![]() |
|
![]() |
| But you don't have to on Linux.
Like there's just so much crap you have to do to make these non-free OSes pleasant or private and it's always blowing up. Linux mostly "just works" OOTB. |
![]() |
| Yes you can. If there's no network it will skip the check.
It's not very practical though. Better to block the address with little snitch or a hosts file |
![]() |
| Do you have a source? I regularly use /etc/hosts and never saw any inkling of it being ignored, but do see plenty of cases that confirm it is not. |
![]() |
| I feel the same way about this as I do with the whole NSA clustfuck: If I had access to my own data and could do what I wanted with it, I'd be fine with it. |
![]() |
| Some of it is self-serving and some is explainable by the deep and pervasive tension between (security / privacy / autonomy), and usability. |
![]() |
| Not really they are moving into homomorphic encryption where the entire query and processing is encrypted and Apple has no knowledge of the what you actually requested. |
![]() |
| >Which is useless if they simply encrypt the data before sending it over SSL.
Not entirely useless, you'd still know they were sending something and it would be proof they could bypass Little Snitch. |
![]() |
| It depends, they cried much harder for the DMA in the EU and still aren't really fully compliant. In China, they were quite okay to throw citizens under the bus without much complaints though. |
![]() |
| > If that were the case, how would we have discovered the OCSP server
Because Apple is not trying to obfuscate anything. If they did you would never have discovered it. |
![]() |
| Trusting Apple not to break the computer I paid them $1k+ for is very different from trusting Apple to not hoover up and sell my personal data (or let it get stolen). |
![]() |
| > is it not that the actual security of notarization is provided by OSCP?
The security of notarization is provided by Apple's signature over the hashes of the executables in the app [0]. The hashes and signature are put into a "ticket". This ticket is stored on Apple's servers, and can also be "stapled" to the app. Gatekeeper (one of the macOS security systems) will prefer to fetch the ticket from Apple if possible, and fall back to the stapled ticket if available. Notarization is meant to guarantee that the code was sent to Apple and checked for malicious code. OCSP checks that the Apple Developer ID certificate used to sign the app hasn't been revoked. They are two separate checks done by the Gatekeeper system, which is meant to ensure that only trusted software runs on macOS. I believe it makes sense to call the OCSP check part of the Gatekeeper system, but this may be incorrect. [0]: https://forums.developer.apple.com/forums/thread/710738 |
![]() |
| Oh god, don’t send people to developer.apple.com. It’s apple’s worst product.
I’d rather you shill your own blog posts. Even without reading them, I know they are better. ;) |
Regarding OCSP, off-topic for Apple: Firefox enables OCSP by default. This means that for every TLS connection an OCSP plaintext HTTP request will be made to the certificate authority that signed the certificate of the website the browser is connecting to. This means that the certificate authority receives very well timestamped information about the exact domains you are visiting if you are using Firefox and don't disable OCSP and the website you're connecting to does not use OCSP stapling (most don't). Note that disabling OCSP will make Firefox unable to get certificate revocation information (maybe it still uses system's revocation store, I'm not sure about that, but it certainly does not use more privacy preserving CRLs).