[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Now that the dust has settled, how secure is macOS compared to

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 22
Thread images: 3

File: 1468388254493.jpg (616KB, 779x1100px) Image search: [Google]
1468388254493.jpg
616KB, 779x1100px
Now that the dust has settled, how secure is macOS compared to Linux and Windows?
>>
I do not type or do anything on a MacBook that I wouldn't do in front of my own mother.
>>
Secured against whom?
>>
Apple's Operating Systems Are Malware
https://www.gnu.org/proprietary/malware-apple.html

Malware means software designed to function in ways that mistreat or harm the user. (This does not include accidental errors.) This page explains how the software in Apple's computer products are malware.

Malware and nonfree software are two different issues. The difference between free software and nonfree software is in whether the users have control of the program or vice versa. It's not directly a question of what the program does when it runs. However, in practice nonfree software is often malware, because the developer's awareness that the users would be powerless to fix any malicious functionalities tempts the developer to impose some.

Apple Back Doors

Mac OS X had an intentional local back door for 4 years, which could be exploited by attackers to gain root privileges.
https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/

The iPhone has a back door that allows Apple to remotely delete apps which Apple considers “inappropriate”. Jobs said it's OK for Apple to have this power because of course we can trust Apple.
http://www.telegraph.co.uk/technology/3358134/Apples-Jobs-confirms-iPhone-kill-switch.html

The iPhone has a back door for remote wipe. It's not always enabled, but users are led into enabling it without understanding.
http://www.npr.org/2010/11/22/131511381/wipeout-when-your-company-kills-your-iphone
>>
Apple Censorship

Apple censors games, banning some games from the cr…app store because of which political points they suggest. Some political points are apparently considered acceptable.
http://arstechnica.com/gaming/2016/05/apple-says-game-about-palestinian-child-isnt-a-game

Apple banned a program from the App Store because its developers committed the enormity of disassembling some iThings.
http://ifixit.org/blog/7401/ifixit-app-pulled/

Apple rejected an app that displayed the locations of US drone assassinations, giving various excuses. Each time the developers fixed one “problem”, Apple complained about another. After the fifth rejection, Apple admitted it was censoring the app based on the subject matter.

As of 2015, Apple systematically bans apps that endorse abortion rights or would help women find abortions.
http://mashable.com/2014/02/07/apple-app-tracks-drone-strikes/

This particular political slant affects other Apple services.
http://www.theguardian.com/technology/2011/dec/01/siri-abortion-apple-unintenional-omissions

Apple Insecurity

A vulnerability in Apple's Image I/O API allowed an attacker to execute malacious code from any application which uses this API to render a certain kind of image file.
https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple

A bug in the iThings Messages app allowed a malicious web site to extract all the user's messaging history.
https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/
>>
It really depends how much of a moron you are. Windows can be secure if you don't use it like a complete nonce.
>>
Apple Interference

Various proprietary programs often mess up the user's system. They are like sabotage, but they are not grave enough to qualify for the word “sabotage”. Nonetheless, they are nasty and wrong. This section describes examples of Apple committing interference.

Apple forced millions of iThings to download a system upgrade without asking the users. Apple did not forcibly install the upgrade but the downloading alone caused lots of trouble.
https://discussions.apple.com/thread/7256669?tstart0=

Apple Pressuring

Proprietary companies can take advantage of their customers by imposing arbitrary limits to their use of the software. This section reports examples of hard sell and other unjust commercial tactics by Apple.

Apple Siri refuses to give you information about music charts if you're not an Apple Music subscriber.
http://www.theguardian.com/technology/2015/oct/27/apple-music-subscribers-siri-questions

Apple Sabotage

The wrongs in this section are not precisely malware, since they do not involve making the program that runs in a way that hurts the user. But they are a lot like malware, since they are technical Apple actions that harm to the users of specific Apple software.

The Apple Music client program scans the user's file system for music files, copies them to an Apple server, and deletes them.
https://blog.vellumatlanta.com/2016/05/04/apple-stole-my-music-no-seriously/

Apple stops users from fixing the security bugs in Quicktime for Windows, while refusing to fix them itself.
https://web.archive.org/web/20160608183145/http://www.theregister.co.uk/2016/04/14/uninstall_quicktime_for_windows/

iOS version 9 for iThings sabotages them irreparably if they were repaired by someone other than Apple. Apple eventually backed off from this policy under criticism from the users. However, it has not acknowledged that this was wrong.
https://www.theguardian.com/money/2016/feb/05/error-53-apple-iphone-software-update-handset-worthless-third-party-repair
>>
An Apple firmware “upgrade” bricked iPhones that had been unlocked. The “upgrade” also deactivated applications not approved by Apple censorship. All this was apparently intentional.
http://www.computerworld.com/article/2541250/apple-mac/update--apple-plays-hardball--upgrade--bricks--unlocked-iphones.html

Apple deleted from iPods the music that users had got from internet music stores that competed with iTunes.
http://www.theguardian.com/technology/2014/dec/04/apple-deleted-music-ipods-rivals-steve-jobs

Apple Surveillance

Users cannot make an Apple ID (necessary to install even gratis apps) without giving a valid email address and receiving the verification code Apple sends to it.
http://apple.stackexchange.com/questions/49951/how-can-i-download-free-apps-without-registering-an-apple-idcool

iThings automatically upload to Apple's servers all the photos and videos they make.
https://www.apple.com/icloud/photos/
iCloud Photo Library stores every photo and video you take, and keeps them up to date on all your devices. Any edits you make are automatically updated everywhere. [...]
(From Apple's iCloud information as accessed on 24 Sep 2015.)

The iCloud feature is activated by the startup of iOS. The term “cloud” means “please don't ask where.”
https://support.apple.com/en-us/HT202033

There is a way to deactivate iCloud, but it's active by default so it still counts as a surveillance functionality.

Unknown people apparently took advantage of this to get nude photos of many celebrities. They needed to break Apple's security to get at them, but NSA can access any of them through PRISM.
https://www.theguardian.com/technology/2014/sep/01/naked-celebrity-hack-icloud-backup-jennifer-lawrence
https://www.gnu.org/philosophy/surveillance-vs-democracy.html#digitalcash
>>
>>56217520

>you're using it wrong!

kek.
>>
The iBeacon lets stores determine exactly where the iThing is, and get other info too.
http://finance.yahoo.com/blogs/the-exchange/privacy-advocates-worry-over-new-apple-iphone-tracking-feature-161836223.html

Apple can, and regularly does, remotely extract some data from iPhones for the state.
http://arstechnica.com/apple/2014/05/new-guidelines-outline-what-iphone-data-apple-can-give-to-police/

This may have improved with iOS 8 security improvements; but not as much as Apple claims.
http://www.washingtonpost.com/business/technology/2014/09/17/2612af58-3ed2-11e4-b03f-de718edeb92f_story.html
https://firstlook.org/theintercept/2014/09/22/apple-data/

Apple DRM

Apple uses DRM software to prevent people from charging an iThing with a generic USB cable.
http://motherboard.vice.com/read/switzerland-wants-a-single-universal-phone-charger-by-2017

DRM (digital restrictions mechanisms) in MacOS. This article focuses on the fact that a new model of Macbook introduced a requirement for monitors to have malicious hardware, but DRM software in MacOS is involved in activating the hardware. The software for accessing iTunes is also responsible.
https://www.eff.org/deeplinks/2008/11/apple-downgrades-macbook-video-drm

DRM that caters to Bluray disks. (The article focused on Windows and said that MacOS would do the same thing subsequently.)
http://arstechnica.com/apple/2007/08/aacs-tentacles/
>>
Apple Jails

iOS, the operating system of the Apple iThings, is a jail for users. That means it imposes censorship of application programs.
http://boingboing.net/2010/04/02/why-i-wont-buy-an-ipad-and-think-yo.html

Apple has used this power to censor all bitcoin apps for the iThings.
http://boingboing.net/2014/02/07/apple-yanks-last-remaining-bit.html

Apple, in the iThings, pioneered the practice of general purpose computers that are jails, and the term comes from iThing users, who referred to escaping from the censorship as “jailbreaking.”

Here is an article about the code signing that the iThings use to jail the user.
http://weblog.rogueamoeba.com/2008/03/07/code-signing-and-you/

Curiously, Apple is beginning to allow limited passage through the walls of the the iThing jail: users can now install apps built from source code, provided the source code is written in Swift. Users cannot do this freely because they are required to identify themselves. Here are details.

While this is a crack in the prison walls, it is not big enough to mean that the iThings are no longer jails.

More examples of Apple's arbitrary and inconsistent censorship.
http://www.theguardian.com/technology/2014/dec/11/papers-please-game-ipad-nude-body-scans

Apple Tyrants

Apple arbitrarily blocks users from installing old versions of iOS.
http://9to5mac.com/2014/12/01/ios-8-1-signing-window-closed/

The iThings are tyrant devices: they do not permit installing a different or modified operating system. There is a port of Android to the iThings, but installing it requires finding a bug or “exploit” to make it possible to install a different system.
https://web.archive.org/web/20150721065208/http://www.idroidproject.org/wiki/Status
>>
File: 1464047312526.jpg (76KB, 701x720px) Image search: [Google]
1464047312526.jpg
76KB, 701x720px
>>56217510
>>56217535
>>56217556
>Censorship

Private companies controlling their own product is "censorship"? Are you some sort of communist?
>>
Yea if you havent realized by now, fuck apple
>>
I love Maki!
>>
>>56217592
If a consumer buys a product, it should no longer be the product of the company who sold it to them. That company should not be controlling users once they've made their sale.
>>
File: 1471658992191.png (806KB, 1000x1414px) Image search: [Google]
1471658992191.png
806KB, 1000x1414px
>>56217728
Maybe it 'should' but that's not how it is. Apple is a private company and can control their products how they like. They can make it as hard as possible to modify and that's their right. Its like saying companies shouldn't be allowed to lock their doors because what if "the people" wanted to take a look inside. Your proposal is basically that the government should take away their freedom to make their products as they like. That is Communism and an abomination against America's founding principles.
>>
>>56217535
Upgrades remove jailbroken apps, everybody knows that, which is why nobody upgrades to the latest ios version
iCloud can be turned off, you just flip the off switch in the settings menu
>>
>>56217431
i don't type anything anywhere that my mother wouldn't approve of. :^)
>>56217495
your information seems dated
>>56217510
these are all biased articles.
>>56217520
Common Sense v.2016
>>56217523
>>56217535
>>56217548
>>56217556
Samefagging.
>>
>>56217728
>>>56217592
>If a consumer buys a product, it should no longer be the product of the company who sold it to them. That company should not be controlling users once they've made their sale.
The consumer buys hardware, which they do own. The hardware comes with software which is licensed, not sold.
>>
>>56218338
then how come you're not free(as in beer) to remove and replace the software?
>>
>>56217592
>Private companies controlling their product which you own is censorship.
Fixed for you.
>>
>>56218831
>EULA
You only own the hardware, not OSx - You have permission to use OSx
Thread posts: 22
Thread images: 3


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.