×
Privacy

Is Your Phone Infected With Pegasus? (fossbytes.com) 75

Fossbytes has an article detailing how you can check to see if your mobile device is infected with the "Pegasus" spyware. What's Pegasus you ask? It's phone-penetrating spy software developed by NSO Group and sold to governments to target journalists and activists around the world. The CEO of NSO Group says law-abiding citizens have "nothing to be afraid of," but that doesn't help us sleep any better. Here's how to check if your device has been compromised (heads up: it's a bit of a technical and lengthy process): First off, you'll need to create an encrypted backup and transfer it to either a Mac or PC. You can also do this on Linux instead, but you'll have to install libimobiledevice beforehand for that. Once the phone backup is transferred, you need to download Python 3.6 (or newer) on your system -- if you don't have it already. Here's how you can install the same for Windows, macOS, and Linux. After that, go through Amnesty's manual to install MVT correctly on your system. Installing MVT will give you new utilities (mvt-ios and mvt-android) that you can use in the Python command line. Now, let's go through the steps for detecting Pegasus on an iPhone backup using MVT.

First of all, you have to decrypt your data backup. To do that, you'll need to enter the following instruction format while replacing the placeholder text (marked with a forward slash) with your custom path: "mvt-ios decrypt-backup -p password -d /decrypted /backup". Note: Replace "/decrypted" with the directory where you want to store the decrypted backup and "/backup" with the directory where your encrypted backup is located.

Now, we will run a scan on the decrypted backup, referencing it with the latest IOCs (possible signs of Pegasus spyware), and store the result in an output folder. To do this, first, download the newest IOCs from here (use the folder with the latest timestamp). Then, enter the instruction format as given below with your custom directory path: "mvt-ios check-backup -o /output -i /pegasus.stix2 /backup". Note: Replace "/output" with the directory where you want to store the scan result, "/backup" with the path where your decrypted backup is stored, and "/pegasus.stix2" with the path where you downloaded the latest IOCs.

After the scan completion, MVT will generate JSON files in the specified output folder. If there is a JSON file with the suffix "_detected," then that means your iPhone data is most likely Pegasus-infected. However, the IOCs are regularly updated by Amnesty's team as they develop a better understanding of how Pegasus operates. So, you might want to keep running scans as the IOCs are updated to make sure there are no false positives.

Encryption

Amazon Rolls Out Encryption For Ring Doorbells (zdnet.com) 53

Starting today in the U.S. (and other countries in the not too distant future), you'll be able to encrypt the video footage captured via your Ring devices. ZDNet reports: This is done with Amazon's Video End-to-End Encryption (E2EE). If you decide to install this optional privacy feature, you'll need to install a new version of the Ring application on your smartphone. Once installed, it uses a Public Key Infrastructure (PKI) security system based on an RSA 2048-bit asymmetric account signing key pair. In English, the foundation is pretty darn secure.

Earlier, Ring already encrypted videos when they are uploaded to the cloud (in transit) and stored on Ring's servers (at rest). Law enforcement doesn't have automatic access to customer devices or videos. You choose whether or not to share footage with law enforcement. With E2EE, customer videos are further secured with an additional lock, which can only be unlocked by a key that is stored on the customer's enrolled mobile device, designed so that only the customer can decrypt and view recordings on their enrolled device. In addition, you'll need to opt into using E2EE. It doesn't turn on automatically with the software update. You'll also need to set a passphrase, which you must remember. AWS doesn't keep a copy. If you lose it, you're out of luck. [Just know that if you use E2EE, various features will be missing, such as sharing your videos, being able to view encrypted videos on Ring.com, the Windows desktop app, the Mac desktop app, or the Rapid Ring app, and the Event Timeline. E2EE also won't work with many Ring devices.]
ZDNet notes that while police can still ask for or demand your video and audio content, they won't be able to decrypt your E2EE end-to-end encrypted video "because the private keys required to decrypt the videos are only stored on customer's enrolled mobile devices."
Privacy

Passwords In Amazon Echo Dots Live On Even After You Factory-Reset the Device (arstechnica.com) 22

An anonymous reader quotes a report from Ars Technica: Like most Internet-of-things (IoT) devices these days, Amazon's Echo Dot gives users a way to perform a factory reset so, as the corporate behemoth says, users can "remove any... personal content from the applicable device(s)" before selling or discarding them. But researchers have recently found that the digital bits that remain on these reset devices can be reassembled to retrieve a wealth of sensitive data, including passwords, locations, authentication tokens, and other sensitive data. Most IoT devices, the Echo Dot included, use NAND-based flash memory to store data. Like traditional hard drives, NAND -- which is short for the boolean operator "NOT AND" -- stores bits of data so they can be recalled later, but whereas hard drives write data to magnetic platters, NAND uses silicon chips. NAND is also less stable than hard drives because reading and writing to it produces bit errors that must be corrected using error-correcting code.

Researchers from Northeastern University bought 86 used devices on eBay and at flea markets over a span of 16 months. They first examined the purchased devices to see which ones had been factory reset and which hadn't. Their first surprise: 61 percent of them had not been reset. Without a reset, recovering the previous owners' Wi-Fi passwords, router MAC addresses, Amazon account credentials, and information about connected devices was a relatively easy process. The next surprise came when the researchers disassembled the devices and forensically examined the contents stored in their memory. "An adversary with physical access to such devices (e.g., purchasing a used one) can retrieve sensitive information such as Wi-Fi credentials, the physical location of (previous) owners, and cyber-physical devices (e.g., cameras, door locks)," the researchers wrote in a research paper. "We show that such information, including all previous passwords and tokens, remains on the flash memory, even after a factory reset."

After extracting the flash contents from their six new devices, the researchers used the Autospy forensic tool to search embedded multimedia card images. The researchers analyzed NAND dumps manually. They found the name of the Amazon account owner multiple times, along with the complete contents of the wpa_supplicant.conf file, which stores a list of networks the devices have previously connected to, along with the encryption key they used. Recovered log files also provided lots of personal information. After dumping and analyzing the recovered data, the researchers reassembled the devices. The researchers wrote: "Our assumption was, that the device would not require an additional setup when connected at a different location and Wi-Fi access point with a different MAC address. We confirmed that the device connected successfully, and we were able to issue voice commands to the device. When asked 'Alexa, Who am I?', the device would return the previous owner's name. The re-connection to the spoofed access point did not produce a notice in the Alexa app nor a notification by email. The requests are logged under 'Activity' in the Alexa app, but they can be deleted via voice commands. We were able to control smart home devices, query package delivery dates, create orders, get music lists and use the 'drop-in' feature. If a calendar or contact list was linked to the Amazon account, it was also possible to access it. The exact amount of functionality depends on the features and skills the previous owner had used."
Furthermore, the researchers were able to find the rough location of the previous owner's address by asking questions about nearby restaurants, grocery stores, and public libraries. "In a few of the experiments, locations were accurate up to 150 meters," reports Ars.

An Amazon spokeswoman said: "The security of our devices is a top priority. We recommend customers deregister and factory reset their devices before reselling, recycling, or disposing of them. It is not possible to access Amazon account passwords or payment card information because that data is not stored on the device." The threats most likely apply to Fire TV, Fire Tablets, and other Amazon devices, as well as many other NAND-based devices that don't encrypt user data, including the Google Home Mini.
OS X

Apple Makes OS X Lion and Mountain Lion Free To Download (macrumors.com) 47

Mac OS X Lion and OS X Mountain Lion can now be downloaded for free from Apple's website. "Apple has kept OS X 10.7 Lion and OS X 10.8 Mountain Lion available for customers who have machines limited to the older software, but until recently, Apple was charging $19.99 to get download codes for the updates," notes MacRumors. "The $19.99 fee dates back to when Apple used to charge for Mac updates. Apple began making Mac updates free with the launch of OS X 10.9 Mavericks, which also marked the shift from big cat names to California landmark names." From the report: Mac OS X Lion is compatible with Macs that have an Intel Core 2 Duo, Core i3, Core i5, Core i7, or Xeon processor, a minimum of 2GB RAM, and 7GB storage space. Mac OS X Mountain Lion is compatible with the following Macs: iMac (Mid 2007-2020), MacBook (Late 2008 Aluminum, or Early 2009 or newer), MacBook Pro (Mid/Late 2007 or newer), MacBook Air (Late 2008 or newer), Mac mini (Early 2009 or newer), Mac Pro (Early 2008 or newer), and Xserve (Early 2009). Macs that shipped with Mac OS X Mavericks or later are not compatible with the installer, however.
Robotics

Do Security Robots Reduce Crime? (nbcnews.com) 50

Westland Real Estate Group patrols its 1,000-unit apartment complex in Las Vegas with "a conical, bulky, artificial intelligence-powered robot" standing just over 5 feet tall, according to NBC News. Manufactured by Knightscope, the robot is equipped with four internal cameras capturing a constant 360-degree view, and can also scan and record license plates (as well as the MAC addresses of cellphones). But is it doing any good? As more government agencies and private sector companies resort to robots to help fight crime, the verdict is out about how effective they are in actually reducing it. Knightscope, which experts say is the dominant player in this market, has cited little public evidence that its robots have reduced crime as the company deploys them everywhere from a Georgia shopping mall to an Arizona development to a Nevada casino. Knightscope's clients also don't know how much these security robots help. "Are we seeing dramatic changes since we deployed the robot in January?" Dena Lerner, the Westland spokesperson said. "No. But I do believe it is a great tool to keep a community as large as this, to keep it safer, to keep it controlled."

For its part, Knightscope maintains on its website that the robots "predict and prevent crime," without much evidence that they do so. Experts say this is a bold claim. "It would be difficult to introduce a single thing and it causes crime to go down," said Ryan Calo, a law professor at the University of Washington, comparing the Knightscope robots to a "roving scarecrow." Additionally, the company does not provide specific, detailed examples of crimes that have been thwarted due to the robots.

The robots are expensive — they're rented out at about $70,000-$80,000 a year — but growth has stalled for the two years since 2018, and over four years Knightscope's total clients actually dropped from 30 to just 23. (Expenses have now risen — partly because the company is now doubling its marketing budget.)

There's also a thermal scanning feature, but Andrew Ferguson, a law professor at American University, still called these robots an "expensive version of security theater." And NBC News adds that KnightScope's been involved "in both tragic and comical episodes." In 2016, a K5 roaming around Stanford Shopping Center in Palo Alto, California, hit a 16-month-old toddler, bruising his leg and running over his foot. The company apologized, calling it a "freakish accident," and invited the family to visit the company's nearby headquarters in Mountain View, which the family declined. The following year, another K5 robot slipped on steps adjacent to a fountain at the Washington Harbour development in Washington, D.C., falling into the water. In October 2019, a Huntington Park woman, Cogo Guebara, told NBC News that she tried reporting a fistfight by pressing an emergency alert button on the HP RoboCop itself, but to no avail. She learned later the emergency button was not yet connected to the police department itself... [The northern California city] Hayward dispatched its robot in a city parking garage in 2018. The following year, a man attacked and knocked over the robot. Despite having clear video and photographic evidence of the alleged crime, no one was arrested, according to Adam Kostrzak, the city's chief information officer.
The city didn't renew its contract "due to the financial impact of Covid-19 in early 2020," the city's CIO tells NBC News. But the city had already spent over $137,000 on the robot over two years.
Open Source

Ubuntu-maker Canonical Will Support Open Source Blender on Windows, Mac, and Linux (betanews.com) 24

An anonymous reader shares a report: Blender is one of the most important open source projects, as the 3D graphics application suite is used by countless people at home, for business, and in education. The software can be used on many platforms, such as Windows, Mac, and of course, Linux. Today, Ubuntu-maker Canonical announces it will offer paid enterprise support for Blender LTS. Surprisingly, this support will not only be for Ubuntu users. Heck, it isn't even limited to Linux installations. Actually, Canonical will offer this support to Blender LTS users on Windows, Mac, and Linux.
Games

Amazon Will Open Luna Cloud Gaming To Prime Members Later this Month (engadget.com) 30

Amazon's new Luna game streaming service is offering no-invite access on Prime Day, June 21 and 22. From a report: During that time, Prime subscribers in most of the US will be able to start a 7-day Luna trial, and can now get discounts on a Luna controller and Fire TV bundle. To access Luna currently, you must request an invitation or own a supported Fire TV device. It's available on Windows and Mac PCs, Fire TV, iPhone and iPad (via the web) and on supported Android phones. It costs $5.99 a month to access games including Resident Evil 7, Control, Tacoma, Rez Infinite and Metro Exodus. Amazon is discounting the dedicated Luna controller by 30 percent from today until June 22, reducing it to $49 from the list price $70 for Prime members. On top of that, it's offering the Fire TV stick 4K and Luna Controller in the Fire TV Gaming Bundle for $74, a discount of around $45.
Windows

Apple Adds Support For Windows Precision Touchpad Gestures in New Boot Camp Update (theverge.com) 9

Apple is finally adding support for Windows Precision Touchpad drivers in its latest Boot Camp update. The new 6.1.15 update includes support for Windows Precision Touchpad, including single tap to click, lower-right corner to right-click, down motion to scroll up, and three or four finger gestures. From a report: Various Reddit users noticed the surprise update went live yesterday, and it apparently works better than third-party solutions like Trackpad++ and mac-precision-touchpad that people have had to use for years. "Works way better than both of them with better palm and thumb detection too," says one Reddit user. Microsoft first started introducing Windows Precision Touchpad with Intel in 2013, in an effort to fix what were notorious PC trackpad issues at the time. It has taken Apple a long time to enable Windows Precision Touchpad in Boot Camp, but not every MacBook is supported. An Apple support document notes that only Mac computers with a T2 chip will be able to access Windows Precision Touchpad, which is most MacBook Air and MacBook Pro models from 2018 onward.
Desktops (Apple)

Several macOS Monterey Features Unavailable on Intel-Based Macs (macrumors.com) 141

Several of macOS Monterey's features won't be available to users with an Intel-powered Macs. On the macOS Monterey features page, fine print indicates that the following features require a Mac with the M1 chip, including any MacBook Air, 13-inch MacBook Pro, Mac mini, and iMac model released since November 2020: 1. Portrait Mode blurred backgrounds in FaceTime videos
2. Live Text for copying and pasting, looking up, or translating text within photos
3. An interactive 3D globe of Earth in the Maps app
4. More detailed maps in cities like San Francisco, Los Angeles, New York, and London in the Maps app
5. Text-to-speech in more languages, including Swedish, Danish, Norwegian, and Finnish
6. On-device keyboard dictation that performs all processing completely offline
7. Unlimited keyboard dictation (previously limited to 60 seconds per instance)

Programming

Swift Playgrounds For iPadOS 15 Lets You Build Apps On the iPad, Submit Them To the App Store (9to5mac.com) 28

For the first time, you can code, iterate and build apps on the iPad itself. 9to5Mac reports: Using Swift Playgrounds on iPadOS 15, customers will be able to create iPhone and iPad apps from scratch and then deploy them to the App Store. It remains to be seen how limited or not the development experience will be. It is probably notable that Apple chose not to rebrand this as "Xcode," signifying that you aren't going to be able to do everything you can do with Xcode on the Mac. TechCrunch highlights some of the other new features available in iPadOS 15: iPadOS 15 retains the overall look and feel of the current iPad operating system. The updates in the new OS are mostly centered around multitasking. The iPad's widget support gets a big update with iPadOS 15. The widgets are larger, more immersive and dynamic. And, iOS's App Library is finally available on the iPad, where it tweaks the overall user experience. The feature, added to the iPhone in 2020, presents the user with an organized view of the apps on the iPad.

Also added to iPadOS 15 is a new multitasking system. Called Split View, a drop-down menu at the top of the screen unlocks several multitasking, multiwindow options. The system seems much smoother than the current multiscreen option on iPad OS, which is clunky and hidden. With Split View a feature called Shelf makes it easy to switch between different screens and screen grouping.

OS X

Apple Announces macOS Monterey, the Next Mac Desktop Operating System (arstechnica.com) 54

One of the biggest new features of macOS Monterey, the next version of macOS announced at WWDC, is the ability to share a keyboard and mouse across an iMac, MacBook, and iPad. It's called "Universal Control" and it's coming this Fall. Ars Technica reports: Apple SVP of Software Engineering Craig Federighi demonstrated the ability to simply set an iPad near a Mac, move the cursor of the latter toward the former, and have the iPad automatically recognize it. This means users can directly drag and drop files between devices, for instance. Apple demonstrated this feature across an iMac, MacBook, and iPad in concert. Beyond that, macOS Monterey will make it possible to AirPlay video, audio, documents, and other items from an iPad or iPhone directly to a Mac.

The update also brings the Shortcuts feature first seen on iPhones and iPads, allowing users to access automated tasks and workflows on the Mac. Apple says the existing Automator app will continue to be supported with Monterey and that users will be able to import existing Automator workflows into Shortcuts. Safari will also receive something of a makeover with Monterey, bringing a thinner and visually cleaner toolbar alongside more compact tabs. Active tab bars will now house the traditional URL and search bar, and tabs can now be grouped together and accessed through Safari's sidebar. These tab groups can then be accessed and updated across Macs, iPhones, and iPads.

The update will include a number of features from the newly announced iOS 15 and iPadOS 15 updates as well. This includes a SharePlay feature that lets users share content or their current device screen over a FaceTime call and a Focus feature that filters and minimizes notifications when users indicate they are in the middle of a particular activity ("coding," "gaming," etc.).

Android

FaceTime is Coming To Android and Windows Via the Web (theverge.com) 57

Android and Windows users will finally be able to join FaceTime calls. From a report: During its WWDC keynote, Apple announced that FaceTime is going to be available on the web so users can call in from Android devices and Windows PCs. The video calling service was previously only available on iOS and Mac devices. Apple is turning FaceTime into a bit more of a Zoom-like video calling service with this update. FaceTime is also going to allow you to grab a link to a scheduled call, so that you can share it with people in advance and join in at the right time.
Software

One Startup's Quest to Take on Chrome and Reinvent the Web Browser (protocol.com) 101

"The web browser is a crucial part of modern life, and yet it hasn't really been revised since the '90s," writes Protocol. "That may be about to change." The browser tab is an underrated thing. Most people think of them only when there are too many, when their computer once again buckles under Chrome's weight. Even the developers who build the tabs — the engineers and designers working on Chrome, Firefox, Brave and the rest — haven't done much to them. The internet has evolved in massive, earth-shaking ways over the last two decades, but tabs haven't really changed since they became a browser feature in the mid '90s.

Josh Miller, however, has big plans for browser tabs. Miller is the CEO of a new startup called The Browser Company, and he wants to change the way people think about browsers altogether. He sees browsers as operating systems, and likes to wonder aloud what "iOS for the web" might look like. What if your browser could build you a personalized news feed because it knows the sites you go to? What if every web app felt like a native app, and the browser itself was just the app launcher? What if you could drag a file from one tab to another, and it just worked? What if the web browser was a shareable, synced, multiplayer experience? It would be nothing like the simple, passive windows to the web that browsers are now. Which is exactly the goal.

The Browser Company (which everyone on the team just calls Browser) is one of a number of startups that are rethinking every part of the browser stack. Mighty has built a version of Chrome that runs on powerful server hardware and streams the browser itself over the web. Brave is building support for decentralized protocols like IPFS, and experimenting with using cryptocurrencies as a new business model for publishers. Synth is building a new bookmarks system that acts more like a web-wide inbox. Sidekick offers a vertical app launcher and makes tabs easier to organize. "A change is coming," said Mozilla CEO Mitchell Baker. "The question is just the time frame, and what's actually required to make it happen."

They have lots of different ideas, but they share a belief that the browser can, and should, be more than it is. "We don't need a new web browser," Miller said. "We need a new successor to the web browser."

While he was at the White House, Chief Digital Officer (and Miller's boss) Jason Goldman said something Miller couldn't forget. "Platforms have all the leverage," is how Miller remembers it. "And if you care about the future of the internet, or the way we use our computers, or want to improve any of the things that are broken about technology ... you can't really just build an application. Platforms, whether it's iOS or Windows or Android or Mac OS, that's where all the control is."

Security

Asahi Linux Dev Reveals 'M1RACLES' Flaw In Apple M1 (tomshardware.com) 47

AmiMoJo shares a report from Tom's Hardware: Asahi Linux developer Hector Martin has revealed a covert channel vulnerability in the Apple M1 chip that he dubbed M1RACLES, and in the process, he's gently criticized the way security flaws have started to be shared with the public. Martin's executive summary for M1RACLES sounds dire: "A flaw in the design of the Apple Silicon 'M1' chip allows any two applications running under an OS to covertly exchange data between them, without using memory, sockets, files, or any other normal operating system features. This works between processes running as different users and under different privilege levels, creating a covert channel for surreptitious data exchange. [...] The vulnerability is baked into Apple Silicon chips, and cannot be fixed without a new silicon revision."

He also noted that this was the result of an intentional decision on Apple's part. "Basically, Apple decided to break the ARM spec by removing a mandatory feature, because they figured they'd never need to use that feature for macOS," he explained. "And then it turned out that removing that feature made it much harder for existing OSes to mitigate this vulnerability." The company would have to make a change on the silicon level with its followup to the M1 to mitigate this flaw. But he also made it clear in the FAQ that Mac owners shouldn't be particularly worried about M1RACLES because that covert channel affects two bits. It can be expanded, and Martin said that transfer rates over 1 MB/s are possible "without much optimization," but any malicious apps that might take advantage of such methods would be far more likely to share information via other channels. Calling this a two-bit vulnerability would be both technically and linguistically correct. It's a real security flaw, sure, but it's unlikely to pose a real threat to Apple's customers.

Data Storage

Apple's Moves Point To a Future With No Bootable Backups, Says Developer (appleinsider.com) 105

The ability to boot from an external drive on an Apple Silicon Mac may not be an option for much longer, with the creation and use of the drives apparently being phased out by Apple, according to developers of backup tools. Apple Insider reports: Mike Bombich, the founder of Bombich Software behind Carbon Copy Cloner, wrote in a May 19 blog post that the company will continue to make bootable backups for both Intel and Apple Silicon Macs, and will "continue to support that functionality as long as macOS supports it." However, with changes in the way a Mac functions with the introduction of Apple Silicon, the ability to use external booting could be limited, in part due to Apple's design decisions.

The first problem is with macOS Big Sur, as Apple made it so macOS resides on a "cryptographically sealed Signed System Volume," which could only be copied by Apple Software Restore. While CCC has experience with ASR, the tool was deemed to be imperfect, with it failing "with no explanation" and operating in a "very one-dimensional" way. The second snag was Apple Fabric, a storage system that uses per-file encryption keys. However, ASR didn't work for months until the release of macOS 11.3 restored it, but even then kernel panics ensued when cloning back to the original internal storage.

In December, Bombich spoke to Apple about ASR's reliability and was informed that Apple was working to resolve the problem. During the call, Apple's engineers also said that copying macOS system files was "not something that would be supportable in the future." "Many of us in the Mac community could see that this was the direction Apple was moving, and now we finally have confirmation," writes Bombich. "Especially since the introduction of APFS, Apple has been moving towards a lockdown of macOS system files, sacrificing some convenience for increased security." [...] While CCC won't drop the ability to copy the System folder, the tool is "going to continue to offer it with a best effort' approach." Meanwhile, for non-bootable data restoration, CCC's backups do still work with the macOS Migration Assistant, available when booting up a new Mac for the first time.

IOS

Apple Releases iOS and iPadOS 14.6, macOS Big Sur 11.4 (macrumors.com) 26

Apple today released macOS Big Sur 11.4, the fourth major update to the macOS Big Sur, operating system that launched in November 2020. From a report: The new macOS Big Sur 11.4 update can be downloaded for free on all eligible Macs using the Software Update section of System Preferences. macOS Big Sur 11.4 lays the groundwork for two upcoming Apple Music features: Spatial Audio with Dolby Atmos and Lossless Audio, both of which will be available on the Mac. It also adds support for Apple Podcasts subscriptions, and fixes a number of bugs. Apple today also released iOS and iPadOS 14.6, marking the sixth major updates to the iOS and iPadOS operating systems that initially came out in September 2020. From a report: The iOS and iPadOS 14.5 updates can be downloaded for free and the software is available on all eligible devices over-the-air in the Settings app. To access the new software, go to Settings - General - Software Update. iOS 14.6 introduces support for several previously announced features. It lays the groundwork for the Apple Music Spatial Audio with Dolby Atmos and Lossless Audio functionality, but these new Apple Music capabilities aren't expected to launch until June. The update also adds support for Apple Card Family for sharing Apple Cards, it introduces new Podcast subscription options, and it adds new AirTags capabilities, in addition to addressing several bugs.
IOS

Apple Wants Users To Trust iOS, But It Doesn't Trust iOS Users (theverge.com) 105

Apple's software engineering head Craig Federighi had a tricky task in the Epic v. Apple trial: explaining why the Mac's security wasn't good enough for the iPhone. From a report: Mac computers have an official Apple App Store, but they also allow downloading software from the internet or a third-party store. Apple has never opened up iOS this way, but it's long touted the privacy and security of both platforms. Then Epic Games sued Apple to force its hand, saying that if an open model is good enough for macOS, Apple's claims about iOS ring hollow. On the stand yesterday, Federighi tried to resolve this problem by portraying iPhones and Macs as dramatically different devices -- and in the process, threw macOS under the bus.

The second difference is data sensitivity. "iPhones are very attractive targets. They are very personal devices that are with you all the time. They have some of your most personal information -- of course your contacts, your photos, but also other things," he said. Mobile devices put a camera, microphone, and GPS tracker in your pocket. "All of these things make access or control of these devices potentially incredibly valuable to an attacker." That may undersell private interactions with Macs; Epic's counsel Yonatan Even noted that many telemedicine calls and other virtual interactions happen on desktop. Still, it's fair to say phones have become many people's all-purpose digital lockboxes. The third difference is more conceptual. Federighi basically says iOS users need to be more protected because the Mac is a specialist tool for people who know how to navigate the complexities of a powerful system, while the iPhone and iPad are -- literally -- for babies.

Desktops (Apple)

Craig Federighi Says the Mac Has An 'Unacceptable' Malware Problem (9to5mac.com) 99

Craig Federighi is currently testifying during the Apple vs. Epic lawsuit. While facing questioning from Apple's lawyers, Federighi made some interesting comments about security, particularly noting that the Mac currently has a level of malware that Apple "does not find acceptable." 9to5Mac reports: One of Federighi's goals is to paint the iPhone ecosystem, including the App Store and lack of side-loading support, as a secure and trusted environment for users. To do this, it appears that part of Federighi's strategy is to throw the Mac under the bus. Judge Yvonne Gonzalez Rogers, who is presiding over the Epic vs. Apple case, asked Federighi about why the Mac can have multiple app stores, but not the iPhone. "It is regularly exploited on the Mac," Federighi explained. "iOS has established a dramatically higher bar for customer protection. The Mac is not meeting that bar today." "Today, we have a level of malware on the Mac that we don't find acceptable," Federighi added.

The Apple executive also pointed to Android as another example of a platform with multiple app stores that suffers from security problems. "It's well understood in the security community that Android has a malware problem," he explained. "iOS has succeeded so far in staying ahead of the malware problem." Federighi added that Apple is essentially playing "an endless game of whack-a-mole" with malware on the Mac and has to block "many instances" of infections that can affect "hundreds of thousands of people" every week. Since last May, Federighi testified there have been 130 types of Mac malware, and one of them infected 300,000 systems. When asked whether side-loading would affect security on iOS, Federighi said things would change "dramatically. No human policy review could be enforced because if software could be signed by people and downloaded directly, you could put an unsafe app up and no one would check that policy," he said.

Portables (Apple)

Apple Readies MacBook Pro, MacBook Air Revamps With Faster Chips (bloomberg.com) 189

Apple is preparing to release several new Mac laptops and desktops with faster processors, new designs and improved connectivity to external devices, accelerating the company's effort to replace Intel chips and leapfrog rival PC makers. From a report: The overhaul encompasses a broad range of Macs, including Apple's higher-end laptop, the MacBook Pro; the laptop aimed at the mass market, the MacBook Air; and its desktop computers, the Mac Pro, iMac and Mac mini, according to people familiar with the matter. Redesigned MacBook Pros are expected to debut as soon as early this summer, said the people, who requested anonymity to discuss an internal matter, followed by a revamped MacBook Air, a new low-end MacBook Pro and an all-new Mac Pro workstation.

The company is also working on a higher-end Mac mini desktop and larger iMac. The machines will feature processors designed in-house that will greatly outpace the performance and capabilities of the current M1 chips, the people said. Apple plans to launch the redesigned MacBook Pros in 14-inch (code name J314) and 16-inch screen (J316) sizes. They'll have a redesigned chassis, magnetic MagSafe charger and more ports for connecting external drives and devices. Apple is also bringing back the HDMI port and SD card slot, which it nixed in previous versions, sparking criticism from photographers and the like.

Classic Games (Games)

After 35 Years, Classic Shareware Game 'Cap'n Magneto' Finally Fully Resurrected (statesman.com) 23

A newspaper in Austin, Texas shares the story behind a cult-classic videogame, the 1985 Macintosh shareware game "Cap'n Magneto."

It was the work of Al Evans, who'd "decided to live life to the fullest after suffering severe burn injuries in 1963" at the age of 17. Beneath the surface, "Cap'n Magneto" is a product of its creator's own quest to overcome adversity after a terrible car crash — an amalgamation of hard-earned lessons on the value of relationships, being an active participant in shaping the world and knowing how to move on... "Whether I was going to survive at all was very iffy," Evans said. "The chance of me living to the age of 28 or 30 was below 30% or something like that." Regardless of how much time he had left, Evans said he refused to let his injuries hold him back from living his life to the fullest. He would live his life with honesty, he decided, and do his best to always communicate with others truthfully. "I wasn't going to spend the next two years of my life dorking around different hospitals. So I said what's the alternative?" Evans said...

To float his many hobbies and interests, however, Evans knew he had to make money. In addition to doing work as a graphic designer and a translator, he picked up computer programming, which opened his eyes to a digital frontier that allowed for the creation of new worlds with the stroke of a keyboard. When he realized the technical capabilities of the Macintosh — the first personal computer that had a graphics-driven user interface and a built-in mouse function — Evans said he set out to build a world that could marry storytelling and graphics. With the help of his wife Cea, Evans created his one and only computer game: "Cap'n Magneto."

"I really wanted to write a good game, and I definitely think it was that," Evans said...

Australia-based gaming historian, author and journalist Richard Moss says, "What really marked it as different, though, was that the alien speech, once ungarbled by a tricorder item that players had to find, would be spoken aloud through the Mac's built-in speech synthesizer and written on-screen in comic-style speech bubbles," Moss said. "And unlike most role playing games of the time, every character you'd meet in the game could be friendly and helpful or cold and dismissive or aggressive and hostile — depending on a mix of random chance and player choice...."

With "Cap'n Magneto," Evans said he wanted to make sure that players could befriend the non-playable alien characters that the hero encounters. Though the game is beatable without their help, it is significantly easier with the help of allies. A reality in which everyone was an enemy, to Evans, was simply dishonest.

"That doesn't reflect the game of life, you know? Some people, well, most people actually, are probably pretty friendly," he said.

35 years after its release, Evans — now 75 years old — received a message on Facebook informing him that the game was still being played — but no one could finish it because the built-in "nagware" required payments that couldn't be completed.

That problem has finally been fixed, and long-time Slashdot reader shanen now shares the web site where the full game can finally be downloaded.

Slashdot Top Deals