Most active commenters
  • (28)
  • Wowfunhappy(27)
  • dylan604(16)
  • saagarjha(12)
  • fsflover(12)
  • m463(10)
  • _qulr(9)
  • nix23(8)
  • Spivak(7)
  • GekkePrutser(7)

1183 points robenkleene | 645 comments | | HN request time: 3.403s | source | bottom
1. paranorman ◴[] No.24838948[source]
That’s annoying yet pretty predictable, at least we’ve still got https://pi-hole.net/ as an option until DNS encryption becomes widespread :/
replies(4): >>24839196 #>>24839381 #>>24840498 #>>24842893 #
2. jedberg ◴[] No.24838955[source]
A great example of why you need defense in depth. Ideally you'd be running the local firewall on your box, as well as an external firewall.

That being said, this is not ok behavior on Apple's part. There shouldn't be a way for traffic to go around the firewall like this, even if it is just Apple apps.

Because as Apple well knows, once you make a backdoor, someone will figure out a way to exploit it.

replies(2): >>24839551 #>>24841733 #
3. rektide ◴[] No.24838956[source]
different but feels reminisce of Google double-dealing by not-clearing their browser storage cache when asked to. two days old: https://news.ycombinator.com/item?id=24817304
4. jjoonathan ◴[] No.24838965[source]
"You don't need kernel extensions, we'll provide APIs for you! We won't abuse the power that gives us, promise!"

...and now Apple has altered the deal and we must pray they do not alter it further. Disgusting. Predictable, expected, unsurprising -- but still disgusting.

replies(6): >>24839165 #>>24839174 #>>24839249 #>>24839470 #>>24839566 #>>24840061 #
5. 3pt14159 ◴[] No.24838967[source]
This is one of those tough cases where software cuts both ways.

Some people are smart, informed developers that install a trusted tool to monitor their traffic and have legitimate reasons to want to inspect Apple traffic. They're dismayed.

Most people are the opposite and this move protects the most sensitive data from being easily scooped up or muddled in easily installed apps, or at least easily installed apps that don't use zero days.

Is the world better or worse due to this change? I'd say a touch better, but I don't like the fact that this change was needed in the first place. I trust Apple, but I don't like trusting trust.

replies(19): >>24838993 #>>24839043 #>>24839086 #>>24839126 #>>24839194 #>>24839419 #>>24840315 #>>24841406 #>>24841984 #>>24842961 #>>24843115 #>>24843241 #>>24844017 #>>24844287 #>>24844319 #>>24844636 #>>24845405 #>>24845660 #>>24845932 #
6. Wowfunhappy ◴[] No.24838971[source]
I suppose this is a consequence of Little Snitch moving from a kernel extension to Apple's new system that runs in user-space. :(
7. Wowfunhappy ◴[] No.24838993[source]
If I install Little Snitch, it's because I trust Little Snitch to be responsible for my computer's network traffic, over and above anyone else.

I recognize that this won't necessarily apply to all users or all apps, but there needs to be a way for the user to designate trust. Apple services and traffic should not get special treatment.

replies(3): >>24839030 #>>24839084 #>>24842512 #
8. tinus_hn ◴[] No.24839000[source]
The solution is simple, just look at the tricks these apps are using and use them to implement malware.
replies(1): >>24839027 #
9. malandrew ◴[] No.24839003[source]
This is a big breach of trust in terms of Apple always being on the side of user privacy.

If someone knows enough to install these firewall apps, then they know enough to figure out what they want to enable/disable even for Apple applications.

If Apple thinks certain rules cause issues, they certainly could work with the developer of these apps to educate users of adverse effects when certain things cause unintended issues for the user. The decision should still lie with the user. Bypassing firewalls by privileging some traffic is not okay.

Looks like for now, the only real option is an external device you always connect through running pfsense or another firewall, which is not too big a deal for use on a home network, but requires carrying around another device when on other networks.

replies(2): >>24839070 #>>24839290 #
10. coldtea ◴[] No.24839016[source]
So? Users expect basic OS functionality (like the App Store, Maps, etc) to function.

Do people really install Little Snitch (which I've used since 2005 or so) for blocking Apple's own apps?

replies(4): >>24839090 #>>24839390 #>>24839475 #>>24839544 #
11. koolba ◴[] No.24839027[source]
I bet they have feature flags that are signed and validated by Apple. You wouldn’t be able to run your app without their approval (which they won’t give).
replies(1): >>24839276 #
12. coldtea ◴[] No.24839030{3}[source]
They provide the OS. If you don't trust them, then you shouldn't trust anything running on top of it either...
replies(15): >>24839099 #>>24839130 #>>24839176 #>>24839223 #>>24840636 #>>24840860 #>>24842029 #>>24842089 #>>24842540 #>>24842969 #>>24843232 #>>24843903 #>>24843921 #>>24844882 #>>24845297 #
13. ◴[] No.24839043[source]
14. rootusrootus ◴[] No.24839054[source]
Hasn't this always been a bit of an issue? Apps with root privileges have been able to get around Little Snitch for as long as I can recall. Some software relies specifically on that ability.
replies(1): >>24839142 #
15. lifty ◴[] No.24839070[source]
I would love if there would be a small appliance based on a raspberry pi zero or something of similar size, that could be controlled/configured from an app on your phone. This device would be powered through a usb cable (no data) from your laptop, and act as a WiFi hotstpot that you can use to route all your traffic via the VPN or network of your choice. Even if your laptop would be infected by malware or a rootkit, it would be impossible to avoid the little physical VPN/firewall.
replies(3): >>24839131 #>>24839498 #>>24839849 #
16. threatofrain ◴[] No.24839084{3}[source]
If you don’t trust Apple then you need something more than little snitch. Apple is responsible for both hardware and OS. What delta in security or trust is little snitch going to offer over Apple?
replies(2): >>24839186 #>>24842154 #
17. ballenf ◴[] No.24839086[source]
I'd argue this opens up a giant attack surface where malicious software will try to route its command and control communication through a protected service. Do we really want to trust that Apple will keep all 50+ of these privileged services fully protected?

I think it makes the "world" slightly worse in that it will be harder to discover malware. Little snitch has a small user base, but it's been used to identify many forms of malware and protect many more people once the threat is identified.

replies(6): >>24840000 #>>24841973 #>>24843556 #>>24844470 #>>24844572 #>>24894460 #
18. sim_io ◴[] No.24839090[source]
It is a firewall, i should be able to decide what goes in and out of my computer
replies(2): >>24839353 #>>24839497 #
19. Wowfunhappy ◴[] No.24839099{4}[source]
You could (and perhaps would) make the same argument about Intel (for providing the processor) or Broadcom (for providing the wifi chip) or Comcast (for providing internet service). And it's true, all of these parties have the ability to use their positions for nefarious purposes.

However, I would like to limit that potential as much as possible, partly by creating a stigma against practices that remove control from the user.

replies(1): >>24840224 #
20. eptcyka ◴[] No.24839101[source]
Apple seems to do all kinds of weird networking _stuff_. For instance, during wakeup, your T2 equipped Macbook will wait for a DNS response and then use said DNS response to synchronize time via NTP before letting the user use the keyboard. Probably checking timestamps on signatures for the keyboard firmware, or something stupid like that. This only happens if it happens to have a default route.

Similarly, all macOS machines will test a DHCP supplied default route before applying it by trying to reach something on the internet. So if you happen to have some firewall rules that block internet access, no default route will be applied until the internet check times out.

I won't share the other sentiments about the above, but is it really that hard to document these behaviors?

replies(22): >>24839205 #>>24839226 #>>24839281 #>>24839287 #>>24839352 #>>24839401 #>>24839503 #>>24839892 #>>24840087 #>>24840150 #>>24840234 #>>24840673 #>>24840752 #>>24841372 #>>24841670 #>>24842254 #>>24842446 #>>24843973 #>>24843982 #>>24845295 #>>24845368 #>>24847526 #
21. pier25 ◴[] No.24839111[source]
A bit contradictory with Apple's supposedly privacy-focused approach, no?
replies(4): >>24839188 #>>24839314 #>>24840173 #>>24841770 #
22. addicted ◴[] No.24839126[source]
Is there anything Apple can do that makes their platform less accessible to the users that you would not support?
replies(1): >>24840075 #
23. paulryanrogers ◴[] No.24839130{4}[source]
Right, but many users want to delegate trust to more than just the OS vendor.
24. tankenmate ◴[] No.24839131{3}[source]
This is basically what pi-hole is, as to controlling it from a phone app, well it has a web interface.
replies(1): >>24840225 #
25. Wowfunhappy ◴[] No.24839142[source]
...no, I don't think they could. Is there an example you're thinking of?

Up until recently, Little Snitch monitored network traffic in kernel space.

replies(2): >>24839691 #>>24840817 #
26. Skunkleton ◴[] No.24839165[source]
You understand that Apple could bypass kexts too? This is an issue of trust, not a technical issue.
replies(2): >>24839232 #>>24839336 #
27. nix23 ◴[] No.24839174[source]
Dont pray, just dont buy Apple Products
replies(5): >>24839211 #>>24839285 #>>24839301 #>>24839473 #>>24840677 #
28. whimsicalism ◴[] No.24839176{4}[source]
I don't understand these style of responses. I think the point is that this "feature" makes the OS shittier.
replies(1): >>24841005 #
29. addicted ◴[] No.24839186{4}[source]
In this situation the question isn’t about whether or not Apple can be trusted.

Apple has clearly betrayed users’ trust in this situation.

People don’t install Little Snitch only to prevent nefarious third party activity. Some may want to know what traffic is going to and from their computers. Other may want to block all traffic for testing and/or research purposes.

I can trust that Apple is not doing something nefarious and still see that Apple is blatantly betraying the fact that people trusted when switching stuff like firewalls away from kext that it wouldn’t build backdoors for itself.

Also, any backdoors Apple builds for its own apps and services are simply an additional attack vector that could potentially be used by non Apple malicious actors.

replies(2): >>24839406 #>>24839483 #
30. comeonseriously ◴[] No.24839188[source]
Of course, but they'll get a pass because "Apple's got yer back!"
31. joncp ◴[] No.24839189[source]
That totally breaks my use case for Little Snitch: working tethered. When I tether my laptop it thinks it has free reign with the bandwidth and all of the little background processes can kill my data in a few minutes. With a firewall, I can grant access to only the processes that I need to get my work done.

Now, I guess I have to run some external firewall between my laptop and my phone. ... or better yet, abandon Apple.

replies(6): >>24839618 #>>24840511 #>>24842589 #>>24842970 #>>24844004 #>>24865182 #
32. api ◴[] No.24839194[source]
Tech savvy users are not just the minority. They're also cheap. They've been conditioned by the FOSS movement to think all software should be free as-in-beer. (The people who started FOSS didn't say that, but that's what it's become.) They say they want free as-in-freedom, but since they are not willing to pay for it they don't exist. Those who pay set the agenda for everything.

Developing a truly polished operating system with a whole ecosystem of services is far, far beyond what volunteers and hobbyists can achieve. It's just too much work. It also requires focus and coordination and someone who is able and willing to say no. Without that the FOSS community rewrites everything over and over again instead of doing the not-fun parts of programming like fixing bugs and edge cases.

TL;DR: we get what we pay for. We don't pay for freedom so we don't get it.

replies(5): >>24839264 #>>24839372 #>>24839597 #>>24840436 #>>24841094 #
33. buzzerbetrayed ◴[] No.24839196[source]
Not a pi-hole user, but what is the plan for pi-hole once encrypted dns is everywhere? Will it just be dead? I can’t really think of a way for it not to be.
replies(7): >>24839311 #>>24839340 #>>24839349 #>>24839493 #>>24839565 #>>24840121 #>>24841388 #
34. thewebcount ◴[] No.24839205[source]
Oh wow! This probably explains why every now and then when I wake my MacBook Pro from sleep it says no keyboard is connected! I thought I had some hardware problem on a basically brand new machine. Glad to hear it's only a stupid software problem!
replies(2): >>24839272 #>>24880735 #
35. Skunkleton ◴[] No.24839211{3}[source]
It's a frustrating road we are headed down. Tech companies have gotten so big that they don't really have to work together using standardization anymore. Options are limited, and most are anti-consumer in one way or another.
replies(1): >>24839540 #
36. AnonHP ◴[] No.24839212[source]
I trust Apple a lot more than I trust Google or Facebook, but this clamping down of the Mac without options for power users while officially stating that the Mac will remain a Mac is alarming and distasteful on the part of Apple.

With the transition to Apple’s own chips looming, it seems like the days of “a Mac is a personal computer and not an app console like an iPhone or iPad” will be over by the middle of this decade. All Apple devices locked down completely and Apple decides the limits of what users can do on devices. This model made some sense for mobile (where restrictions were gradually removed or workarounds provided), but the Mac is going in reverse.

replies(4): >>24839623 #>>24840120 #>>24841207 #>>24841585 #
37. AnthonyMouse ◴[] No.24839223{4}[source]
> If you don't trust them, then you shouldn't trust anything running on top of it either...

Trust, but verify.

The problem with this is that it's taking away the ability to verify. Which takes away the ability to trust.

38. dheera ◴[] No.24839226[source]
> wait for a DNS response and then use said DNS response to synchronize time via NTP before letting the user use the keyboard

... and what if your network is down? You can't even use your keyboard?

replies(2): >>24839239 #>>24844049 #
39. CountSessine ◴[] No.24839232{3}[source]
Try to bypass kexts and you’re just asking for kernel stability issues and Mac customer crashes. Pushing these guys out of the kernel lets Apple cheat them and Mac users clean and easy.
replies(1): >>24839452 #
40. metroholografix ◴[] No.24839240[source]
Background: I've written my own kernel extension that works in similar manner to Little Snitch, but does a lot more, including SSL MITM and on-demand packet capture, that I've been using for more than 10 years now.

It's a fact that Apple has continuously moved to lock down macOS in ways that are antithetical to folks that want full control over their operating system. To many of us that moved on from Linux on the desktop, the combination of a stable/uniform/attractive desktop environment with a Unix core that had great developer documentation -no longer the case!- and nicely-designed APIs was too much to resist. Unfortunately, the push towards consumers and Apple's increasingly one-sided my-way-or-the-highway approach (fueled by security concerns that to me are completely irrelevant, if not a huge annoyance and waste of time) means that a lot of us oldschool Unix hackers were left out in the cold.

I don't plan to upgrade past Mojave and at some point in the future I will move back to Linux.

replies(9): >>24839367 #>>24839592 #>>24839989 #>>24840003 #>>24840032 #>>24840486 #>>24840753 #>>24845499 #>>24847280 #
41. eptcyka ◴[] No.24839239{3}[source]
I should've clarified - it only does this if there is a default route. Funnily enough, whilst the firewalls in the original twitter post would possibly fail to catch this traffic, PF will block it just fine.
replies(2): >>24839282 #>>24839522 #
42. Skunkleton ◴[] No.24839264{3}[source]
> They say they want free as-in-freedom, but since they are not willing to pay for it they don't exist. Only paying users matter.

Citation needed. If you look at app store pricing models the opposite seems true. If I were going to take a random guess I would say that tech savvy users use open source software to avoid anti-consumer bullshit more than anything else.

replies(1): >>24839294 #
43. dmd ◴[] No.24839272{3}[source]
If you're using Cisco Anyconnect, blame that for that particular keyboard issue.
replies(8): >>24839337 #>>24839388 #>>24839439 #>>24839500 #>>24840392 #>>24840759 #>>24842173 #>>24910269 #
44. verytrivial ◴[] No.24839276{3}[source]
Yep. I think people need to get past the idea that they own their iPhone or Mac. Apple does, they just let you use it.
45. nateberkopec ◴[] No.24839281[source]
Holy cow, you just explained a load of weird keyboard behavior I was seeing after waking from sleep.
replies(1): >>24840138 #
46. xenospn ◴[] No.24839282{4}[source]
Having a default route does not mean the internet is reachable.
replies(2): >>24839342 #>>24839363 #
47. gogopuppygogo ◴[] No.24839285{3}[source]
The alternative is what? System76 makes a decent laptop but they don’t have a repair center in every major city. I buy Apple computers because of the hardware support and integration with iPhone.

Speaking of iPhone, the open options are at best abysmal for privacy (at least orders of magnitudes worse than Apple) and at worst part of planned obsolescence that creates e-waste much faster than Apple devices.

Fun fact, at least for now, you can still buy a Mac and boot Linux. Probably not true once Apple silicon hits but that’s a sad day for anyone who liked boot camp.

replies(3): >>24839331 #>>24839347 #>>24839496 #
48. ◴[] No.24839287[source]
49. dkonofalski ◴[] No.24839290[source]
>If someone knows enough to install these firewall apps

Your statement implies that it's difficult to install these apps. Installing Little Snitch is no different than installing any other macOS app. Also, this isn't specifically against Little Snitch, it's about any app that could potentially compromise a user's network traffic. Little Snitch is obviously a desired use of these features but how do you then differentiate it from the undesired uses?

50. api ◴[] No.24839294{4}[source]
If enough people said to Apple "hey, this stuff is not acceptable and we won't pay for it" and then they actually did follow through, Apple would stop.

My point is that the vast majority of people don't say that, only a very tiny minority. The vast majority of people want convenience, not control. They want their stuff to "just work" because even if they do have the technical knowledge they don't have the time to screw around with fixing their computer. Apple is giving the market what they want as evidenced by actual buying behavior, not posts on HN.

My other point is that while there probably are enough tech-savvy people who care about freedom to support a viable alternative platform, the majority of these users are not willing to pay for anything so there is not in fact a market for it.

Basically what it boils down to is that people don't actually care. Even the vocal people who say they care don't care because they won't open their wallets or change their buying habits. If you won't actually do anything about something, you don't care. Whining on the Internet is not doing something.

replies(3): >>24839662 #>>24842553 #>>24845466 #
51. AlexandrB ◴[] No.24839296[source]
Both major consumer OS vendors seem hell-bent on bringing the OS layer under their complete control. As a power user, it's very frustrating. Meanwhile "desktop" Linux still kind of sucks, just like it did 10 years ago. I don't have much hope of seeing a compelling, unified UX out of Linux in my lifetime.
replies(6): >>24839339 #>>24839436 #>>24839550 #>>24839643 #>>24839695 #>>24839842 #
52. munificent ◴[] No.24839301{3}[source]
Boycotting is not an effective strategy for addressing oligopolies. You need actual strong anti-trust regulation.
replies(6): >>24839399 #>>24839501 #>>24839914 #>>24840126 #>>24840146 #>>24840218 #
53. blacksmith_tb ◴[] No.24839311{3}[source]
Couldn't you host pi-hole on a cheap VM and set it to be your DNS-over-TLS / DNS-over-HTTPS endpoint?
replies(1): >>24839365 #
54. dheera ◴[] No.24839314[source]
Was Apple every privacy focused? I think they mostly try to play the good guys to get on users' sides but actually are pretty much the opposite. They know everything about you.

Why was the FBI even able to get access to that person's phone? Sounds like there was a loophole. Not happening if it were an encrypted Android device with a high-entropy password.

Apple also has vastly different policies in different countries. They do cooperate with government privacy invasions but they don't publish that fact in the US. It's a business decision but they are most definitely profit-focused, not privacy-focused.

replies(1): >>24839537 #
55. ◴[] No.24839321[source]
56. solatic ◴[] No.24839331{4}[source]
You respond as if the majority of buyers do not already have alternatives for Apple laptops and Apple phones.
57. Wowfunhappy ◴[] No.24839336{3}[source]
It's worth noting the Apple does release the source code to XNU (albeit on a ~6 month delay), and unlike some of their other source releases, there's actually enough tooling for you to build your own kernel. So while there are still gaps, it is overall more open to review.
58. dylan604 ◴[] No.24839337{4}[source]
Why not blame the idiotic decision to make this network check just to wake up?
replies(1): >>24839658 #
59. hexis ◴[] No.24839339[source]
Maybe desktop Linux needs more people like you and me to help make it better?
replies(2): >>24839530 #>>24839674 #
60. 0xCMP ◴[] No.24839340{3}[source]
You can always reconfigure your DNS. It's important feature so unlikely they'll get rid of that.
61. eptcyka ◴[] No.24839342{5}[source]
I wish Apple agreed.

But on the other hand, there are use cases where checking for the existence of a default route is the best heuristic.

replies(1): >>24840572 #
62. fortran77 ◴[] No.24839347{4}[source]
The alternative is Windows 10 on a wide variety of hardware, or Linux.
replies(1): >>24839461 #
63. Skunkleton ◴[] No.24839349{3}[source]
DoT isn't a big problem for a pihole, but it doesn't look like things are going that way. DoH can only be blocked by a mitm proxy. You would have to take a pretty serious security hit to do something like that with a pihole.
replies(3): >>24839429 #>>24840326 #>>24840851 #
64. gumby ◴[] No.24839352[source]
> but is it really that hard to document these behaviors?

I imagine it is, given the bureaucracy of a big company. Apple's documentation has long been really dreadful, mostly nonexistent and where it does exist, usually incomplete and even wrong. I've assumed it was because the code itself is developed by isolated groups while the documentation presumably has to touch all sorts of people (publishing, translation, language checks, ...) in a kind of Conway's law.

However, hard or not, writing comprehensive documentation is quite doable. I have never been a fan of the Windows programming model but I have long admired not just MS's documentation but the amount of effort and commitment they obviously put in.

Apple cares about some things but in this regard it appears they simply don't give a shit.

replies(3): >>24840071 #>>24840160 #>>24840950 #
65. pnw_hazor ◴[] No.24839353{3}[source]
It is pretty clear Apple doesn't think it is your computer. Similar to how they feel about their phones that they let people use.

edit-to-add: further evidenced by Apple's stance on right-to-repair.

66. easton ◴[] No.24839363{5}[source]
Probably why the other discussed function exists:

> Similarly, all macOS machines will test a DHCP supplied default route before applying it by trying to reach something on the internet. So if you happen to have some firewall rules that block internet access, no default route will be applied until the internet check times out.

So if the default route doesn't exist yet since it's still checking for internet, it would let you use the keyboard. DHCP probably runs every time the NIC is turned on (like from sleep), and they could just disable this function if you've set a static default route (since they may not be able to reach their NTP server on that route).

replies(1): >>24839425 #
67. Skunkleton ◴[] No.24839365{4}[source]
This assumes that your software is doing what you asked it to do, not what some bigco or malware wanted it to do.
replies(2): >>24839572 #>>24839696 #
68. indymike ◴[] No.24839367[source]
I just moved from Macos to Linux. The Linux desktop experience has improved a lot in the past five years (at least KDE has).
replies(4): >>24839573 #>>24839980 #>>24840233 #>>24840790 #
69. pshirshov ◴[] No.24839372{3}[source]
I'm happy to pay for good FOSS and open hardware and I'm paying. Also I'm trying to avoid any proprietary and especially cloud-connected things. You are generalizing too much, there are enough people who are happy to pay for trustworthy software and hardware. Just noone cares.
70. anonymousisme ◴[] No.24839381[source]
I don't see how pi-hole get affected by DNS via https, unless you are leaving out the part about computers, tablets, and phones using hard-coded DNS servers that use DNS via https. This is a trend, but a very small one right now.
replies(2): >>24839510 #>>24839529 #
71. unethical_ban ◴[] No.24839388{4}[source]
It's any VPN software that is always-on.
72. _qulr ◴[] No.24839390[source]
> Do people really install Little Snitch (which I've used since 2005 or so) for blocking Apple's own apps?

Yes, Absolutely! My primary use case for Little Snitch is to block Apple "services" that I don't use or want.

I don't use iCloud at all. I don't want Apple phoning home unless I specifically, manually check for software updates.

replies(1): >>24841036 #
73. y7 ◴[] No.24839399{4}[source]
Hear hear. All "just use an alternative" does is temporarily shift the problem. And then tomorrow an article appears highlighting Windows 10's invasive telemetry and people say "yeah just use macOS".
replies(2): >>24839660 #>>24839924 #
74. tmd83 ◴[] No.24839401[source]
Unrelated but has anyone often had Chrome going on cpu usage rampage and unresponsive fairly frequency on 'wakeup from sleep'? It's almost certain to happen if the chrome has been updated and waiting to be restarted.
75. threatofrain ◴[] No.24839406{5}[source]
> any backdoors Apple builds for its own apps

Apple hasn't weakened the security of their devices to provide a secret way in, in fact, they made their systems even more robust.

The question absolutely is whether Apple can be trusted. Little Snitch works for other apps, just not Apple's apps. The remaining slice of the pie you're arguing for is whether or not we can trust Apple.

So what delta in security and trust over Apple are we getting by asking for this change, and how much insecurity and brittleness are we inviting to all other users with our ineffective software based firewall?

replies(3): >>24839460 #>>24839619 #>>24842479 #
76. solatic ◴[] No.24839419[source]
> Is the world better or worse due to this change?

This is the false shortcut behind any attempt to weaken security. Security makes access harder, therefore let's weaken security to improve access.

The fact is that weakening security also makes malicious behavior easier and/or more likely. Changes like this are bad particularly because Apple users pay for a protected walled garden.

replies(1): >>24840403 #
77. eptcyka ◴[] No.24839425{6}[source]
The default route verification is separate from the keyboard issue. I don't know exactly what is going on here, but in the above post what I mean by the system applying a default route is that the route isn't propagated to the system configration's dynamic store and whatever macOS uses for netlink, i.e. the route doesn't show up in `route monitor` until the check finishes. However, I do believe it would still be used at some level, either on the T2 or in the kernel to do the NTP stuff.
replies(1): >>24839998 #
78. OJFord ◴[] No.24839429{4}[source]
Wouldn't pi-hole be the 'resolver' the other end of the request, the party it's encrypted for?

Sure, Apple (or whoever) could just bypass it and use something specific, but can already just use an IP, no DNS anyway?

replies(1): >>24839813 #
79. pshirshov ◴[] No.24839436[source]
Desktop linux still kind of sucks because there aren't enough people writing desktop linux software which does not suck and not enough people paying for that.

Also there are enough people in linux community who still hate/disapprove all the integration efforts (e.g. systemd). And the thing linux sucks the most is integration.

replies(1): >>24839642 #
80. ClearAndPresent ◴[] No.24839439{4}[source]
Or Wireguard.

The absurdity of sitting in front of a frozen keyboard and trackpad for up to a minute before I can unlock the screensaver on a 2k machine has driven me spare. And now has driven away from these astounding lemons.

This is the last Apple laptop for me.

81. gruez ◴[] No.24839452{4}[source]
>Try to bypass kexts and you’re just asking for kernel stability issues and Mac customer crashes

why would that be the case? All you'd need to do is provide some sort of private network api, and only allow apple signed code to use it.

replies(1): >>24839467 #
82. smnrchrds ◴[] No.24839459[source]
Apple has been more and more acting on the belief that when you buy one of their devices, you don't buy and own the device. You rather purchase an experience—a service—from Apple. They don't have to let you run your own software on your device or poke around the internals. That is not part of the experience offered. You should use the device as Apple intends it to be used.
replies(2): >>24839577 #>>24840727 #
83. Wowfunhappy ◴[] No.24839460{6}[source]
> Apple hasn't weakened the security of their devices to provide a secret way in, in fact, they made their systems even more robust.

I'd consider poking a hole in firewalls to be providing "a secret way in", particularly in the context of Little Snitch. This isn't some antivirus bloatware that comes preinstalled, or a firewall imposed by corporate networks. The entire pitch of Little Snitch is that it enables you, the user, to monitor and control any bit of traffic that leaves your machine. No one was asking for Apple to bypass that.

replies(1): >>24841801 #
84. throwaway2048 ◴[] No.24839461{5}[source]
Windows 10 has even more invasive spyware nonsense.
replies(1): >>24839526 #
85. throwaway2048 ◴[] No.24839467{5}[source]
that is not how kexts work(ed), they can do completely arbitrary things to the kernel, including removing any theoretical code signing requirement.
replies(1): >>24839599 #
86. josteink ◴[] No.24839470[source]
> and now Apple has altered the deal and we must pray they do not alter it further

And the slippery slope of MacOS lockdown slips just a little further.

87. sbuk ◴[] No.24839472[source]
Use Murus, which uses PF, which is built in to OS X...

https://www.murusfirewall.com

replies(1): >>24839649 #
88. ineedasername ◴[] No.24839473{3}[source]
What's the alternative for the typical user? Windows has its own problems, and let's face it: market forces on this sort of thing or any other practices by the two of them have not driven people to use desktop Linux instead. For most people, there's simply no reasonable option to switch to that would avoid these things or employ market forces to get these companies to change their ways.
replies(4): >>24839516 #>>24839941 #>>24840143 #>>24840171 #
89. OJFord ◴[] No.24839475[source]
Firewall users expect the 'App Store, Maps, etc.' to not function if not configured to be allowed through the firewall.
replies(1): >>24841046 #
90. CharlesW ◴[] No.24839483{5}[source]
> Apple has clearly betrayed users’ trust in this situation.

That's a perfectly reasonable opinion to hold, but 99.9% of macOS users won't know the difference and will be safer for it.

Some of the folks who know the difference will also be fine with it. FWIW, I've used Little Snitch (only to prevent nefarious third party activity), and its biggest UX problem is that it treats legitimate OS traffic no differently than untrusted traffic.

91. acgkmopvvgvmgv ◴[] No.24839490[source]
A good lesson for the anti-FLOSS crowd so heavily present in this website.

I'll be the first to admit Linux desktops are full of flaws (although there are other options), just like every other OS but they could be fixed given enough money or maybe you could be the one that write that code.

But an OS that is not FLOSS will always work against their users and restrict their freedom. It's also a big joke that they have so many ads talking about privacy, when they are just as bad as their rivals. I do understand that not everyone has a choice because specialized software that they need for professional use could be available only in other platforms and that's unfortunately.

I don't expect an utopic world where everything is FLOSS but the OS is too important to be closed. It will only get worse with time.

92. dwrodri ◴[] No.24839493{3}[source]
The pi-hole software turns the Raspberry Pi into a DNS server, so you can point your own DNS server (i.e. the raspberry pi) at the DNS provider of your choosing so that it can resolve uncached queries.

I don't think encryption matters because you control the sender (your PC), the first hop (the pi-hole), and the next resolution destination (Cloudflare/Quad9/Google/OpenDNS/etc.).

replies(1): >>24841180 #
93. pshirshov ◴[] No.24839497{3}[source]
Realistically, you have two options: to use Linux or to trade your control and freedom for convenience.

In case the control and freedom are important for you, why not to switch to Linux, purchase Pinephone or Librem, use DD-WRT/VyOS/pfSense for your router?

94. nix23 ◴[] No.24839496{4}[source]
>Fun fact, at least for now, you can still buy a Mac and boot Linux.

Are you praing too that Apple will still allow that in the future?

>I buy Apple computers because of the hardware support and integration with iPhone

Have fun then, i dont buy Think different but same.

95. ignoramous ◴[] No.24839498{3}[source]
https://firewalla.com/ might be it, though I am sure there are other similar products.

Disclaimer: I work on a similar product but for smartphones.

replies(1): >>24840236 #
96. wincy ◴[] No.24839500{4}[source]
Ugh, Cisco AnyConnect, had my MDM policy erroneously install the 32-bit version of it and removing it required finding a shell script in /opt/cisco and running to deregister it before I could install the updated version. So much fun!
97. curiousgal ◴[] No.24839501{4}[source]
Regulation will never be ahead of corporations. Regulators always play catch-up. Seeing how, at the end of the day, all these company care about is profits, hitting them where it hurts will make a difference.

That being said, Linux is available, and it's perfectly usable by people who would be bothered by Apple's dev policies.

replies(1): >>24839651 #
98. dylan604 ◴[] No.24839503[source]
Apple touted the T2 chip as the bee's knees in security. Now, we have a vulnerability that cannot be defended against. However, Apple went all in on the security of this T2 chip so that you cannot replace the SSD (besides the method to manufacture). I appreciate the desire at making a device difficult for a bad actor to get to your data, but they epicly failed and ultimately only made an user-hostile device. Oh, and the laptops with these chips also had the world's worst keyboard. Absolute trash.
replies(8): >>24839773 #>>24840191 #>>24840273 #>>24840861 #>>24841024 #>>24842626 #>>24842828 #>>24843964 #
99. brightball ◴[] No.24839504[source]
Unreal.

Does it feel to anybody else that a lot of grip tightening seems to be happening right now?

replies(1): >>24841476 #
100. throwaway2048 ◴[] No.24839510{3}[source]
You are confusing DNSSEC and DoT/DoH, DNSSEC is not encrypted.
101. ramosu ◴[] No.24839515[source]
"I should have got a Thinkpad"
102. nix23 ◴[] No.24839516{4}[source]
I'm not a "typical" user so i dont care.
replies(2): >>24839586 #>>24841847 #
103. rowanG077 ◴[] No.24839518[source]
Apple SW and HW need to be broken up. They have abused their position too much.
104. joshspankit ◴[] No.24839522{4}[source]
This mindset probably explains why I have such issues with Apple products when my connection to the internet goes down, but the internal network infrastructure (including DNS server) are perfectly fine.
105. nix23 ◴[] No.24839526{6}[source]
Not the Enterprise/Education edition.
replies(1): >>24839589 #
106. fanf2 ◴[] No.24839529{3}[source]
DNSSEC does not do encryption: DNSSEC is about data origin authentication. Encrypted DNS is DoT or DoH, DNS-over-TLS or DNS-over-HTTPS (and maybe in the future DoQ, DNS-over-QUIC)
replies(1): >>24840240 #
107. AlexandrB ◴[] No.24839530{3}[source]
I appreciate the sentiment, but I'm not a UX designer or expert. And the problem is not that Linux doesn't have enough UI developers, it's that many of them are working on re-inventing the wheel in different, competing ways. Linux needs a dictatorial BDFL for UI - a Linus Torvalds for the desktop - an idea somewhat antithetical to the distributed nature of open source development.

It doesn't help that organizations that could be leading the charge keep changing direction. Ubuntu went Gnome -> Unity -> Gnome in the span of 15 years or so. And now they're going in hard on Snaps, which introduces breaks in UI uniformity again (Gnome Themes, for example[1]).

[1] https://www.omgubuntu.co.uk/2020/10/automatic-theme-installa...

replies(1): >>24839803 #
108. gruez ◴[] No.24839537{3}[source]
>Not happening if it were an encrypted Android device with a high-entropy password.

because you have to balance security with usability. iPhones use its security chip to slow/prevent password guessing. that allows you to use a weak password without losing much security, but if that system is compromised you're back to square one. I'm sure if you used a high entropy password on ios, they wouldn't be able to get access either.

replies(1): >>24839786 #
109. nix23 ◴[] No.24839540{4}[source]
>Options are limited

No not really, but limited is the mindset of peoples.

replies(1): >>24839616 #
110. ◴[] No.24839541[source]
111. wl ◴[] No.24839544[source]
Sure. I don't want Spotlight making network requests on a filesystem search.
112. nomel ◴[] No.24839550[source]
> bringing the OS layer under their complete control

To me, it seems the purpose is almost always to protect the average user from malware. What do you think their reasoning is?

replies(2): >>24839739 #>>24839781 #
113. klyrs ◴[] No.24839551[source]
> Because as Apple well knows, once you make a backdoor, someone will figure out a way to exploit it.

I can't help but see this as the real reasoning behind the change. With EARN-IT on on the table and antitrust cases looming, they've got every reason to bend over and give governments whatever access they can.

114. Wowfunhappy ◴[] No.24839553[source]
I wonder if it would make sense for Little Snitch to continue supporting their kext-based solution in parallel to the new one, possibly only for users who are willing to disable SIP.

You might argue that disabling SIP for a security product defeats the point, but I'm not sure if that's necessarily true. SIP effectively delegates trust away from the user and towards Apple, which is fine as a default—but the calculus may be different for experienced users, like the ones who use Little Snitch.

replies(1): >>24841142 #
115. m3kw9 ◴[] No.24839555[source]
Maybe if you block it randomly renders your OS inoperable and you won’t know why. Example iCloud login, could be a few obscure network calls. You would then call Apple and ask wtf if you are some noob blocking everything. This isn’t old days where there could be zero dependence on the net for critical function.
replies(1): >>24842457 #
116. skykooler ◴[] No.24839565{3}[source]
You could have it spoof the keys and add its keys to your OS's key store.
replies(1): >>24839886 #
117. gabereiser ◴[] No.24839566[source]
Tim Cook's Apple Inc is really a nightmare. Sure we have sleek shiny laptops and devices that are amazingly powerful but at what cost? I still haven't found a trackpad as good as MagicTrackpad sadly otherwise I'd ditch the MacBook Pro.

To be fair to Apple though, it's their OS, they can do what they want and we agree every time we update MacOS or iOS. It's crazy to me that we basically only have 3 phone device choices, 2.15 environment choices (OS wise... Linux Desktop is crap, but getting better), and only 2 choices in GPU's, CPU's, etc...

What can we do about this?

replies(7): >>24839667 #>>24839673 #>>24839683 #>>24839794 #>>24840099 #>>24840106 #>>24840124 #
118. silon42 ◴[] No.24839572{5}[source]
firewall anything that doesn't go through your DNS server... at least thay way the malware will be obviously detectable.
replies(1): >>24840148 #
119. adambatkin ◴[] No.24839573{3}[source]
Linux on the desktop and Linux on the laptop (heh) has definitely improved. It _sometimes_ needs a little tweaking to get it right, but KDE/Plasma also happens to offer that level of "tweakability" that should satisfy almost all semi-mainstream users (at least anyone coming from Windows or Mac).

Compared to my first Linux laptop (a Sony Vaio circa 2000), my current XPS 13 works as well as any Mac laptop I have ever owned, and all the hardware that you would "expect" to work (but probably didn't work as smoothly 10 or 20 years ago) Just Works (WiFi, external displays, excellent battery life/sleep, etc...)

Based on the complaints I have heard about Apple hardware and MacOS over the past few years, I'd even argue that Linux-on-the-desktop isn't any less stable or harder to get working than a Mac.

replies(2): >>24839865 #>>24841083 #
120. parliament32 ◴[] No.24839577[source]
Device-as-a-Service is an excellent way to describe the Apple ecosystem.
121. pmarreck ◴[] No.24839586{5}[source]
So basically you provided a suggestion that only works for you.
replies(1): >>24842097 #
122. throwaway2048 ◴[] No.24839589{7}[source]
That you can't legally acquire outside of a commercial support contract.
replies(1): >>24839891 #
123. kar1181 ◴[] No.24839592[source]
The linux desktop experience is still quite in a state. I will likely do the same and suffer Linux, but I think many will go back to windows as WSL continues to improve.

Apple is going to lose developers.

replies(3): >>24839815 #>>24840249 #>>24840722 #
124. montjoy ◴[] No.24839597{3}[source]
Where are these weird anti-FOSS statements being bred from?

> Those who pay set the agenda for everything. And this different from non FOSS software how?

> Developing a truly polished operating system with a whole ecosystem of services is far, far beyond what volunteers and hobbyists can achieve.

As someone who uses Linux as my primary workstation I disagree. My coworkers that use Mac or Windows seem to have about the same number of issues overall. I mean- look at the article this is about. I’m pretty confident that would be much harder to get away with in the Linux community. Gnome shell is more polished than windows or macOS were at the same age.

> It also requires focus and coordination and someone who is able and willing to say no.

Clearly you haven’t dealt with the Gnome folks who are perfectly willing to say no to features some users scream for. Or read any of Linus’s rants about nvidia.

Edit: formatting

replies(1): >>24840996 #
125. gruez ◴[] No.24839599{6}[source]
any access? On Windows, you can write a driver that would run in kernel mode, but critical sections can't be modified[1]. I'd imagine there's something similar for mac.

[1] https://en.wikipedia.org/wiki/Kernel_Patch_Protection

replies(2): >>24839831 #>>24839933 #
126. gabereiser ◴[] No.24839616{5}[source]
>No not really, but limited is the mindset of peoples.

I'd argue options really are limited. Your counter argument assumes one can just roll their own OS with the same features and functionality as current-gen OS's. That's quite a leap. Options today are Windows, Mac, or some flavor of Linux if you can get it to work. Linux aside, Windows and Mac both are making it so you no longer own the OS but are "subscribed" to it. Making it easy for them to implement anti-consumer strategies to lock you in.

replies(1): >>24840166 #
127. chrisshroba ◴[] No.24839618[source]
For what it's worth, my hacky solution to this is this script which kills all the background processes that use significant bandwidth. If you're interested in how I came up with the list of processes, I can share the BitBar [1] script I wrote for monitoring per-process network usage (I wrote a small wrapper around nettop that logs to a db, which is read periodically by my BitBar script to show me the per-process usage:

    if [ $(whoami) != root ]
    then
      echo "Please run as root, not $(whoami)"
      exit
    fi

    while true
    do
      killall -9 planb 2>/dev/null && echo "$(date) - Killed planb"
      killall -9 murdockd 2>/dev/null && echo "$(date) - Killed murdockd"
      killall -9 uplink-soecks 2>/dev/null && echo "$(date) - Killed uplink"
      killall -9 nsscacheclient 2>/dev/null && echo "$(date) - Killed nsscacheclient"
      killall -9 ksfetch 2>/dev/null && echo "$(date) - Killed ksfetch"
      killall -9 nsurlsessiond 2>/dev/null && echo "$(date) - Killed nsurlsessiond"
      killall -9 softwareupdated 2>/dev/null && echo "$(date) - Killed softwareupdated"
    done

[1]: https://github.com/matryer/bitbar
replies(2): >>24839827 #>>24841381 #
128. _qulr ◴[] No.24839619{6}[source]
> The question absolutely is whether Apple can be trusted.

This is a false dichotomy. I choose to use a Mac, but I also choose not to let my Mac phone home to Cupertino unless I allow it. Why can't I have that choice? Why does it have to be all or nothing? I'm only interested in the Mac, I have zero interest in Apple "services". It's a fine computing device, but I see no reason why the device has to continue to talk to Apple after I purchase it, except to download software updates — which I manually trigger.

It's not about trust, it's about choice.

EDIT: Now if Apple provided a way to easily disable all of those "services" that phone home, there would be a lot fewer complaints about this issue. But they don't.

129. capableweb ◴[] No.24839623[source]
People keep saying "I trust company X a lot more than I trust company Y" but is "trust" really something that applies to companies at all? Feels weird to humanize companies in that way. If you trust a company, isn't it really that you trust the humans working at that company? So you should really say "I trust person X who happens to work at X today", as as soon as they leave, the trust went with them.

Companies are not people and cannot be trusted to act in any interest but profits. Any trust you feel towards a company is towards humans in the company, but let's not anthropomorphise companies (yet, until we have better AI at least).

replies(4): >>24840041 #>>24840494 #>>24841605 #>>24841676 #
130. AlexandrB ◴[] No.24839642{3}[source]
> Also there are enough people in linux community who still hate/disapprove all the integration efforts (e.g. systemd).

This is a fair point, and I'm guilty of complaining about systemd myself. Having said that, I haven't seen any improvements in the Linux UI experience that could be explained by "systemd fixed that". Maybe network management??

replies(2): >>24840107 #>>24840278 #
131. dylan604 ◴[] No.24839643[source]
What is it about Adobe software that makes it only work on Windows or macOS? Both of their graphics engines are totally different, so what makes it so difficult for Linux compatibility? It's the only software package that keeps me beholden to Apple (I'll never run Windows of my own decision).
replies(2): >>24840042 #>>24840657 #
132. ◴[] No.24839649[source]
133. seg_lol ◴[] No.24839651{5}[source]
These companies would be happy to lose the customer and the vars that complain. Unless you can convince 100x more people than yourself to loudly and dramatically move to something not as user hostile, just voting with your dollars will not work, there isn't enough competition.
replies(2): >>24839718 #>>24839767 #
134. eptcyka ◴[] No.24839658{5}[source]
I think the threat model here is that someone might've swapped out your keyboard to one that's spying on you, whilst you're out at a conference enjoying the more social aspects of such gatherings. At the same time, if you were to not be connected to a network, this kind of verification wouldn't do anything.
replies(2): >>24839845 #>>24840429 #
135. anamexis ◴[] No.24839660{5}[source]
I think in both cases, people generally say "use Linux".
replies(1): >>24841679 #
136. notamy ◴[] No.24839662{5}[source]
> They want their stuff to "just work" because even if they do have the technical knowledge they don't have the time to screw around with fixing their computer.

And that's why I picked up an MBP this year; it's caused me way less grief than my various Linux boxen have.

replies(1): >>24841093 #
137. ProAm ◴[] No.24839667{3}[source]
Would you use a good trackpad that connects via USB or bluetooth? Its a real question because I see a lot of comments about people not leaving the Macbook because of the trackpad even though they dislike the rest of the laptop? Seems like something that could be a product?
replies(5): >>24839725 #>>24839726 #>>24839751 #>>24839771 #>>24840154 #
138. jonny_eh ◴[] No.24839673{3}[source]
Look on the bright side, having at least 2 choices is waaaay better than only 1.
139. baq ◴[] No.24839674{3}[source]
It needs more people willing to pay software developers, UX designers and testers to improve the Linux desktop, starting with the kernel, graphics drivers, ending in consistent set of apps. This is a (ten) billion dollar endeavor.
140. vinay427 ◴[] No.24839683{3}[source]
What is distinct about the direction of Tim Cook's Apple Inc compared to any previous Apple Inc?
replies(3): >>24839760 #>>24839796 #>>24840217 #
141. frankjr ◴[] No.24839691{3}[source]
Not OP but one example is bridged networking. I discovered this while trying Parallels Lite from the App Store. I was used to being prompted for every connection attempt VirtualBox was making but I was not getting any when using Parallels. I contacted Little Snitch's support and they acknowledged the issue but said that there's not much they can do because Little Snitch works on "application level" and Parallels uses bridged mode of networking that Little Snitch is unable to intercept. Note that the Lite version of Parallels doesn't require any kernel extensions (even on older macOS releases).

If an application is running as root, you are similarly able to use the lower level APIs and completely "bypass" Little Snitch. I cannot find a good alternative source for this other than the Security and Privacy Guide [0]:

It is worth noting that these firewalls can be bypassed by programs running as root or through OS vulnerabilities (pdf), but they are still worth having - just don't expect absolute protection.

[0] https://github.com/drduh/macOS-Security-and-Privacy-Guide#th...

142. pmarreck ◴[] No.24839695[source]
I'm kind of glad Linux doesn't have a "unified UX". I mean, the MacOS of 15+ years ago iron-fisted it, and it was right most of the time, but glaringly not in a few cases (simple examples, the ability to reshape a window by any corner or edge was conspicuously absent on Mac for a long time, as was the right mouse button).

Best to let a bunch of free ideas duke it out.

Currently using Ubuntu 20.10 beta (releases in 2 days!) on ZFS on root, and got all my dev and games working, so I'm pretty happy with it thus far. The ability to roll back to any point at which an apt install was made or attempted via zsys' integration with ZFS snapshots is nice. And ZFS is just... as glorious as an enterprise-class filesystem, basically. And all "for free".

replies(1): >>24841455 #
143. goatinaboat ◴[] No.24839696{5}[source]
If I remember correctly Chrome already ignores your DNS and does it’s own over HTTPS.
replies(1): >>24840378 #
144. nix23 ◴[] No.24839718{6}[source]
It's not about voting, it's about the tech YOU use. You want apple? Buy it, if not dont. I really dont care what others use.
145. xyst ◴[] No.24839720[source]
This is a very sneaky move by Apple, shame on them.
146. kccqzy ◴[] No.24839725{4}[source]
No you wouldn't. It's not about the trackpad hardware (Apple sells a separate Bluetooth trackpad after all), but it's about the software.
replies(1): >>24839866 #
147. ucosty ◴[] No.24839726{4}[source]
You can already buy an external Magic Trackpad from Apple (https://www.apple.com/uk/shop/product/MJ2R2Z/A/magic-trackpa...). Not terribly useful for a laptop unless you want to set up at a desk.
148. danmg ◴[] No.24839735[source]
If a third party did anything like this, it would be considered malware.
replies(1): >>24840019 #
149. AlexandrB ◴[] No.24839739{3}[source]
So what if that is their reasoning? Freedom also means the freedom to make mistakes. We don't set a standard of "absolute safety" in many other (arguably more important) areas of our lives, so why do it here?
replies(1): >>24840165 #
150. tapland ◴[] No.24839751{4}[source]
That’s called a mouse.

The trackpad is important because it’s the default interface when moving the portable computer. External devices kill that.

151. bayindirh ◴[] No.24839760{4}[source]
Jobs' Apple created technologies which have rooted deeply in POSIX standards and standard UNIX* conventions. If you knew UNIX(Linux/BSD/whatever), you can find the same data streams on the same places.

OS was obscure but, predictable. Different but, familiar. It had kernel extensions, logs and devices. Nothing was extremely obfuscated. It was a UNIX device but, shinier.

Now it feels like a glorified iOS box with more transparent walls. You can see some gears but can't touch them. There are only limited interfaces to some of those, which you can touch remotely but, not alter completely.

I wonder what will happen to my EXT drivers from Paragon though.

replies(2): >>24839889 #>>24839918 #
152. giantg2 ◴[] No.24839767{6}[source]
"Unless you can convince 100x more people..."

I don't even know 10 people who use Mac.

153. jeromenerf ◴[] No.24839771{4}[source]
Nah, it’s just people whining and finding excuses.
154. rorykoehler ◴[] No.24839773{3}[source]
Additionally charging on the left side ports makes the T2 chip overheat and crashes the machine on occasion.
replies(2): >>24840309 #>>24840819 #
155. dheera ◴[] No.24839786{4}[source]
> I'm sure if you used a high entropy password on ios

The problem is you don't get this choice in iOS.

A privacy-respecting company would provide you this option -- Android does. You can have a high-entropy passcode in Android if you wish, and choose to sacrifice usability in the interest of privacy, if that is what you'd like.

replies(2): >>24840037 #>>24840062 #
156. vlunkr ◴[] No.24839794{3}[source]
I used to be really tied to the Apple trackpad. After switching to Linux and a keyboard-driven window manager I couldn't care less. I'm not going to say Linux Desktop is perfect, but at this point I'd pick it over everything else.
157. arcticbull ◴[] No.24839796{4}[source]
Without taking a position on OPs value judgement, the difference between Steve's Apple and Tim Apple's is that services have come to the fore.

Apple has historically always considered itself a hardware company, and now it is a hardware and services company. Small but concrete examples are the Settings page's "Activate your free trial of AppleTV+ today!" and their constant pitching of Apple Card. This is the thin edge, more than likely, of them moving to a model not of monetizing your hardware but rather capturing your data and selling you on a subscription bundle of services.

This transition is in a way necessitated by their declining revenue growth, so they're looking at new ways of monetizing their existing users.

158. ebiester ◴[] No.24839803{4}[source]
Two groups tried that. Unity tried that, and GNOME is trying that. Many of us really hate GNOME's decisions.

I'm not sure I really like the BDFL here.

159. Macha ◴[] No.24839813{5}[source]
My understanding is the concern would be that closed source applications would use a hardcoded DoH resolver and pinned certs to bypass any unwanted blocks of ads/telemetry which could only be resolved with decompilation and patching with varying degrees of difficulty.
replies(3): >>24840560 #>>24842196 #>>24847143 #
160. eknkc ◴[] No.24839815{3}[source]
I switched to Windows and been working exclusively on WSL2. It is pretty decent and I'm glad I got out of Apple ecosystem.
replies(1): >>24840643 #
161. droopyEyelids ◴[] No.24839827{3}[source]
please share the script for monitoring per-process network usage! I'd love it.
replies(1): >>24841065 #
162. SCHiM ◴[] No.24839831{7}[source]
KPP is not considered a security boundary. That means, in Windows security jargon, that it's a feature that helps security. But not something that you or anyone else should consider a fail proof solution, or even something that would result in a patch if breached.
replies(1): >>24840129 #
163. miguelmota ◴[] No.24839842[source]
Curious, what sort of things make desktop Linux suck in your opinion? I’ve been on Linux for years as my primary machine and haven’t encountered anything that made me switch back.
replies(1): >>24840203 #
164. junon ◴[] No.24839845{6}[source]
I don't believe this is ever the case. What happens if you legitimately installed a new keyboard? Will Apple just... prevent you from using it?
replies(2): >>24840115 #>>24843040 #
165. wyld ◴[] No.24839849{3}[source]
I've been pretty happy with the PiHole Remote app https://apps.apple.com/us/app/pi-hole-remote/id1515445551
166. kitsunesoba ◴[] No.24839865{4}[source]
I try the major DEs every few years to see if they fit me, most recently trying the newest KDE and GNOME versions in a VM about a month ago. Both have improved for sure, but they still have a long way to go… GNOME actually came closest but its customizability level is even lower than that of macOS, even factoring in extensions.

Both suffer from a laundry list of minor annoyances that snowball into something that's hard to ignore, and in KDE's case the UX design they employ just doesn't jive with me at all.

It's all enough that I end up coming back to macOS because despite its problems, it fits me in ways that nothing else even comes close to touching. Sometimes it feels like there will never be a macOS alternative that has what it takes for me to switch without feeling a major sense of loss.

replies(6): >>24840477 #>>24840668 #>>24840833 #>>24842603 #>>24844106 #>>24851932 #
167. ProAm ◴[] No.24839866{5}[source]
What about the software makes it good? Ive never used a macbook so have zero experience with it.
replies(3): >>24840010 #>>24840113 #>>24840197 #
168. layoutIfNeeded ◴[] No.24839886{4}[source]
>add its keys to your OS's key store

What key store? User-hostile apps (like Chrome) already use their own key store because they know better than the user :^)

169. Arubis ◴[] No.24839889{5}[source]
I intend this with kindness: normally I don’t nitpick on grammar and punctuation, but you’ve got a repeated error here that’s easily corrected. Generally, you want to break your sentences with commas _before_ usage of “but”: “He wanted to buy a pen, but the store had run out.”

If you’re a native speaker, the comma goes where you’d naturally have a brief pause in speech.

If you’re not a native speaker, it may be helpful to remember that the clause with “but” should be able to be removed & what remains should still be a valid sentence: “He wanted to buy a pen.”, not “He wanted to buy a pen but.”

replies(4): >>24839979 #>>24840038 #>>24840343 #>>24845268 #
170. wayneftw ◴[] No.24839891{8}[source]
you can buy it right here for 299

https://www.trustedtechteam.com/products/windows-10-enterpri...

171. smolyeet ◴[] No.24839892[source]
do you have a source for the keyboard part? I experience odd delays in typing and this would definitely explain that.
replies(1): >>24840206 #
172. rch ◴[] No.24839914{4}[source]
Engineers and scientists choosing MBPs as a means of getting a POSIX system on nice hardware did more for getting Macs in the workplace than any of the anti-trust actions did.
173. Wowfunhappy ◴[] No.24839918{5}[source]
It's perhaps worth noting that iOS and all of its restrictions were created under Steve Jobs. And Jobs absolutely expected iOS devices to eventually replace full computers for most people; as he put it, everyone needs a car but only a few need a truck.

Where I absolutely agree with you is that under Jobs, there were no attempts to make macOS behave more like a car. Lion did borrow a handful of visual elements from iOS, but it was mostly aesthetic. Jobs was also on medical leave for much of Lion's development cycle, so I wonder if he was less involved.

replies(1): >>24840172 #
174. fsflover ◴[] No.24839924{5}[source]
See also: https://news.ycombinator.com/item?id=24831699
175. comex ◴[] No.24839933{7}[source]
There hasn’t been anything like that on macOS. macOS on Apple Silicon will have a form of kernel patch protection, like on iOS, but it’s designed to guard against exploits from userland, not approved kexts. It’s definitely possible for third party kexts to bypass that somehow, but possibly only by disabling Secure Boot; I haven’t looked into it.
176. _-david-_ ◴[] No.24839941{4}[source]
Depends on what the typical user does. I would guess a lot of people would be fine with a Chrome Book.
replies(1): >>24841827 #
177. giancarlostoro ◴[] No.24839945[source]
I mean I already knew something was weird when I couldnt su into root and do... root things without a bios hack on a Mac. Thats just not how Unix works at all... The whole concept of root is you are root no exceptions.
replies(5): >>24840051 #>>24840130 #>>24840255 #>>24840451 #>>24848099 #
178. Wowfunhappy ◴[] No.24839979{6}[source]
I read this as a poetic choice by GP—it evoked Apple's "Think different" tagline in my mind, although now I'm not actually sure why. I could be wrong though!
replies(1): >>24840205 #
179. _underfl0w_ ◴[] No.24839980{3}[source]
Just wanted to add another compliment for KDE (specifically Plasma). I've been using KDE Neon as my daily driver for a few months now and it's amazing. Connects to my android device to share notifications and clipboard content, is heavily customizable and themeable, the whole OS feels very snappy and uniform in terms of UI/UX, and installing alongside Win10 and macOS in a hackintosh setup with full LUKS disk encryption was a snap through the installer GUI. Absolute 10 out of 10.
180. kekebo ◴[] No.24839989[source]
Is your kernel extension public?
181. sroussey ◴[] No.24839998{7}[source]
The T2 has its own OS, so that makes sense.
182. 3pt14159 ◴[] No.24840000{3}[source]
Yes I agree with your first part. There are real drawbacks.

But it's like installing a custom HTTPS cert in your OS to inspect potential traffic that malware may use through, say, a Google Doc or Sheet. It's helpful to true professionals dealing with highly sensitive information, but it's ultimately a bigger source of compromise for the vast majority of software users.

I don't think there is an easy answer here. That's why I said I thought it made the world a "touch better" and I can see from your response that you understand the tradeoffs roughly as well as I do based on the wording of your response. The fact is that contemplating these hard tradeoffs belie the underlying truth: Securing computers is hard and getting harder and the stakes keep going up. I can't say if this move by Apple will ultimately be worth it, but I certainly understand the predicament they are in. This is no easy work.

replies(4): >>24843279 #>>24844065 #>>24844210 #>>24845648 #
183. rantwasp ◴[] No.24840003[source]
hahaha. I also don’t plan to upgrade past Mojave. To me Catalina was a trainwreck and at this point I think I’m loosing a lot of trust I used to put in Apple.

this is compounded by the fact that I love Little Snitch and it has basically exponentially improved my life when it comes not only to browsing the web but when using any app on mac.

replies(1): >>24840280 #
184. daniel-thompson ◴[] No.24840010{6}[source]
For me, two things combine to make it feel super responsive: 1. The latency between you moving your finger(s) and seeing movement on the screen feels imperceptible. 2. There isn't any "lost" movement - if you scribble your finger around really quickly and come back to where you start, the cursor or window scroll position will be back to where it started too.
185. fsflover ◴[] No.24840019[source]
Many already consider Apple software malware: https://www.gnu.org/proprietary/malware-apple.html.
replies(2): >>24840959 #>>24841052 #
186. sroussey ◴[] No.24840032[source]
“folks that want full control over their operating system” and “walware authors” want too much of the same thing.

I think everyone would appreciate ideas for solutions.

replies(1): >>24841622 #
187. gruez ◴[] No.24840037{5}[source]
>The problem is you don't get this choice in iOS.

Who says you can't?

https://9to5mac.com/wp-content/uploads/sites/6/2019/05/custo...

188. ◴[] No.24840038{6}[source]
189. snazz ◴[] No.24840041{3}[source]
You make a valid point, but it’s also worth considering how the stakeholders’ interests align with your own. Apple is in the premium hardware and value added services business, so its interests are aligned with mine with regards to privacy and producing a quality product. On the other hand, Facebook is in the ad business, so its interests are not aligned with mine on a variety of points.
190. jasonv ◴[] No.24840042{3}[source]
I have an aging MacBook Air (works great for 99% of the things I want to do), an aging iPad Pro, and an iPhone XR.

I probably am in the market to replace them in that order. I just bought my son a Lenovo laptop because he needed Windows.

I'm dismayed at where Apple is going, so I'm considering a Dell Linux laptop as my daily driver.

I need to do some video editing, so for a while I'll use my son's laptop, and possibly get a Mac Mini if I really need to keep up with video editing.

My thinking is I'll buy the minimum I need to keep up with my video editing but make more aligned choices for my daily drivers.

Sitting on those thoughts more has left me entirely cold to the iPhone 12 announcements last week.

replies(1): >>24842045 #
191. Wowfunhappy ◴[] No.24840051[source]
You don't need to hack anything, you just need to use the officially-supported mechanisms Apple provides to grant yourself more permissions (namely, disabling SIP and remounting the root filesystem).
192. hilbert42 ◴[] No.24840061[source]
Don't bother to look to Microsoft Windows for a solution!

For don't forget MS Windows has a 'dial-home-to-Microsoft' link that's hard coded within Windows itself. It bypasses the hosts file altogether, and if I recall correctly, it's been in Windows since XP.

The only solution stop the 'talk-home' connection would be to find the destination IPs numbers and then key them into your external router for blocking.

replies(1): >>24840269 #
193. dheera ◴[] No.24840062{5}[source]
@gruez Replying here since no reply button and I don't have time to wait for HN to make it appear

Thanks! I didn't realize iOS implemented this.

194. dkdbejwi383 ◴[] No.24840071{3}[source]
> Apple's documentation has long been really dreadful

Developer docs for most of their libraries are usually just the method name in a large font and the parameter types and that's it.

replies(1): >>24845500 #
195. 3pt14159 ◴[] No.24840075{3}[source]
Absolutely. For example, I think that the lockdown of the bios was a move that hobbled developers like myself that installed custom bios extensions. I used to be able to run raw linux on real hardware. Now I need to use a commercial virtual machine just to get the dev environment I want.

The difference between the two is subtle, but true. I want true masters that understand what the tradeoffs are to make those hard choices for themselves. I want the rest of the world to have a blanket of privacy and security that protects everyone.

Especially the elderly that are too trusting with what they believe.

replies(2): >>24840886 #>>24842628 #
196. ◴[] No.24840084[source]
197. dkdbejwi383 ◴[] No.24840087[source]
Hmm is this also why I can't use my bluetooth mouse at the login screen?
replies(1): >>24840377 #
198. x87678r ◴[] No.24840099{3}[source]
New XPS 15 has great trackpad and is a good alternative. Its not any cheaper than MBP though. https://www.youtube.com/watch?v=WCM8FZlFTas
replies(2): >>24840167 #>>24840169 #
199. michaelmrose ◴[] No.24840106{3}[source]
The talos raptor has a power9 cpu. The Ampere is powered by arm. There is an upcoming risc-v based pc by SiFive

That is at least 3 niche entries in addition to the 2 mainstream choices.

Intel wants really badly to be a 3rd player in the GPU space and its integrated graphics are already good enough if you aren't gaming although I have doubts about their upcoming dedicated GPU.

The Linux desktop space is nicer in the keyboard centric simple environments space or at least ditch gnome and switch to KDE running on an distro that actually stays up to date.

The challenge is not mostly using such an environment its setting it up in the first place.

Looks like every category has 3-5 options.

200. Spivak ◴[] No.24840107{4}[source]
The biggest thing is probably systemd user services and session management with logind. Having your entire user session under a process supervisor that can anything can hook into is good for stability since your "desktop" now has a much more control of what's actually running. They days of logout just failing because your compositor can't kill all the things are pretty much gone. Logind is far far from perfect but it's a breath of fresh air compared to ConsoleKit and it unifies the concept of a session so that GUI/VNC/SSH are all the same kind of thing.
201. fsflover ◴[] No.24840113{6}[source]
See also: https://news.ycombinator.com/item?id=24700537
202. dylan604 ◴[] No.24840115{7}[source]
I have a 2017 MBP. There are several keycaps that that are no longer physically connected to the key, so if I tilt the laptop 4 or 5 keys fall off. I have been dealing with it by using an external Apple keyboard (with added benefit of having 10-key and full sized arrow keys). Since it's on a desktop in this config, I have it set to never sleep so luckily I have not seen this unwakeable fuck up.
replies(3): >>24840903 #>>24841010 #>>24841215 #
203. clusterfish ◴[] No.24840120[source]
Maybe you should review that trust. Apple of 2020 is very different from what they were in 2010 and before
204. Spivak ◴[] No.24840121{3}[source]
You use your pi-hole as your encrypted DNS provider?
replies(1): >>24844229 #
205. m463 ◴[] No.24840124{3}[source]
don't upgrade and/or don't continue with apple.

Alternatively firewall your machine, but apple keeps allowing itself workarounds, like find my where "offline" machines aren't so offline.

And then 5G has all kinds of inter-machine connectivity.

206. fsflover ◴[] No.24840126{4}[source]
You need everything at the same time. You also should promote Linux among your friends.
207. gruez ◴[] No.24840129{8}[source]
If patching the kernel to intercept network requests is sufficiently hard enough that you're forced to use their "approved" way of intercepting network requests, then it's very easy for them to sneak requests through. Even if patching the kernel wasn't an issue, it still turns into a game of whack a mole because apple can sneak as many changes as they want with each macos release. It heavily favors apple, not the developers of such firewalls.
replies(1): >>24840780 #
208. jlgaddis ◴[] No.24840130[source]
> The whole concept of root is you are root no exceptions.

Wait until you learn about mandatory access control [0] ...

--

[0]: https://en.wikipedia.org/wiki/Mandatory_access_control

209. jidiculous ◴[] No.24840138{3}[source]
I'm seeing this weird keyboard behaviour on wakeup with my 2012 MBP running Catalina too
210. fsflover ◴[] No.24840143{4}[source]
I installed GNU/Linux for my relatives and it's been working fine for years. So I would say GNU/Linux is a perfect alternative for typical users.
replies(1): >>24841776 #
211. ballenf ◴[] No.24840146{4}[source]
I get the antitrust case on iOS, but has the argument been widened to include regulating what Apple does with its PCs?

Or are we saying that we want the federal government to regulate OSs generally?

212. Spivak ◴[] No.24840148{6}[source]
But DoH is just any other HTTP request. This is the downside of networks blocking everything except 80/443 outbound and browsers not supporting SRV records.
213. sildur ◴[] No.24840150[source]
When I had the authenticate with watch option enabled, and for some reason the watch lagged, the Mac didn't allow me to log in with my password or finger.
214. hrktb ◴[] No.24840154{4}[source]
The trackpad is just the saillant point.

As we(I) go deeper the "let's try linux" route, thousands more papercuts come to the surface. It's fine for specific use cases (e.g. just focusing on backend dev), it becomes worse for wider use cases.

215. LocalH ◴[] No.24840160{3}[source]
Makes one wish Woz’s Apple was still around (and yes I know Jobs tried as hard as he could to put a monkey wrench into that at the time)
216. nomel ◴[] No.24840165{4}[source]
Because a computer is an appliance for most people, with it working, and it being secure, being an absolutely critical feature.

I believe still have the option to disable SIP and make as many mistakes as you want. [1]

1. https://developer.apple.com/documentation/macos-release-note...

> Workaround: During development, you can temporarily disable System Integrity Protection to allow these deprecated kernel extensions to load.

replies(1): >>24840368 #
217. fsflover ◴[] No.24840166{6}[source]
> or some flavor of Linux if you can get it to work

Do not try to get anything work. Just buy preinstalled.

replies(1): >>24841663 #
218. kibwen ◴[] No.24840167{4}[source]
Can confirm that my 2016-era XPS 15 model has the best trackpad I've used on a PC. I did have an issue where after a few years it became almost impossible to physically click (still important for click-and-drag operations), though after investigation it turned out that the dying battery was swelling up from below and interfering with the trackpad. So, full marks on the trackpad, but I hope they've ironed out their battery story.
219. horsawlarway ◴[] No.24840169{4}[source]
Second this - XPS machines on Wayland are basically spot on for trackpads.

Honestly - just Wayland in general has dramatically improved my linux desktop experience. 10/10, will never go back to X.

replies(1): >>24840619 #
220. brlewis ◴[] No.24840171{4}[source]
Are you saying that because large numbers of typical users have not yet switched to desktop Linux, we can conclude that desktop Linux is not a reasonable option they can switch to?
replies(1): >>24841534 #
221. nicoburns ◴[] No.24840172{6}[source]
Indeed. I think for all his faults, Jobs was still himself a "power user". He understood why people wanted to be able to tweak things like this because he wanted to be able to this himself (even if most of the time he used an ipad).
replies(1): >>24840802 #
222. withinboredom ◴[] No.24840173[source]
That privacy “focus” is just marketing.
223. m463 ◴[] No.24840191{3}[source]
T2 is a nightmare for people who want to reinstall. I reinstalled a machine for someone and it was a mess of 2fa and other nonsense.
replies(1): >>24841288 #
224. passwordreset ◴[] No.24840197{6}[source]
Spaces, the virtual desktop manager, makes it good. A few years ago, multiple desktops were accessible with a 3-finger swipe left or right. Now, when you make an app full-screen, it creates a new space to contain the app, so multiple full-screen apps are easily accessible.

Linux has a virtual desktop manager, and Windows has some 3rd-party apps that provide multiple desktops. None of those apps seem as tightly integrated and useful as this Mac OS feature.

225. dylan604 ◴[] No.24840203{3}[source]
Can you select a file in the whatever is the Linux desktop equivalent of Finder and hit the spacebar to get a quick look at the file native to the OS?

Can I run the software I need to be able to make a living?

Can I run multiple HiDPI displays that I can connect/disconnect as needed without causing issues?

I honestly don't know if these are or are not available features. The first question is a muscle memory thing for me and makes me thing Windows Explorer is broken. I know the second question is not possible, so after that it's full stop. Question 3 is something I anecdotally know that has been an issue in the past, but would be problem for me if it is not possible.

replies(2): >>24840471 #>>24840523 #
226. joshiee ◴[] No.24840205{7}[source]
to me it's plainly wrong for a comma. but I also don't like to color outside the box. perhaps an ellipses would've been ok.
replies(1): >>24840608 #
227. m463 ◴[] No.24840206{3}[source]
The other odd delays are from gatekeeper checking each command you run via the network.
228. ◴[] No.24840217{4}[source]
229. zepto ◴[] No.24840218{4}[source]
Except that it’s not an oligopoly - it can’t be by definition.

There is a free alternative which is better in many ways and has an unlimited supply.

The only reason Apple has a lead in software is that they have made their closed source model deliver end-user benefits at a faster rate than the open source alternatives.

There is no reason this needs to remain true, and there are a lot of signs that it will not continue.

replies(1): >>24842605 #
230. LocalH ◴[] No.24840224{5}[source]
I find it interesting how the needs of legitimate security mesh so well with the industry desires to kill off general-purpose computing for the majority of users
replies(5): >>24840678 #>>24841760 #>>24842599 #>>24843104 #>>24844722 #
231. lifty ◴[] No.24840225{4}[source]
That's how I use pi-hole as well. But I would like something that has wireguard and tor as well, in a nice maintainable package or little box.
232. DrAwdeOccarim ◴[] No.24840233{3}[source]
Same! I purchased a Razer Blade Stealth 13 and put Linux Mint on it end of 2019. I have been really pleased with the entire thing. I don't do anything crazy (web browsing, simple budget spreadsheets, watching videos, viewing family photos) and it works perfectly. I was an avid mac user for many years because of bash/BSD but the march toward locked-down hardware and software really pushed me away. The only thing I miss are the glass trackpads and the fantastic gesture support.
233. m463 ◴[] No.24840234[source]
check out their captive portal detection. It's a mess of apple-specific garbage.
234. lifty ◴[] No.24840236{4}[source]
This looks awesome! Thanks
235. anonymousisme ◴[] No.24840240{4}[source]
Of course. I knew what I meant, but used the wrong word.
236. DrAwdeOccarim ◴[] No.24840249{3}[source]
Try Linux Mint with xfce. Really nice out of the box.
replies(1): >>24844127 #
237. kstrauser ◴[] No.24840255[source]
That's absolutely not true. For instance, the BSDs have the notion of securelevels (https://man.openbsd.org/securelevel.7) which severely limits what even the root user can do. SELinux can do a lot of the same things.
replies(2): >>24840480 #>>24840984 #
238. WarOnPrivacy ◴[] No.24840269{3}[source]
Windows doesn't bypass 3rd party firewalls.
replies(1): >>24843835 #
239. MrMorden ◴[] No.24840273{3}[source]
The new keyboard is no longer horrible beyond index. Unfortunately, it's merely adequate, which at least in my book is unacceptable for any $1k+ laptop, let alone $3k+.
replies(1): >>24841387 #
240. pshirshov ◴[] No.24840278{4}[source]
There are A LOT of improvements (e.g. session management, dynamically spawned services, networking, bluetooth, thunderbolt) which were made possible by systemd, udev and dbus.

I'm not saying that UI/UX is good. It sucks. It does not improve that much over time. Also Canonical made things worse by rolling out snapd which is unreliable and hard to setup non-ubuntu distros (e.g. it tends to drop its state on Gentoo)

241. m463 ◴[] No.24840280{3}[source]
I tried catalina and... why? why did they dumb down mail? This is like the beige apple box era all over again. lame decision after lame decision and everything turns to mud.
replies(1): >>24841123 #
242. simonklitj ◴[] No.24840309{4}[source]
What if you have a model with ports only on the left-hand side? Does it crash it as well?
replies(2): >>24840629 #>>24840898 #
243. m463 ◴[] No.24840315[source]
Have you used little snitch? It very clearly allows all apple traffic by default, and if you modify something that would affect it, you get a huge popup explaining what will happen and have to click on a red button to confirm.
244. MrMorden ◴[] No.24840326{4}[source]
Whitelisting would make it much more difficult for wildcat DoH. On the gripping hand, whitelisting is extremely annoying and tends to block more work-related-and-useful than software that is actually malicious.
245. wruza ◴[] No.24840343{6}[source]
If you’re a native speaker, the comma goes where you’d naturally have a brief pause in speech.

Some speech styles use pause after "but". You can hear it from news reporters and on tv shows in general, when actors read partial sentences from paper or screen. It is not exclusive to english, and it is a common mistake to use punctuation with respect to own/technical intonations and delays instead of correct ones.

"X but, Y" likely means "X, but... Y" here, i.e. the first pause is much less pronounced than the second.

246. AlexandrB ◴[] No.24840368{5}[source]
The fact that you can still disable SIP is a good point and I hope that's always possible. The direction Apple is going thought suggests that an iPad-like experience is the eventual goal.
replies(1): >>24840874 #
247. dvtrn ◴[] No.24840377{3}[source]
Would certain go a long way to explain why waking my MBP up after going AFK involves an affair that requires me to undock it from my vertical stand, entering password, and awkwardly trying to place it back into the stand, reconnecting peripherals while slapping the BT keyboard endlessly so it doesn't go back to sleep after login.

Quite annoying.

replies(1): >>24840816 #
248. Xylakant ◴[] No.24840378{6}[source]
I think you're misremembering. This is the most official documentation of the rollout plan for DoH that I can quickly ddg: https://www.chromium.org/developers/dns-over-https - in a gist: If the systems resolver is known to support DoH, the DNS query will get upgraded to DoH. That means chrome will still be using the configured systems resolver, but the connection will be encrypted.

I think you're remembering what firefox is rolling out: Firefox will by default, if DoH is enabled for your country by default use a specific provider that subjects to additional privacy controls. However, firefox respects network level settings (for example a specific canary domain that should resolve) and will disable DoH, even if the default is enabled - unless again, the user has overwritten that in a setting. That means that the network owner is still in full control of the network-wide default and PiHole supports this approach. So a stock firefox in a network that uses pi-hole will not use DoH.

replies(1): >>24841319 #
249. ◴[] No.24840392{4}[source]
250. m463 ◴[] No.24840403{3}[source]
What this will do is allow apple to decide what goes in and out of the machine.

It's pretty clear what they think - they allow basically any app to access the network on ios.

replies(1): >>24845238 #
251. mulmen ◴[] No.24840429{6}[source]
Huh? When I’m out socializing there’s no spying to do. But as soon as I get back I will just log in and the spying begins.

I’m so accustomed to flaky peripherals with Apple products I wouldn’t even be alarmed at the behavior.

replies(1): >>24840777 #
252. m463 ◴[] No.24840436{3}[source]
I think that's a false false assumption.

With trust you get trade. Trade is commerce and the more trust you have the more money changes hands.

If I could firewall my phone I would upgrade every year no question.

253. beervirus ◴[] No.24840451[source]
SELinux doesn’t let root just do whatever it wants.
replies(1): >>24840962 #
254. miguelmota ◴[] No.24840471{4}[source]
> Can you select a file in the whatever is the Linux desktop equivalent of Finder and hit the spacebar to get a quick look at the file native to the OS?

Yes, I use pcmanfm on Linux and the spacebar will open the file in the default program.

> Can I run the software I need to be able to make a living?

Depends on what you do. If it's mostly design work and you require Adobe products then Linux is not a good choice. For software development then Linux is great.

> Can I run multiple HiDPI displays that I can connect/disconnect as needed without causing issues?

I never encountered problems connecting external monitors but also haven't tried connecting to an Apple monitor and makes me think drivers are probably non-existing for that.

replies(1): >>24840625 #
255. oatmealsnap ◴[] No.24840477{5}[source]
Same experience. I tried, but Linux just isn’t ready to be used as a general OS right now.

I’ve dug through message boards and bug reports, and a lot of the features that MacOS has will never be implemented. I’m taking about features released 13+ years ago on OS X 10.4.

replies(3): >>24840848 #>>24841154 #>>24841660 #
256. m463 ◴[] No.24840480{3}[source]
I don't know about bsd, but there's lots of documentation on how selinux works (including source code) and information on how to alter its behavior in a fine-grained fashion. and selinux doesn't leave itself a backdoor (as far as the nsa has told us)
replies(1): >>24840561 #
257. superasn ◴[] No.24840486[source]
I've become a huge fan of Linux Mint. It looks amazing and unlike before now there are no driver related issues (the thing that kept me from using it all this time).

The only thing I miss is Photoshop but I really can't think of a single reason besides that to not use Linux anymore.

258. deltron3030 ◴[] No.24840494{3}[source]
>but is "trust" really something that applies to companies at all?

Of course, It's called branding. Promises that aren't kept are still promises that aren't kept, and Apple was traditionally known for going beyond expectations, it's the core of their brand.

Some companies are more B2B business and developer friendly, like MS and FB, and others like Apple and Amazon are the opposite, they're first and foremost about B2C and mainstream customers.

Apple is less B2B focused than before because of the iPhone. They don't have to attract devs by giving them the best tools, they can attract them because of their market share among solvent customers on mobile alone.

259. m463 ◴[] No.24840498[source]
Easy to bypass. Apple will just talk directly to 17.x.y.z or akamai.
260. Xavdidtheshadow ◴[] No.24840511[source]
I use Trip Mode for that (https://tripmode.ch/). Though, it's not unlikely it'll have the same issues described in the OP, it does seem to block Apple stuff on Mojave.
replies(2): >>24842979 #>>24843930 #
261. iosonofuturista ◴[] No.24840523{4}[source]
Add recurrent sound issues to the list. Also sub-par touchpad support.
262. kstrauser ◴[] No.24840561{4}[source]
That's a different issue, though. Today, booting into macOS is similar to booting into a BSD with securelevel=1 enabled, or into Linux with SELinux set up not to allow modifying files in /bin or such.
263. gsnedders ◴[] No.24840560{6}[source]
Is this much more of a concern than closed source applications that use open DNS but use pinned certs to connect to the resolved host?
264. Spivak ◴[] No.24840572{6}[source]
I mean that's what a default route is supposed to mean, right? That this machine can route to any address. It might not get there because of a firewall, or because nothing is at a given address but you're at least claiming to know what to do with a packet destined for anywhere.
replies(2): >>24841111 #>>24841417 #
265. bigwavedave ◴[] No.24840608{8}[source]
Don't worry, your instincts are correct. The only time a comma should follow a conjunction is if there is an interrupting phrase that breaks up the sentence. Example: "He's a nice guy but, to be honest, he smells like a hippopotamus."
replies(1): >>24840827 #
266. darthrupert ◴[] No.24840619{5}[source]
Did Wayland start being good recently? Its glacial progress is one of the reasons I switched to macs a few years ago.
replies(1): >>24850504 #
267. dylan604 ◴[] No.24840625{5}[source]
>Yes, I use pcmanfm on Linux and the spacebar will open the file in the default program.

That's not what QuickLook does. It allows the user to get a "quick look" at a file without launching a default application. Also, in macOS you get access to QuickLook from inside any application's Open dialog. That's a huge time saver when you have similar files and just need to see which one before doing a full open. Think large image files that you want to place in a layout.

replies(2): >>24841192 #>>24849167 #
268. imwillofficial ◴[] No.24840629{5}[source]
Mine doesn’t.
269. Spivak ◴[] No.24840636{4}[source]
This really isn't about trusting Apple, this is about trusting Little Snitch. I don't think it would be a good decision to allow any app to control your firewall, but I should be able to say "this app should be allowed to because I trust it."
270. sbarre ◴[] No.24840643{4}[source]
I'll second this sentiment.. After setting up WSL2 I figured I would move between my iMac and my Windows machine, and I honestly haven't touched my iMac in forever for any dev work.

I'll miss some apps like Omnigraffle (not looking for alternate suggestions thanks), but I can live with that if it means using an OS that respects me enough to let me control it the way I want.

271. jaywalk ◴[] No.24840657{3}[source]
Adobe doesn't care to support Linux. It's as simple as that.
replies(1): >>24840754 #
272. brightball ◴[] No.24840668{5}[source]
Tried PopOS from System76 recently? It's IMHO the current best user experience of Gnome.
replies(1): >>24842003 #
273. commandlinefan ◴[] No.24840673[source]
I was trying to figure out how my routing table was set up on my iPad and I found out that iOS doesn't expose any interface to routing tables, at any level of privilege. Very frustrating.
replies(1): >>24841611 #
274. darthrupert ◴[] No.24840677{3}[source]
Yeah, I don't think so. I fought with technology since my late teens, and I'm just too old for that shit now. I have maybe an hour to spend on freetime every day and I want to spend exactly 0 seconds of it battling with my devices.

Apple gives me that. Ubuntu gives me that these days in some limited sense too, but not when you factor in AppleTV , phone, pad, homepod and airpod and the watch.

replies(1): >>24845730 #
275. Spivak ◴[] No.24840678{6}[source]
I mean the irony is when it comes to browsers you see the general tone of HN shift to the opposite opinion when it comes to features like, RTC, USB, Bluetooth, Filesystem Access. These are all features that give users more power but it's (apparently) easier to see the downsides and how these features can and are used maliciously.

Now put yourself in the Apple's position where "an iOS app" or a "mac App" is about as trusted as a random website. Tech people have a strong culture of locally installed apps being extremely trusted but that doesn't extend to everyone. Can you imagine if websites could control your firewall?

replies(3): >>24841039 #>>24842844 #>>24843471 #
276. entropea ◴[] No.24840722{3}[source]
You have even less control over the OS with Windows 10. Why would anyone move from Mac to Windows for a daily desktop env?
replies(1): >>24840993 #
277. spideymans ◴[] No.24840727[source]
For better or for worse, this has been Apple’s philosophy since forever. Steve Jobs himself said, “[users] are paying us to make these choices”.

https://youtu.be/rKPEK9BSIhA

278. bitobserver ◴[] No.24840732[source]
For anyone that wants to switch to Linux and retain similar functionality as this firewall app, there is this: https://github.com/gustavo-iniguez-goya/opensnitch
replies(1): >>24841849 #
279. ardy42 ◴[] No.24840752[source]
> Apple seems to do all kinds of weird networking _stuff_. For instance, during wakeup, your T2 equipped Macbook will wait for a DNS response and then use said DNS response to synchronize time via NTP before letting the user use the keyboard. Probably checking timestamps on signatures for the keyboard firmware, or something stupid like that. This only happens if it happens to have a default route.

When did they start doing this? I'm still using High Sierra on my 2018 MBP work laptop, because the keyboard and trackpad was freezing for anywhere up to 5 minutes or more with Mojave after a wakeup (usually after a long sleep). Downgrading to High Sierra fixed it, but fighting with the machine was such a pain I haven't dared touch it since.

I'm wondering if you're describing the problem I was having, but could never figure out.

280. Wowfunhappy ◴[] No.24840753[source]
> I've written my own kernel extension that works in similar manner to Little Snitch, but does a lot more, including SSL MITM and on-demand packet capture, that I've been using for more than 10 years now.

I'd be interested to read more about this, and maybe even use your kext. I'm currently MITM'ing all of my SSL traffic[1] for a different, esoteric reason: I insist on using a 7-year-old version of macOS, and it doesn't natively support modern SSL ciphers, so I have to add it in with an mitm proxy.

I've run into a handful of issues with various software that I've had to work through as they arise, but if you've been doing this for ten years you've probably seen it all already.

1: https://forums.macrumors.com/threads/fixing-maverickss-outda...

replies(1): >>24842023 #
281. dylan604 ◴[] No.24840754{4}[source]
That's an obvious drive by answer, but I'm asking a forum of developers for an explanation/guess on what it is about Linux that would make Adobe not care about it.
replies(3): >>24841305 #>>24842112 #>>24843373 #
282. ryukafalz ◴[] No.24840759{4}[source]
Happens with the built-in, first-party VPN client as well. Definitely not just a Cisco issue.
283. johnmaguire2013 ◴[] No.24840777{7}[source]
I think you misunderstand.

The idea is that if your keyboard is replaced with a keyboard that has modified (hacked) firmware, your computer will refuse to let you use it.

To do this, it must obtain a cryptographic attestation from the keyboard firmware, proving that it has not been modified. Further, to avoid replay attacks it must include the current time in the message it signs. NTP is used by macOS to determine the current time, so as to verify the signature provided by the keyboard.

So, if NTP is slow to respond or time out, you are stuck waiting for your Mac to verify your keyboard's signature.

replies(5): >>24840891 #>>24841322 #>>24841492 #>>24842000 #>>24842664 #
284. CountSessine ◴[] No.24840780{9}[source]
Even if patching the kernel wasn't an issue, it still turns into a game of whack a mole

Exactly - but the game itself is the problem. Firewall vendors will go hunting through kernel code for jump targets and structs to plug into hidden interfaces, and Apple will remove and change them, causing crashes and instability. Apple has some leverage if they have a program like WHQL, but even then driver writers will commit shenanigans. Push them out of the kernel altogether and now only Apple can engage in shenanigans and break user trust. Which they already have.

285. jjoonathan ◴[] No.24840790{3}[source]
How is desktop search? Spotlight (mac desktop search) is a killer feature for me -- fast, reliable, smooth, all straight out of the box. Meanwhile, I've wasted many hours trying to get desktop search up to the same standard on Windows and Linux. That was years ago (for linux, at least), hopefully things have improved. How is linux desktop search doing today?
replies(3): >>24841165 #>>24842822 #>>24843282 #
286. xlii ◴[] No.24840797[source]
Looks like one of the answers in the Twitter thread mentions that this might be cached content. Is this confirmed that the network call is actually being made (by router for example?). Cause later down the line it seems that pf blocks the calls just fine.
287. gabereiser ◴[] No.24840802{7}[source]
It’s been documented how irate he would get over small details. Those small details are really only seen by someone who is a power user and has a vision for what it _should_ be. Not to make excuses for his behavior but he understood technology and wanted to make it simple for everyone. That drive towards simplicity makes you have to make a choice as to what features are left to the user and what features are managed by the system. Increasingly under Cook it’s been the later.

The argument that most of this started under Jobs is valid. True. But like it was commented he was dealing with an illness and it’s unknown just how much involvement he had. This is obviously just my view of the land and my perspective is my own. YMMV.

288. ardy42 ◴[] No.24840816{4}[source]
> reconnecting peripherals while slapping the BT keyboard endlessly so it doesn't go back to sleep after login.

https://www.cru-inc.com/products/wiebetech/mouse_jiggler_mj-...

289. rootusrootus ◴[] No.24840817{3}[source]
Off the top of my head, I think it was Photoshop or something else along those lines (it's been a few years). It installed itself a little helper tool that ran as root which could talk to the licensing servers without tripping Little Snitch.

I don't run Little Snitch any more, so it may no longer work that way. Some software (games seem to be an egregiously bad offender) insists on communicating with seemlingly random IP addresses and not using DNS to resolve them, and it's hard to run any kind of filtering software or parental controls such as Screen Time successfully. I make do with outbound filtering at my router.

replies(1): >>24841105 #
290. rootsudo ◴[] No.24840819{4}[source]
REALLY?

Okay, I'm going to test this.

I noticed odd hangings and cpu hitting high temps on a MBP 2018' w/ dell usb C dock on left side, meanwhile right side is fine but I had to reboot randomly and sometimes it will just crash.

And this is a MBP on a laptop stand.

replies(3): >>24841129 #>>24841144 #>>24841851 #
291. gabereiser ◴[] No.24840827{9}[source]
I learn so much from grammar folks. :D
292. boogies ◴[] No.24840833{5}[source]
elementary OS’s Pantheon seems to be the closest DE to macOS’s Aqua
293. boogies ◴[] No.24840848{6}[source]
> a lot of the features that MacOS has will never be implemented

Care to name any? Other times I’ve heard things like this on HN I’ve been able to locate them.

replies(1): >>24844923 #
294. ◴[] No.24840851{4}[source]
295. mdoms ◴[] No.24840860{4}[source]
I trust my friend Mike to drive me to the pub. I don't trust Mike to be the executor of my will.
replies(1): >>24842315 #
296. grishka ◴[] No.24840861{3}[source]
> I appreciate the desire at making a device difficult for a bad actor to get to your data

That's what FileVault is for. I don't understand what's the problem T2 is trying to solve by its existence. Being able to use something else to read the data from a drive you pulled out of your computer, after decrypting it with your password, is a feature, not a bug. T2 is a regression, not an improvement in security. You can't call it a security product if you keep the master key, which Apple does.

replies(3): >>24841398 #>>24843832 #>>24925093 #
297. nomel ◴[] No.24840874{6}[source]
The requirement of a developer account, or some entitlement, to get full access would really be unfortunate.
298. mdoms ◴[] No.24840886{4}[source]
Interesting that it's only the thing that personally affects you that you object to
299. mulmen ◴[] No.24840891{8}[source]
I was thinking of an external keyboard. That might be the cause of confusion.
300. rorykoehler ◴[] No.24840898{5}[source]
I'm not sure. I have a 2019 mbp 16 with a dodgy logic board and while it crashes even without charging on the left it definitely crashes more often when charging on the left. I'm stuck in limbo because I need my machine for work. Will take it in when I have a break.

Some threads https://discussions.apple.com/thread/250905859

https://forums.macrumors.com/threads/2019-16-inch-macbook-pr...

replies(2): >>24841031 #>>24842647 #
301. ◴[] No.24840903{8}[source]
302. azinman2 ◴[] No.24840918[source]
Everyone seems to assume this is true, but are people also confirming this? I installed LittleSnitch recently on Big Sur and I’m constantly getting pop up’s for all of Apple’s internal daemons etc. While I haven’t tried the App Store specifically, I’m wondering if the person didn’t understand how things were configured and was allowing certain traffic thru. I can’t imagine there’s really some big conspiracy here.
replies(2): >>24841204 #>>24841277 #
303. Fizzadar ◴[] No.24840936[source]
I guess this means no updating to 5 or Big Sur then, I'll be keeping the kernel extension, thank you Apple.
304. TheRealDunkirk ◴[] No.24840950{3}[source]
> Apple's documentation has long been really dreadful, mostly nonexistent and where it does exist, usually incomplete and even wrong.

Anyone want to tell him about Microsoft's Azure or .NET documentation?...

It's the same all over.

replies(2): >>24841058 #>>24841526 #
305. fsflover ◴[] No.24840959{3}[source]
Not sure why downvotes: It's true that some people consider Apple as malware and they do have a point, including the present title.
306. giancarlostoro ◴[] No.24840962{3}[source]
It's typically not enabled by default though, but I suppose that's a fair point.
replies(1): >>24841399 #
307. giancarlostoro ◴[] No.24840984{3}[source]
Ah I'm more familiar with Linux so that's my bad, it was still a shocking and annoying observation I had. It doesn't fully bother me cause I never even need full on root on a Mac but this one time I did and having to tell my wife (girlfriend at the time) how to do all of that over the phone was just suspect, just so she could root a tablet that had a kill switch (Nvidia Shield Tablet).
308. recursive ◴[] No.24840993{4}[source]
You don't need control over things that already work how you want them to.
309. api ◴[] No.24840996{4}[source]
I crap on FOSS a bit because I like it and wish it got more traction in the mainstream. I intend it as constructive criticism.

I've been a FOSS user and sometimes contributor since 1994 when I installed Linux with floppy disks, and have consistently watched FOSS lose the mainstream because they don't grasp the critical importance of UI/UX.

I want to write "it has to just work" on a sledgehammer and bash people about the head with it over and over again until they understand that user experience is f'ing EVERYTHING and every installation or setup step required to adopt something roughly halves adoption.

This is largely because we are in an age of time and attention poverty.

replies(2): >>24841923 #>>24858827 #
310. coldtea ◴[] No.24841005{5}[source]
For the average user who expects to be able to block malicious traffic via something like Little Snitch, but still expects their OS updates, App Store, etc to work, or for someone who "knows better"?
replies(1): >>24841047 #
311. hombre_fatal ◴[] No.24841010{8}[source]
Apple has a three year warranty which means yours may have run out or is about to run out.

If you still have time, get your keyboard replaced for free: https://support.apple.com/keyboard-service-program-for-mac-n... (it also means they have to replace your mobo and battery due to brilliant Apple engineering).

It doesn't fix the problem, but it resets the clock until they fall off again. In Texas, it was <48 hours between dropping my Macbook off at the Apple shop and receiving it on my doorstep.

replies(3): >>24841090 #>>24841241 #>>24841572 #
312. cute_boi ◴[] No.24841024{3}[source]
Plus don't talk about display. Its has serious flaw. Like most macbook 2017 have lines on bottom due to apple placing controller in tcon board. What a trash .
313. dylan604 ◴[] No.24841031{6}[source]
Are the Apple Stores in your area even open to take the laptop in? I have delayed my attempt to get my keyboard looked at because of Covid.
replies(2): >>24841181 #>>24841328 #
314. coldtea ◴[] No.24841036{3}[source]
>I don't use iCloud at all. I don't want Apple phoning home unless I specifically, manually check for software updates.

I don't think a valid buyer of macOS computers is the type that doesn't use iCloud and needs to block it.

Sounds like masochism.

They can of course not use iCloud or the App Store. Blocking it? Might as well use another OS.

I don't doubt there are some users like that. I doubt there are many users like that. And I don't believe an OS maker should cater to such a niche demographic...

replies(1): >>24841127 #
315. Wowfunhappy ◴[] No.24841039{7}[source]
> I mean the irony is when it comes to browsers you see the general tone of HN shift to the opposite opinion when it comes to features like, RTC, USB, Bluetooth, Filesystem Access.

I don't think it's that ironic. From my vantage point, the big tech companies specifically and consistently invoke the security arguments that are best aligned with their agendas.

• We need to enforce automatic Windows 10 updates to keep your computer secure. (But also, we won't let consumers use the security-patches-only LTSC branch we offer businesses.)

• You cannot install an app on your iPhone that we have not personally vetted. (As part of the vetting process, we enforce a 30% cut on all digital goods.)

• We need to hide URLs in Chrome to protect users from phishing websites. (But isn't it nice how it makes AMP more seamless?)

• We need to give browsers Bluetooth and USB access, because web apps are safer than random Windows executables. (But also, we can advertise inside of web apps more easily.)

I could go on. The problem with all of these arguments is that they aren't wrong so much as they're selective. The iOS App Store does protect users from malware, and hiding URLs does protect users from phishing. What goes unacknowledged are the trade-offs of these decisions—some of which may themselves be bad for security.

replies(2): >>24841429 #>>24842102 #
316. coldtea ◴[] No.24841046{3}[source]
Well, I'd say most Apple users expect the OS and core features (including iCloud, Maps, Mail, App Store, updates, etc) to "just work" -- and if they install some application firewall it's for other apps -- malware, etc.
317. Wowfunhappy ◴[] No.24841047{6}[source]
The average user isn't using Little Snitch. And if they are, the app provides default profiles for this sort of thing.
318. murermader ◴[] No.24841052{3}[source]
Just read the german version of that article, and they way the talk, and the way it is represented does not sound professional at all. It often sounds like a parody, for example calling Apple „Big Brother“ for offering a cloud service.

Its sounds really polemic and takes away some of its credibility, because of weird wording, and leaving out some information here and there so some things sound worse than they are.

replies(1): >>24841089 #
319. gumby ◴[] No.24841058{4}[source]
Yeah, I am talking of the old windows mfc doc that came printed on paper.
320. chrisshroba ◴[] No.24841065{4}[source]
I just pasted the relevant files in here. At some point I'll try to make this a bit more professional and easy to use, but for now it works!

https://gist.github.com/chrisshroba/e31fd89b6a560733d3f915e8...

(ps if having an easily installable version of this would be helpful to anyone reading this, please comment or upvote this and maybe I'll prioritize it :) )

321. novok ◴[] No.24841083{4}[source]
Is there a 'little snitch' for desktop linux with the speed of it's UI in setting networking rules?
replies(2): >>24841939 #>>24842452 #
322. fsflover ◴[] No.24841089{4}[source]
I agree with you, the style could be much better. However it does not change the listed facts.
323. dylan604 ◴[] No.24841090{9}[source]
The big question is will they extend the warranty by the number of months the Apple Stores were closed due to pandemic lock down? My keycaps didn't start misbehaving until about April.
324. lovehashbrowns ◴[] No.24841093{6}[source]
It's the opposite for me. Pop!_OS has caused me the least amount of grief. I tried switching to it as my main workstation but, sadly, Zoom doesn't run very well (in my experience). It crashed often and started using 100% CPU on all my cores.
325. TheRealDunkirk ◴[] No.24841094{3}[source]
> Tech savvy users are not just the minority. They're also cheap.

Bologna. I spent $4,000 for this MBP, and I've spent many hundreds on accessories, and thousands of dollars on software to run on it. I do everything on it. It is the center of my digital life.

That being said, the day I go to do something on this machine and find that I can't is the day I go buy a sub-$1,000 PC laptop, and go back to Linux (which I ran on the desktop for 19 years). Apple should be very careful how hard they squeeze here.

326. Wowfunhappy ◴[] No.24841105{4}[source]
I definitely needed to let Photoshop CS6 through Little Snitch to activate a few years ago. (but frankjr also brought up a situation that I wasn't aware of.)
327. ryukafalz ◴[] No.24841111{7}[source]
I think that’s a reasonable assumption for applications to make. I think that’s a less reasonable assumption for your keyboard to make.
328. novok ◴[] No.24841123{4}[source]
There was a bunch of stuff broken by local file security stuff I'm guessing.
replies(1): >>24841312 #
329. _qulr ◴[] No.24841127{4}[source]
> I don't think a valid buyer of macOS computers is the type that doesn't use iCloud and needs to block it.

"a valid buyer"?

> Might as well use another OS.

Ah yes, the many different wonderful options for desktop OS...

> I don't believe an OS maker should cater to such a niche demographic

The Mac itself is a "niche" demographic and always has been.

330. dylan604 ◴[] No.24841129{5}[source]
I never had mine crash, but if I charge on the left hand side, the temp of the laptop increases to the point of needing the fan. Charging on the right hand side does not cause this problem. I had never paid attention to what side I was charging on until earlier this year when someone posted about it. After trying the right hand ports, I could see a difference.
331. novok ◴[] No.24841142[source]
Eventually I don't think little snitch will even have apis to access stuff like that in the kernel as a kext as macos updates continue on.
replies(1): >>24841283 #
332. fennecfoxen ◴[] No.24841144{5}[source]
Docks on the left side, or similar devices which provide both power and send data, seem to be particularly problematic. On advice of my employer's IT department I went from "spinning up new VMs in VirtualBox reliably leads to thermal excess, CPU throttling, and total system shutdown" to a system that actually works -- just by moving the dock connection to the right side.

It's a little funny because the advice used to be you should use the left-side USB-C ports first because they were faster (both for data and charge, IIRC?)

replies(2): >>24841458 #>>24841512 #
333. ryukafalz ◴[] No.24841154{6}[source]
> Same experience. I tried, but Linux just isn’t ready to be used as a general OS right now.

Highly, highly subjective. I use Linux as my main OS and have for many years.

replies(1): >>24841488 #
334. ◴[] No.24841165{4}[source]
335. novok ◴[] No.24841180{4}[source]
He is referring to the fact that apps will start ignoring local network DNS config and directly talk to their own hard coded DNS IPs.

I'm guessing the solution to that is to firewall various DNS IPs to force the app to use your local DNS. I could forsee apps going to random IPs for DNS and making it look like https, which will be hard to deal with.

replies(1): >>24841532 #
336. rorykoehler ◴[] No.24841181{7}[source]
In Berlin everything is pretty much open (loosely enforced indoor mask and social distancing mandates). They’re not trying to eliminate the virus here like they do in Singapore or Australia. They track 3 values and depending on the scores they escalate or ease restrictions.
337. stallmanite ◴[] No.24841192{6}[source]
Dumb question: How does this differ from setting the view in the file selector to thumbnails?
replies(1): >>24841246 #
338. sneak ◴[] No.24841195[source]
This is upsetting. I currently use macOS with iCloud, FaceTime, iMessage, and App Store all disabled, and use Little Snitch to prevent the machine from communicating with Apple except for on update days, and then limited only to those specific update processes.

It’s possible that this will mean that the next macOS version will be unsuitable on privacy grounds, as I will then have to use a second physical device to prevent such network access. :(

339. latexr ◴[] No.24841204[source]
The tweeter is Patrick Wardle, security researcher and creator of Objective-See[1] which publishes several macOS security apps, including the LuLu firewall. Given Patrick’s track record, it’s generally safe to assume due diligence was given to the claim and that lack of understanding about configuration doesn’t apply.

As to your specific case, the tweet does mention “many of” Apple’s apps are affected (i.e. not all, not even necessarily the majority).

[1]: https://objective-see.com/

340. sneak ◴[] No.24841207[source]
All of these companies are equally subject to the spying mandates of the US military intelligence community, an organization that no one should trust due to many decades of history operating entirely outside of the law.

Trust Apple, fine. But don’t trust the CIA, which gets access to the whole of Apple’s data, taken by threat of force under spying programs.

341. wtf_srsly ◴[] No.24841215{8}[source]
> Apple seems to do all kinds of weird networking _stuff_. For instance, during wakeup, your T2 equipped Macbook will wait for a DNS response and then use said DNS response to synchronize time via NTP before letting the user use the keyboard. Probably checking timestamps on signatures for the keyboard firmware, or something stupid like that. This only happens if it happens to have a default route.

I had the same thing happening to me but Apple changed the complete keyboard under their extended keyboard warranty programm (even though it was out of Apple Care already).

342. wtf_srsly ◴[] No.24841241{9}[source]
48 hours is pretty optimistic. At least for the 2016 model they can't just change the keycaps but they'll have to change the whole bottom case. This took a few weeks for me since I had to send it to a certified repair center.
replies(1): >>24849542 #
343. dylan604 ◴[] No.24841246{7}[source]
Thumbnails might work for a folder of images. However, QuickLook will also allow you to preview a video, Word Doc, PDF, spreadsheet, and text files including source code. It's honestly my favorite feature of the OS.

Trying to attach a file to an email, but not sure it's the right one? QuickLook allows you to view the document in the Open dialog. Once you use it, it is something you will just accept as natural and only notice it not being available on other OSes.

replies(1): >>24845437 #
344. LeoNatan25 ◴[] No.24841277[source]
Confirmed. Someone also found the strings in the network stack, which are tested against the app's bundle identifier to provide these wholes. It's ridiculous.
replies(1): >>24854747 #
345. Wowfunhappy ◴[] No.24841283{3}[source]
Kexts are used by Apple internally, so I'd be shocked if they were removed from the OS completely. Third party kexts may be deprecated, but as long as SIP can be disabled it will always be possible to load your own.
replies(2): >>24843118 #>>24845946 #
346. GekkePrutser ◴[] No.24841288{4}[source]
Yeah if you want to wipe a laptop, make sure you unlink your user account first. It's Apple's theft protection, same as with their phones. It'll want to see a successful login with the Apple ID.
replies(1): >>24844938 #
347. LeoNatan25 ◴[] No.24841305{5}[source]
The small user-base. It's a feedback loop; people don't use Linux because a lot of software isn't there, and developers don't port the software to Linux because people don't use Linux.
348. rantwasp ◴[] No.24841312{5}[source]
let me rephrase that for you: some things actually worked when it was initially released :(
349. goatinaboat ◴[] No.24841319{7}[source]
Thanks for clarifying that!
350. GekkePrutser ◴[] No.24841322{8}[source]
So they introduce a major usability breaker (consider opening up your macbook on a plane with no internet access) to prevent a really obscure security issue that requires an attacker to replace the entire system's top case without you noticing. Nice.

At least give the user the ability to turn that off.

351. simonklitj ◴[] No.24841328{7}[source]
Have found success with pressing hard on stuck keys to unstick them.
352. winter_blue ◴[] No.24841372[source]
Another reason why I'm going to stick with Linux for the foreseeable future.

I just wish the font rendering situation on Linux was better though. Text (in browsers) just looks so bad on Linux compared to both Windows and mac.

replies(1): >>24842161 #
353. GekkePrutser ◴[] No.24841381{3}[source]
Won't Launchd simply start them all up again? It'll be simpler to disable the launchDaemons :P

And really, put a sleep in there of at least a second or so or this'll be a huge resource hog.

replies(1): >>24848675 #
354. sdoering ◴[] No.24841387{4}[source]
I am at MB Pro #3 in as many years. We replace around 2 percent of or colleagues' machines per week. Some because of the keyboard (they go into repair and are rotated back) some because they stop working from one moment to the next (also into repair, but only once, after that if it happens again they're scrapped). All three of my MB Pro devices were in repair once because they stopped working costing me one additional day of setup of a temp device. And also one day for setting them up again after they came back. When they died for good another day for a temp replacement until the newly ordered one arrived and it was another day of setup. So I am currently quite well versed in setting up a MB Pro and have it scripted as far as I can thanks to homebrew and the like.

But replacing 2.5k every year with additional repairs in the 700 Euro range isn't viable.

Sadly we are primarily a Mac shop and I have to say that Keynote is by far the best piece of presentation software I know of. But none the less. The hardware is currently unacceptable imho.

355. rsync ◴[] No.24841388{3}[source]
Here is what I did ...

First, I created my own recursive resolver in the cloud using 'unbound'. You can do this quickly and easily with an EC2 instance or whatever (mine is a FreeBSD jail on my own server).

Second, I got a paid nextdns.io account and enabled the basic blocklists which are, essentially, the same as ublock origin would have locally.

Third, I set my recursive resolver to use the nextdns.io endpoint as its upstream source of DNS.

Finally, I set all of my networks to assign my personal DNS server (and no others) for all DHCP requests and I hardcoded it into my own machines.

So now I control my own dns, globally, and my upstream source of name resolution is "sanitized". Theoretically, I could just remove ublock origin from my browsers now ...

Then I

replies(1): >>24841634 #
356. derrick_jensen ◴[] No.24841398{4}[source]
One of the value props was the inability to reset and resell if it were lost or stolen. Now that it’s cracked there is more of an incentive to not try and find the owner.

As for actual data security you are probably right

replies(2): >>24841580 #>>24843893 #
357. acdha ◴[] No.24841399{4}[source]
That very much depends on what distribution you use. The Fedora/CentOS/RHEL world has had SELinux enabled by default for years. The Debian world has not but AppArmor is pretty popular there and while that's a fairly different system it hits many of the same sandboxing points. Beyond the default configuration, anyone who is following a hardening standard like CIS is going to have SELinux enabled, too.
358. GekkePrutser ◴[] No.24841406[source]
Who cares about the world.. I just want full access to the system I paid for. This should always remain an option.
replies(1): >>24844925 #
359. ◴[] No.24841417{7}[source]
360. GekkePrutser ◴[] No.24841429{8}[source]
Also, they lock the user in to the corporation's choices. Most of these don't even have a way to bypass them for knowledgeable users.
361. millstone ◴[] No.24841455{3}[source]
Consistent UI compounds. If every app picked its own keyboard shortcuts and "duked it out", we would lose the thing that makes keyboard shortcuts useful.
362. sdoering ◴[] No.24841458{6}[source]
What? I have to test this. I have my 4k monitor also providing power. Being a lefty I always plug it into the left side. Need to test this. Thanks for the information.
363. GekkePrutser ◴[] No.24841476[source]
Yes it does. All in line with "Computing as a service" rather than "Computing as a product". We're now a guest inside our computers rather than the owner.
364. freedomben ◴[] No.24841488{7}[source]
Agreed. I've used Linux full time on the desktop, laptop, and on the server for over 10 years now and I have a better experience there than mac (which I had to use on my work machine for 6 months due to employer only allowing macs).

Of course everything is not perfect, but that wasn't true in mac either. I had to hack and shim so many things to get my system to behave the way I wanted to. There were also horrible bugs like where plugging in an external (Apple branded) monitor would cause the laptop screen to go black forever until I held down the power button.

365. userbinator ◴[] No.24841492{8}[source]
If I was an attacker I would simply hook into the key matrix. The extra obfuscation in firmware is just user-hostile and stupid.
366. dylan604 ◴[] No.24841512{6}[source]
On one of the older MacBookPros, the left hand USB port was USB3 while the one on the right hand side was USB2
replies(1): >>24843845 #
367. userbinator ◴[] No.24841526{4}[source]
MS docs were great, but after they took down MSDN and let the "community" maintain them on Github, it's been going downhill.
368. toast0 ◴[] No.24841532{5}[source]
> I could forsee apps going to random IPs for DNS and making it look like https, which will be hard to deal with.

DoH isn't really going to look like https, the requests and responses are going to be too small.

If you're serious about it, you don't allow any random IP connections, only allow connections to IPs that were received by DNS, and only return proxy addresses that you NAT to the real thing. It's more work, but it's still trivial.

replies(1): >>24841703 #
369. ineedasername ◴[] No.24841534{5}[source]
No, the fact that Linux is not currently a practical option for most users isn't proof that it can't be or never will be.

I am saying the lack of desktop adoption is indicative of the difficulties of doing so. There is a level-of-effort barrier and technical-knowledge barrier to it. 20 years of progress have lowered those barriers a lot, but even if something like Ubuntu will often be fully functional with a standard install, most users never have to install an OS. They can't walk into Best Buy and come out with a computer that runs desktop Linux.

I think the success of Chrome Books show that people would be receptive to alternative operating systems, but we don't have a retail or post-purchase support environment in place to facilitate it, and I don't see that coming on the horizon.

370. dylan604 ◴[] No.24841572{9}[source]
I just followed your link, and had an interesting experience. Of all of the Apple Stores and Authorized Repair they do not appear to be accepting repairs. Everyone of them tell me: "This location has no available reservations. You can check another location now, or check this location again tomorrow."

Can't even get far enough to see if the repair would be covered. Good job Apple

371. Siira ◴[] No.24841580{5}[source]
Is the crack in hardware or software? Any links on it? I thought the iPhones at least could not be reset by thieves?
replies(3): >>24842622 #>>24842687 #>>24844928 #
372. userbinator ◴[] No.24841585[source]
Apple's authoritarian control-freak mentality has been around since the original Macintosh of the 80s. It was only a coincidence that moving to x86 opened up some freedom. Now it's just moving in the same direction Apple always was.
replies(1): >>24842404 #
373. xondono ◴[] No.24841605{3}[source]
Not necessarily, you might trust the intangibles that are part of the company, like how do they do business or what kind of internal policies they have in place.

Think how (knowledgeable) people “trust in science”, they don’t trust the humans, they trust the method.

374. e28eta ◴[] No.24841611{3}[source]
I think this is probably wrong. I don’t know what the interface is, but on my iPad running 14.0.1 this app shows a Routing Table that looks okay to me. https://networktools.he.net/
375. Wowfunhappy ◴[] No.24841622{3}[source]
Require the user to authenticate, then provide full control? Yes this provides a vulnerability pathway, but it's not like Apple software updates don't already provide this type of access.
376. ignoramous ◴[] No.24841634{4}[source]
> Third, I set my recursive resolver to use the nextdns.io endpoint as its upstream source of DNS.

Doesn't that relegate your recursive resolver to a stub?

You could run pi-hole on fly.io for free if DoT/DoH is all you need: https://fly.io/blog/stuff-your-pi-hole-from-anywhere/

I run a public DoH resolver with 170+ blocklists on Cloudflare Workers. Might open source it soon.

replies(1): >>24842239 #
377. nicoffeine ◴[] No.24841660{6}[source]
I'd be interested in the features that you were missing as well.

I just bought parts for a desktop that's literally 4x cheaper than a similarly specced Mac Pro with the usual caveats (Ryzen instead of Xeon, non ECC, etc.) It will have to be pretty rough for me to consider investing anything beyond a Mac Mini so I can have access to Xcode once my MBP dies.

replies(1): >>24845340 #
378. a1369209993 ◴[] No.24841663{7}[source]
Buy preinstalled from where, exactly?

(And no, chromebooks are not linux for any practical purpose, although they probably would be easier to install a real linux system on.)

replies(1): >>24841711 #
379. udev ◴[] No.24841670[source]
That's how typical Apple "magical/just works" features are implemented, i.e. very ugly behind the curtain.

Documenting means revealing the edge cases and the limitations, which engineering knows is the best kind of documentation. But marketing people are invested in the "magic".

Marketing people have too much sway at Apple.

380. bredren ◴[] No.24841676{3}[source]
Think of companies more like nation states than people and it will make more sense.

The organization is still molded heavily by those in power, but it is what the organization “stands for” that you must put your trust in.

For example, the United States is a republic and stands for “freedom and justice for all.”

As we have seen, different people in leadership will interpret these foundational ideas differently and will take actions accordingly.

It’s worth asking again what Apple stands for.

The company has made privacy and thus security core values. However, above that is a goal to make _the best_ products of any company, which as Jobs put it is a matter of “taste.”

So the sentiment of feeling as though Apple’s networking software and developer api choices deviate from your taste has to be measured against one’s support of these other values, and whether one believes Apple’s leadership succession will be measured and protected from weakness.

replies(1): >>24842227 #
381. brimstedt ◴[] No.24841679{6}[source]
I have been using windows, apple and Linux (KDE) on a daily basis and handle all os' quite well.

KDE is by far my preference and in general I don't think neither windows nor macos has fewer problems despite the price tag.

After hearing the "it just works" mantra of apple users for many years I was surprised to find I had at least as many glitches on the Mac as I did on KDE (win 7 was better, 10 has more problems ime).

(I use my computers for development and sysadmin, not gaming or art)

382. ignoramous ◴[] No.24841703{6}[source]
> ...only allow connections to IPs that were received by DNS

Works for a home / office setup. I think the main use of DoH is circumventing government enforced censorships, to an extent that it can.

For ISPs to use "packet sizes" they'd need to run stateful firewalls at scale, which is unheard of, and possibly very expensive to run at that scale.

383. fsflover ◴[] No.24841711{8}[source]
https://system76.com

https://puri.sm

https://www.debian.org/distrib/pre-installed

and many more.

384. Wowfunhappy ◴[] No.24841733[source]
If you're on a laptop, you won't necessarily always be able to filter on the router level.
replies(1): >>24841915 #
385. mlindner ◴[] No.24841760{6}[source]
There has always been a tradeoff between security and freedom.
386. threatofrain ◴[] No.24841770[source]
Big entities probably make up 99% of the firewall market today, and for those who currently want firewalls, it makes far more sense to have independent hardware.

The use case for an end user managing their firewall experience with a 3rd-party software-based firewall AND who also wish to monitor Apple traffic is very niche.

For the overwhelming portion of the population, I would be more worried about the MacOS security model. Someone's iPad or iPhone experience can only be screwed up so much and can be reset without losing data. For MacOS the stakes are a lot higher, and users are trained to enter credentials for annoying-to-audit vague permissions.

In my view, MacOS is the biggest security hole in Apple's ecosystem. Doesn't this make you wonder how Apple will handle the health app on MacOS?

replies(1): >>24842198 #
387. ineedasername ◴[] No.24841776{5}[source]
The key thing there is that you installed the OS. You're saying there's little difficulty in using the OS, but that isn't what I mean when I say it's not a practical option. The core problem is that the average person doesn't know how and wouldn't be comfortable taking that step, even if it's pretty easy once you know how. You have also made yourself their support person. They can't bring their computer to Best Buy or call Apple if they have a problem. We don't have the retail & support infrastructure in place for desktop Linux to be a viable option. These are the things I'm talking about when I say it's not a practical option for a typical user.
replies(1): >>24842086 #
388. mlindner ◴[] No.24841801{7}[source]
ANY firewall inherently trusts the OS of the device it's running. They have to in order to function. The firewall sits on top of the OS, not underneath it. Even on Linux if you're running ipfw, the traffic first goes through the OS and then to your firewall.
replies(2): >>24842170 #>>24845430 #
389. ineedasername ◴[] No.24841827{5}[source]
The barrier isn't usability or functionality for most use cases. The barrier is getting it on the computer and supporting it. We don't have the retail & support infrastructure in place for it to be a practical option. If a non-technical person has Linux on their computer, it's probably because some technical relative put it there, and has made themselves the support person for it as well. You can't walk into a Best Buy and walk out with an Ubuntu laptop. The is an effort & technical knowledge barrier to it, and that's what I mean when I say it's not currently a practical option for a typical user.
390. ineedasername ◴[] No.24841847{5}[source]
Then you have provided a solution that is not generalizable. Which is fine, but not particularly useful to this conversation.
replies(1): >>24842109 #
391. dhaavi ◴[] No.24841849[source]
There is another - and I'd argue better - alternative for Linux and Windows:

Portmaster by Safing https://safing.io/portmaster/

Not only is it an application firewall, but also gives you DNS filtering (ie. Pi-Hole basics) and DNS-over-TLS.

Full Disclosure: I'm one of the founders.

replies(1): >>24845343 #
392. mlindner ◴[] No.24841851{5}[source]
Yes it was with specific models, but it's got nothing to do with the T2 chip. https://apple.stackexchange.com/questions/363337/how-to-find...
393. jedberg ◴[] No.24841915{3}[source]
Of course not, which is why this still isn't very cool. If you're super paranoid you can always carry around a small router or a pi to attach to the wifi and be your external router though.
replies(1): >>24844238 #
394. dvfjsdhgfv ◴[] No.24841918[source]
Microsoft is doing the same as Apple, just because they can.
395. bittercynic ◴[] No.24841923{5}[source]
Is it really a goal of most FOSS projects to attract the mainstream? IME some of the highest-quality and longest lived projects know who their users are and provide an extremely high quality product.

I don't want to see Arch Linux, for example, to start prioritizing for attracting non-technical users who want it to "just work."

replies(1): >>24842740 #
396. dhaavi ◴[] No.24841939{5}[source]
We are working on an alternative for both Linux and Windows: https://safing.io/portmaster/

Not only is it an application firewall, but also gives you DNS filtering (ie. Pi-Hole basics) and DNS-over-TLS.

Not sure what you mean with "the speed of it's UI ..." though.

397. comboy ◴[] No.24841973{3}[source]
The decision is questionable, but you can always inspect traffic from the machine outside it, I would even say that's preferable in context of malware.
replies(2): >>24842095 #>>24843750 #
398. flower-giraffe ◴[] No.24841984[source]
> I trust Apple, but I don't like trusting trust.

Trust relies on faith or evidence, the overwhelming circumstantial evidence is that Apple can not be trusted with anything other than their commercial interests.

You can not trust Apple with anything else, therefore you must have faith.

399. likeclockwork ◴[] No.24842000{8}[source]
What happens if you have networking turned off or your WiFi isn't configured for the local network?
replies(1): >>24843409 #
400. kitsunesoba ◴[] No.24842003{6}[source]
I have, in fact I had it installed directly on one of my towers a few months ago to make sure that no weird VM shenanigans were futzing things up.

It was one of the smoother GNOME distros, and its installer was far more competent than Ubuntu's (mainly, it didn't screw with the boot partitions of every drive in the system like Ubuntu's installer did). Ultimately though, GNOME itself is flawed in its approach to a few things.

401. dhaavi ◴[] No.24842023{3}[source]
> I'd be interested to read more about this

Yeah, me too!

402. flower-giraffe ◴[] No.24842029{4}[source]
> If you don't trust them, then you shouldn't trust anything running on top of it either...

You start with trust, if you attempt to verify that trust by examining behaviour and discover a covert side channel surely you can no longer trust.

403. mcyukon ◴[] No.24842045{4}[source]
I'm in the same boat, just more from a Photography standpoint. Oldest Mac I own is a 2012 MBP and I really do not see any appeal in any of the newer machines. I built myself fairly high end Mini ITX Windows machine for a fraction of what a comparable Mac would cost. Only downside is having a somewhat bigger PC on my desk.

For video editing I was very surprised at how quickly I picked up / understood the Free version of Davinci Resolve after looking for a Final Cut replacement for my gaming PC.

replies(1): >>24843445 #
404. 1MachineElf ◴[] No.24842067[source]
Is pf still included in macOS? I wonder if it blocks it. Last time I played with it was the Snow Leopard days: https://opensource.apple.com/source/xnu/xnu-1456.1.26/bsd/ne...
405. fsflover ◴[] No.24842086{6}[source]
https://news.ycombinator.com/item?id=24840166
replies(1): >>24842542 #
406. kbenson ◴[] No.24842089{4}[source]
It's not about trust that they aren't doing something malicious, it's about trusting them to provide the level of attention and work required to keep something very secure.

A kernel and the core OS capabilities are a high security domain and I expect Apple to be extremely careful and put a lot of attention into making it secure. Desktop applications are a different domain where security is not quite at the same level and Apple will not and can not provide the same level of security for all of them that it can and does provide for the base OS.

As a simple example, compare Safari and the OS. The domains in which they operate make it extremely hard, if not impossible, for Safari to have the same level of security as the OS and kernel because the use case of Safari opens it to far more attack vectors.

Does anyone believe that exempting all Safari traffic from firewalls would be a good idea? If not, then why should we accept that it's a good idea for some arbitrarily set of other Apple applications?

The issue here is simple, it's the same as it always is with Apple. There's a choice to do the thing that's slightly more complex and requires users to provide even a minimal amount of input that they might have to think about ("An application is attempting to change the traffic flow required by X service, if you allow this it may cause problems with this service. Yes/No?"), but instead they opt for "Users must trust us implicitly and entirely in everything we do", which is their go-to solution. It all comes back to control, does Apple control the user, or the the user control their software? Apple has built their empire around the former, so while we can't expect the latter without if being forced on them, that doesn't mean we shouldn't.

407. gowld ◴[] No.24842095{4}[source]
Can you recommend a portable wifi firewall? Based on Raspberry Pi, perhaps?
replies(1): >>24842279 #
408. ◴[] No.24842097{6}[source]
409. tpxl ◴[] No.24842102{8}[source]
>hiding URLs does protect users from phishing

Real question: how? I would expect it to be the opposite, a perfect phishing site will have the wrong URL.

replies(2): >>24842215 #>>24842238 #
410. nix23 ◴[] No.24842109{6}[source]
Use Linux or any other free OS, personal preferences are normaly not generalizable.
411. themacguffinman ◴[] No.24842112{5}[source]
The reasons that game developers give should be instructive:

- "Linux" is not a unified desktop environment, there are many different configurations and supporting such variety is difficult. The Linux desktop landscape also changes more frequently than most (eg. Pipewire & Pulseaudio, Xorg & Wayland, Snap & Flatpak & AppImage & native distro package managers) which requires more development resources to keep up with.

- But suppose you try to cut costs by supporting only one blessed Linux configuration and constrain your Linux development budget. You still have another cost that you can't avoid: customer support, which is very expensive. It's especially expensive when you get a lot of Linux users who don't know or care that you technically only support one blessed Linux configuration, they'll have some wacko configuration and they'll take the time to complain to your customer support agents about it. Your constrained Linux development budget will only exacerbate your customer support costs as more users run into Linux bugs more often.

- Which isn't worth it because you know that Linux has a small user base. The actual sales bump you get from Linux support isn't worth the cost of maintaining it.

Frankly, I don't think Linux will ever solve the problem of a small user base. No one working on Linux cares enough about the normal-person-UX of its desktop to make it good enough for a majority of people to use, and many current Linux users even oppose measures that would trade off the power & flexibility that they enjoy now for normal-person-UX. This isn't going to change because Linux is largely a volunteer-led project.

412. kbenson ◴[] No.24842154{4}[source]
You're overloading "trust". I think most people trust Apple not to be malicious, but that doesn't mean they trust apple to omniscient and perfect.

A back-channel that you can't inspect but Apple can use is a back-channel that you can't inspect but malicious actors have found a way to use waiting to happen. Preventing you from seeing that traffic doesn't protect you, only protects Apple at your expense, since you have no way of detecting whether something fishy is going on.

413. Phlogi ◴[] No.24842161{3}[source]
No, it's fine, just needs a bit of tweaking: https://aswinmohan.me/posts/better-fonts-on-linux/
replies(1): >>24845308 #
414. Wowfunhappy ◴[] No.24842170{8}[source]
Yes, but as a user, I expect the OS to behave in a transparent manner. If the OS provides a firewall API, I expect it to send all traffic through firewalls that use that API, not selectively redirect traffic from certain apps or domains.
415. mschuster91 ◴[] No.24842173{4}[source]
So I'm not the only one?! Holy I thought I was going crazy, dropping out of the VPN meant a ten second freeze until a couple of weeks ago. Do you have any additional sources?
416. ardy42 ◴[] No.24842196{6}[source]
> My understanding is the concern would be that closed source applications would use a hardcoded DoH resolver and pinned certs to bypass any unwanted blocks of ads/telemetry which could only be resolved with decompilation and patching with varying degrees of difficulty.

IIRC, the vision with DoH is that eventually even browsers would do DNS as part of a bunch of pipelined HTTP requests. So you call up https://www.example.com/page.html and www.example.com resolves img.example.com for you since it's used on the page. The downside is www.example.com could also resolve tracker.adnetwork.com for you, too.

IIRC, DoH is there to defeat MITM attacks, but stuff like Pi-Hole is basically a MITM attack, so it's kinda collateral damage.

I bet network-level ad-blocking will eventually have to evolve into literal firewall rules on the gateway.

417. pier25 ◴[] No.24842198{3}[source]
> In my view, MacOS is the biggest security hole in Apple's ecosystem.

Is it? Can you elaborate?

replies(1): >>24842407 #
418. Spivak ◴[] No.24842215{9}[source]
Because it's not really "hiding the URL" despite what all the outrage bloggers tried to make it seem. It's by default (i.e. until you tap/click it) hiding the parts of the URL that the site controls. So paypal.amazon.citibank.scamsite.biz/secure/login/trustus will just show scamsite.biz.
replies(4): >>24843638 #>>24843674 #>>24843710 #>>24849799 #
419. ◴[] No.24842227{4}[source]
420. greycol ◴[] No.24842238{9}[source]
google.com.evilwebsite.example?=google.com

Oh that has google in it (twice even) we can go there.

There's also arguments that URLs are too complex for normal people to understand.

I agree with you though, hiding or redirecting URLs is the opposite of protecting users from phishing.

replies(1): >>24843762 #
421. dhaavi ◴[] No.24842239{5}[source]
Nice. Do you have any more info on that resolver of yours?
replies(2): >>24845026 #>>24847283 #
422. centimeter ◴[] No.24842254[source]
> your T2 equipped Macbook will wait for a DNS response and then use said DNS response to synchronize time via NTP before letting the user use the keyboard.

Holy shit, this is why my macbook sometimes won't let me log in for like 15 seconds on my shitty cellular hotspot connection? Absurd. Apple software has fallen so far from just 10 years ago.

replies(1): >>24843724 #
423. yayr ◴[] No.24842279{5}[source]
saw the GL.iNet+GL-MT300N-V2 recently - have not bought it yet, maybe it's time if it's good
replies(2): >>24843036 #>>24844282 #
424. Wowfunhappy ◴[] No.24842315{5}[source]
And also, you might be uncomfortable if Mike blacked out all the windows.
replies(1): >>24842668 #
425. Wowfunhappy ◴[] No.24842404{3}[source]
I'm not entirely sure what's leading you to this conclusion. The original Macintosh had no privileges system and let apps write to random bits of memory. It was quite problematic for multitasking, in fact.
replies(1): >>24843566 #
426. ◴[] No.24842407{4}[source]
427. codezero ◴[] No.24842446[source]
The keyboard thing is new to me, wow that sucks. The other one sounds like a workaround for captive portals. I think there is some documentation on that wrt Safari and the built in networking, but it was mostly a workaround needed to deal with wifi hotspots that intercept dns until you pay/subscribe, and it causes safari to look hung - so they had to make it clear it wasn’t their browser hanging since it couldn’t make SSL connections.
replies(1): >>24843072 #
428. Fnoord ◴[] No.24842452{5}[source]
There's OpenSnitch [1].

[1] https://github.com/gustavo-iniguez-goya/opensnitch

429. Wowfunhappy ◴[] No.24842457[source]
This is one of the key purposes of the Apple Store. The Genius Bar would help you test on a clean account or do a full wipe — although, Little Snitch is well-known enough that I'd expect an Apple Store employee to recognize it pretty quickly.

I suppose it's theoretically possible they're trying to drive down support costs. But, geez, that would make me much more scared about the direction Apple is taking than anything else.

Really though, Little Snitch is quite explicit about what it does. It's also $40, and it's marketed to a pretty technical audience.

430. addicted ◴[] No.24842479{6}[source]
Bottom line is that Apple made software like Little Snitch switch away from kexts and then built in behavior that was unexpected, which would not have been possible for them to do while Little Snitch was based on kexts.

Whether this is malicious, not malicious, secure, insecure etc. is irrelevant to whether this is an untrustworthy action. It’s not what one would reasonably expect and is therefore a betrayal of users’ trust.

If Apple switched gatekeeper on MacOS to completely remove the option and the workarounds to run unsigned apps, it would certainly be more secure. It would also be a huge betrayal of users’ trust in Apple and the MacOS platform.

replies(1): >>24844110 #
431. Sporktacular ◴[] No.24842512{3}[source]
5 years ago I found LS was unable detect any traffic out of a VMWare virtual machine running on the same Mac. Sure the VM is running through some installed virtual network adapter, but if that's all it takes an attacker can set up one of her own. Cool Hollywood interface but I gave up on LS as a serious security tool right there.
replies(2): >>24842587 #>>24842811 #
432. Sporktacular ◴[] No.24842540{4}[source]
Trust but verify. Now we must do the former without being able to do the latter.
replies(1): >>24842595 #
433. ineedasername ◴[] No.24842542{7}[source]
None of those options are viable for mass market adoption right now. They are niche operations that are practically invisible to anyone outside of the industry. I didn't say you can't buy Linux pre-installed, I said you can't go into a big-box store like Best Buy to do so, and that there's no significant consumer support infrastructure.

There's also the strong possibility that at least some of these places won't exist anymore at some time over the lifetime of the computer. Purism is only a few years old, with ~ $1million in revenue/year. It uses its own flavor of Linux, meaning support options are extremely limited. System76's website is itself half-broken, with 500 errors when I attempt to customize a system.

You cannot point to niche operations and claim it to be a viable mass-market option. I'm not saying it isn't possible to get there, I'm saying it doesn't exist today, which means it is not an option for mass-market consumers. If tomorrow a million Apple users said "Enough! LittleSnitch is the straw that breaks the camel's back!" and decided they wanted to shop for a desktop linux system, the market couldn't handle it.

Remember, I'm not saying Linux can't be successful on the desktop, I'm saying that it is not a mass-market option right now for users frustrated with Windows/OS X.

replies(1): >>24845625 #
434. Dylan16807 ◴[] No.24842553{5}[source]
> Basically what it boils down to is that people don't actually care. Even the vocal people who say they care don't care because they won't open their wallets or change their buying habits. If you won't actually do anything about something, you don't care. Whining on the Internet is not doing something.

People aren't buying features off a list. In a situation like this a missing feature has to be so important that it completely disqualifies the product, which is a very different thing from a willingness to open the wallet.

It's similar to how you can get a kindle with or without lock screen ads. If the only option was with ads, you'd see more people buying that version because it becomes artificially hard for them to say "I don't want ads". Even though they're willing to pay for the feature.

And for convenience vs. control, well, this firewall bypass doesn't help convenience.

435. _qulr ◴[] No.24842587{4}[source]
I can't speak about 5 years ago, but I was using Little Snitch with VMWare last year, and it worked. I had to specifically allow the VMWare process.
replies(1): >>24842900 #
436. Ensorceled ◴[] No.24842589[source]
Yeah, I tethered my MBP on the train and it used my entire 4GB data plan in about 15 minutes downloading an OS update.

Glad to know stopping shit like that is no longer an option.

437. DiederikvandenB ◴[] No.24842595{5}[source]
You can very easily monitor all outgoing traffic through an external device.
replies(2): >>24842680 #>>24906738 #
438. heavyset_go ◴[] No.24842599{6}[source]
As is usual, this is something Stallman had touched upon years ago[1].

[1] https://www.gnu.org/philosophy/can-you-trust.en.html

replies(1): >>24843891 #
439. kevincox ◴[] No.24842603{5}[source]
> Both suffer from a laundry list of minor annoyances that snowball into something that's hard to ignore

This sounds just like your familiarity. I could have used the exact same sentence to describe how I feel using macOS for work after being used to Linux (GNOME) for 8 years.

When you use something for a while you learn to avoid all the bugs and the UX starts to feel natural. Any switch will end up in you running into new bugs and finding the UX odd, no matter if it is to or from macOS, Windows, GNOME, KDE or otherwise.

I would say that I run into 10x more bugs on macOS than GNOME. But that probably isn't because there are 10x more bugs. There is likely a comparable number on GNOME but I have learned to subconsciously avoid most of them.

440. munificent ◴[] No.24842605{5}[source]
> free alternative

Only "free" in terms of literal monetary payments to acquire the operating system. But the choice between Apple's stack and other Linux stacks has many trade-offs in terms of time, support, documentation, complexity, transition cost, etc.

replies(1): >>24842682 #
441. jeroenhd ◴[] No.24842622{6}[source]
A demo of the T2 hardware exploit on iMacs can be found here: https://blog.t8012.dev/plug-n-pwn/

From what I could find, the encryption keys of the T2 are still secure but the OS running on it is not. Wiping the SSD and/or repairing another might be enough to resell the device without any locks but I'm not 100% sure about that.

442. Dylan16807 ◴[] No.24842626{3}[source]
> Apple went all in on the security of this T2 chip so that you cannot replace the SSD

That's not a security thing, really. It's easy enough to layer encryption on a normal SSD. It's their desire to make it some kind of do-everything auxiliary chip, which has the end result of weakening security.

443. addicted ◴[] No.24842628{4}[source]
I appreciate the response. I suspect you’re missing the many ways in which this change can negatively impact valid and fairly frequent advanced usages of macs, in a way similar to the BIOS change you mentioned.

When I was in college, Little Snitch was an absolute must for using Macs in our networking labs, because it was the best way to analyze and control our network. Without it the mac was not a feasible option.

This change by Apple would have essentially eliminated the macs use in several of these experiments, and I suspect that’s true today as well.

Further, this has a regular advanced user impact as well, for users on metered networks who would like to control their data usage.

444. ohmaigad ◴[] No.24842647{6}[source]
I also have 2019 MBP16 and i am using a dock/charging on the left side - i think the system froze once in a year so i don't seem to have this issue.
replies(1): >>24846251 #
445. Dylan16807 ◴[] No.24842664{8}[source]
> Further, to avoid replay attacks it must include the current time in the message it signs.

Use a counter...?

replies(1): >>24843413 #
446. ◴[] No.24842668{6}[source]
447. Wowfunhappy ◴[] No.24842680{6}[source]
You can’t filter per-app, however, which is a key selling point of Little Snitch.
448. zepto ◴[] No.24842682{6}[source]
Agreed, but that’s not because of an ‘oligopoly’ constraining supply.

The only thing stopping those trade-offs being changed is people’s willingness to make the changes.

Based on a lot of criticism of MacOS I see here, some of that is because people don’t actually want to change the trade offs.

449. lioeters ◴[] No.24842687{6}[source]
> The mini operating system on the T2 (SepOS) suffers from a security vulnerable also found in the iPhone 7 since it contains a processor based on the iOS A10.

> ..Using the checkm8 exploit originally made for iPhones, the checkra1n exploit was developed to build a semi-tethered exploit for the T2 security chip, exploiting a flaw. This could be used to e.g. circumvent activation lock, allowing stolen iPhones or macOS devices to be reset and sold on the black market.

> Since sepOS/BootROM is Read-Only Memory for security reasons, interestingly, Apple cannot patch this core vulnerability without a new hardware revision.

Crouching T2, Hidden Danger (2020-10-05) https://ironpeak.be/blog/crouching-t2-hidden-danger/

450. Sporktacular ◴[] No.24842740{6}[source]
Well you should be thankful our predecessors took making things "just work" seriously enough to remove your need to boot using toggle switch sequences.
replies(1): >>24845183 #
451. ◴[] No.24842811{4}[source]
452. hariboapfel ◴[] No.24842812[source]
i think this is a bug. for instance iCloud photos syncing network traffic, (belongig to nsurlsessiond) doesnt show up in the BigSur native Activity Monitor, but for some reason still gets shown in my Stats app.
453. heavyset_go ◴[] No.24842822{4}[source]
Works pretty well on Plasma Desktop. I use it all the time to find files via KRunner.
454. jscipione ◴[] No.24842828{3}[source]
It's ok, the T3-based MacBook Air is due out next month.
455. AnthonyMouse ◴[] No.24842844{7}[source]
> Now put yourself in the Apple's position where "an iOS app" or a "mac App" is about as trusted as a random website.

The mistake is in creating a category called "iOS app" or "mac app" and trying to fit every piece of third party code in the universe into that category.

What there should be is different categories of apps with different levels of trust. Then 95% of apps can go in the totally untrusted category because they don't actually need any special privileges. Which then makes asking for a trusted privilege a red flag rather than something the user clicks through because they see it for every app they install.

> Can you imagine if websites could control your firewall?

Realize that this has already happened. You wanted to block DNS to untrusted servers so everything would have to use your Pi-hole? Say hello to DoH. You could block AOL Instant Messenger by blocking port 5190, good luck doing that with Facebook.

The web made every protocol run over HTTPS to bypass your firewall, even if it has nothing to do with transferring hypertext.

Because that's what happens when you do security wrong. It has to be usable or it gets routed around. People started blocking unknown ports by default, or blocking/mangling protocols both of the endpoints didn't want blocked or mangled, so firewalls got displaced.

You don't actually want that to happen (again). You don't want the only options to be living in a cage or rooting your device with some unaudited 0-day code you got from some Russian hackers. There is value in the existence of the middle ground.

456. heavyset_go ◴[] No.24842893[source]
I've been using network-level ad blocking with software like Pi Hole for a while now.

According to the stats, about a year ago, I used to block around ~40% of traffic via DNS. Recently, it's only about ~10% of traffic that gets blocked.

Despite disabling application-level DoH in favor of network-level DoH on every device and app I could, I suspect streaming devices and various Android apps are using DoH at the application-level and are bypassing my DNS entirely.

457. Sporktacular ◴[] No.24842900{5}[source]
Guest traffic was visible when the VM was in NAT mode, but when switched to Bridged mode traffic went straight through with LS unaware. I suppose LS was only sniffing the standard adapters, though this could have been improved since.
replies(2): >>24843606 #>>24843687 #
458. gowld ◴[] No.24842961[source]
How is this good?

Either Apple doesn't trust Little Snitch and shouldn't let it interfere with any apps, or Apple does trust Little Snitch and shouldn't block it at all. There's no reason to implement this halfway.

459. gowld ◴[] No.24842969{4}[source]
Their software could have bugs, or be compromised.
460. ◴[] No.24842970[source]
461. Terretta ◴[] No.24842979{3}[source]
I had replied to parent as well, but then saw your note. So I deleted, and pasting my agreement here:

> free reign with the bandwidth and all of the little background processes can kill my data in a few minutes

New: TripMode 3, made for macOS 11 Big Sur. Easily control your Mac's data usage on slow or expensive networks.

Drastically optimize your Mac’s data usage by automatically blocking unwanted background updates. Keep control with the new live monitor and data usage reports. Reveal domains where your apps send your data to. Now with a redesigned, easier than ever UI.

https://tripmode.ch

462. rhizome ◴[] No.24843036{6}[source]
Ah, nice. I've been looking for something with which I can sniff my phone's activity, and that provides all of the keywords. And $20 ain't bad neither.
463. gowld ◴[] No.24843040{7}[source]
Before 2019 if you use the factory standard keyboard Apple will just prevent you from using it (butterfly).
464. eptcyka ◴[] No.24843072{3}[source]
Cool, can you reference some docs or any communication from Apple re the captive portal workarounds?

It feels rather heavy handed as there are ways other systems have worked around this that don't hijack routes.

replies(1): >>24848606 #
465. dwaite ◴[] No.24843104{6}[source]
As a general rule, you want to prevent software from bypassing a user's informed consent. Apple typically does this in one of two ways:

1. Have functionality only accessible through system frameworks, so that the OS can be responsible for prompting for informed consent and granting it to a process. This means that the system itself has to have functionality to prompt for that informed consent in a way that users can understand.

2. Require processes which an application cannot script that are technically complicated enough that users might realize they are pulling off the warranty-voiding stickers. A prime example would be rebooting into recovery mode to turn off system integrity protections via a terminal command.

Both of these wind up getting gated in priority, but such is the priority of their system - limiting the ability of arbitrary software to act as an unrestricted agent of the user so that user security and privacy (as well as device operation like battery life and radio reception) can be protected.

replies(2): >>24845331 #>>24848124 #
466. 1vuio0pswjnm7 ◴[] No.24843115[source]
Why doesn't each individual user have the final say over whether she wants to accept the change or not? There is no option presented to the user:

   [ ] Do not trust Apple, trust only me
You say "Some people are smart, informed developers" but in this case, it appears Apple is treating every user as the same.

I am not a "developer" (nor am I particularly "smart") and yet I monitor traffic to/from computers I own. Maybe some incorrect assumptions are being made about so-called "users". I find it perplexing that any company should be able to prevent me from monitoring traffic to/from computers I own. I own the computers, I pay for the bandwidth. I do not buy Apple computers for the Apple software.

467. dwaite ◴[] No.24843118{4}[source]
The networking subsystem that the kernel exposes could be removed however, replaced with one which is neither stable nor publicly documented.
468. abhinav22 ◴[] No.24843232{4}[source]
Great comment - agree 100%
469. Godel_unicode ◴[] No.24843241[source]
If the data is so poorly protected in transit that a firewall app on the system is a concern, something has gone very wrong indeed. It's just going to see that your Apple services on your Apple device are speaking to Apple servers.

There's an availability consideration here, but that's about it.

470. admax88q ◴[] No.24843261[source]
If Microsoft did this in windows, or Google did this in chrome, would we see so much defense of this strategy? Or could it be those rose coloured glasses that HN tends to view Apple through.

Or more like "users are literally brain dead and cannot be trusted to change the channels on their TV" coloured glasses. If you only trust your users to watch TV, then get into TVs instead of computers.

We don't fault the maker of a drill when a careless user drills a hole in their hand. We fault the user for being careless. At what point do we start doing the same for computers? The advantage of physical power-tools is that their mechanism of operation is readily apparent, open, understandable, predictable. If Apple really cares about their users, they should start investing in making software open, understandable, predictable. This is a much harder problem, and probably less profitable, than just building another TV, but I'd rather live in that world than this one. I don't need another TV.

replies(2): >>24844375 #>>24846517 #
471. aftbit ◴[] No.24843262[source]
Chrome exempts Google properties from rules? Unacceptable!

macOS exempts Apple apps from rules? Protecting users!

Seriously, it's my machine. I should have top permissions on it, not Apple. If I chose to run an app that intercepts traffic, I want it to intercept _all_ traffic. What's next, making it impossible to hook a debugger to Apple services? Or did they already do that?

As much as I love Mac & iPhone UX, stuff like this will keep me off them and keep me from recommending them to anyone either.

472. Godel_unicode ◴[] No.24843279{4}[source]
Absolutely not, installing a CA makes attacks which weren't previously possible now possible. A host firewall isn't doing anything a network provider (read: your ISP, coffee shop, vpn provider, etc) couldn't already do. At least you can possibly look at what the host firewall is doing.
replies(2): >>24844333 #>>24845436 #
473. indymike ◴[] No.24843282{4}[source]
KDE's search is very, very fast and at least on the latest KDE, just works.
474. ◴[] No.24843373{5}[source]
475. johnmaguire2013 ◴[] No.24843409{9}[source]
Per the grandparent...

> At the same time, if you were to not be connected to a network, this kind of verification wouldn't do anything.

476. johnmaguire2013 ◴[] No.24843413{9}[source]
I'm not trying to defend Apple here, just explain the mechanism to the parent.
replies(1): >>24843607 #
477. dylan604 ◴[] No.24843445{5}[source]
The one thing the newer machines have are better discrete GPUs. Everything now will use the GPU from web browsing to full on video/photo editing and color correction. Your 2012 GPU might as well be hanging out with Moses its so old in GPU years. The speed difference you'll see in a photo edit standpoint will justify your upgrade. If you are even halfway serious about using Resolve, you cannot put enough GPU power in a box. (I've built Resolve desktop systems with 3 GPUs in a Mac PCIe external chasis. PCs/Linux Resolve systems can have even more GPUs.)
replies(2): >>24844479 #>>24844692 #
478. dumpsterdiver ◴[] No.24843471{7}[source]
> Can you imagine if websites could control your firewall?

Oh, they can. Cross-site scripting and request-forgery attacks aren't dead yet thanks to widespread terrible security practices :)

479. beaunative ◴[] No.24843556{3}[source]
I think this is the case where you can have traffic monitoring set-up on your home router or any other network gateway available. It will be slightly more troublesome, but not impossible.
replies(1): >>24843726 #
480. userbinator ◴[] No.24843566{4}[source]
The original Macintosh had no privileges system and let apps write to random bits of memory

Neither did the PCs of the time, but the difference becomes obvious when you actually try to write an app: PC magazines were filled with BASIC and Asm listings (to be entered with DEBUG), both of which could be immediately used on an IBM PC with DOS, whereas to even start creating --- or for that matter, modifying --- software for the Macintosh was pretty much a non-starter for everyone who didn't want to actually invest plenty of $$$ in it.

Documentation on the system details is barely available (there's Inside Macintosh, but that pales in comparison to the IBM PC Technical Reference series --- the latter including full BIOS source code and schematics, even for the monitor and hard drive), and of course the PC was far more expandable. Apple wanted the whole stack locked down from the beginning.

481. _qulr ◴[] No.24843606{6}[source]
I was only trialing VMWare before, so unfortunately I can't test this anymore.
replies(1): >>24843641 #
482. Dylan16807 ◴[] No.24843607{10}[source]
Oh, okay. You said "must" so I was wondering if there was another important factor.
replies(1): >>24848935 #
483. ◴[] No.24843638{10}[source]
484. Wowfunhappy ◴[] No.24843641{7}[source]
Heads up that VMWare Fusion has a free version on Mac as of this month. :)
485. dumpsterdiver ◴[] No.24843674{10}[source]
My first instinct was to distrust the hide-until-click URL bar also, but you've illustrated clearly why it's a reasonable default. It mitigates the effect of malicious websites playing URL games, and allows the browser to more accurately convey to the user where they really are.
486. belthesar ◴[] No.24843687{6}[source]
That's likely because VMWare Workstation's bridge mode likely injects into the networking stack at the same point that Little Snitch does.
487. dumpsterdiver ◴[] No.24843710{10}[source]
To drive your point home, paypal.amazon.citibank.scamsite.biz/secure/login/trustus will likely have a perfectly valid certificate, along with the trusted green closed-lock before the URL, implying that the site is "secure".
488. protomyth ◴[] No.24843724{3}[source]
Great... Well, that explains the crappy response on some bad connections.

I really wish Apple executives were forced to use their computers on crap wifi. Who am I kidding, I would imagine Tim Cook hasn't used a Mac in years.

489. DaiPlusPlus ◴[] No.24843726{4}[source]
That doesn't work with HTTPS, obviously.

And with DNS-over-HTTPS, DNS-over-TLS and encrypted SNI, that makes it all the more harder.

replies(1): >>24864587 #
490. tssva ◴[] No.24843750{4}[source]
TLS makes this difficult today and SNI encryption will make this next to impossible without installing a custom ca certificate and doing MITM. Even that isn't helpful when you are using a laptop that may not always be on the network where you have deployed a device for inspection. Better to be able to inspect or block on the device by application.
replies(2): >>24845274 #>>24845438 #
491. pdkl95 ◴[] No.24843762{10}[source]
> google.com.evilwebsite.example?=google.com

This was solved a decade ago by rendering the 2nd+1st level domains (and sometimes other parts of the URL) in a different style.

> There's also arguments that URLs are too complex for normal people to understand.

That argument is an insulting attempt to justify a form of illiteracy[1]. Most people don't need to know all of the technical features of a URL; they just need to be able to use it as an address and recognize basic features like the hostname.

Street addresses are a good analogy. Most people understand the basics easily even though physical addresses are far more complex[2] than URLs!

[1] https://news.ycombinator.com/item?id=7694919

[2] https://news.ycombinator.com/item?id=7695735

492. m3nu ◴[] No.24843772[source]
Apple is not going in a great direction for more technical people. Started looking a Linux desktops and r/unixporn . Maybe time to switch, when my Macbook is up for replacement.
493. jiveturkey ◴[] No.24843832{4}[source]
> I don't understand what's the problem T2 is trying to solve by its existence.

watch the 2 security briefings that Apple delivered at black hat. i think they are 3 years apart and each touched on different aspects. i might be misremembering and T2 is covered in just one of them.

494. hilbert42 ◴[] No.24843835{4}[source]
'Windows doesn't bypass 3rd party firewalls.'

Sorry WarOnPrivacy, Windows does bypass 3rd-party firewalls and has done so since at least XP onwards (however, I am uncertain if this was the case with Windows 2000).

Microsoft has programmed into Windows dozens of addresses that 'dial home' to Microsoft's servers. As you will be aware, many of these addresses change with the various versions of Windows. Normal program switches can block some of these addresses whilst others are hidden from normal view, but with a little judicious snooping, we can find most of hidden ones and successfully block them with the hosts file.

However, we cannot block all of them, and this has been the case since Windows XP. From my understanding, which I learned from various security experts around 15 or more years ago at the time when the Microsoft 'exploit' was first discovered, Microsoft hard-coded certain dial-home links for the specific purpose of determining which and how many copies of Windows were pirated. (This seemed to have been the consequence of the widespread pirating of certain corporate copies of Windows 2000.)

Whilst the user many have thought he'd secured every talk-home to Microsoft loophole and was safe, nevertheless MS still knew that his O/S was a pirate version. Unlike other activation links that announced an 'illegal copy' status to the user, these links only advised Microsoft of the fact—if you like, there're part of Microsoft's secret surveillance system. Essentially, Microsoft has deliberately sabotaged the DNS client's hosts table lookup functionality by bypassing it with hard coding.

It seems that in recent years, Microsoft has developed this secret system to an even finer art, as these days it gathers much more information other than whether the O/S has been pirated or not.

With having the handle WarOnPrivacy, I gather you're more than just interested in securing your Windows in the usual ways. If I were you, I'd do what I'm doing here and that's to research the details further and then publicize the fact. As will now be obvious, this is not something that Microsoft wants broadcast to the world.

Below are a few links about the matter with a few comments from some of the sites:

https://slashdot.org/story/06/04/16/1351217/Microsoft-Bypass...

https://bugtraq.securityfocus.narkive.com/a2fZWlAb/microsoft...

" Hey, guess what I just found out: Microsoft have deliberately sabotaged their DNS client's hosts table lookup functionality. Normally you can override DNS lookup by specifying a hostname and IP directly in the hosts file, which is searched before any query is issued to your dns server; this technique is often used to block ads, spyware and phone-homes by aliasing the host to be blocked to 127.0.0.1 in your hosts file."

https://www.theregister.com/2015/09/01/microsoft_backports_d...

"All the updates can be removed post-installation – but all ensure the OS reports data to Microsoft even when asked not to, bypassing the hosts file and (hence) third-party privacy tools. This data can include how long you use apps, and which features you use the most, snapshots of memory to investigate crashes, and so on."

replies(1): >>24853242 #
495. jiveturkey ◴[] No.24843845{7}[source]
T3 vs USB3, not USB3 vs USB2.
replies(1): >>24850603 #
496. fomine3 ◴[] No.24843891{7}[source]
I've been respecting RMS' argument year by year
replies(1): >>24844173 #
497. grishka ◴[] No.24843893{5}[source]
> One of the value props was the inability to reset and resell if it were lost or stolen.

It's sure one of those nice to have features, but there's no good reason why it has to be mandatory like it is. All in all, having a device purposefully retain some information when you factory reset it is user-hostile.

The "lost or stolen" argument also hardly holds for desktop computers like Mac Pro or Mac Mini or iMac, yet they still have T2s in them.

replies(2): >>24843967 #>>24845075 #
498. LdSGSgvupDV ◴[] No.24843903{4}[source]
China (enter the room): Agreed.
499. _jal ◴[] No.24843921{4}[source]
That's the exactly the thing - they are, indeed, chasing me off. When this Mac dies, I'll be replacing it with something running Debian.

It is too bad - the Mac hit this sweet-spot where it was pretty much my perfect machine for several years - a kickass Unix workstation in a decently built laptop, with a decent GUI, with access to consumer apps, too. It was great while it lasted.

Thing is, this is a reasonable thing for Apple to do. Back when they weren't enormous, it made sense for them to at least make token gestures to the Unix-weenie/developer market - we threw a lot of money at them and made them hip when they were down and out. Now we're in rounding-error territory, and that we got what we wanted for a while was sort of a happy accident, anyway. Building developer dream-machines was never Apple's thing.

I bought my first Mac in 1991, and this one will last a while longer. Can't really complain too much about 30 years of decent-to-awesome tools.

replies(2): >>24844889 #>>24845291 #
500. joncp ◴[] No.24843930{3}[source]
Unfortunately, it appears that Tripmode can't filter it either: https://medium.com/tripmode/apple-started-hiding-the-traffic...
501. ◴[] No.24843964{3}[source]
502. hayksaakian ◴[] No.24843967{6}[source]
It seems like this is a feature designed to shrink the "used" market for Apple products -- and not a user benefiting feature.
replies(1): >>24844092 #
503. LdSGSgvupDV ◴[] No.24843973[source]
OS is a weird design. It lets the machine belong to Apple/MS/Google not we, so they could update whatever they want or query to their website secretly. You can't even stop them because once you installed you agreed for all. You don't have choices to partially agree. It makes me feel like when you have a cecal surgery, the doctor also took out your foreskin for auto-updating.
504. leshenka ◴[] No.24843982[source]
I'm working from home now, and in my company we use Tunnelblick for vpn into corp network. VPN has time-based OTP so it never gets saved.

Sometimes when my MBP goes to sleep it loses wifi connection and VPN disconnects. When it wakes up, Tunnelblick asks for password, but it doesn't restore routes (I guess?). Basically no internet until I either enter password or click disconnect. At that moment I'm typing in my OS password and pressing Enter.

What then happens is that it waits for ≈30 seconds and then logs me in, as if it made a network request and waited until it timed out.

Could it be related to the issue you're describing?

505. LdSGSgvupDV ◴[] No.24844004[source]
Is there no chance for little snitch to block app store? I just have a demo ver of little snitch and will buy it for blocking all apple service. I always connect the internet through my phone outdoors. The bandwidth is limiting...
506. vaccinator ◴[] No.24844017[source]
Apple fanboys will always ignore the facts... why would you want apps to bypass a firewall that you install... Apple need to fix their OS either way
507. _qulr ◴[] No.24844030[source]
"You have to trust Apple", it's said. But I suspect that if you actually knew how much your Apple devices were phoning home to Cupertino, you wouldn't trust Apple anymore. Using Little Snitch (the kernel extension) was a real eye opener for me. Especially when I allowed Little Snitch to block all Apple processes (by disabling the built-in iCloud Services and macOS Services rule groups).

This may be a good time to remind folks of my blog post where I explain how Catalina phones home when you run unsigned executables, including shell scripts! In the article I mentioned that you can prevent this with Little Snitch. But that was the LS kext. Is it even possible anymore? https://lapcatsoftware.com/articles/catalina-executables.htm...

Let me just quote one comment from the HN discussion of that article: https://news.ycombinator.com/item?id=23278253 "Making this about speed is burying the lede. From a privacy and user-freedom perspective, it's horrifying. Don't think so? Apple now theoretically has a centralized database of every Mac user who's ever used youtube-dl. Or Tor. Or TrueCrypt."

It's all too easy to dismiss the privacy violations that we're not aware of. Out of sight, out of mind.

replies(2): >>24844381 #>>24845966 #
508. aeyes ◴[] No.24844049{3}[source]
That is exactly what happens if you use VPN clients.

The machine is basically frozen at login until some timeout hits.

509. vaxman ◴[] No.24844065{4}[source]
If they can circumvent system security for their own purposes (even though I’m sure it wasn’t planned to be that way), then they should be open to circumventing it for our country (by backdoor-ing their encryption), at least that is how I would imagine it will be referenced in the inevitable government lawsuit. What a major screw up Apple!
replies(1): >>24845258 #
510. jerrysievert ◴[] No.24844085[source]
I'm not too concerned about privacy-focused apple doing this, but if apple can do it others could figure out how to do it too.

that completely breaks any network filtering and is not acceptable.

511. grishka ◴[] No.24844092{7}[source]
But one of the things about Apple products that makes people okay with the exorbitant pricing is the resale value. I thought Apple themselves realized this?
replies(1): >>24866452 #
512. 3131s ◴[] No.24844106{5}[source]
I would suggest looking into MATE or XFCE if you haven't, or even a tiling window manager like i3.
513. dpkonofa ◴[] No.24844110{7}[source]
>is therefore a betrayal of users’ trust.

I would disagree with that statement. The user bought an Apple computer so they clearly trust Apple already. If anything, the new frameworks make the system more secure which strengthens that trust for users. The only people really affected by this change are users who want granular control over everything whether it comes from Apple or not.

replies(2): >>24845087 #>>24846147 #
514. 3131s ◴[] No.24844127{4}[source]
Or MATE on an older laptop. Linux Mint is great!
515. heavyset_go ◴[] No.24844173{8}[source]
I find this article[1] linked by RMS is prescient as well, for something published in 2003.

[1] https://www.cl.cam.ac.uk/~rja14/tcpa-faq.html

516. specialp ◴[] No.24844210{4}[source]
I helped a friend of mine with her OS X laptop. She had installed something bad and it installed MITM proxy and its own CA and other things to totally own and inspect all of her web browser traffic including SSL. So these features that we find powerful and informative also do have a dark side for more novice users.
replies(2): >>24844663 #>>24853521 #
517. buzzerbetrayed ◴[] No.24844229{4}[source]
> Not a pi-hole user
518. sneak ◴[] No.24844238{4}[source]
This comment frames someone who wants privacy, a routine and everyday common desire, as “super paranoid”. That’s bad, but, worse yet, inaccurate.

You shouldn’t have to carry around another box to keep your computer or phone from spying on you.

519. jasonjayr ◴[] No.24844282{6}[source]
Someone else here recommended those, and now I have 11 for myself + my staff. They are great 2-port devices, with free GPIO pins too! Can do on-device VPN (openvpn, wireguard + tor) with a policy that kills internet access unless it's through the VPN.
520. roody15 ◴[] No.24844287[source]
why do you “trust” Apple?
521. xenadu02 ◴[] No.24844319[source]
In this case it's actually "just" a bug.
522. jachee ◴[] No.24844333{5}[source]
Installing any third-party software that inspects network traffic makes attacks which weren't previously possible now possible, since that software can be targeted.
replies(1): >>24844580 #
523. wmeredith ◴[] No.24844375[source]
My problem with defending this is even if you trust Apple now, what about in the future? Google used to be one of the good guys...
524. jachee ◴[] No.24844381[source]
Apply Occam's Razor.

Why would the most successful company in history—a success gained in no small part through protecting users, selling hardware and services instead of their data, and promoting and enhancing privacy as a first-class feature—do that sort of thing? What possible benefit could such a centralized database serve? How's that gonna make them more money?

replies(2): >>24844454 #>>24846051 #
525. ◴[] No.24844410[source]
526. _qulr ◴[] No.24844454{3}[source]
I'd love to apply Occam's Razor to Apple's network connections. Those entitles should not be multiplied without necessity. That's why I use Little Snitch!

Seriously though, Tim Cook has been absolutely trashing Apple's hard won reputation by relentlessly pushing (via push notifications no less) TV shows and other garbage "subscriptions" on computer buyers. It's not what I signed up for when I became a Mac user many years ago.

527. zamalek ◴[] No.24844470{3}[source]
> Do we really want to trust that Apple will keep all 50+ of these privileged services fully protected?

No.[1] That's what people need to start understanding.

Even if you decide to trust that someone will attempt to act in your best interests (you really shouldn't, see Google's extinct "do no evil" mantra), you can't trust anyone to do so perfectly.

All this aspirational goodwill that fans express on behalf of their favorite FAANGMUULA is the tech equivalent of flat earthing. The facts are simple: no software is perfect, you can't trust any software.

1: https://www.cvedetails.com/vendor/49/Apple.html

replies(2): >>24845513 #>>24846238 #
528. mcyukon ◴[] No.24844479{6}[source]
That's why the 2012 MBP is under my desk 99% of the time collecting dust. I use it mostly for command line applications through homebrew these days. Haven't quite figured out a good way/something comparable for windows. Would love to get another Mac, but what I would need is quite pricey. Would love to see a Mac Pro 1/2. And its hard to justify 2 expensive machines when I have what was at the time of building was a pretty high end PC with an Intel i7 3.70 GHz CPU, GTX 2080 GPU, 16 GB Ram, and 2 SSD's. Interestingly enough Lightroom Classic is still slower than molasses on it, apparently because there is so much legacy code in it. I've recently switched to Capture One which is super fast, but now I have to relearn a bit as it functions very differently than LR.
529. jzl ◴[] No.24844500[source]
In the off chance anyone here is able to answer ... does anyone know how to trace the originating app when Little Snitch detects an outgoing connection from netbiosd? I believe that happens when an app tries to access an smb mount. Some app on my computer is constantly doing that to an AWS-hosted mount, but I can't figure out what.
530. jameshart ◴[] No.24844572{3}[source]
If you can get into apple’s system processes, you are already on the other side of the airtight hatchway. You can make sufficient changes to the system at that point that you can certainly mess with any user-installed firewall monitoring.
replies(1): >>24844598 #
531. ◴[] No.24844580{6}[source]
532. csande17 ◴[] No.24844598{4}[source]
In any system with any kind of sane security model, being able to convince the Maps app to send arbitrary data to an arbitrary URL is not exactly the same thing as total change-stuff-not-even-root-has-access-to compromise.
533. jerry80 ◴[] No.24844636[source]
Ah, yes, the "users actually want an operating system that undermines their every action" argument.
534. calciphus ◴[] No.24844663{5}[source]
OK, but if it's a real security risk why do they only protect their own services? Why not have the user jump through a bunch of complex hoops like editing a plist file from an elevated terminal account? Hell, this is the os that makes it onerous to install software that didn't come from the App store. Clearly they don't mind throwing some user pain in front of basic activities.
replies(1): >>24844845 #
535. jasonv ◴[] No.24844692{6}[source]
Can you expand on, or link to, multiple GPUs for photo and video editing?
replies(1): >>24848864 #
536. matheusmoreira ◴[] No.24844722{6}[source]
User freedom means being able to command our computers to do anything, even if it's against the law or against the business interests of corporations. A free computer is by definition hostile to corporations and governments since it can be used against them.

Security as an industry is generally all about protecting the interests of corporations and governments. Just look at how they react when normal people use subversive technology like encryption. The people in power simply cannot tolerate anything they have no control over.

replies(1): >>24845344 #
537. Wowfunhappy ◴[] No.24844845{6}[source]
> Hell, this is the os that makes it onerous to install software that didn't come from the App store.

No, they really don’t. Unsigned software is a little onerous, but signed software can come from outside the Mac App Store.

538. dreamcompiler ◴[] No.24844882{4}[source]
Microsoft makes an OS too. And to use it I have to spend an enormous amount of time turning off all its daemons that phone home, harvest my personal information, show me ads, and force updates on me.

So no, I don't trust OS providers. I tolerate them and defend myself against them.

539. andreareina ◴[] No.24844889{5}[source]
I disagree that it's reasonableness except in the short term. We're seeing a change in developers' opinions; my friends in video production were getting ready to ditch Apple due to their "professional" software and hardware products getting worse both in relative (hardware) and absolute (software) terms. Part of the Apple cachet is that these are professional tools; how long is their reputation going to hold up if those professionals leave the platform?

It's a touch of hubris to think that we are and will continue to be taste makers, certainly. Maybe Apple won't get burned by alienating this crowd. But it seems a risky strategy for dubious return.

replies(1): >>24846130 #
540. skissane ◴[] No.24844900[source]
Does anyone know how this actually works, technically?

Are these apps using some kind of special API? (If yes, what's to stop other people's apps using that API?)

Is it because they are signed with some kind of special entitlement?

Is it due to some combination of both? (Maybe you have to use some magic API, but you need to be signed with some magic entitlement to be allowed to use it?)

541. mindfulhack ◴[] No.24844923{7}[source]
A big one I will sorely miss as I transition to Linux (and it's the only one I can think of right now), is the ability to rename and move around files while they are open!

OK here's another, very related: the ability to have apps remember their open files when you quit and re-open them.

These are significant productivity boosters, and I will miss them. It's definitely a trade-off, but now Apple has tipped the scales too much in favour of Linux...for me.

replies(1): >>24845596 #
542. sjwright ◴[] No.24844925{3}[source]
Depending on your definition of "full access", you probably haven't truly had that for decades—on any broadly available computing system at least.
replies(1): >>24845435 #
543. Polylactic_acid ◴[] No.24844928{6}[source]
Every device up to the iphone X has been cracked btw so the factory reset protection can be bypassed.
replies(1): >>24857504 #
544. Polylactic_acid ◴[] No.24844938{5}[source]
This is the worst. So many people seem to forget their apple ID password but remember their screen unlock password. I saw a case recently where someone had an attacker get access to their apple account as well as everything else. I was able to do a fresh install of their windows laptop but I was unable to reset the persons iphone because the attacker had changed the apple id password.

I have also seen many android devices bricked by the same anti theft protections.

replies(1): >>24846088 #
545. ◴[] No.24845026{6}[source]
546. threeseed ◴[] No.24845075{6}[source]
> The "lost or stolen" argument also hardly holds for desktop computers

Why ? People's houses get broken into all the time.

And probably 99.999% of laptops never leave a person's house.

547. nitrogen ◴[] No.24845087{8}[source]
This conflating of purchasing with trusting is harmful. It's an ongoing trend I've seen with large tech companies, with arguments of the form "You accept a tiny X, therefore your rejection of the giant Y is invalid."

We buy things from companies we don't implicitly trust all the time, because we can isolate and verify those things.

I don't always trust the supermarket to sell me non-moldy produce, but I can look at the produce and see whether it's moldy.

I don't trust oil companies not to destroy the environment, but if they sell me bad fuel it will be very clear.

I don't trust OS makers, but I can run firewalls and network sniffers to verify that the OS is behaving reasonably, and isolate it when it isn't. Until I can't.

548. bnegreve ◴[] No.24845183{7}[source]
Oh come on! It is not because I spend most of my life inside a terminal that I don't prefer simple things over complicated ones.

Technical doesn't mean "unnecessarily complicated", it means "rich, expressive and built for users that are willing to spend some time to learn" (at least it should)

549. spockz ◴[] No.24845238{4}[source]
Local network access is a separate permission since iOS 14. I’m not sure whether that is for scanning or multicast only (e.g. finding devices such as Chromecast) or complete access to anything other that the gateway and dns servers.
550. bayindirh ◴[] No.24845268{6}[source]
Hey, thanks for your comment. There are no hard feelings and I really appreciate that. I'm not a native speaker but, I try to write and talk as correctly as possible.

I used to put commas before, however some grammar checking tools like grammarly marked them as wrong, and I changed my ways.

Comma rules are complex in both in my native language and English and a good, definitive guide would be really helpful.

Thanks for your comment again.

551. tialaramex ◴[] No.24845274{5}[source]
I would be astonished if Apple doesn't at least experiment with key pinning for the services it has decided to "protect" in this way.

If pinning is used then you can't interfere by interposing a middlebox, the connection would just fail. I guess it's possible Apple would find corporate pushback is too strong, but maybe not.

Don't use things you don't trust. If you trust Apple's proprietary software at least you are getting exactly what you signed up for. Apple gets to do whatever they want, which you apparently trust them to do. Will they accidentally let in bad guys? Maybe. You signed up for that too.

552. KngFant ◴[] No.24845291{5}[source]
I really thought about this yesterday, and the one program i really miss on linux would be Little Snitch. I need a good application firewall on linux.
replies(3): >>24845797 #>>24846167 #>>24855631 #
553. spockz ◴[] No.24845295[source]
> For instance, during wakeup, your T2 equipped Macbook will wait for a DNS response and then use said DNS response to synchronize time via NTP before letting the user use the keyboard.

Aha so this is why I need to put my MacBook back to sleep after waking on a spotty WiFi connection or when it was previously connected to vpn which timed out during sleep!

554. saagarjha ◴[] No.24845297{4}[source]
Well, that's not the whole story: consider another example, the various parts of Safari. Apple wrote that, Apple wrote the whole OS…should they have access to a kernel task port? Shouldn't I trust them to not do bad things? Of course I do, since I use the browser–but I am glad that those are split into separate processes and sandboxed, because an exploit in any of those instantly turns this access into a confused deputy problem. A confused deputy is trustworthy–but they're confused.

Adding exceptions means adding more points of failure, more complexities in code, more opportunities for attackers to bypass restrictions placed on them but not on OS services. Not only that, but you get the upside of having a unified model for Apple and your app developers "for free"–the latter which is of critical importance to Apple in particular, since they have had years of trouble in this area.

555. winter_blue ◴[] No.24845308{4}[source]
Thank you!
556. saagarjha ◴[] No.24845331{7}[source]
Unfortunately, Apple often does 1 far more often than 2, whether it be because 2 is harder, or has a worse experience, or what have you. And Apple exempting themselves is really option 3 for themselves.
557. vladvasiliu ◴[] No.24845340{7}[source]
In my experience it's mostly "convenience" / "nice to haves" related to "modern things" such as entertainment. Of course, this excludes any specialty software you may need that may be unavailable for Linux, but I suppose that's not your case since you're considering this.

For example changing from a low-resolution (non-hidpi) screen to a hidpi one doesn't work that great. You want to watch netflix or prime video in FHD? Not going to happen (although, admittedly, that's not linux's fault but a DRM-related decision).

I've noticed that, as usual, all this is highly dependent on what one does with the computer. If it's a laptop often used with a high resolution external screen and for on-line media consumption, the experience can be less than ideal. If it's a working computer used in fixed conditions, the experience can be outright great. My "work" computer is a desktop linux with a UHD screen and I absolutely love working on it. But for random hanging around on the internet, watching a movie or whatever, I'll grab my macbook.

558. mindfulhack ◴[] No.24845343{3}[source]
But has it added pop-up per-app (and then per domain/port/ip) block/allow functionality in the Linux DE GUI yet? Thanks to your whole team for the awesome work.
replies(1): >>24846065 #
559. saagarjha ◴[] No.24845344{7}[source]
> Security as an industry

…is not a monolith. There are plenty of people in security interested in giving you freedom as a user, actually, many do it specifically for that reason.

560. gsteiner ◴[] No.24845368[source]
What's the DNS name and type that gets looked up?
561. unicornporn ◴[] No.24845405[source]
> Some people are smart, informed developers that install a trusted tool to monitor their traffic and have legitimate reasons to want to inspect Apple traffic. They're dismayed.

Wouldn't say I'm that smart. Wouldn't call myself a developer either. But I'm still kind of dismayed. I used to love macOS (or OS X to be precise), but the clock has been ticking for years now. Near every decision made about macOS future goes in the wrong direction (for me). Right now I'm looking at Manjaro. But still, I need the Adobe CC suite to get my work done, so I will have to use two machines. I hate running two computers. But that's probably where I'll end up.

562. saagarjha ◴[] No.24845414{6}[source]
I’m having trouble understanding your comment, but it sure sounds a lot like complaining about downvotes–that’s usually not well received.
563. saagarjha ◴[] No.24845430{8}[source]
There is trust and there is visibility. Here’s an alternative example I actually do quite often: I attach debuggers and such to system processes. Not because I don’t trust them to not do something malicious, but knowing what they are doing is always useful to me. If Mail is randomly reading files from my Documents folder, perhaps something is wrong with it. Maybe I should just tell it that I can’t look there and see why it might be doing so. These are things that give me more control over my system, not things I engage in because of a lack of trust.
564. saagarjha ◴[] No.24845435{4}[source]
Regardless of whether that want is feasible today, having something that gets closer to it is clearly the goal.
replies(1): >>24846188 #
565. silentOpen ◴[] No.24845436{5}[source]
It depends on the host firewall... many quality operating systems allow host firewalls to apply process-based policy which your upstream certainly can’t achieve.
566. mindfulhack ◴[] No.24845437{8}[source]
Linux Mint Cinnamon has this feature, with package `nemo-preview`. It even plays back actual video when spacebar'ing on an MKV file, something I can't do in macOS!
567. comboy ◴[] No.24845438{5}[source]
When we are talking about malware that's irrelevant. And if we are talking about inspecting Apple's traffic, I don't think you should trust things you see on their hardware running their operating system.
568. saagarjha ◴[] No.24845466{5}[source]
> If enough people said to Apple "hey, this stuff is not acceptable and we won't pay for it" and then they actually did follow through, Apple would stop.

“The market will price this out” doesn’t actually work because it assumes that 1. Apple’s product strategy is done to match market desires perfectly and 2. The decision to buy is solely predicated on this particular thing. The first is false because nobody can do that and the second is because people buy Apple products for other reasons than just that. I personally know many people (although this sample is of course unbiased) that buy Apple devices for a number of reasons (they work well, they look nice, they have good support) but hate that they can’t do thing on them. But their purchase decision doesn’t reflect their opinions on this particular issue.

569. octoberfranklin ◴[] No.24845499[source]
I switched back to linux two years ago for exactly the same reason.

It was painful at first, but it's worth it. The only things I still miss are the visual feedback in the UI (lots of little stuff) and the feel of the trackpad.

But the customizability has more than made up for that in productivity. Like being able to edit the source code for the window manager.

570. saagarjha ◴[] No.24845500{4}[source]
Online documentation. For some reason the qualification is necessary because their header files have a bunch of information that whatever script or tool that generates the webpages doesn’t catch.
571. est ◴[] No.24845589[source]
Would something similar be done with Linux's netns ?
572. jhasse ◴[] No.24845596{8}[source]
Both of those things work under Linux for me. I guess it depends on the apps?
replies(1): >>24846924 #
573. fsflover ◴[] No.24845625{8}[source]
> It uses its own flavor of Linux, meaning support options are extremely limited.

The difference between PureOS and Debian is practically non-existent.

> System76's website is itself half-broken, with 500 errors

OK, it proves that the company is about to die. We of course never see those errors on big websites /s

>If tomorrow a million Apple users said "Enough! LittleSnitch is the straw that breaks the camel's back!" and decided they wanted to shop for a desktop linux system, the market couldn't handle it.

Although it is true, the good news is that such thing just cannot happen. This is not how the market changes. The change is always smooth enough that the companies can adjust. And I am sure Purism and System76 are able to given reasonable time.

> I'm saying that it is not a mass-market option right now for users frustrated with Windows/OS X.

Many (most?) frustrated users on MacOS are those who can use the options I listed. If they understand the problems like the one in the title, they definitely can order a laptop online. Probably also true with Windows. Such changes typically start with geeks anyway (AFAIK geeks switched to MacOS first).

> You cannot point to niche operations and claim it to be a viable mass-market option.

I did not claim that. I suggest that those complaining about users restrictions should go to Linux. Typical users do not complain about such things.

> I didn't say you can't buy Linux pre-installed, I said you can't go into a big-box store like Best Buy to do so, and that there's no significant consumer support infrastructure.

Now you have a point and I actually do not really understand, why I cannot just enter a big shop and ask for a Linux laptop. I actually tried to ask tens of times and they always say there are no. Sounds like a conspiracy by the big labels to me.

574. Aerroon ◴[] No.24845648{4}[source]
Why not just give additional permission levels? I don't really get why so many permission models on what software can do are effectively "admin mode" or "user mode". Why can't you get a very strong warning when software tries to snoop on traffic, but you can still do it? Or maybe you have to go into settings and allow it or something like that.

When you rent space in a building, do you get access to every single apartment/office space in the building? No. You get access to specifically what you rented and the front door. The maintenance people for the building will have access to the front door and other maintenance areas, but won't have access to your space. We can clearly conceptualize models like that. We even have something like this on phones.

replies(1): >>24852176 #
575. tomcooks ◴[] No.24845660[source]
Trusting corporations (or any entity free from limitations and background checks) seldom bring the expected results.
576. seemslegit ◴[] No.24845665[source]
Loving the "are we ok with this ?" take - as if anyone cares.
577. nix23 ◴[] No.24845730{4}[source]
Have Fun then, i have fun with my even less fiddli tech..like a normal watch, a real stereo and no pods....
578. arvinsim ◴[] No.24845797{6}[source]
Sounds like a business opportunity...
replies(1): >>24855637 #
579. ghthor ◴[] No.24845905[source]
If everyone in this thread would use their energy to build a nice Little Snitch GUI app for linux firewalling instead of bitching, that do be great.
580. arendtio ◴[] No.24845932[source]
Actually, I don't think this is about trust. I mean, when I use an Apple OS, I (should) trust them, as their software has access to all my most sensitive digital information.

However, making it impossible to route the traffic of the system apps through a VPN of my choice (whatever the reason), is just broken functionality.

581. saagarjha ◴[] No.24845946{4}[source]
Apple could stop allowing you to load kexts they don’t sign, like they do on iOS.
replies(1): >>24847261 #
582. tgv ◴[] No.24845966[source]
Even for shell scripts? I'm still on Mojave, and now I've got even less appetite to upgrade.
583. strogonoff ◴[] No.24846051{3}[source]
That quote—“Apple now theoretically has a centralized database of every Mac user who's ever used youtube-dl.”—is somewhat misleading.

Apple doesn’t get script contents, it only gets a hash. Of course, if Apple really wanted, they could maintain a DB of hashed contents of every possible version of youtube-dl script, and do their best to match it up with what users execute. However, even that far-fetched scenario falls apart the moment you wrap youtube-dl invocation in a convenience script—as only the hashed content of the script you invoke is submitted for notarization check, not every binary or script further launched by it.

replies(1): >>24846466 #
584. dhaavi ◴[] No.24846065{4}[source]
This is already implemented, but was broken during an important refactor. We hope to fix it soon.
585. GekkePrutser ◴[] No.24846088{6}[source]
Yep we have a whole box full of perfectly good phones and that's just for one office :(

However Apple does unlock them if you can prove ownership. You need an invoice with serial number. It's a lot of hassle but it works. The reason for that box is that we didn't get serial numbers on the invoices for a long time :(

It's another one of those things that are supposedly for the benefit of the consumer but also really supports the company's bottom line by having to buy a new product. I'm always a bit dubious of their motives. I do see the benefit of such features. But they should have some kind of workaround for unlocking it. Such as a card with a QR code that you get with the phone and keep on file or something. Because theft isn't the only way you can get locked out. And since the fappening Apple is really difficult with resetting passwords, in some cases people just can't make it happen.

Android is even tougher but our local carrier can send them for repair to unblock them. Also, Samsung KME overrides the lock, which makes sense because it proves the device is company owned. I wish Apple DEP could do this too.

replies(1): >>24852841 #
586. MagnumOpus ◴[] No.24846130{6}[source]
Both the tech-bro and the media production audience are now a rounding error of a rounding error for Apple. It is a consumer luxury brand first and foremost, and it derives 99% of net income from that. Catering to dorks in basements is a tiny legacy business and the support level for it is commensurate. (It probably actually only exists because Apple has its own share of dorks in basements.)
replies(1): >>24849094 #
587. simion314 ◴[] No.24846147{8}[source]
>The user bought an Apple computer so they clearly trust Apple

This is false, maybe I bought X because it was the least shitty choice.

replies(1): >>24864905 #
588. input_sh ◴[] No.24846167{6}[source]
There's OpenSnitch, but it's a WIP: https://github.com/evilsocket/opensnitch
589. sjwright ◴[] No.24846188{5}[source]
If that goal is important to you, I agree. I disagree that this should be declared as a universal goal for all people.
590. 3pt14159 ◴[] No.24846238{4}[source]
If you buy a ticket to a commercial flight, you're trusting software with your life.

It's a matter of degree of trust and hazard at failure.

replies(1): >>24846949 #
591. rorykoehler ◴[] No.24846251{7}[source]
Did you buy the stock spec or custom?
replies(1): >>24889503 #
592. _qulr ◴[] No.24846466{4}[source]
Why are scripts even getting notarization checks when scripts cannot be notarized???

We shouldn't need to tell a story about how it would be difficult for Apple to exploit data they have about us, because they simply shouldn't have this data about us.

The whole "We can trust Apple with our data" line starts with a flawed assumption: that Apple should be allowed to collect data from us. False. And it's important to note that none of this data collection was ever explained or even disclosed to users. We had to discover it by reverse engineering. Extremely shady practice by Apple. It doesn't matter if the "intentions" were good. Secretly collecting data is never acceptable.

And let's never forget, Apple has been actively collaborating with authoritarian governments to shut down pro-democracy activism. That's not just a theoretical possibility, it actually happened.

The very possibility of Macs phoning home for every shell script would have been considered a crazy conspiracy until we discovered that's it's actually a real thing. So it's a bit ironic to suggest that Apple's exploiting this data is just a crazy conspiracy theory.

replies(1): >>24848384 #
593. nickflood ◴[] No.24846517[source]
Btw, when I've been testing a "kill switch" on Windows (firewall configuration that doesn't allow internet access without a VPN running) using the built-in firewall, I discovered that

- Chrome adds a Firewall rule on installation that grants it access to all networks, bypassing kill switch configurations.

- Microsoft has an "Allow app through Firewall" [1] dialog that manages all of the rules for its apps and services along with some third-party apps. These rules again tend to allow everything, and at least on earlier builds from like 2018 they would reset to allow everything on _every_ update.

This was such a pain to deal with.

[1] https://az767233.vo.msecnd.net/images/Security/win8_winfirew...

594. mindfulhack ◴[] No.24846924{9}[source]
Can you give examples of which apps you noticed it working for? and what desktop environment/distro? I will most certainly test.
replies(1): >>24868456 #
595. ◴[] No.24846949{5}[source]
596. OJFord ◴[] No.24847143{6}[source]
Sure, but if you're worried about them using a specific DNS, aren't you already worried about them not using DNS; resolving `phonehome.evil.co` once per release and shipping the baked-in IP? Stops working if it can't reach that IP, 'xx needs to update', gets new IP?
597. sneak ◴[] No.24847261{5}[source]
It’s my understanding (and I imagine yours is better than mine) that at least at present, the macOS kernel is open source, which would mean that unless they forked it, disabling firmware security and SIP would mean that you could replace it with a compatible one compiled from open sources that skips such a check.

They can, of course, remove that option a number of ways: closed source kernel, disable the disablement of boot security (such as on iOS), et c.

replies(2): >>24848014 #>>24852281 #
598. sneak ◴[] No.24847280[source]
Little Snitch is the only thing keeping me on macOS.

How do we go about replicating this sort of per-process network visibility/permission on Linux?

599. ◴[] No.24847283{6}[source]
600. Zenbit_UX ◴[] No.24847526[source]
You actually just helped me diagnose a really annoying bug I've been having lately. When I wake up my Mac from sleep mode the keyboard and mouse are unresponsive for a up to a few minutes in some extreme cases, sometimes I even have to hard reboot. I found online that it was related to VPNs trying to restore their connection but I could never find the link between the keyboard and the VPN.

It was also compounded by the VPN setting I use to disable all traffic until it successfully reconnects. Meaning whether my computer works or not is dependent on my VPN providers reliability.

Now that I know Apple thinks I need an internet connection to wake up my laptop securely I'm quite pissed by this. Brand new $4k laptop is a paperweight if my VPN can't connect.

601. Wowfunhappy ◴[] No.24848014{6}[source]
XNU is open source and I have personally used custom kernels, but if it got to that point I definitely don't think it would be worthwhile for Little Snitch to maintain their kernel extension.

I truly don't think it would get to that point though. And even if it does, that day could be years away. We're talking about maintaining an existing product, not starting a new one from scratch.

IMO, the more pertinent question is whether it's worth asking customers to disable SIP. Up until now, commercial Mac software—even software targeting advanced users—has seemingly wanted to avoid that at all costs, whether it's Flavours discontinuing their theming software or nVidia discontinuing their web drivers†.

---

† Note that I'm continually suspicious we don't have the whole story here, but the commonly-cited narrative is that Apple won't sign nVidia's drivers.

602. cma ◴[] No.24848099[source]
You can't even remove their new bloated system-installed wallpapers (>2GB, with about 3 of them taking almost 300MB each) without rebooting into safe mode and following tons of steps. But they will sell you an SSD upgrade to help hold them for 3X the market price.

https://apple.stackexchange.com/questions/375519/how-to-dele...

603. Wowfunhappy ◴[] No.24848124{7}[source]
> A prime example would be rebooting into recovery mode to turn off system integrity protections via a terminal command.

I actually think the way Apple implemented this downright brilliant. As you say, it can't be done automatically, and it's definitely made to be a bit intimidating. At the same time, it's not difficult or onerous, that's a pretty hard balance to strike.

By contrast, when I try to install unsigned drivers in Windows, I feel as though Microsoft is fighting me, and I get annoyed basically every time. I've never had that feeling with SIP; when I get a new computer, I take off the training wheels I don't need, and move along.

604. strogonoff ◴[] No.24848384{5}[source]
> And let's never forget, Apple has been actively collaborating with authoritarian governments to shut down pro-democracy activism. That's not just a theoretical possibility, it actually happened.

I wonder why any time I see these claims, they’re never accompanied by anything resembling reliable evidence.

> The whole "We can trust Apple with our data" line starts with a flawed assumption: that Apple should be allowed to collect data from us.

Apple is free to do that, as a private entity in a free market; you on the other hand are free to vote with your wallet and your time by buying their devices and developing for their ecosystem (or not).

You’re entitled to not believe that the end goal (security) is not justified or achieved by the means (notarization, Gatekeeper, etc.), but somehow you are not making that argument.

replies(1): >>24848530 #
605. _qulr ◴[] No.24848530{6}[source]
> I wonder why any time I see these claims, they’re never accompanied by anything resembling reliable evidence.

Because the stories have been on all the news sites, it's common knowledge, and thus it would be superfluous to submit detailed documentation every time it's mentioned? I can't help it if you're not informed about politics and tech.

> you on the other hand are free to vote with your wallet and your time by buying their devices and developing for their ecosystem (or not).

People always say stuff like that, but do they really mean it? It feels like just empty rhetoric to shut down criticism of Apple, not an actual suggestion. I've been a professional Mac developer for over a dozen years, my software has been enjoyed by countless people, and I've also provided many tech insights enjoyed by many people, including this one under discussion, as well as the Google Chrome bug story that's been going around — that's me too! Are you seriously saying I should pack my bags and leave the Apple ecosystem forever and no longer write software for the Mac or write blog posts about it? Is that what you really want? Is that what people in general want, for me to leave the Mac? Don't say it unless you mean it, and are willing to drive away longtime Mac users and/or developers like me.

I hope you'll enjoy your "curated" criticism-less ecosystem with no actual developers who care about the Mac.

replies(2): >>24848683 #>>24855855 #
606. codezero ◴[] No.24848606{4}[source]
I don’t work for Apple, you might ask their developer support.

A quick search for Captive Network Assistant shows it’s not documented.

607. chrisshroba ◴[] No.24848675{4}[source]
> Won't Launchd simply start them all up again?

Yeah, that's why it's running an infinite loop heh

> It'll be simpler to disable the launchDaemons

Simpler that just nuking them with kill -9? No way. Better in literally every other way? Absolutely

> or this'll be a huge resource hog

That's a fair suggestion, but I'm seeing 0.0 CPU and MEM consumption, so I'm not too concerned

608. schwartzworld ◴[] No.24848683{7}[source]
> people always say stuff like that, but do they mean it?

no of course not. it's a pointless thing to say, equivalent to "if you don't like the laws in America, move somewhere else." Easier said than done, for starters.

But also, if developers and power users aren't allowed to criticize or give feedback than who is? Apple needs us more than we need it, so of course you should have a voice

609. j45 ◴[] No.24848827[source]
This might mean running firewalls on the local networks which block outgoing traffic to Apple. And possibly keeping Apple devices vpned to such a network.

I was looking forward to new Apple devices, but feel uncertain about the "trust Apple but no one else" approach.

Concerns:

1) Apple devices have been configurable to be respectful if not invisible in corporate or client windows networks.

You could use a Mac with a firewall in windows environments without being worried about setting off something on the network for unusual traffic. Especially for environments that don't support some but don't stop it either.

2) Corporate Windows networks can control the monitoring of telemetry and metadata to a higher degree than Apple now seems to. It could be a new gap in Apple when compared to others.

If the above are true, it's not clear if Apple sees few Mac users in any corporate environment as an opportunity to grow, it's only accelerating the consideration of other operating systems.

Apple also appears to be signaling that devices do not belong to the customer. The idea of we will protect your data, but trust your data to our policies, which we can change seems confusing. I'm considering the new iPhone for security, but this workaround seems like an affront to it.

610. dylan604 ◴[] No.24848864{7}[source]
https://documents.blackmagicdesign.com/ConfigGuides/DaVinciR...

There's an entire guide provided by BMD that tells you exactly what products are compatible with your OS and particular computer. It even comes as included documentation with the installer. You know, those PDFs in the folder with the install app that nobody looks at? After Apple's nixing Nvidia from their platform, you're limited to AMD GPUs for Mac. For PC, have more options. For Linux, you can go absolutely nuts with the amount of GPU since you can utilize some of the GPU appliances rather than PCIe boards.

replies(1): >>24851047 #
611. johnmaguire2013 ◴[] No.24848935{11}[source]
Sorry, that wasn't the best word choice. Certainly a counter is another viable way of performing that check. (And obviously comes with its own set of trade-offs which I'm not interested in performing value judgments on!)
612. AnthonyMouse ◴[] No.24849094{7}[source]
That's assuming nobody cares about the opinions of tech people when they're buying tech.

It's not just that tech people are customers, it's that ten other customers will look at what the tech people are carrying and assume they're the ones to know what's good.

And developers write code for the platform they actually use first. And spend time fixing the problems with that platform that are keeping other people from using it. Then more non-developers switch to it because it's improving.

613. miguelmota ◴[] No.24849167{6}[source]
I see. Not exactly the same but Sushi on GNOME file managers might be the closest thing

https://www.omgubuntu.co.uk/gnome-sushi-mac-quick-for-ubuntu

614. hombre_fatal ◴[] No.24849542{10}[source]
That's the same for the 2017 model that I had to fix. I got a new mobo + battery. Convenient because my battery was in dire need to servicing.

I heard it would take weeks and even had a backup laptop ready, so it surprised me when it came <2 days later. It was my original laptop too (had all my data and the same dent).

Oh well, the new models don't have this issue anymore. What a fuck up.

615. wool_gather ◴[] No.24849799{10}[source]
Safari does not behave as you've described. The subdomain (for example, 'gist' in 'gist.github.com') is displayed.
replies(1): >>24852201 #
616. horsawlarway ◴[] No.24850504{6}[source]
Yes, at least in my experience over the last two years with Arch running Gnome as the DE.

Wayland's trackpad support is excellent, I can switch from my mac for work to my personal machine without noticing.

Multi monitor support is MILES (I literally cannot emphasize how much better it is) better. Different scaling ratios for different monitors, much better automatic detection and configuration.

There are two remaining problems in my opinion

- Screen sharing is still rather hit or miss. Pipewire is functional for me on latest versions of chromium, but does not work for some electron apps that package older versions (Slack, in this case).

- X-Wayland applications still make you feel the hurt from Xorg. Most times I don't care, but the default builds of chromium and chrome both rely on X-Wayland. There are AUR builds of chromium that have moved to Ozone and have native Wayland support, though (https://aur.archlinux.org/packages/chromium-ozone/)

----

Long story short, Wayland is why my personal machine no longer has windows on it. It's genuinely much better, and I don't spend any time at all dicking around with xorg config files (literally not once have I touched a config file related to monitors or user input devices on my current linux box in the last year. It feels very nice.)

617. dylan604 ◴[] No.24850603{8}[source]
I said OLDER MBPs. This was before TB3 was even a thing
618. jasonv ◴[] No.24851047{8}[source]
Thanks!
619. fsflover ◴[] No.24851932{5}[source]
This is so vague that I want to downvote this comment as irrelevant.
replies(1): >>24852440 #
620. saagarjha ◴[] No.24852176{5}[source]
Apple's argument is typically "users ignore strong warnings".
621. saagarjha ◴[] No.24852201{11}[source]
I suspect that Safari uses Public Suffix or similar for that.
622. saagarjha ◴[] No.24852281{6}[source]
The kernel is open source, but compiling it is non-trivial (over the years there's been a couple of hardcore people from the Hackintosh or jailbreaking community who do it, and sometimes Apple engineers write guides from time to time). But if they really wanted to stop this kind of thing they could go the iOS route and make it impossible to load that kernel.
623. kitsunesoba ◴[] No.24852440{6}[source]
Apologies, it's deeper than it seems at first glance. If I were to elaborate, the resulting writeup would be better suited for a blogpost than an HN comment.
624. Polylactic_acid ◴[] No.24852841{7}[source]
How old are the phones? Everything up til the X can be hacked now to bypass that I was told. If the company has no use for them you could probably make a huge profit unlocking all of them.
625. WarOnPrivacy ◴[] No.24853242{5}[source]
None of what you've posted has anything to do with firewalls, 3rd party or otherwise. Similarly, bypassing the Hosts file is strictly a DNS resolution issue and - again - has nothing to do with firewalls.

Please feel free to post info about actual firewalls, info that isn't about DNS/Hosts.

replies(1): >>24866400 #
626. suifbwish ◴[] No.24853521{5}[source]
I’m trying to think of a powerful tool that is not dangerous. Still thinking
627. musicale ◴[] No.24854747{3}[source]
Do you have a reference? As noted, this seems to contradict what Objective Development is saying.

Objective (sic) proof that Objective Development is lying would certainly be a big deal, and a very good reason not to trust Little Snitch.

628. dhaavi ◴[] No.24855631{6}[source]
We are working on an alternative for both Linux and Windows: https://safing.io/portmaster/

Not only is it an application firewall, but also gives you DNS filtering (ie. Pi-Hole basics) and DNS-over-TLS.

If you check it out, we'd love to hear some feedback! (Full UI revamp incoming)

629. dhaavi ◴[] No.24855637{7}[source]
We're on it: https://safing.io/portmaster/
630. strogonoff ◴[] No.24855855{7}[source]
> Because the stories have been on all the news sites, it's common knowledge, and thus it would be superfluous to submit detailed documentation every time it's mentioned?

Those are the claims, yet every time I dig deeper I see how from “actively collaborating with authoritarian governments to shut down pro-democracy activism” they are reduced to “complying with local laws” within a single brief conversation.

Sure, in some countries the latter is a superset of the former. In such countries, violation of ethical norms could be required in some situations to comply with local law. However, it doesn’t mean that any instance of the latter always requires the former, nor that Apple had ever faced this choice, nor that if put in this situation Apple would agree to actually do the former as opposed to exiting the market (which, exiting, I suspect is a scenario CCP would very much prefer to avoid).

I will roughly delineate the difference based on two concrete example situations:

1) Complying with the requirement to store encryption keys for Chinese user data on Chinese servers = complying with local laws.

2) Providing personally identifiable information about individual Apple users at request of CCP, or helping CCP representatives hack into Apple devices = collaborating to shut down activism.

If you have any evidence of anything along the lines of (2), I’m all ears (as I’m sure is any tech journalist worth their salt).

> Are you seriously saying I should pack my bags and leave the Apple ecosystem forever and no longer write software for the Mac or write blog posts about it?

I’ll level with you here. I’m not a professional Apple developer making a living from selling my software to end-users, but I dabble, and I am very deep in Apple’s hardware and software, preferring them to any other alternative in the market. It would be an extreme lifestyle change, but if I had reasons to believe that Apple had indeed collaborated with CCP to shut down activism, due to my personal views I would have to exit Apple’s ecosystem and start hacking on a PinePhone or something.

That said, if a country like China doesn’t want its citizens’ data encryption keys to live on servers in a country like the USA, I don’t believe that’s outrageous; if you’re an activist, you’ll be aware of that and make arrangements. There’s a line, but this does not cross that line as far as I’m concerned.

631. Siira ◴[] No.24857504{7}[source]
Can you provide some links?
632. montjoy ◴[] No.24858827{5}[source]
Sorry then. I had read something anti-foss the other day (probably on Reddit) which seemed to have a hidden agenda behind it like in the old days. As far as having a “it just works” experience- sticking with the Lenovo and Dell professional lines has worked out pretty well for me.
633. Wowfunhappy ◴[] No.24864587{5}[source]
It would work with HTTPS if you can set your software to accept a self-signed root cert. That's a significant if, however.
634. dpkonofa ◴[] No.24864905{9}[source]
That's fine but you bought it. When it comes down to it, America and capitalism run on the premise that you vote with your dollar. You voted with your dollar regardless of the mental gymnastics you did or didn't do to make that decision.
635. lilyball ◴[] No.24865182[source]
Last year Apple introduced 2 flags on the network: “constrained” (the Low Data Mode toggle) and “expensive” (most cellular and personal hotspots). These are intended to let the app make intelligent decisions about what network requests to do. For example, “expensive” networks should disable background or speculative fetches and only fetch what the user asked for.

Presumably Apple apps that bypass the network filter are making use of these flags already, to avoid unnecessary network traffic.

636. hilbert42 ◴[] No.24866400{6}[source]
1. Firewalls can monitor existing host settings and take them into account.

2. The 'dial-home' mentioned bypasses Windows's firewall.

3. External monitoring has shown that it does bypass firewalls (however, I cannot say whether that's all of them). So does security software such as LoJack (but that's somewhat unusual).

4. This includes ones with kernel drivers.

5. As the code is written to be invisible to other processes, firewall writers would either have to reverse engineer MS's code to stop it or know certain proprietary details about it. I doubt if any legit/reputable developer would risk using info gained from RE (certainty not to stop it functioning as MS intended). Nevertheless, some MS parteners know about it for obvious reasons.

6. From various news reports several weeks ago, it seems that XP's source code has leaked. That means if you are keen enough you can find the 'offending' code and verify the matter for yourself one way or the other (at least as far as XP goes). If you don't, then sooner or later l'm sure others will do so.

If I and others who share this understanding are way off beam, which I doubt having seen evidence, then please let us all know about it in a HN post.

637. thewileyone ◴[] No.24866452{8}[source]
No, they want both you and the potential pre-owned Mac buyer to buy a new device each.
638. jhasse ◴[] No.24868456{10}[source]
VSCode and Sublime Text remember the files they had opened. And renaming files while they are played back works fine with mpv.
639. cbowns ◴[] No.24880735{3}[source]
omgggg it's not just me?! I thought it was bad hardware. this is both good and bad news; at least I can sort out a way to mitigate this now.
640. ohmaigad ◴[] No.24889503{8}[source]
Stock with i9, 16GB RAM, Radeon 5500m, 1TB SSD
641. wooger ◴[] No.24894460{3}[source]
Same situation with a government:

Even if you believe all the MPs / representatives are trustworthy and intend to act in your best interests, their competence is going to be limited, so we need to checks and balances and a limit on their power.

642. ric2b ◴[] No.24906738{6}[source]
How do you get around TLS with cert-pinning?
643. apple4ever ◴[] No.24910269{4}[source]
Oh my gosh this explains so much.

I blame Apple though for their terrible software.

644. ◴[] No.24925093{4}[source]