Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

MacOS Big Sur is spying on everything you do and sending the data to Apple
Notebook Check ^ | 11/17/2020 | Sam Medley

Posted on 11/17/2020 10:32:48 AM PST by Mount Athos

Apple's latest operating system, macOS Big Sur, uses a new API to constantly send users' data (including how, when, and where a Mac is used) to Apple. This data is transmitted to Apple without encryption, meaning anyone with access to the same network as the Mac can see the information.

There are plenty of reports of Google, Amazon, Facebook, and other big tech companies tracking and logging user data. Thankfully, Apple has been a bastion of respect for user privacy in both the computer and smartphone world. Right?

According to a new report from Jeffrey Paul, a computer privacy blogger and advocate, macOS Big Sur is constantly logging and transmitting user data. He reports that a recent Apple server failure brought attention to the tracking process. Apparently, macOS Big Sur communicates with Apple servers and logs which apps a user opens; the time the app is opened; and location data like the user’s IP address, city, state, etc.

Normally, this process either logs and send user data when a user is online. If the process cannot immediately connect with the server, it fails without notifying the user. Late last week, an Apple server got bogged down. The tracking process could still communicate with the server, but the longer connection times caused the code to skip past its quick-fail path. However, the issue caused apps to fail to open as they couldn’t verify the logging process.

What does this mean? In a nutshell, Apple receives data detailing exactly where, when, and how you use your macOS Big Sur device. Further still, Apple can prevent apps from opening on your computer, whether you know it or not.

This tracking has been present in prior versions of macOS, but privacy-focused apps and VPNs could trick the process. However, Big Sur introduces a new API that circumvents even these apps and VPNs. In other words, a VPN or firewall won’t shield your location from Apple’s own tracking.

Considering the new proprietary hardware Apple has put into its MacBooks (like the T2 security chip and the new M1 SoC), this tracking has become extremely difficult to circumvent as some processes appear to take place at the hardware level. Not only is it almost impossible to install another operating system through non-Apple-approved channels (i.e., dual-booting Linux), it is becoming harder to block or hamper Apple’s embedded tracking practices.

Perhaps worst of all, the data is sent to Apple through unencrypted channels. That means anyone with access to the computer’s connected network (e.g., your ISP or anyone on the same public WiFi network) can see the data being transmitted with little trouble. Apple does hash the application data, but if history is any lesson, hashes like these are cracked in due time.

As Jeffrey Paul states, your MacBook is no longer yours.


TOPICS: Computers/Internet
KEYWORDS:
Navigation: use the links below to view more comments.
first 1-2021-36 next last

1 posted on 11/17/2020 10:32:48 AM PST by Mount Athos
[ Post Reply | Private Reply | View Replies]

To: Mount Athos

I’m told by reliable sources here that Apple does not spy on its users.


2 posted on 11/17/2020 10:33:52 AM PST by Jonty30 (What Islam and secularism have in common is thp at they are both death cults. N)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Ping


3 posted on 11/17/2020 10:34:41 AM PST by House Atreides
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos

Yes - if you check the box that says “send analytics data to Apple” that’s what it does.


4 posted on 11/17/2020 10:36:25 AM PST by Skywise
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos

I fully switched from Mac to Linux years ago. I also do my freeping and other conservative web activities inside a VM, connected to a VPN.

Because things are starting to get weird.


5 posted on 11/17/2020 10:38:01 AM PST by shaven_llama
[ Post Reply | Private Reply | To 1 | View Replies]

To: Skywise

How surprised would you be to find out you are completely wrong?

Q: Is this part of macOS analytics? Does this still happen if I have analytics off?

A: This has nothing to do with analytics. It seems this is part of Apple’s anti-malware (and perhaps anti-piracy) efforts, and happens on all macs running the affected versions of the OS, independent of any analytics settings. There is no user setting in the OS to disable this behavior.

https://sneak.berlin/20201112/your-computer-isnt-yours/


6 posted on 11/17/2020 10:44:04 AM PST by Mount Athos
[ Post Reply | Private Reply | To 4 | View Replies]

To: Mount Athos

This is a stupid article. You have to opt-in to send the analytics.


7 posted on 11/17/2020 10:44:16 AM PST by dinodino ( )
[ Post Reply | Private Reply | To 1 | View Replies]

To: dinodino

You are completely wrong.
Do you feel... stupid?

Q: Is this part of macOS analytics? Does this still happen if I have analytics off?

A: This has nothing to do with analytics. It seems this is part of Apple’s anti-malware (and perhaps anti-piracy) efforts, and happens on all macs running the affected versions of the OS, independent of any analytics settings. There is no user setting in the OS to disable this behavior.

https://sneak.berlin/20201112/your-computer-isnt-yours/


8 posted on 11/17/2020 10:47:08 AM PST by Mount Athos
[ Post Reply | Private Reply | To 7 | View Replies]

To: Jonty30

I’m told by reliable sources here that Apple does not spy on its users.

Well that, and Linux is the holy grail.

9 posted on 11/17/2020 10:47:22 AM PST by unixfox (Abolish Slavery, Repeal the 16th Amendment)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Mount Athos

Read the whole article, all the way to the bottom, including the part about the fixes supplied by Apple.


10 posted on 11/17/2020 10:48:39 AM PST by dinodino ( )
[ Post Reply | Private Reply | To 8 | View Replies]

To: dinodino

I see you didn’t read the link i gave you

https://sneak.berlin/20201112/your-computer-isnt-yours/


11 posted on 11/17/2020 10:51:46 AM PST by Mount Athos
[ Post Reply | Private Reply | To 10 | View Replies]

To: shaven_llama

Smart.

What browser do you use?

Brave?


12 posted on 11/17/2020 10:56:18 AM PST by desertfreedom765
[ Post Reply | Private Reply | To 5 | View Replies]

To: All

Privacy protections

macOS has been designed to keep users and their data safe while respecting their privacy.
Gatekeeper performs online checks to verify if an app contains known malware and whether the developer’s signing certificate is revoked. We have never combined data from these checks with information about Apple users or their devices. We do not use data from these checks to learn what individual users are launching or running on their devices.

Notarization checks if the app contains known malware using an encrypted connection that is resilient to server failures.

These security checks have never included the user’s Apple ID or the identity of their device. To further protect privacy, we have stopped logging IP addresses associated with Developer ID certificate checks, and we will ensure that any collected IP addresses are removed from logs.

In addition, over the next year we will introduce several changes to our security checks:

*A new encrypted protocol for Developer ID certificate revocation checks
*Strong protections against server failure
*A new preference for users to opt out of these security protections


13 posted on 11/17/2020 11:04:25 AM PST by Skywise
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos

More:

Editorial
macOS Big Sur telling Apple what app you’ve opened isn’t a security or privacy issue

https://appleinsider.com/articles/20/11/15/big-sur-telling-apple-what-app-youve-opened-isnt-a-security-or-privacy-issue


14 posted on 11/17/2020 11:08:48 AM PST by Rio
[ Post Reply | Private Reply | To 11 | View Replies]

To: Mount Athos

That’s okay, you can use an Android ....

Wait!


15 posted on 11/17/2020 11:21:47 AM PST by Uncle Miltie (Biden: Senile, pedophile, grifter, extortionist, thief.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: shaven_llama

Virtually no businesses will transact with you from a VPN.


16 posted on 11/17/2020 11:22:40 AM PST by Uncle Miltie (Biden: Senile, pedophile, grifter, extortionist, thief.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Mount Athos

Following some blowback, Apple responds...

Second, it’s putting in place new protections to prevent server failure issues. And finally, addressing the overarching concern that Jeffry Paul raised, Apple will release an update to allow users to opt-out of using these macOS security protections.

https://9to5mac.com/2020/11/15/apple-explains-addresses-mac-privacy-concerns/


17 posted on 11/17/2020 11:28:32 AM PST by Flick Lives (My work's illegal, but at least it's honest. - Capt. Malcolm Reynolds)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos

Any issues with the iPhone recent 14.2 update? I don’t like the new orange or green dot in top right corner near the battery/wifi/cell signal icons, which is supposedly showing apps are using microphone or camera without my consent.


18 posted on 11/17/2020 11:40:38 AM PST by Blue Highway
[ Post Reply | Private Reply | To 1 | View Replies]

To: Mount Athos

https://9to5mac.com/2020/11/15/apple-explains-addresses-mac-privacy-concerns/

Update 11/15 8:25 pm PT: Apple has updated a Mac security and privacy support document today sharing details about Gatekeeper and the OCSP process. Importantly, Apple highlights it doesn’t mix data from the process of checking apps for malware with any information about Apple users and doesn’t use the app notarization process to know what apps users are running.

The company also details Apple IDs and device identification have never been involved with these software security checks.

But going forward “over the next year,” Apple will be making some changes to offer more security and flexibility for Macs. First is that Apple will stop logging IP addresses during the process of checking app notarizations.

Second, it’s putting in place new protections to prevent server failure issues. And finally, addressing the overarching concern that Jeffry Paul raised, Apple will release an update to allow users to opt-out of using these macOS security protections.

Privacy protections
macOS has been designed to keep users and their data safe while respecting their privacy.
Gatekeeper performs online checks to verify if an app contains known malware and whether the developer’s signing certificate is revoked. We have never combined data from these checks with information about Apple users or their devices. We do not use data from these checks to learn what individual users are launching or running on their devices.

Notarization checks if the app contains known malware using an encrypted connection that is resilient to server failures.

These security checks have never included the user’s Apple ID or the identity of their device. To further protect privacy, we have stopped logging IP addresses associated with Developer ID certificate checks, and we will ensure that any collected IP addresses are removed from logs.

In addition, over the next year we will introduce several changes to our security checks:
*A new encrypted protocol for Developer ID certificate revocation checks
*Strong protections against server failure
*A new preference for users to opt out of these security protections

We’ve also learned more technical details about how this all works from Apple that aligns with what independent security researcher Jacopo Jannone shared earlier.

macOS’ process of using OCSP is a very important security measure to prevent malicious software from running on Macs. It checks to see if a Developer ID certificate used by an app has been revoked due to software being compromised or events like a dev certificate being used to sign malicious software.

Online certificate status protocol (OCSP) is used industry-wide and the reason why it works over unencrypted HTTP connections is that it is used to check more than just software certificates, like web connection encryption certificates. If HTTPS were used, it would create an endless loop. Jannone explained it succinctly: “If you used HTTPS for checking a certificate with OCSP then you would need to also check the certificate for the HTTPS connection using OCSP. That would imply opening another HTTPS connection and so on.”

Two notable points on this are that it’s not strange for macOS to be using unencrypted requests for this as that’s the industry standard and that with Apple’s commitment to security and privacy, it is investing in creating a new, encrypted protocol that goes above and beyond OCSP.

In addition to the OCSP process currently used by Apple, macOS Catalina and later also have another process where all apps are notarized by Apple after having checked for malware. When launching an app, macOS makes another check to make certain the app hasn’t become malicious since the first notarization. This process is encrypted, isn’t usually impacted by server issues, and indeed wasn’t affected by the OCSP issue.

As for the performance problems we saw on macOS Catalina and earlier during Apple’s server issues last week, they were caused by a server-side misconfiguration that was exacerbated by an unrelated CDN misconfiguration. Those issues were resolved on Apple’s end a few hours after they began with no action needed to be done on the users’ part.

Between the explanation of how everything is working here and the commitment to the future changes described above, Apple shows it is listening to users and putting privacy and security first.

Update 11/15 9:00 am PT: More details about Apple’s use of OCSP have been shared by cybersecurity researcher Jacopo Jannone. He says that macOS isn’t sending a hash of each app to Apple when they run and explains why the industry-standard OCSP doesn’t use encryption. Further, he says Paul’s analysis “isn’t quite accurate” and importantly notes that Apple uses this process to check and prevent apps with malware from running on your Mac.


19 posted on 11/17/2020 11:41:26 AM PST by PIF (They came for me and mine ... now its your turn)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Rio

Not using Sur, but I did notice a change of character set data, in an older Mac OS, overnight -— as a result of the older Mac OS communicating with an Apple server.

24/7, a Mac (if allowed by the user) is in routine contact with Apple via at least:

AppleIDAuthAgent
configd
helpd (AmazonAWS sub-contracting to Apple)
ntpd
ocspd
sntp
syspolicyd
trustd


20 posted on 11/17/2020 11:42:04 AM PST by linMcHlp
[ Post Reply | Private Reply | To 14 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-36 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson