently encrypted, while not lying. The Gatekeeper OCSP checks described in this post (“Gatekeeper performs online checks”) are not encrypted. (The notarization ones, which aren’t relevant here, are.)

Apple’s spin doctors are among the best in the world, and my hat’s off to them.

...It sucks that they’ve let the NSA, CIA, your ISP, et al slurp up this unencrypted pattern-of-life data off the wire for the last 2+ years, and they’re still going to transmit the data (encrypted) to Apple in realtime, on by default every single mac, but at least the 0.01% of mac users who know about it now can turn it off, so Apple will only get a realtime log of what apps you open, when, and where for the other 99.99% of mac users. Cool.

This is, sadly, about as close as you can possibly get to a “we fucked up” from Apple PR: they’re deleting their IP logs, encrypting their shit, and letting you turn it off. This is great, but they have remained totally silent on the fact that their OS apps will still bypass your firewall and leak your IP and location past your VPN on Big Sur and how they’re still not fixing the key escrow backdoor in iMessage’s encryption so Apple sysadmins and the FBI can keep seeing your nudes and texts in iMessage.

...

In short, the knowledgeable user can have better privacy, but no one else will and Apple has not committed to real privacy. Shame on Apple, and this all falls on Tim Cook.

Related: your iCloud backups that not private , iMessage is not private

In other news, Apple has quietly backdoored the end-to-end cryptography of iMessage. Presently, modern iOS will prompt you for your Apple ID during setup, and will automatically enable iCloud and iCloud Backup.

iCloud Backup is not end to end encrypted: it encrypts your device backup to Apple keys. Every device with iCloud Backup enabled (it’s on by default) backs up the complete iMessage history to Apple, along with the device’s iMessage secret keys, each night when plugged in. Apple can decrypt and read this information without ever touching the device. Even if you have iCloud and/or iCloud Backup disabled: it’s likely that whoever you’re iMessaging with does not, and that your conversation is being uploaded to Apple (and, via PRISM, freely available to the US military intelligence community, FBI, et al—with no warrant or probable cause).

See also: Apple dropped plan for encrypting backups after FBI complained - sources:

...the company did not want to risk being attacked by public officials for protecting criminals, sued for moving previously accessible data out of reach of government agencies or used as an excuse for new legislation against encryption.

“They decided they weren’t going to poke the bear anymore,” the person said, referring to Apple’s court battle with the FBI in 2016 over access to an iPhone used by one of the suspects in a mass shooting in San Bernardino, California.

...Apple’s iCloud, on the other hand, can be searched in secret. In the first half of last year, the period covered by Apple’s most recent semiannual transparency report on requests for data it receives from government agencies, U.S. authorities armed with regular court papers asked for and obtained full device backups or other iCloud content in 1,568 cases, covering about 6,000 accounts.

..Had it proceeded with its plan, Apple would not have been able to turn over any readable data belonging to users who opted for end-to-end encryption.

...

With FISA court abuses a national scandal, Apple is cooperating?



Deals Updated Daily at B&H Photo
View all handpicked deals...

Apple 16" MacBook Pro (Late 2019, Space Gray)
$2799 $2549
SAVE $250

diglloyd.com | Terms of Use | PRIVACY POLICY
Contact | About Lloyd Chambers | Consulting | Photo Tours
Mailing Lists | RSS Feeds | Twitter
Copyright © 2020 diglloyd Inc, all rights reserved.
Display info: __RETINA_INFO_STATUS__