TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Does Apple really log every app you run? A technical look

621 pointsby jacopojover 4 years ago

55 comments

the_dukeover 4 years ago
While other posts on this topic are too alarmist, this one is way too Apple apologetic for my taste.<p>* There is no information on how often the validation happens. All this investigation concludes is that it doesn&#x27;t happen when closing and immediately re-opening an app. Is it every week? Every reboot? Every hour? If it&#x27;s less, that&#x27;s essentially the same as doing it on every launch.<p>* There is no justification for sending this information in cleartext. I don&#x27;t follow the &quot;browsers and loops&quot; argument. This is a system-service that only has to trust a special Apple certificate, which can be distributed via other side-channels.<p>* Many developers only publish a single app or a certain type of app. So it still is a significant information leak. It&#x27;s really not much different from sending a app-specific hash. Think: remote therapy&#x2F;healthcare apps, pornographic games, or Tor - which alone could get you into big trouble or on a watchlist in certain regions.<p>I assume they will push a fix with better timeouts and availability detection.<p>But Apple simply has to find a more privacy-aware system designs for this problem which does not leak this kind of data without an opt-in and also does not impact application startup times. (revocation lists?)<p>I imagine this data might just be too attractive not to have. Such a &quot;lazy&quot; design is hard to imagine coming out of Apple otherwise.
评论 #25096688 未加载
评论 #25096307 未加载
评论 #25096654 未加载
评论 #25097699 未加载
评论 #25096396 未加载
评论 #25103477 未加载
评论 #25097646 未加载
评论 #25096241 未加载
评论 #25099643 未加载
评论 #25100258 未加载
评论 #25113947 未加载
评论 #25100332 未加载
评论 #25096718 未加载
评论 #25096291 未加载
ravenstineover 4 years ago
&gt; macOS does actually send out some opaque information about the developer certificate of those apps, and that’s quite an important difference on a privacy perspective.<p>Yes, and no. If you&#x27;re using software that the state deems to be subversive or &quot;dangerous&quot;, a developer certificate would make the nature of the software you are running pretty clear. They don&#x27;t have to know exactly which program you&#x27;re running, but just enough information to put you on a list.<p>&gt; You shouldn’t probably block ocsp.apple.com with Little Snitch or in your hosts file.<p>I never asked them to do that in the first place, so I&#x27;ll be blocking it from now on.
评论 #25096122 未加载
评论 #25096240 未加载
评论 #25099372 未加载
jgiliasover 4 years ago
So the takeaways are:<p>* Your Mac periodically sends plain text information about the developer of all apps you open, which in most cases makes it trivial for anyone able to listen to your traffic to figure out what apps you open. Better not use a Mac if you&#x27;re a journalist working out of an oppressive country.<p>* Because of this Macs can be sluggish opening random applications.<p>* A Mac is not a general purpose computing device anymore. It&#x27;s a device meant for running Apple sanctioned applications, much like a smartphone. Which may be fine, depends on the use case.<p>Yeah... No Mac for me anytime soon then.
musicaleover 4 years ago
&gt; You should be aware that macOS might transmit some opaque information about the developer certificate of the apps you run. This information is sent out in clear text on your network.<p>Wow, that is bad from a privacy perspective!<p>Since certificate revocation is rare, it makes more sense to simply periodically update a list of revoked certificates instead of repeatedly checking each certificate. That would solve the privacy issue while still allowing certificates to be revoked.<p>OCSP seems like a bad idea for web browsing for similar reasons.
评论 #25096264 未加载
评论 #25102128 未加载
评论 #25096617 未加载
izacusover 4 years ago
When it comes to these article, you should really apply the following &quot;smell&quot; test:<p>Replace &quot;Apple&quot; with &quot;Google&quot;, &quot;Facebook&quot;, &quot;Verizon&quot;. Re-read the article. If it sounds horrifying, then it&#x27;s also horrifying if Apple does it. There&#x27;s no such thing as &quot;trust&quot; into a single corporation - especially the one which just argued that you not paying 30% to them is &quot;theft&quot;.<p>Applying this test helps weed out the marketing bias these corpos constantly try to push at you.
评论 #25100579 未加载
评论 #25099585 未加载
jrockwayover 4 years ago
OCSP doesn&#x27;t seem like the right protocol for this. Apple should probably just ship you a list of hashes of revoked certificates once a day, and should do the check locally. (Obviously, the global certificate database is too big to send to every user, but Apple should be able to determine the subset of certificates they trust, and the even smaller subset of those that are revoked or compromised.)<p>To me, it sounds like they decided to take the quick-and-easy path of reusing an existing protocol for the use case of stopping malware, but it doesn&#x27;t really fit. The latency, privacy, and availability guarantees of OCSP just don&#x27;t match with the requirements for &quot;run a local application&quot;.
评论 #25096526 未加载
评论 #25096245 未加载
评论 #25096397 未加载
评论 #25096259 未加载
评论 #25097531 未加载
sz4kertoover 4 years ago
Can someone explain my why is this significantly less problematic than sending out app hashes? If we accept that most developers don&#x27;t have many similarly popular apps, then isn&#x27;t this enough to infer what apps are users running?<p>In the example from the article: if Mozilla&#x27;s certificate is sent, then it&#x27;s very likely that the app that has been opened is Firefox, as the a priori likelihood of using Firefox is way higher than eg using Thunderbird.<p>If the developer is Telegram LLC, then ... and so on.
评论 #25096189 未加载
评论 #25099973 未加载
banachtarskiover 4 years ago
There will be a day when all apps on a mac will only be installable from the app store. Developers will be forced to buy macs and subscribe to Apple’s developer program to support it. Customers will be trained to not care. And HN Apple fanboys and fangirls will try to justify why this is a Good Thing(TM).
评论 #25096475 未加载
评论 #25096462 未加载
评论 #25097050 未加载
评论 #25096606 未加载
评论 #25096719 未加载
评论 #25098068 未加载
cute_boiover 4 years ago
Clearly this article doesn&#x27;t reveal every truth. Certificates authority should have been decentralized but is it happening?<p>And just by looking ip address, and app usage and other data they receive they can connect the data and identify its me. And what security has apple provided till now?<p>&quot;You shouldn’t probably block ocsp.apple.com with Little Snitch or in your hosts file.&quot;<p>That&#x27;s far better than freezing computer which doesn&#x27;t work, doesn&#x27;t run any apps. If I don&#x27;t need apple mercy and protection please don&#x27;t force me.<p>Already installed Linux and its a start.
bitmunkover 4 years ago
Yeesh, &quot;It&#x27;s not THAT bad, it ONLY leaks the developer of every app you open, via cleartext. Oh, and it cripples your offline software when someone spills coffee over Apple&#x27;s servers&quot;<p>This is the reason people laugh at this website.
vmateixeiraover 4 years ago
So, not only apple, but pretty much everyone, can eavesdrop on the HTTP request and find out from which developer I&#x27;m running apps from?
lifeisgood99over 4 years ago
Being able to identify the developer of any app I run on my own machine is already too far. You have to assume all these requests are logged and available for state actors on legal demand.<p>I wonder how big a local revocation list would be. I would support a on-by-default local check.
_qulrover 4 years ago
A caveat to blocking ocsp.apple.com is that I discovered Apple is running more than one service on that domain.<p><a href="http:&#x2F;&#x2F;ocsp.apple.com&#x2F;ocsp-devid01" rel="nofollow">http:&#x2F;&#x2F;ocsp.apple.com&#x2F;ocsp-devid01</a> is Developer ID, but <a href="http:&#x2F;&#x2F;ocsp.apple.com&#x2F;ocsp03-apevsrsa2g101" rel="nofollow">http:&#x2F;&#x2F;ocsp.apple.com&#x2F;ocsp03-apevsrsa2g101</a> is something else, which if blocked can prevent the Mac App Store from loading.
neologover 4 years ago
So Apple sends an app-developer identifier in clear text each time you open an app? That sounds really bad.
paultopiaover 4 years ago
Has anyone used a pi-hole to block apple privileged servers, like the OCSP one, while running Big Sur? I&#x27;m thinking of setting one up---not necessarily to block OCSP, because the points in this post about actually wanting to know when a certificate has been revoked are sensible---but to at least have the option in case of another disaster...<p>Relatedly, does anyone know if Big Sur allows one to use a custom DNS server on the device level with those privileged destinations? (He says, mulling the complexities of getting a pi-hole working with his mesh system.)
评论 #25097162 未加载
评论 #25096456 未加载
ThePhysicistover 4 years ago
Not sure whether the non-privacy related aspect about OCSP is less worrying. Officially Apple does this to protect innocent users from malware, but as we&#x27;ve seen it also allows them to remotely disable any developers&#x27; software. Not really something that I&#x27;d want on my machine.
评论 #25104451 未加载
评论 #25096280 未加载
评论 #25096193 未加载
arexxbifsover 4 years ago
ITT: Arguing what semantics to use when whitewashing a massive breach of trust, privacy and security with no officially solicited opt out.
withinboredomover 4 years ago
Now just waiting for the trolls to write some software that makes the response always cause it to be invalid. With a wee bit of ARP magic, you could make a bunch of mac users very unhappy at the cafe&#x27;s.
评论 #25097382 未加载
评论 #25097416 未加载
sneakover 4 years ago
“It doesn’t send a hash of the app, it sends a thing that is a encoded hash that uniquely identifies the app! Totally different!”<p>It wasn’t a misunderstanding, it was a simplification so that people could understand the issue without me explaining OCSP and app signing and x509 and the PKI. Dozens of people wrote me to thank me for explaining it in a way that they could understand.<p>It is indeed a hash, and it does indeed uniquely identify most apps, and it is indeed sent in plaintext, when you launch the app (and is cached for a half day IIRC). I very deliberately didn’t claim it is a hash of the content of the app file.<p>It also doesn’t send a unique identifier, but I would be willing to wager that the set of apps that you launch in 48h is probably enough to uniquely identify your machine in the vast majority of cases.
评论 #25097091 未加载
theodricover 4 years ago
By default, Android logs every app you use. You have to disable - bafflingly - features including saving locations in Google Maps and fully-functional voice recognition to (supposedly) disable that behavior. What I&#x27;m saying is: don&#x27;t look so surprised.
评论 #25098956 未加载
评论 #25097025 未加载
评论 #25098110 未加载
评论 #25098727 未加载
m463over 4 years ago
&gt; As you probably have already learned during Apple’s OCSP responder outage, you can block OCSP requests in several ways, the most popular ones being Little Snitch<p>Uninformed advice - apple prevents little snitch from blocking this traffic in big sur.
评论 #25096355 未加载
评论 #25096350 未加载
Cloudefover 4 years ago
Wouldn&#x27;t it be hilarious to mitm these requests at open hotspot and basically cripple everyone&#x27;s macs while connected.
olliejover 4 years ago
I get that a dev cert isn&#x27;t the same as identifying the software itself... but that only applies for developers that have multiple apps, and I suspect most do not.<p>Then unencrypted requests are also a Bad Thing, because anyone has access to the same info - it may require a lot of work to get general knowledge of what apps someone is using, but if you were looking for a specific one then I don&#x27;t see any real difficulty identifying that.<p>e.g. if I wanted to know if someone was using signal I just look for the signal cert being queried. That&#x27;s a much easier problem, and can be dangerous to the end user.
xalavaover 4 years ago
The fact that this was included in the OS without raising alarms is quite revealing in terms of privacy concerns.<p>Question, is there a good justification to use not use hierachical certificates like web browsers or other OSes ?
xbarover 4 years ago
Apple&#x27;s decisions about OCSP decry two indisputable facts that contradict Apple marketing:<p>Apple does not prioritize privacy. Apple does not prioritize availability.
bywaterstreetover 4 years ago
Good write-up.<p>I write a lot of Go on my Mac at home. The first run is _always_ slow, but I&#x27;ve never measured it or bothered to find out why. This is a real &quot;lightbulb moment&quot; for me.<p>I just built a Go executable and timed it: 0.194 for the first, and ~0.018 for subsequent. I haven&#x27;t signed code on Mac platforms before, so I figured I&#x27;d give it a go using the Apple code signing guide [0]. So, I created a self-signed certificate using Keychain, changed and built a Go project, signed the executable [1], and ran it: ~0.400 for the first run, and ~0.018 for subsequent. It... doubled? Will this happen on every first run still? Is there a way to exclude executables?<p>[0] <a href="https:&#x2F;&#x2F;developer.apple.com&#x2F;library&#x2F;archive&#x2F;documentation&#x2F;Security&#x2F;Conceptual&#x2F;CodeSigningGuide&#x2F;Procedures&#x2F;Procedures.html" rel="nofollow">https:&#x2F;&#x2F;developer.apple.com&#x2F;library&#x2F;archive&#x2F;documentation&#x2F;Se...</a><p>[1] codesign -s &lt;cert_id&gt; &lt;path&gt;
treeman79over 4 years ago
Worked a major virus company. This was the same Basic technique. W e would download a list of all md5 hashes. All executables would have to match against it.<p>Periodically there would be an issue downloading the updates. Would result in similar problems.<p>Managing size of updates was a big issue. Just checking against an online server is certainly a more up to date approach
rStarover 4 years ago
in my opinion, this seems like Apple, once a computer company that catered to computer users and the expectations of computer users, is now a mobile phone company catering to and responsive to the lower expectations of phone users. to engineer these plain text surveillance communications over the public internet between a users private computer and the company responsible for building that computer is like if my home informed the company that built my home every time I started any unique activity while inhabiting said home, as long as I hadn’t been engaged in that activity for some amount of time. It’s extremely disrespectful to Apples users, who are also Apples customers, who are also mostly all of us on this message board. My goal is to one day grow a backbone and stop putting up with this.
sbussardover 4 years ago
Apple has always been a gated community, but now there’s a guard at the gate checking everything that goes in and out. This is something most users probably don’t want. It has me personally considering what a future without Apple would look like.
评论 #25096881 未加载
评论 #25099486 未加载
评论 #25096829 未加载
micheljansenover 4 years ago
This still allows Apple (and ISPs, employers etc) to correlate very sensitive information: developer certificates and IP addresses. Plenty of developers only create one application, and most Macs will be used most frequently on a small number of (ranges of) IP addresses. In essence that still let’s Apple see way more than a self-proclaimed “privacy conscious” company should.<p>Why not take a more privacy-centric approach? Antivirus companies have been working with “virus definitions” for ages. Ad blockers use the same model, but for locally stored blacklists. Why can Apple not regularly download a list of revoked certificates and maintain it locally?
spullaraover 4 years ago
I have always been annoyed by OCSP being HTTP. It is really the fault of the standard that this is the way we revoke certificates. I basically agree that Apple should just be downloading revoked certificates and checking them locally. This is what we are doing at various SaaS companies that have to check these in order to avoid downtime. We have also mistakenly failed-closed. We now default to fail-open but customers have the option to change that if they are paranoid.
randomtreeover 4 years ago
Very curious, what&#x27;s opaque about a uniq developer id of an app you start? Sure looks like gaslighting.<p>&quot;You should be aware that macOS might transmit some opaque information...&quot;
jijjiover 4 years ago
whatever happened to letting the user decide which application they wanted to run? now the mothership has to give their blessing before they let you run it... sounds insane.
29athrowawayover 4 years ago
Out of the loop: How does this compare to MS Windows telemetry?
polackover 4 years ago
The request obviously sends lots more information than just the serial number of the developer certificate. Is it &quot;harmless&quot; data or could they have more info about the executable in there?<p>Why don&#x27;t the author post the OCSP request of Thunderbird too? And how about another request for Firefox so we can compare the data? This article really doesn&#x27;t clear anything up for me...
dmitriidover 4 years ago
&gt; Maybe the hash is computed only once (e.g. the first time you run the app) and it is stored somewhere.<p>This would explain why some games take minutes to launch the first time to run them. I&#x27;ve experienced this many times with Steam. You install a game, you launch it, and nothing happens for up to several minutes, and then the game runs. No delays after in launching after that.
评论 #25096155 未加载
Pelamover 4 years ago
Technically AFAIK, the revocation list could be turned into a Bloom filter (or one of its alternatives) and updated from the servers periodically.<p>edit: on 2nd thought just a list of hashed cert ids could suffice because it is hard to imagine there ever being thousands of revocations.<p>That way the provider would have no knowledge of which certs are being verified.
mrcybermacover 4 years ago
I see no reason why OCSP checks on developer certificates cannot be encrypted. This whole &quot;oh no there could be a loop for a SSL cert check&quot; argument seems like gaslighting. Why can&#x27;t the client know if it wants to access an OCSP server using HTTP or HTTPS, and default to HTTPS when possible?
Nightshaxxover 4 years ago
The idea that sending information about the cert is somehow not exposing the app is crazy. An attacker could easily download apps and sniff the network traffic to correlate cert info with an app.<p>Also i don&#x27;t get the argument for using HTTP. Aren&#x27;t these two separate systems?
jzer0coolover 4 years ago
There is a local save which manages your app Screen Time (App Settings -&gt; Screen Time) but did not imagine hashes sent.<p>How does one go about setting up (easy) server of some sort to see what servers are being connected say when investigating a different area?
omkover 4 years ago
If this is just a matter of revoked certificates, Apple could very easily setup a subscription for developer certificates on the machine when an app is installed. Why wait to check if a certificate is revoked once an app is launched?
评论 #25099409 未加载
_57jbover 4 years ago
It feels like this is the type of response where we were at with Windows when they were forcing updates etc.<p>They backpedaled a little bit when you were forced to log in through a Microsoft account and people semi-rioted but came back pretty strong.
bitLover 4 years ago
Are there any pi-hole settings to prevent Apple from phoning home? And the same for Windows 10? I can&#x27;t trust my computers any longer so I need to rely on external enforcement.
kzrdudeover 4 years ago
To be generous, Apple has unwittingly created an app use surveillance possibility. All from the idea of developer certificates and diligent revocation checks.
Syzygiesover 4 years ago
We need a version of Little Snitch that allows these reports to reach Apple, modified so the app appears to always be &quot;Go fuck yourself&quot;.
tedd4uover 4 years ago
Seems like the solution is just put a short timeout on the OCSP call and fail positive? Nets the same behavior as when you’re offline.
评论 #25096351 未加载
chimenover 4 years ago
Do they bypass&#x2F;circumvent firewalls doing that? That&#x27;s the question you have to ask, not what they send (now).
pkuharover 4 years ago
i feel this is irrelevant. apple offers app analytics to developers. which means app usage data is going to apple anyway.<p><a href="https:&#x2F;&#x2F;developer.apple.com&#x2F;app-store-connect&#x2F;analytics&#x2F;" rel="nofollow">https:&#x2F;&#x2F;developer.apple.com&#x2F;app-store-connect&#x2F;analytics&#x2F;</a>
评论 #25097010 未加载
gjsman-1000over 4 years ago
I would be surprised if Apple doesn&#x27;t make changes to this system after this incident.
pubkraalover 4 years ago
If anyone is concerned with ocsp activity and verifications being requested all over the web, then oh boy stay away from https.<p>OCSP is a good thing, and the web - and your signed applications - are better off with it.
评论 #25096242 未加载
评论 #25096199 未加载
评论 #25096301 未加载
评论 #25096182 未加载
stmfreakover 4 years ago
Yes.
sildurover 4 years ago
tldr: no, but yes.<p>It logs app certificate requests which in real life is pretty much equivalent to logging app runs. And that line about only calling the server from time to time is bullcrap. I have years of experience on this issue because my internet is pretty shitty. And that &quot;from time to time&quot; is every couple of hours.
orionblastarover 4 years ago
We have been warned and ignored the warning: <a href="https:&#x2F;&#x2F;prism-break.org&#x2F;en&#x2F;" rel="nofollow">https:&#x2F;&#x2F;prism-break.org&#x2F;en&#x2F;</a>
apiover 4 years ago
There are two issues here. One is the privacy problem which I agree is not quite as bad as some think. The second is the stupid fact that if some server goes down you can’t launch apps. That is just awful.
supernova87aover 4 years ago
I think it would help if someone could quote or reference Apple&#x27;s official position &#x2F; explanation on this (if there is one).<p>You know, before declaring the end of the world, is there any information from the source (Apple)? Discussions here seem to have had several thousand comments without obtaining this basic info. It would be good to know, I would think?
评论 #25096348 未加载