[] - [] - [] - [] - [] - []

[a] - [b] - [d] - [e] - [f] - [g] - [h] - [i] - [k] - [l] - [m] - [n] - [o] - [p] - [q] - [s] - [t] - [u] - [v] - [w] - [z] - [z8] - [int] - [psy]



[Назад | Back | 回去]
Ответ в тред | Answer in the thread | 在线程中回答 №261
Your Computer Isn't Yours

 выхода нетостаться внутри треда
stay inside (noko)
残す
 умеретьуйти из жизни
I want to die
我要死
 тленне поднимать тред
don`t raise it (sage)
下げ
 закопайтезакопать тред
bury to the grave
埋葬在坟墓里
жирный шрифт
bold font
粗体

**TEXT**
курсивный шрифт
italic font
斜体字体

~~TEXT~~
подчёркнутый текст
underlined text
带下划线的文字

__TEXT__
зачёркнутый текст
strikethrough text
删除文字

==TEXT==
зацензурированный текст
censored text
审查文本

%%TEXT%%
выделенный текст
marked text
标记文字

##TEXT##
код
code


[[code]]TEXT[[/code]]
ASCII-арт
ASCII-art
ASCII艺术

[[ascii]]TEXT[[/ascii]]
спойлер
spoiler
扰流板

[[spoiler]]TEXT[[/spoiler]]


[[thx]] [[lol]] [[unsee]] [[tea]] [[sad]] [[cry]] [[uzhos]]
[[plz]] [[yahoo]] [[tlen]] [[facepalm]] [[bebe]] [[zapil]] [[morg]]






  (введите текст с картинки)
CAPTCHA
 
  (для удаления постов и файлов) 
  • Разрешены типы файлов GIF, JPG и PNG.
  • Максимальный размер файлов 2 MB.
  • Картинки больше, чем 250x250 будут уменьшены.
  • Лимит тредов: 100
  • Лимит постов: 300
  • Задержка постинга 42 сек.
  • Всего 257 постов и 91 картинка в 121 треде.
  • Удалены 4 поста
  • Тредов под лимитом: 21
  • IBI индекс `имиджбордности`: 35.4%
  • WBI индекс `завайпленности`: 47%
  • DBI индекс `удаляемости`: 1.5%
  • Загружено контента: 13.47MB
  • Уникальных файлов: 91
  • Средний размер файла: 151.56KB
  • Копий файлов: 0
  • PrBI индекс `пикрандома`: 0%
  • Муха прилетит на гет через 39 постов

No.261 [1/300] [1] [Скачать] [Линк] [Ответить]
On modern versions of macOS, you simply can’t power on your computer, launch a text editor or eBook reader, and write or read, without a log of your activity being transmitted and stored.

It turns out that in the current version of the macOS, the OS sends to Apple a hash (unique identifier) of each and every program you run, when you run it. Lots of people didn’t realize this, because it’s silent and invisible and it fails instantly and gracefully when you’re offline, but today the server got really slow and it didn’t hit the fail-fast code path, and everyone’s apps failed to open if they were connected to the internet.

Because it does this using the internet, the server sees your IP, of course, and knows what time the request came in. An IP address allows for coarse, city-level and ISP-level geolocation, and allows for a table that has the following headings:

Date, Time, Computer, ISP, City, State, Application Hash

Apple (or anyone else) can, of course, calculate these hashes for common programs: everything in the App Store, the Creative Cloud, Tor Browser, cracking or reverse engineering tools, whatever.

This means that Apple knows when you’re at home. When you’re at work. What apps you open there, and how often. They know when you open Premiere over at a friend’s house on their Wi-Fi, and they know when you open Tor Browser in a hotel on a trip to another city.

“Who cares?” I hear you asking.

Well, it’s not just Apple. This information doesn’t stay with them:

These OCSP requests are transmitted unencrypted. Everyone who can see the network can see these, including your ISP and anyone who has tapped their cables.

These requests go to a third-party CDN run by another company, Akamai.

Since October of 2012, Apple is a partner in the US military intelligence community’s PRISM spying program, which grants the US federal police and military unfettered access to this data without a warrant, any time they ask for it. In the first half of 2019 they did this over 18,000 times, and another 17,500+ times in the second half of 2019.

This data amounts to a tremendous trove of data about your life and habits, and allows someone possessing all of it to identify your movement and activity patterns. For some people, this can even pose a physical danger to them.

Now, it’s been possible up until today to block this sort of stuff on your Mac using a program called Little Snitch (really, the only thing keeping me using macOS at this point). In the default configuration, it blanket allows all of this computer-to-Apple communication, but you can disable those default rules and go on to approve or deny each of these connections, and your computer will continue to work fine without snitching on you to Apple.

The version of macOS that was released today, 11.0, also known as Big Sur, has new APIs that prevent Little Snitch from working the same way. The new APIs don’t permit Little Snitch to inspect or block any OS level processes. Additionally, the new rules in macOS 11 even hobble VPNs so that Apple apps will simply bypass them.

@patrickwardle lets us know that trustd, the daemon responsible for these requests, is in the new ContentFilterExclusionList in macOS 11, which means it can’t be blocked by any user-controlled firewall or VPN. In his screenshot, it also shows that CommCenter (used for making phone calls from your Mac) and Maps will also leak past your firewall/VPN, potentially compromising your voice traffic and future/planned location information.

Those shiny new Apple Silicon macs that Apple just announced, three times faster and 50% more battery life? They won’t run any OS before Big Sur.

These machines are the first general purpose computers ever where you have to make an exclusive choice: you can have a fast and efficient machine, or you can have a private one. (Apple mobile devices have already been this way for several years.) Short of using an external network filtering device like a travel/vpn router that you can totally control, there will be no way to boot any OS on the new Apple Silicon macs that won’t phone home, and you can’t modify the OS to prevent this (or they won’t boot at all, due to hardware-based cryptographic protections).

Update, 2020-11-13 07:20 UTC: It comes to my attention that it may be possible to disable the boot time protections and modify the Signed System Volume (SSV) on Apple Silicon macs, via the bputil tool. I’ve one on order, and I will investigate and report on this blog. As I understand it, this would still only permit booting of Apple-signed macOS, albeit perhaps with certain objectionable system processes removed or disabled. More data forthcoming when I have the system in hand.

Your computer now serves a remote master, who has decided that they are entitled to spy on you. If you’ve the most efficient high-res laptop in the world, you can’t turn this off.

Let’s not think very much right now about the additional fact that Apple can, via these online certificate checks, prevent you from launching any app they (or their government) demands be censored.


Probably Unrelated

In other news, Apple has quietly backdoored the end-to-end cryptography of iMessage. Presently, modern iOS will prompt you for your Apple ID during setup, and will automatically enable iCloud and iCloud Backup.

iCloud Backup is not end to end encrypted: it encrypts your device backup to Apple keys. Every device with iCloud Backup enabled (it’s on by default) backs up the complete iMessage history to Apple, along with the device’s iMessage secret keys, each night when plugged in. Apple can decrypt and read this information without ever touching the device. Even if you have iCloud and/or iCloud Backup disabled: it’s likely that whoever you’re iMessaging with does not, and that your conversation is being uploaded to Apple (and, via PRISM, freely available to the US military intelligence community, FBI, et al—with no warrant or probable cause).

https://sneak.berlin/20201112/your-computer-isnt-yours/




Удалить пост  

[a] - [b] - [d] - [e] - [f] - [g] - [h] - [i] - [k] - [l] - [m] - [n] - [o] - [p] - [q] - [s] - [t] - [u] - [v] - [w] - [z] - [z8] - [int] - [psy]

[] - [] - [] - [] - [] - []
[]
[]
[]
[]
[]