- Last Active
After 15 years of downloading things in Safari, you now get the "feature" of having to approve access to your Downloads folder, manually, for every single website.
GuruZac said:This article is bogus. See Apple's product info and compatibility on their own website...
The title, "Apple agrees to Russia laws requiring preinstalled software" doesn't match the content:
"Under the agreement, iPhones and iPads activated from April 1 onward will present a new screen to users, offering a selection of applications produced by Russian developers. Users will be able to select which apps they will allow or refuse to be installed via this screen as part of the set-up process."
There is nothing preinstalled, if the body/content is correct. Just an offer to install apps, which the user can refuse.
VSCode on macOS is a PoS - doesn't even follow standard keyboard shortcuts. It's just a poorly ported Windows app.
I tried Atom on macOS for some embedded development - another poorly ported app, with some good ideas, but if things like undo/redo don't follow standard Mac app conventions - WTF?!?!?
GeorgeBMac said:wood1208 said:GeorgeBMac said:I'm a little confused by this. I thought Apple had halted updates to the iPhone 5 last September (2018). Is it still getting updates? Or maybe just security updates?
But, none of that answered my original question of: "What is Apple's policy regarding outdated equipment? I thought they had halted updates to the iPhone 5."
randominternetperson said:dewme said:The MacBook Pro's slight advantage over the Mac Mini tells me that Apple could probably tweak a lot more performance from the Mini if they were willing to sacrifice a bit on its aesthetics to have a more aggressive thermal management subsystem. Maybe a mini cheese grater design rather than the current cigar box design?
What these results tell me is that the M1 chip inside all the new Macs are identical (except in terms of memory and that sadly disabled 8th GPU core in the entry-level air), and that (unlike the very first MacBook Air, way back when) the lack of a fan not a huge deal (9% difference at 10 minutes, 18% different at 30 minutes).
sflocal said:That's seriously impressive power. While I know that charging MacBooks comes close to that 100w limit on USBc, are there any peripherals currently that use that much power over USBc?I'm curious what the transfer speed will be with USB5? Will it use a faster version of the Thunderbolt interface?
Apple does not throttle the machine when power draw exceeds the AC adapter. Most non-Apple systems slow down the machine to keep the power draw with the ability of the adapter.
rorwessels said:And yet, iOS still does not support DNS over TLS or DNS over HTTPS. Why?
Windows 10 now supports secure DNS (even if it’s only DNS over HTTPS).
Secure DNS as well as restoring the option for full device and cloud backup encryption would be a good start.
Adding an option to force emails to be encrypted would be great. Say a Mail+ service that simplifies and makes secure email a reality for all iOS ans macOS users. Maybe even build in some message retention features like automatic document deletion after a period of time.
Maybe add an option in Messages so that messages would self destruct after being read or after a specified amount of time?
How about an assurance that NO records of message traffic are stored by Apple for any reason?
Just a few real world options that would make real contributions to user privacy.
Cloud backup encryption is there, and has not changed. But cloud backup encryption has ALWAYS stored a set of keys with Apple, that Apple will provide to law enforcement with a valid search warrant. If you only have one Apple device and Apple does not store key, then you wouldn't be able to restore the backup. (I know there are ways to avoid this, but non-technical people would not understand it and would scream bloody murder if they could not restore from their backup if they lost their cloud backup key!)
See this Apple support document: iCloud security overview
Xed said:nicholfd said:Xed said:rob53 said:So what. Someone who knows what they're doing can do the same thing to every computer ever made. The trick is to make these changes without being obvious. All those jumper wires are obvious. I'd like to see him put it back into the enclosure and try and pass it off as an unmodified AirTag. I'm still waiting for mine and this guy wastes "multiple" AirTags.
This is an impressive accomplishment for a product that has been out for a week, and to neither see nor acknowledge this blows my mind.
We have no idea what else could be done in the future. Nefarious users could figure out was to have it bypass sending or receiving data from Apple altogether, which could make this a very useful tool for certain people.
While I doubt we'll see many doing this, that's not the point for even one person using these in an unintended way for evil is worth protecting against, so I hope Apple can push a way to protect the HW soon.
The AirTag receives nothing from Apple - it only receives data from Apple devices (probably only the device it is paired with.)
To put another way, these do function as ad-hoc devices with BT and UWB when you're within range, but they also work over the internet with your iCloud account so you can locate these trackers when you aren't in range by having them link to other devices securely which will forward their location to Apple which will let you know where they were found.
The locating over the internet is because the App (Find My) on the listening devices (iPhone/iPad) reports to Apple that it saw a tag ID (ID only), and what the location of the listening device was when it saw the tag.
No listening app, and the tag can't communicate. Period.