Some vocal proponents and shills on the internet and in privacy community are trying to defend and heavily insinuate lies about Apple’s notarisation not being of any consequence, and claiming Linux does it, and is an ordinary acceptable thing.
There is also being thrown around a claim about Apple’s notarisation checks being a documented process. Documentation does NOT make a thing right or wrong, it just establishes the flowchart or algorithm of a process.
Major edit: bypassing firewalls/VPNs was totally intended for MacOS and not a bug or flaw: https://i.imgur.com/M1ZwlDC.png
CDNUUIDs sent with the OCSP server checks are sent in PLAINTEXT on the internet to Apple servers: https://i.imgur.com/Q2IhYqM.png
Apple apps apparently have ads served, needing to be blocked via LittleSnitch, since firewalls are automatically bypassed: https://twitter.com/p9k/status/1324415251308269568
That is all, folks! Take care and stay away from such garbage corporations.
This community is meant to advocate privacy, security and freedom in an concise manner, free of prejudice bias, free of politics, free of cultist thoughts.
Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say. - Edward Snowden
READ THE RULES
Opinions are welcome, facts more so. Attack arguments, not people. Hating, baiting, trolling, flaming will be dealt with strictly.
Discuss closed source software with caution. Advocating for it strongly (cult brigading) can be treated as violation of this rule.
Editing titles of article links is strictly prohibited, unless and until the summarisation remains accurate to the context of the article or paper. Such link post will be removed without questioning.
Targeting of any country, person or nation is strictly prohibited without valid reasoning. Evidence if not presented against the specific company/corporation/individual will be treated as personal attack and/or hate speech. This will result in a warning, then ban system.
NO PERMA BANS! Ban system will work as follows:
1 day --> 3 day --> 1 week --> 2 weeks --> 3 weeks --> 1 month --> 3 months --> 6 months
Severity of the ban system will be dealt with based on degree of violation and circumstances.
NO FACT-LESS EVIDENCES, NO FALSE RHETORIC Evidence has to be credible. The onus of this lies on the claimant. The same applies on the user who questions proven evidence. Violation of this rule will be dealt with strictly.
Copycat posts serve to litter the community, increasing quantity and decreasing quality of posts. As such, posts will be removed. Repeated attempts will receive warning.