Most active commenters
  • brundolf(8)
  • valuearb(7)
  • romanovcode(6)
  • (4)
  • jlokier(4)
  • twentydollars(4)
  • Lammy(3)
  • thelean12(3)

←back to thread

2603 points mattsolle | 96 comments | | HN request time: 1.546s | source | bottom
1. Lammy ◴[] No.25075443[source]
Maybe it's just me but the idea that my computer lets Apple (+ any LE organizations) surveil my app launches seems so much scarier than any malware.
replies(6): >>25075490 #>>25075500 #>>25075562 #>>25075747 #>>25075841 #>>25076444 #
2. brundolf ◴[] No.25075490[source]
I don't know about you, but hashes of the binaries I run don't exactly reveal any sensitive personal information about me. That said, obviously they should have much more graceful degradation in place for when something is wrong with the service.
replies(8): >>25075523 #>>25075525 #>>25075542 #>>25075578 #>>25076133 #>>25076290 #>>25076425 #>>25076603 #
3. eslaught ◴[] No.25075500[source]
Is this the one-time signature checking that has been in place since Catalina, or is this something else? (And if so is there any information about it?)
replies(1): >>25075797 #
4. djsumdog ◴[] No.25075523[source]
In this case, isn't the hash of the binary consistent across all devices, so Apples can in fact derive exactly which binary you're running (assuming they have a large database of application binary and hashes)?
replies(3): >>25075572 #>>25075582 #>>25075672 #
5. cortesoft ◴[] No.25075525[source]
It reveals how often I am running new software, it reveals what time of day I run new software, it reveals what networks I connect from
6. Lammy ◴[] No.25075542[source]
"Hey Siri, select every Tor Browser user in America for additional screening."
replies(2): >>25076789 #>>25078159 #
7. dclowd9901 ◴[] No.25075562[source]
Has anyone confirmed if this outside the error-reporting agreement step?
8. ardy42 ◴[] No.25075572{3}[source]
> assuming they have a large database of application binary and hashes

A database like an "app store"?

replies(1): >>25075826 #
9. amelius ◴[] No.25075578[source]
> I don't know about you, but hashes of the binaries I run don't exactly reveal any sensitive personal information about me.

If they know the hash of (let's say) a pr0n app which you run, then I'd say that's pretty damn sensitive information Apple is getting.

10. refulgentis ◴[] No.25075582{3}[source]
yup! and the variety of ways to leak that information along the way...Privacy(tm)!
11. brundolf ◴[] No.25075672{3}[source]
Yes. My personal data involves what I do within those apps, not which ones they are.
replies(3): >>25075725 #>>25075758 #>>25075894 #
12. thelean12 ◴[] No.25075725{4}[source]
That's not even close to true. Apps that you have downloaded can reveal a massive amount of potentially personal information.

Think about someone having a dating app that would out them. Or a therapy app that they don't want people to know about. And that just scratches the surface.

replies(2): >>25075858 #>>25075965 #
13. romanovcode ◴[] No.25075747[source]
This has happened since forever on Mac, Windows and Ubuntu.
replies(3): >>25075832 #>>25075916 #>>25076681 #
14. remus ◴[] No.25075758{4}[source]
I don't think that's necessarily true. Meta data about your usage can be very revealing in itself. To use an analogy, if someone tracked every location you visited that'd be very invasive, regardless of whether they recorded any details about what you did at those locations.
replies(1): >>25077676 #
15. cdubzzz ◴[] No.25075797[source]
I experienced the issue with Mojave while this was happening. So not just Catalina.
replies(1): >>25078165 #
16. ◴[] No.25075826{4}[source]
17. jchw ◴[] No.25075832[source]
No it has not.
replies(1): >>25075870 #
18. valuearb ◴[] No.25075841[source]
Why is it scary that your computer checks for malware?

It’s not like Apple us building a database of apps you’ve launched linked to your address and social security number.

replies(8): >>25075885 #>>25075907 #>>25075938 #>>25075981 #>>25076090 #>>25076863 #>>25076899 #>>25078619 #
19. valuearb ◴[] No.25075858{5}[source]
Only if linked to personally identifiable information. Do we have any evidence this is happening?
replies(4): >>25075991 #>>25075995 #>>25076004 #>>25077372 #
20. mehrdadn ◴[] No.25075870{3}[source]
I'm fairly sure Windows does upload at least some hashes if you have it enabled in Windows Defender (which it is by default). Don't expect Ubuntu does this though.
replies(2): >>25076453 #>>25082517 #
21. TameAntelope ◴[] No.25075885[source]
I don't know they're not doing that, is the problem. They probably aren't, but as Bill Kristol offered recently, 99% sure isn't 100% sure, and the fact that I'm not 100% sure is a problem unto itself.
22. simonh ◴[] No.25075894{4}[source]
Its what apps you’ve got, exactly when and how often you use them, and where you are at those times via network info. Casual gay pickup app, last night in a coffee shop in the red light district, while your wife thought you were at the office working late for example.
23. mtnygard ◴[] No.25075907[source]
I can't tell if you're being sarcastic or serious. Schrodinger's sarcasm.
replies(1): >>25075921 #
24. bkovacev ◴[] No.25075916[source]
Can you please provide resources for Ubuntu?
replies(1): >>25077294 #
25. saagarjha ◴[] No.25075921{3}[source]
Poe's law.
26. goatinaboat ◴[] No.25075938[source]
It’s not like Apple us building a database of apps you’ve launched linked to your address and social security number.

Linked to your identity if you have a credit card saved for say iTunes.

replies(1): >>25075963 #
27. valuearb ◴[] No.25075963{3}[source]
Any proof of that audacious claim?
replies(2): >>25076148 #>>25076294 #
28. brundolf ◴[] No.25075965{5}[source]
Part of it is that, when we're talking about a traditional computer (contrasted with a phone), all of that stuff happens in the web browser these days. The average user's native binaries are mostly limited to said web browser, some work communication apps, maybe a notes app, maybe some dev tools or office tools or media tools depending on the person. Nothing remotely interesting to advertising companies. Maybe that will change with the new iOS app support, but I kind of doubt it.

And anyway, when we are talking about a phone, it would be literally impossible to run an app store without recording (and personally identifying!) that information. Maybe that's one more argument to allow third-party app stores, which I'm not against (though who knows if they're more trustworthy with that data?), but nevertheless.

My point is that in the grand scheme of privacy concerns, this is a very silly hill to die on. In the grand scheme of system reliability, on the other hand, it's totally legitimate to be upset that this effectively took down thousands of expensive workstations across the world for a few minutes.

replies(2): >>25076106 #>>25076159 #
29. erdos4d ◴[] No.25075981[source]
> Why is it scary that your computer checks for malware?

It isn't just checking for malware, its broadcasting your app opening behavior to apple and anyone else who might be listening.

> It’s not like Apple us building a database of apps you’ve launched linked to your address and social security number.

You know this how? Seriously, I don't get why you would believe that.

replies(1): >>25076220 #
30. thelean12 ◴[] No.25075991{6}[source]
That's unrelated to my comment. I was simply responding to the astoundingly wrong claim that "My personal data involves what I do within those apps, not which ones they are."
31. ◴[] No.25075995{6}[source]
32. gpm ◴[] No.25076004{6}[source]
You are moving the goal posts.

It is also trivially linked to ip address, which is usually personally identifying.

replies(1): >>25076166 #
33. ◴[] No.25076090[source]
34. overkalix ◴[] No.25076106{6}[source]
> My native binaries are mostly limited to said web browser, some work communication apps, dev tools, maybe a notes app. Nothing remotely interesting to advertising companies.

Translation: "I've got nothing to hide".

replies(1): >>25076126 #
35. brundolf ◴[] No.25076126{7}[source]
That's a bad-faith reading of what I said. I've edited it to be extra unambiguous.
36. OkGoDoIt ◴[] No.25076133[source]
What about the hash of a password cracking binary or the hash of some sort of binary used for piracy or stripping DRM off of something? Or just in general the ability to profile users based on the apps they use seems completely trivial. I imagine it would not take a particularly brilliant data scientist to correlate people who use FTP programs or developer programs or whatever else with people who buy high value items from certain e-commerce sites, for example. Seems like a marketer’s dream if they could ever get access to that. And sure Apple wouldn’t do that, today, on purpose, but are you 100% certain that could never happen? And if there was some way to tie that illegal piracy app binary hash to you personally and the government came knocking with a subpoena, seems like something Apple might be forced to comply with. It’s a very slippery slope.
37. reificator ◴[] No.25076148{4}[source]
In the modern age isn't the audacious claim that they're not?
replies(2): >>25076247 #>>25076456 #
38. thelean12 ◴[] No.25076159{6}[source]
So you're okay with it because at the moment you personally (or at least some vague idea of the "average user") don't have any "interesting" apps on your traditional computer? You should step back and understand why this is the wrong way to look at it.

Take a look at the macOS App Store medical section. Doing a quick scan of the top apps there is one app to help with some diabetes pump, one for a personal ECG machine, one that says it's a "mobile lactation consultant". Those can reveal a lot about a person that they might want to keep private. Searching "therapy" or "dating" also shows many results that people might want to keep private.

39. valuearb ◴[] No.25076166{7}[source]
Do you have any proof this is happening?

This is Apple we are talking about, which has the strongest privacy commitment of any device maker, and no advertising business outside of the App Store. Linking IP addresses to app certificate requests provides them zero benefit and exposes them to substantial brand damage.

replies(1): >>25076307 #
40. valuearb ◴[] No.25076220{3}[source]
Because Apple would not benefit from doing so, I’m fact could be hugely damaged doing so.

They don’t have any significant advertising business. They don’t need to collect any personally identifiable information. They’ve promoted their brand by putting their customers privacy first.

So why would you believe they would intentionally risk all of that here?

replies(5): >>25076516 #>>25076643 #>>25076691 #>>25077055 #>>25077261 #
41. valuearb ◴[] No.25076247{5}[source]
For an advertising supported business, sure.

But not for Apple where advertising revenues a rounding error on a rounding error, and they’ve built their brand on their commitment to privacy.

replies(1): >>25076432 #
42. jlokier ◴[] No.25076290[source]
I run Tor browser occasionally. That fact alone is sensitive personal information about me. It makes me stand out. Someday it might be held against me.

I already expect the ISP to detect my Tor traffic.

But I didn't expect Apple, of all companies, to have a detailed audit trail of every time I've ever opened it, to the nearest minute.

replies(1): >>25077642 #
43. goatinaboat ◴[] No.25076294{4}[source]
Any proof of that audacious claim?

Proof that if you are signed into any of their cloud services they know who you are? Is this a serious question?

replies(1): >>25077403 #
44. gpm ◴[] No.25076307{8}[source]
Do I have proof they have your ip address? Of course, that's how the internet works.

Do I have proof that they could be ordered by a court to store it? Of course, that's how warrants work.

Do I have proof they are currently storing it? No, nor was that ever the claim.

replies(1): >>25117700 #
45. jlokier ◴[] No.25076425[source]
The information reveals in exquisite detail what times of day I'm working, what times I'm slacking off, which days I work too.

And whether I'm taking a long or short lunch break, or lots of breaks. Whether I stay in bed until late, or work late at night. It's enough to predict whether I'm a "good" worker.

It also reveals whenever I travel, which coffee shops and libraries I frequent and what times of day. It also reveals what time I open any of several video conferencing apps.

And the sort of thing some HR would like to browse when assessing job candidates. They wouldn't need to ask "do you know X", they could just consult the Apple log of how often I run the relevant commands. Things like "we see you ran 'git' an average of 145 times per day last month, tell us more about that".

And whether I'm running tools I "shouldn't".

All that seems quite sensitive and personal to me.

replies(1): >>25076500 #
46. 8note ◴[] No.25076432{6}[source]
Apple runs ads as far as I know.

They also run the app store, which is an advertising platform

replies(1): >>25078979 #
47. thrwwy90876 ◴[] No.25076444[source]
If you haven't downloaded your data from Apple recently I suggest doing that. The amount of personal info they collect has exploded over the last couple years.

Their Services business is moving them into Google levels of data collection.

replies(3): >>25076564 #>>25080914 #>>25081294 #
48. jchw ◴[] No.25076453{4}[source]
Yeah, Windows Defender does worse if you let it have sample submission on. It'll send binaries to Microsoft and they will run in Azure!

https://medium.com/sensorfu/how-my-application-ran-away-and-...

That said, "this has happened forever" is false too. These behaviors are relatively new and relatively under the radar. Many people don't know they exist to get upset about it.

49. tshaddox ◴[] No.25076456{5}[source]
No. Apple has a history of being extremely careful with personal data, and almost always goes out of its way to make sure it never even collects anything personalized. Of course, those could all be lies, I suppose.
replies(1): >>25076533 #
50. brundolf ◴[] No.25076500{3}[source]
> It's enough to predict whether I'm a "good" worker.

If your employer is willing to be that invasive, they already have a much easier route for getting that information: forcibly installing surveillance software on your work machine.

> It also reveals whenever I travel, which coffee shops and libraries I frequent and what times of day.

How...? How would the binaries you're running have anything remotely relevant to say about this?

> They wouldn't need to ask "do you know X", they could just consult the Apple log of how often I run the relevant commands. Things like "we see you ran 'git' an average of 145 times per day last month, tell us more about that".

That's a pretty contrived use-case for a pretty significant and unscrupulous bit of data-sharing. From a PR perspective Apple would never intentionally and publicly share this data. So assuming this data is even stored anywhere after the check is complete, and assuming any personal identification is kept with it, both of which are huge ifs, that leaves a couple of possibilities:

- Hackers gain access to the data

- Government subpoenas the data

- Extremely lucrative contracts, probably from advertising companies, are enough to motivate Apple to sell the data despite the risk of a massive PR scandal

I don't see any of those falling under your proposed scenario of random employers casually perusing the logs.

replies(1): >>25076654 #
51. nmlnn ◴[] No.25076516{4}[source]
Let me tell you a story about this frog and this scorpion..
replies(1): >>25076911 #
52. reificator ◴[] No.25076533{6}[source]
They run an ad network and are the entity that manages device identifiers for iOS.

I certainly trust that they are better than Facebook or Google on the privacy axis. I don't blindly trust that they are innocent.

replies(1): >>25078805 #
53. Lammy ◴[] No.25076564[source]
> The amount of personal info they collect has exploded over the last couple years.

Since maybe 2016-ish? https://en.wikipedia.org/wiki/FBI–Apple_encryption_dispute

54. marcolussetti ◴[] No.25076603[source]
I think that for some users, the applications they run and the frequency they run them at would be enough to identify them across time and accounts. I could change my identifier, even my name, but at the end of the day, I've been using the same apps for at least a decade more or less.
55. cblconfederate ◴[] No.25076643{4}[source]
What if a 3 letter agency told them so? (Since apparently it is entirely impossible for people to even conceive that apple might be doing it for their own benefit)
56. jlokier ◴[] No.25076654{4}[source]
> If your employer is willing to be that invasive, they already have a much easier route for getting that information: forcibly installing surveillance software on your work machine.

The question was whether the information gathered is personal and sensitive.

The fact there is another way it could be gathered doesn't make the information less personal or sensitive.

> How...? How would the binaries you're running have anything remotely relevant to say about this?

Because your temporary IP address is part of the hash request, and that's usually enough to identify which major organisation's network you are on, not counting any geolocation.

Thus, coffee shop (which brand), library (government network), home or mobile, at least.

I expect the websites and services I'm using to have this when I'm using them. That's reasonable, I'm reaching out to them.

Apple itself is not a service I'm using constantly, so I don't expect it to be sent a minute-by-minute update of my movements whenever I'm doing work in a CLI, and happen to have wifi on.

(I don't use iCloud, btw. Perhaps people using iCloud expect activity to be streamed constantly.)

> From a PR perspective Apple would never intentionally and publicly share this data.

Again, the question was whether the information is personal and sensitive. That's a property of the information itself.

Not whether Apple intends to store it and share it.

replies(1): >>25076729 #
57. sliken ◴[] No.25076681[source]
Sorry, not on Ubuntu. It's easy to check, compile a binary, run it, and use wireshark to watch your uplink.
replies(1): >>25082493 #
58. sergeykish ◴[] No.25076691{4}[source]
Only if catched. You've claimed Linux does similar checks. Linux is not a company, it is community. They don't need to collect PI, they don't play PR.

Why would private company not utilize leverage? You have no source, you can't even turn off these checks without hacks. Privacy first is open source and audit. It is removing feature people don't want.

59. brundolf ◴[] No.25076729{5}[source]
> Because your temporary IP address is part of the hash request, and that's usually enough to identify which major organisation's network you are on, not counting any geolocation.

Okay. You realize that you literally have to turn off the network connection completely to prevent dozens of companies from getting this information every waking moment? Windows and even Ubuntu constantly send back basic telemetry, not to mention the many more less-trustworthy apps that are refreshing in the background, the websites you interact with (even with ads/tracking blocked, the site itself still knows your IP address and time of access!), and so on.

Maybe it's not the exact point I was making originally, but my point now is that this is a ridiculous thing to focus on in the grand scheme of privacy concerns. It might be the single least-privacy-significant network request that any of your devices ever makes. Personally, if that's the only cost, I'll take the tradeoff for the security benefits. But even if I didn't feel that way, it's not what I would be spending my energy worrying about.

replies(1): >>25076944 #
60. twistiti ◴[] No.25076789{3}[source]
That's scary. What if you set it up inside a Virtual Machine?
61. thesuperbigfrog ◴[] No.25076863[source]
It's only a matter of time and money: https://www.google.com/amp/s/mashable.com/article/apple-sear...
62. greycol ◴[] No.25076899[source]
Well it would be pretty good information to have to do analysis against.

You could easily see knowing how often an app is used on an OS to be useful business information if apple wanted to create software to get into a trend before it gets to big.

Of course that doesn't require fine grained time data just daily would be more than good enough.

However you could also see the business use of knowing if two pieces of software are often used together or sequentialy which could inform creating an all in one/integrated experience that would do well in a market. So you need that finer application timing.

Of course that doesn't require tying it to a particular user account,not even a device ID, just a sessionID that changes each time the device restarts would probably be granular enough.

However since we've got that other stuff in place per device wouldn't it be great to see if there's a correlation between people using an app on there Mac and using it or another App on there iphone, ipad, or watch. What piece of data can we include to match up a user across all their devices? Maybe some kind of obfuscated or derived userID.

Of course you'd hope that other interests such as a commitment to privacy would rule out the use of such a dataset. If Apple did have such a dataset then you'd hope they'd be doing whatever processes (social, business, and technical) it can to obfuscate and seperate how that dataset is tied to a specific user.

The only real argument against Apple not having it is the balance between the cost of creating/exploiting such a data set, the expected profit, and the legal and reputational costs of such behaviour.

63. ben509 ◴[] No.25076911{5}[source]
For those not familiar with it, the fable is that the scorpion asks the frog to help it cross a river, it stings the frog, the frog asks why since they'll both drown, the scorpion says it's my nature to do so.

A corporation's nature is determined by their business model.

If you want to apply that fable to, say, Apple's relationship with independent repair shops, I'd 100% agree.

> They don’t have any significant advertising business.

This refutes that they're the scorpion in this relationship.

64. jlokier ◴[] No.25076944{6}[source]
> You realize that you literally have to turn off the network connection completely to prevent dozens of companies from getting this information every waking moment

I do. (A look at my comment history would show I know quite a bit about networking.)

Again, the question being addressed, or actually the assertion being challenged, was: "hashes of the binaries I run don't exactly reveal any sensitive personal information about me"

I replied to show that those hashes do reveal that information.

But I threw in that how the hashes are sent (revealing the IP constantly) also reveals sensitive and personal information.

You might think that's inevitable, maybe so trivial it doesn't merit a mention. But in fact it isn't. It's purely a consequence of a technical decision. There are many ways Apple could perform the hash check without revealing your ephemeral IP to Apple.

Still, you asked what I thought was "how does sending your hash to Apple reveal where you go?".

Since you asked, I answered.

But perhaps I misunderstood your question, and you were asking how does Apple having the hash reveal where you are, not the act of sending it to them.

Fair enough.

65. erdos4d ◴[] No.25077055{4}[source]
You are assuming that Apple would have a say in the matter. The US is deteriorating socially and becoming much more authoritarian every day. It is not at all outlandish to believe the US could simply compel Apple to store this information and/or funnel it right to the NSA/FBI/Whoever. They could even be ordered to lie and say they are respecting our privacy and would never do such a thing.
66. RonanTheGrey ◴[] No.25077261{4}[source]
> They don’t have any significant advertising business. They don’t need to collect any personally identifiable information. They’ve promoted their brand by putting their customers privacy first.

Yes... now. Can you say that with certainty 10 years from now? 15? 20? Would you want an evil Apple 10 years from now having that? Or one that a 3-letter agency forced to collect it and they could never tell anyone because National Security Letter? Is that a bet you want to take? One you NEED to take? Is it truly unavoidable, sufficient to justify such a thing?

The best bulwark against overreach is to not create the capacity for it in the first place. Power will only ever do 1 thing, and that's amass more power.

replies(1): >>25079352 #
67. deadbunny ◴[] No.25077294{3}[source]
I would guess they are referencing the Ubuntu Amazon search thing from about 5 years ago (IIRC)
replies(1): >>25082497 #
68. deadbunny ◴[] No.25077372{6}[source]
I'm not an Apple user so forgive my ignorance here.

1. Do you need an apple account to use the app store?

2. Do you need to provide personal information to use an apple account (I'm thinking at least enough to get a credit card working for app purchases/subscriptions)?

3. Is the data sent to this anti-malware service linked to your Apple account or an apple hardware id? (Has someone wiresharked the data to confirm/deny)

replies(1): >>25077666 #
69. sroussey ◴[] No.25077403{5}[source]
And that that service is using the malware detection data?
70. sneak ◴[] No.25077642{3}[source]
Don’t forget that client IP geolocation gives coarse location, so they have your timestamped track log, too.

Big Sur prevents Little Snitch from blocking these system level connections, and these OS apps will also bypass any configured VPN.

71. brundolf ◴[] No.25077666{7}[source]
1. Yes

2. Yes

3. I doubt it

But regardless of 3, simply by using the App Store at all (similarly to any other App Store out there) you're already giving them more information than they get from these hashes (at least for the apps that come from the store). I know for a fact that they keep a record of which apps you've downloaded there, associated with your account, because they check for updates and let you re-download them. As does the Android store. As does the Windows store.

replies(1): >>25078248 #
72. brundolf ◴[] No.25077676{5}[source]
I think this is more analogous to someone tracking what models of car you drive.
replies(1): >>25080934 #
73. doubleunplussed ◴[] No.25078159{3}[source]
Ironically, if tor was already running, the check would run over tor and not be traceable. But to start it in the first place it would be traceable. Damn.
replies(1): >>25078310 #
74. eslaught ◴[] No.25078165{3}[source]
Ok, but this doesn't answer the question. If this is the same behavior since Mojave, why aren't those users complaining about this outage on their Mojave and Catalina based system?

Presumably something changed, but so far I haven't heard an explanation that makes sense of it.

replies(2): >>25079823 #>>25080999 #
75. damnencryption ◴[] No.25078248{8}[source]
Correction: You don't need to login to install apps from Microsoft store and software control on Linux.

Android, yes playstore requires an account but you can install an alternative store without signing in.

76. ben-schaaf ◴[] No.25078310{4}[source]
The connection would run over tor, but the app you're running and any other PII could/would still be sent regardless.
77. ◴[] No.25078619[source]
78. rbrtl ◴[] No.25078805{7}[source]
To which ad network are you referring?

They have a couple: https://searchads.apple.com, https://support.apple.com/en-gb/guide/adguide/apda0878bbd9/i....

They cover ads in Apple News, the App Store Search ads and promotions, and there's the results of Siri search I suppose too. But all of these are internal Apple products and marketplaces. They are not running advertising auctions to any bidder on the basis of guaranteed user groups or targeting strategies.

If you are in fact suggesting that they sell ads beyond their internal marketplaces I'd consider that motivation to move away from them myself, and I converted away from OSS when I got bored fixing my workstation more than my work.

79. rbrtl ◴[] No.25078979{7}[source]
We're talking about the ads in apps here?

It's hilarious: most of the journalism I'm finding via DDG search is anti-Apple from the advertisers perspective. All these bloggers and Forbes writers decrying the fact that Apple keep making it harder for third parties to exfiltrate user data. Outraged that Apple would use this data internally making the marketplace non-competitive to both "tiny ad networks" and "Apple's corporate rivals" alike.

This is bogus. It seriously strangles the capabilities of the rival giants to get hold of that trove of data, but the small ad networks, representing businesses with whom Apple has a formal supplier relationship (the Apple Developer Program) and no direct competition are really no worse off.

Shock and awe.

The big change that caused this flurry of self-serving smear? Making 3rd party advertising opt-in. Forgive me if don't swoon with relief that they are now holding off on this user-empowering, privacy focussed change until next year: "to give advertisers and publisher more time to prepare" and come up with ways to subvert the new order.

Throughout this whole discussion users are talking about "ecosystems" and buying in to one or the other, and the effort of changing. The original issue in this thread was serious, reasonably short-lived, and an infrequent screw up (though that frequency is increasing if you ask me). The issue of Apple's ads is moot. They protect their right to be custodians of the user data they hold (or own, I'm still kind of unclear on that) and they continue to shore up the fences that keep the wolves at bay.

Point me to another major hardware/software/data vendor who shares those values.

80. circularfoyers ◴[] No.25079352{5}[source]
Furthermore has everyone forgotten that Apple are a PRISM provider? https://commons.wikimedia.org/wiki/File:Prism_slide_5.jpg
81. pfortuny ◴[] No.25079823{4}[source]
Because you do not notice until they f*ck up like this.
82. e_proxus ◴[] No.25080914[source]
For anyone who wants to do this, you can do it here (at least if you are in the EU): http://privacy.apple.com/
83. e_proxus ◴[] No.25080934{6}[source]
And where you drive it since they track IP numbers.
84. robotfelix ◴[] No.25080999{4}[source]
According to statcounter.com [1] there are over 4x as many Catalina users as there are Mojave users (62% vs 14% of MacOS users), so I think it's just that the people complaining about Catalina are louder.

Anecdotally, I'm using Mojave and experienced this issue, a person I was trying to have a Zoom call with was experiencing the same issue on their Mojave.

I think there are enough comments scattered across Hacker News to safely conclude that it affected Mojave too - although it's possible the timeout behaviour / error handling is different to Catalina.

[1] https://gs.statcounter.com/macos-version-market-share/deskto...

85. st1x7 ◴[] No.25081294[source]
Having downloaded my data from both Apple and Google, "Google levels of data collection" seems inaccurate.
86. romanovcode ◴[] No.25082493{3}[source]
Ubuntu did upload what applications you launched to Amazon.
replies(2): >>25085516 #>>25086152 #
87. romanovcode ◴[] No.25082497{4}[source]
Yes, exactly
replies(1): >>25086142 #
88. romanovcode ◴[] No.25082517{4}[source]
> Don't expect Ubuntu does this though.

Ubuntu uploads (at least it did couple years ago) your data to Amazon.

https://www.gnu.org/philosophy/ubuntu-spyware.en.html

89. sliken ◴[] No.25085516{4}[source]
Link?

There was a connection between the search bar for awhile, if you typed in pants you'd get potential amazon links. It was easy to turn off and disappeared awhile later.

replies(1): >>25085771 #
90. romanovcode ◴[] No.25085771{5}[source]
It is exactly that. And you can turn off spying on other OS'es as well, doesn't defeat the point - they all spy.
replies(1): >>25086241 #
91. twentydollars ◴[] No.25086142{5}[source]
So... No, this has never happened on Ubuntu.
92. twentydollars ◴[] No.25086152{4}[source]
This is a lie.
93. twentydollars ◴[] No.25086241{6}[source]
Linux operating systems don't spy on their users. This is false. Stop repeating misinformation.

The Ubuntu Amazon fiasco is, if anything, evidence of extreme resistance to this kind of thing. The Linux community rejected Canonical's opt-out ad partnership with Amazon collectively and almost unanimously. The program was relatively benign, but it went against ideals of both users and developers, and there have been no repeats.

replies(1): >>25086585 #
94. romanovcode ◴[] No.25086585{7}[source]
I did not say "Linux" anywhere. I said Ubuntu.

Did it happen? Yes. And that is enough information.

replies(1): >>25094147 #
95. twentydollars ◴[] No.25094147{8}[source]
You said "they all spy", implying generic Linux.

You have been called out for multiple falsehoods in your comments here and you've still failed to provide any evidence.

96. valuearb ◴[] No.25117700{9}[source]
Then the claim is ridiculous. Apple isn’t keeping any of this info, because it would have no purpose.