Have you read the source? (<a href="https://www.gnu.org/proprietary/malware-apple.html.en" rel="nofollow">https://www.gnu.org/proprietary/malware-apple.html.en</a>)<p>I'm sorry but that list doesn't provide any evidence of spying or backdoors. It's basically a list of vulnerabilities that have been patched, and features described in a way that makes them seem suspicious.<p>Imho, an article like that should provide proof.