Hacker News new | past | comments | ask | show | jobs | submit login

Stop trusting Apple?



Assuming we have to use their devices, what measures can we take?


This is a weird assumption.


Only a weird assumption if you're going to be rigid with solutions. Think along the lines of adversarial maneuvering. Software and hardware solutions to combat and neutralize privacy leaking effects.


You do not control your Apple device. You can't see or change the code it runs. Apple's fundamental approach is "you trust us ultimately".


So there's absolutely no avenues of reverse engineering here, is what you're saying? If so that speaks more to Apple's competence in being able to lock things down.


There are certainly things you can reverse-engineer with relation to MacOS and Mac hardware. Not everything is reversible though, and even third-party projects like Asahi still have to run the Apple-engineered Boot ROM and device firmware. In the fictional, expressly non-real world where Apple deliberately compromises their hardware for intelligence agencies, you are a fish in a barrel. No amount of "adversarial maneuvering" will meaningfully save you.

Companies like Apple, Intel and AMD are proving to the world that the only secure hardware stack is a fully open one. God only knows what the second Snowden leak will reveal once current geopolitical tensions boil over...


Is it not enough to have a full view of all network requests? How can surveillance happen if we have full knowledge of what enters and leaves the device? Is there any evidence of hidden network requests?


It's enough to detect the network requests and read some of them (since they are unencrypted as explained in TFA), but it's not enough to fix that.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: