Hacker News new | past | comments | ask | show | jobs | submit | al_borland's comments login

I thought WebOS looked great and thought it was the only real chance we ever had for a 3 platform. Much of the UI we take for granted in mobile devices today came from WebOS (such as card based app switching and swiping to close). I would have loved to see what it could become, rather than relegating it to TVs. iOS wasn't what it is today back then. It was still pretty new itself, and lacking what most would say are very basic features today.

I often wonder what HP would look like today had Léo Apotheker not been such an awful fit. The damage 1 person can do in less than a year is astonishing. He even proposed selling off the PC division. WebOS was a fairly new acquisition and very well could have been the future, but he couldn't see any vision outside of software with his background. HP was built on hardware, they did't need to pivot that hard. It seems the stockholders agreed.


I think there is another side to this that was briefly mentioned in passing.

When people adopt these identities, it often comes with a community. In an increasingly lonely world, these identities are a fast track to a feeling of belonging. To give up the identity is to give up the community and be cast back out into the wilderness alone.

Since these communities are only held together by these shared identities, they tend to be rigid and fragile… especially online where people are often more one-dimensional.


I’m not sure what it does, but if you scroll all the way down in the app, you can report an issue, if the current conditions you’re seeing don’t match the forecast.

It’s all theater so they can sell the idea that they’re doing everything they can, and if something does happen they can shift blame.

In many cases, it may be to fulfill rules associated with PCIDSS requirements, even if the company never sees the credit card. This all originates from consultants, and the consultants are engaged in security theater.

On the side of things, the risk of never needing your password is people tend to forget it.

Just the other week I was helping someone setup a TV and they thought they didn’t have an Amazon login, because they never needed to login. This was a Prime member.

1Password defaults to having users reauthenticate every 2 weeks. I do find this a bit annoying, but I find the occasional reminder of my password to be a necessity evil. Even doing it every 2 weeks for years, there are some days I have trouble bringing it to the front of my mind. And that would mean a hidden piece of paper somewhere with the password written down in case it’s forgotten. As I get older I should accept the idea that I should have these emergency systems in place if my mind does go, but it makes me uncomfortable.


It's a good point on password usability. Signal app periodically prompts you for the encryption PIN to make sure you don't forget it.

I think this should be handled out of band of the login process. Similar to "is xxx still your phone number?" -- companies could do periodic password hygiene and freshness checks.

Context matters. Companies forget that people are trying to get something important done, and blocking them for other attention is a huge frustration.


> Signal app periodically prompts you for the encryption PIN to make sure you don't forget it.

At least Signal does not block the app until you enter the PIN. WhatsApp forces you to enter it before you can reach your messages, which not only is annoying when you're in a hurry, but also forces you to type the PIN even when you're in a place where it might be seen by someone else.

On the other hand, on Signal it's possible to leave the warning forever at the bottom of the screen without acknowledging it and typing the PIN, which kind of defeats its purpose.


Apps need to treat these experiences more critically. I had a similar forced re-auth with Gaia when i was offline, losing my maps.

So here I am, lost, trying to find my way using a downloaded map, and the app won't let me in.

These are no longer casual entertainment experiences we are dealing with. Many of these apps are central to carrying on with life. And they are introducing new and unanticipated failure modes.


good point

Our work SSO is set to 12/24 hours in most places which seems like a decent compromise. Auth once a day

In a corporate environment, ideally your workstation password is tied to SSO and you have a short but reasonable lockscreen timeout where you need to re-type your password.


Was there a period where it was good? I tried in back around 2001 or 2002 and it produced a mess. I swore it off and figured it wouldn’t be around long. Here we are over 20 years later hearing that it’s too error-ridden to use.

These days something like MusicBrainz is effectively a legacy system. So few people buy CDs anymore that there's not a lot of interest in maintaining it. It's fairly hard to even find a computer with an optical disk reader these days, especially if you are looking at laptops.

Note that the scope of the project goes beyond CDs, it's a catalogue for pretty much any format where you can play music.

It's used as the basis in a _lot_ of places. So fixing errors fixes them in a lot of other websites (and infoboxes).

Never worked fine for me, at least not fine enough to trust it.

> I'm sure phones are just as stimulating for some.

This is one of my big objections do 2FA. My work has been pushing it hard, and from a security perspective, I get it. However, it’s all via an Authenticator app on the phone. We can no longer set down our phones and simply work. To start working, and periodically throughout the day, we are now forced to pickup our phones to authenticate. This invites the chance to see other notifications, check and app quickly, or more generally, break flow as we have to switch to another device and back again.

All of this seems like a suboptimal solution.


You should try a CLI-based workflow for 2FA. As long as you can exfiltrate the secret (and you often can by pretending you can't scan QR codes), then you can use oathtool to generate passcodes.

1. use 'pass' to save the secret: 'pass edit work.secret' <enter it and quit>

2. use oathtool to generate 2fa given a secret:

' #!/bin/bash

oathtool -b --totp "`pass show $1.secret`" >&1 '

use it like '2fa work'

If you have 'xsel' you can even do

'oathtool -b --totp "`pass show $1.secret`" | xsel -ib'

to copy it to clipboard automatically.


Even if you only have the QR code, you can download the image or screenshot it and then extract the secret without ever having to use a smartphone by using zbarimg and then manually extracting the secret from the URI:

    sudo apt-get install zbar-tools oathtool
    zbarimg qr-2fa-code.png
    
Output:

    QR-Code:otpauth://totp/username?secret=ABCDEFSECRET012349BASE32&period=30&digits=6
If you have some 2FA that you need to enter 10 times per day, then you can also add a global shortcut to automatically paste it. Of course, this undermines the "second device" security. Some PC password managers also support 2FA, e.g. https://github.com/paolostivanin/OTPClient ( sudo apt install otpclient )

I have this little one-liner mapped to a hotkey combo:

`bash -c 'xfce4-screenshooter -r -o zbarimg | gxmessage -title "Decoded Data" -fn "Consolas 12" -wrap -geometry 640x480 -file -'`

Works great if you have xfce4-screenshooter, gxmessage, and zbarimg installed. It allows you to draw a box around a screen region, screenshots it, decodes it via zbarimg, and pipes the output into a dialog box with copyable text.


Just to add, 'pass' has an otp extension to simplify this a bit [1]

With that, you can do

    $ zbarimg -q --raw qrcode.png | pass otp insert <some-name>
    $ pass otp <some-name>  # or pipe to xsel
[1] https://github.com/tadfisher/pass-otp

Heh, I use pass like this; but it's on my (Pine)Phone, so it doesn't solve the parent's original problem ;-)

Although the nice thing about CLI workflows is that I can easily run it by SSHing into my phone (just make sure you set up GPG so the passphrase prompt will appear in your terminal, and not as a popup on the phone!)


We also have Microsoft authentication that displays a number on the browser and asks you to enter in on the device! :-(

My company also uses MS auth + 2fa for everything. Even signing into corporate G-suite :-). But I do not like the Microsoft Authenticator - I previously had issues where it would not show the number - and I was able to switch to a different TOTP provider. It’s a bit buried in the menus but possible

Unless they have explicitly disabled it even m365 has the option to add a totp 2fa method. Might be worth double checking.

In my union contract we have language that requires the employer to provide us with a hardware 2FA token for just this reason. I and some of my coworkers don't use smartphones, and we didn't want to be obligated to use one for work.

"So long as [employer's] access management vendor... supports the use of physical two-factor authentication devices (for example, a YubiKey), [employer] shall make such devices available to Employees upon their submission of a request for the device."


I've worked in places that wanted to push cell phone apps on the team for auth and we also pushed for hardware tokens. It worked extremely well. The concerns we had were mainly centered on privacy since the app wanted location/camera access and apps can (or at least at the time could) get a ton of data from your device without requesting any permission at all like getting a list of every app you have installed, or data from sensors like the accelerometer, gyroscope, compass, barometer, thermometer, etc.

I'm old enough to have lived through the era of standalone authenticators. The downsides of that approach are also numerous.

I understand where you're coming from though, and I think this is where OS features like Focus Modes come into play.

When I'm in a "Work" mode, I literally don't see notifications from most of my apps. They don't show up in the notification center, or on app icon badges, or anywhere.

This takes a few minutes to set up, but once it's in place, it's fantastic. I also do this for other aspects of my life: Photography, Research, etc. When I'm in those modes, I don't want to see anything except for the apps that are specific to what I'm doing. It's worth the effort of setting this up IMO, and extends far beyond just work.


Hmm. I wonder if there would be a market for a super simple TOTP authentication device with an e-paper display. Kind of like those RSA tokens with the LCDs, but more modern and able to hold any number of TOTP credentials.

Getting the credentials loaded could be a bit of a pain without a camera for QR code scanning. Easiest solution would be via Bluetooth to a companion app, which you would probably want anyway for periodic time sync (likely wouldn't be worth it to embed a GNSS receiver just to update the time).

Probably be a pretty small market, but as a niche Kickstarter device? I could see a small but loyal customer base.


Sounds like a job for a second phone, one which you'd just be extra careful to only use for one purpose. It can be cheap as balls, but it will have a QR-compatible camera and whatever else we may have come to expect from such a device. :)

Yup. Just use a secondary 5-year old phone for dirt cheap. I was actually considering doing it once, but the convenience takes a hit.

Make sure your GNSS receiver supports OSNMA, and be _extremely_ trusting of your battery-backed RTC and profoundly skeptical of time jumps over a certain magnitude.

GNSS spoofing is trivial now and it's an extremely useful way to manipulate a target device's idea of time, which breaks all sorts of things. (SSL certificate validity periods...)


This is nearly what you’re looking for (well, not that close, but it’s got the right spirit):

https://blog.singleton.io/posts/2022-10-17-otp-on-wrist/


I would love this, but only if it also successfully implemented a few disparate authentication protocols that essentially do the same things (prove identity) but are regrettably proprietary - like the de facto standard electronic ID in Sweden, BankID.


Yubikey?

Yubikey does TOTP on-board, but you need to connect it to a phone or computer (no display or on-board power). It solves a different problem, where you want to have your TOTP credentials on a tamper resistant hardware security module. It doesn't solve the "don't want to carry around a phone for TOTP" problem.

This doesnt make sense. If you need a 2FA code then you are obviously using some device like a laptop already. Yubikey totally solves the "need a second personal device" problem.

> It doesn't solve the "don't want to carry around a phone for TOTP" problem.

It does—if you carry the Yubikey you don't need a phone.


If you read a six-digit pin from an e-ink display, you have to type it into your computer.

If you grab it from a plugged-in yubikey, you can copy and paste it. That seems way easier


A yubikey works great for this

I used to use a yubikey but have now moved onto a fingerprint sensor and passkeys. Doesnt work for all sites but does for most of them.

they exist, in my country they are available as alternative to smartphone apps for identity auth. (ie you can choose between android, iphone, and TOTP LCD device.)

Flipper Zero supports that

Have you tried a smart watch? The Duo 2FA app lets you add an arbitrary TFA code based authenticator with same QR code Google Authenticator supports and generate those from their Apple WatchOS [0] or Android WearOS apps. I have used it successfully for years, it's a huge reason I got an Apple Watch in fact. Now you'll have to configure your watch with a "work" focus mode that turns off all notifications and not install any fancy apps on the watch (do those still exist?), but it can free you from your phone.

Along the same lines the Meta Wayfarer[2] smart glasses lets you take slice of life photos and videos without needing to whip out your phone. You lose a ton of quality but stay in the moment more. The AI features are getting better so eventually you'll be able to use it for basic information lookup.

0 - https://guide.duo.com/apple-watch

1 - https://guide.duo.com/duo-wear

2 - https://www.meta.com/ai-glasses/wayfarer


Yubikey nanos are the way out of that specific problem

I imagine Yubikey doesn't support all the stupid custom-app-2fa that companies push out.

I really wish they'd just stick to classic TOTP.


Is there a way of getting them to store a dozen or so totp secrets? And if so, how do you select which one you want to use?


Taking the 2 out of 2FA since 2017!</sarcasm>

Thanks for sharing a potentially useful tool but I will not use it without a lot more details about how this browser extension secures the 2FA secrets from sketchy websites/ads.


Most trusted desktop password manager apps can manage and autofill OTPs in browsers as well, e.g. KeepassXC and 1password. (If you're making the tradeoff anyway, I think you may as well use a password manager you already trust with other secrets.)

keepassxc does great with TOTP codes, but the default client isn't the easiest to add them with.

This is one of the thing that smart watches should be doing, or even better, something like https://blog.singleton.io/posts/2022-10-17-otp-on-wrist/.

First of all, I'm not a fan of constantly needing to re-authenticate.

But for your specific problem there is a simple solution that isn't particularly expensive. Buy a new phone. Install 2FA on it, and don't install anything else.


I just use an old phone that I've wiped clean and removed the SIM. Sits on the desk and I just glance at it when I need a new 2FA code.

I imagine you've considered it already, but maybe your work would be willing to put the 2FA secret into something like 1Password, which you could access on your computer instead of your phone.

Defeats the purpose of 2FA though. I'd argue a cheap 2FA-only phone would be good, if they're struggling to touch their real phone without being consumed by distractions.

It does not defeat the purpose of 2FA as possession of the decrypted 1Password vault is the second factor.

Isn't that just remembering two passwords instead of one? And isn't two passwords instead of one basically the same as remembering one very long password?

For that matter, how do they prevent you from using the same password for both?


https://news.ycombinator.com/item?id=44259556

I posted another comment explaining why 1Password Vault with both a password and a OTP code is still secure, but in short it does not defeat the purpose. Your vault's are protected and in the situation where someone gets access to your vault it's most likely to be full access to your computer at which point they have other viable methods to get access to a specific service you use.


Isn't the whole point of 2fa that if someone gets access to my computer they can't do shit because they'd need my phone too?

The “whole point” of 2fa is that even if someone knows your password they cannot login with just credentials.

Compromising or stealing a device is a significant escalation from guessing passwords.


It is also more obvious when your device has been stolen vs just the password.

Well i'm assuming 1Pass is also storing the password. Ie if it's in the same place for your pass and token, it's 1FA, no?

No the two factors are something you have and something you know. Not something you have and another thing you have. In this case decrypting the vault requires two factors.

In my view the factors are attach vectors. If i wrote both my token and my pass down on a single sticky note, it's 1FA. If i have them on two stickies stored in two locations, it's 2FA.

Though i have no idea, that's just how i internalized it over the years. In your 1Pass example, it's a single attack vector (the password of my 1pass) to compromising both the token and the password of the product/server/thing.


How many feet apart do the two sticky notes have to be before it’s 2FA? :)

In the spirit of the idea, it would be the attack vector imo. So behind locked doors, buildings, safes, etc.

Eg a hacker can access my computer, even have a clipboard/keylogger on my machine, and have a difficult finding my token if it's on my phone. They need to attack my phone and my computer.

Having them both in your unlocked 1Password vault means if someone walks by your computer they can access your account. A single location with both of your "2FA". If they had a keylogger installed on your machine, they only need your single 1Pass password to breach your "2FA".

Granted i imagine that a Phone TOTP would still be a concern with a keylogger on your PC, since you still enter it on your compromised machine. Still more difficult than the having the totp key though, of course.


Time to get a “work” phone.

I carried 2 phones for many years. It was more trouble than it’s worth. Especially these days. Working from home, my only work use of the phone is for the Authenticator app.

The optics of that can be questionable. Just ask Skyler White or her brother-in-law.

If it's Authenticator you can use bitwarden from your browser, that's what I do. If you're using a custom app or something different then yeah it's annoying

Get a keyboard with a usb port on the side. Insert yubikey nano. Now instead of annoying 2FA you just reach your finger over and touch.

Apple Watch with Authy is a great solution for this. I don’t need to have my phone in the same room to use 2FA.

Why does it have to be an app on your phone? IT should be able to support yubikeys (or similiar) and even printed OTP lists.

I see some evidence that yubikeys are used somewhere in the organization, but not sure where or how.

The only information we were sent to get this all setup was specifically for a phone. The portal that exists to add devices only appears to support phones.

I have a co-worker who simply tried to use Authy instead of MS Authenticator and it didn’t work. There is a lot of bureaucracy that typically makes it not worth the fight.


> However, it’s all via an Authenticator app on the phone.

Why not save the secret on your laptop and generate the OTP on your laptop?


I use MS Authenticator for work too. It doesn't do standard TOTP, at least not for Entra. The QR codes don't contain the secret. IDK that anyone has been able to exfiltrate a secret and generate codes with a third party app.

I personally use an Android emulator on my laptop, which achieves the same goal. It saves and restores state automatically for quick startup.


You can use the Freedom app.

url freedom.to

Or just disable notifications. The iphone has a do not disturb mode that can be scheduled.


Most password managers (Bitwarden, 1Password etc) have a function for generating TOTP codes.

Ever since I disabled all the notifications on my phone my life has been happier. It won't work for everyone (50% of the time it doesn't even work for me), but I can't help but write this anecdote here.


For Windows, here's a free little authenticator app that lives in your system tray: https://github.com/richard-green/Authentiqr.NET

Get a Yubikey or similar, have a USB port close, one finger tip, done.

1Password can be your 2fa and autofill those fields. It has a built in scanner which will look at your screen and read the QR code on the screen (no separate device needed).

The comments here have the genre of "2 factor, 1 device"...

Two Factor doesn't mean 2 devices. Two factor generally has been thought of as "something you know, and something you have."

Let's do a quick threat model on putting both passwords and MFA tokens in a 1password vault.

1Password employees a recovery key + password login by default, and logging into a vault requires you to either have a device with the encrypted vault on it and your password, or have knowledge of your password and knowledge of your recovery key (normally in a file which makes it something you have) essentially traditional 2fa needed to log into a new device.

If someone steals your phone with 1password installed - they need your 1password to be able to access your credentials on the physical device. At that point they already have both your factors - your phone (have) and your password (know) - still protected by 2fa.

If someone manages to fully root your computer, they could wait until you unlock your vault and then extract your credentials. However, if you use traditional 2fa on a separate device - then they can just wait until you log into the target app, and then ride your session and get the same level of access to the target. While there may be a small difference in level of effort or how long it takes, the same access level is possible, and the requirements are that they have very privileged access to your operating system. Someone rooting the device that you login to services is grants them "single factor" access to your services when you access them.

There is some subtle differences between these, but except for situations where you have very high privileged requirements, at which point you should be using yubikeys or standalone MFA devices, using 1Password with OTP and password is very comparable to using a separate device for MFA.

I'm a previous red teamer and currently a blue teamer.


It was never meant to be two device authentication.

Reminds me of when I was developing an application 'in' Facebook (when it was mostly friends but with adds for addictive games in the sidebar)

Invest in a password manager that stores it all, including the rolling codes

Use a yubikey

do you use a pw manager? bitwarden (OSS) has it built in if you pay for premium. i think it's an extra 1-3/mo but well worth it to support the team

It's not your job's responsibility to cater to your lack of self control

Even doing nothing beyond the authentication, it is still requiring task switching, changes devices, waiting for codes, entering them, switching back. It’s very disruptive to any type of flow state.

But it's in their best interests.

While this seems like a lot, in some ways this is what user's expect. Push notifications should be coming all the time, assuming the system is on. Most users expect various maintenance services to run when the system idle so it doesn't interfere with their active use of the system. When users open apps like Weather (or view a widget), they expect it to already be up to date without having to manually refresh or wait for data to load when the app launches.

I'm sure some fat can be trimmed, and it may not all be user-centric, but a lot of this had to do with the expectations users have these days with the data being always up to date, instantly available, and proactive about alerting them to things they may want to know about, like rain coming to your area in 30 minutes.

One of my big pet peeves is when I pick up my phone in the morning, go to open an app, and it starts updating, so I need to wait for the download/install. It just had 8 hours on a charger to do that, and instead it seems to wait until it's taken off the charger and unlocked. With auto-updates on, I'd much rather this happen when placed on the charger and inactive, than actively in use and off the charger. The same can be said for a lot of things on the desktop.

This ends up mostly being a question of transparency and user control. Which then becomes a question of how much time/money to they invest in features for 1% of users? Now how much time do they invest in those same features when the 99% will stumble in there, turn a bunch of stuff off, then call support and ask why their weather widget isn't updating?


When Microsoft has telemetry:

* Windows is a spyware machine - how can anyone use it? Year of Linux baby!

When Apple has telemetry:

* It's working as expected.

So... to be fair, is there a thorough comparison of the two? How are they the same, and how are they different?


But the things mentioned in the post above yours have nothing to do with telemetry. They're more like core functions to make the system work at all.

take a look at fbs.smoot.apple.com and argue that isnt telemetry?

why does an os need to hit the internet AT ALL to work? osx doesnt of course


> why does an os need to hit the internet AT ALL to work?

Does it actually need to hit these to work?


no, as i indicated above, and is patently clear to anyone who has turned off wifi

The article, then again, specifically talks also about telemetry. The parent commenter conveniently chose to ignore them because of the Apple reality distortion field.

> fbs.smoot.apple.com - for crash reports, analytics, or user feedback.

> purchase pancake.apple.com - telemetry

> xp.apple.com - telemetry


> Which then becomes a question of how much time/money to they invest in features for 1% of users? Now how much time do they invest in those same features when the 99% will stumble in there, turn a bunch of stuff off, then call support and ask why their weather widget isn't updating?

That sounds like telemetry?


The features I was referring to would be a control panel to list all the various remote calls to let uses micromanage what calls they wanted and which ones they didn’t.

Inside of those settings could be options to enable/disable telemetry, sure. But also push notifications, weather updates, virus definition updates, etc.


That's how it should be if all was fair, I feel like what we have here is a "dark pattern" whereby keeping all the telemetries opaque ... enables one to keep around the nasty sort of telemetry the company very much wishes to remain opaque.

No that's incorrect. It is listed in TFA.

I didn’t see the person you’re replying to ever mention Microsoft. It seems weird to accuse them of hypocrisy?

I read it as a criticism of HN not the GP.

This is a very valid criticism of my post and many that group "opinions" as if they come from a single source.

Here, the top-voted comment is OK with Apple software phoning home, but there's no evidence they are not equally OK with Microsoft software phoning home, so I'm contrasting this popular opinion with another popular opinion elsewhere.

Here's one example from a different user, where Microsoft is described as "the big daddy of spyware."

https://news.ycombinator.com/item?id=22246187

See also this sibling top-level comment from today:

https://news.ycombinator.com/item?id=44256951


Microsoft put ads in their OS menus. Kindof a stretch to "both sides" this one.

Apple does too! Drives me crazy, although it’s not nearly as bad as Windows.

I have never seen this. What ads are you referring to in MacOS?

They keep trying to get me to buy iCloud space in the settings menu

Uh…where?

You don't see them if you're already paying for all Apple services.

But otherwise, you get constantly nagged to get iCloud and also sometimes for their media and gaming subscriptions

Finally, what people for some reason ignore: Apple has been an advertisement company ever since their app store became the majority share of their revenue.


Ah okay yeah I have Apple One so I wouldn’t see them

Also, no, Apple makes nowhere close to a majority of its revenue from its App Store (source: https://www.visualcapitalist.com/charted-how-apple-makes-its...)

51% are iPhone sales 9% are wearables and home device sales 8% are Mac sales 7% are iPad sales

A portion of the 25% that make up services and subscriptions is advertising, in addition to Apple Music, iCloud, Google’s search default payment (20B/yr), etc.

Apple makes less than 5% of its revenue from advertising


Oof, I meant to write "a majority share", not the.

I still believe that to be true, as you're splitting the advertisement revenue - in my opinion, all app store revenue is related to their advertisement business.

From my perspective, only counting the money that went into the advert itself is misleading, as the store itself is what the adverts are shown on.

If it was a more general advertisement network I'd agree with your splitting though.


No, that is how Apple split them. There is no ad revenue in any segment outside of services. “Belief” is not necessary, this is accounting

I’m a shareholder, I read the reports. Apple make 70%+ of their revenue from direct device sales (no one else comes close to them)


I can see where you're coming from, but I still feel like you might be putting too much trust into how apple splits their revenue in documents as they're provided to the public.

I'm not saying that the numbers are false, but apple can ultimately freely choose how to categorize their revenue itself.

From my point of view, their advertising revenue inherently cannot be split from their app store revenue.

It's akin to me saying "I've only spent $50 on groceries yesterday", but omit that the actual cost was $100 because of added fees and taxes.

It's still technically correct, and a bookkeeper will categorize it as such, but it also incredibly misleading.

I hold that opinion because in the apple ecosystem, the customer journey doesn't end with the advertisement. Every successful capture inevitably ends with more revenue via their 30% cut.

And btw, I'm technically a shareholder too - though only in the low thousands (value, not #), so prolly a lot less then you ( • ‿ • )


App Store and ad revenue are part of the same category

But in aggregate, it's 25%, right?

I'd consider that a majority share, or would you say the term should only apply if it's over 50%? I considered it to be a majority share because it's a significant chunk of the total revenue and not just a minor footnote, but looking back, "a significant amount" would've probably been better


“majority share” means > 50%

“plurality” means it’s the biggest number

Neither apply in this case


Plus, the ads for Apple are like “buy our cloud storage solution” and the ads for MS are like “10 foods to make you SEXY this summer!” I’m not a fan of either, but one is significantly worse than the other

That's a hyperbolic cherry picked comparison from different areas. If you compare the settings and start menu equivalent they are the same.

No it isn't. The context is telemetry and spying, not built in advertising.

And none of the items in the original thread post were about telemetry. They were about functional requirements.

That's a stretch, but giving the benefit of the doubt, you alone say potahto, most here are saying potato.

I guess you didn't read the article then, there are entries for telemetry. He even helpfully listed the official use case next to the domain name that was accessed.

Thread post. Not article post. Try to keep up.

You made the claim that apple didn't make any telemetry requests in response to someone pointing out the double standard for Apple.

Yes the person further up in this thread lists features other then telemetry, but that's literally the double standard. It's also did telemetry, just like windows does. Did you unironically think windows phones home only for telemetry, and not for various features too?

Because the article you're commenting on lists telemetry requests.

Your comment makes straight up no sense.


Okay buddy. Enjoy your day.

Apple users tend to trust Apple (whether or not that trust is misplaced is a different topic). Very few people trust Microsoft.

Honestly I would say “working as expected” for like 99% of Microsoft’s telemetry. I think the only difference is that I fucking hate hate hate OneDrive and so I’m gonna be more upset about the fact that Windows uses it. iCloud does not bother me so I don’t complain about it.

Apple is nowhere near as evil as Microsoft, so I’m willing to put up with it.

Apple has been involved in all the same government spying programs as Microsoft. They do not offer any services or products with E2E encryption that they do not control the key too.

But at least they have E2E encryption. The whole point of which is not having the key to.

The whole point is that a 3rd party (Apple) doesn’t have the key. It’s not real E2E and it’s still susceptible to government overreach.

It is not. It is real E2E. Or at least, here is my evidence (and before you balk at a chatgpt link, the links to the sources are also in there). What do you have?

https://chatgpt.com/share/684dae83-a980-8004-8226-d6e13a673d...


Not every Apple service is E2E encrypted, but some of them (like iMessage) are, and it's 100% real E2E.

It's now way more than iMessage, especially if you opt into more:

https://chatgpt.com/share/684dae83-a980-8004-8226-d6e13a673d...


If you do a forgot password and move to a new device do you lose all your chats?

AFAIK, if you can't get a previous device to authenticate your new device, you will indeed lose your chat history. However, I have several devices that can always authenticate for new ones, so I can't verify this empirically.

As the other person stated, in theory yes, but in practice, if you are an "Apple ecosystem" participant, you usually have another Apple device available that you can auth on.

https://chatgpt.com/share/684dae83-a980-8004-8226-d6e13a673d...


Still need your password to use the key

No Apple can unlock your phone with the master key they used to generate your phone hardware enclave key. This is how the FBI has pressured them in the past to unlock devices.


Apple claims what you’re describing is impossible

https://support.apple.com/en-ge/guide/security/sec59b0b31ff/...


Which specific part of the enclave doc refutes it?

This Quora claims otherwise: https://www.quora.com/How-can-we-unlock-our-iPhones-if-we-fo...


The exact section is "Root Cryptographic Keys," here is the key passage:

``` A randomly generated UID is fused into the SoC at manufacturing time. Starting with A9 SoCs, the UID is generated by the Secure Enclave TRNG during manufacturing and written to the fuses using a software process that runs entirely in the Secure Enclave. This process protects the UID from being visible outside the device during manufacturing and therefore isn’t available for access or storage by Apple or any of its suppliers. ```


> They do not offer any services or products with E2E encryption that they do not control the key too.

Are you saying that Apple still has the keys when Advanced Data Protection is turned on? And has access to the covered data even though they say the keys are only on the trusted devices?


> They do not offer any services or products with E2E encryption that they do not control the key too.

That’s way off the mark from reality. You can look at Advanced Data Protection. It’s not enabled by default for the sake of convenience, but it’s an option available to the users.


Well if you're going to throw that out there, you might as well explain.

The people who complain about windows telemetry, arnt going to Mac, they use Arch Linux btw.

Are you sure Mac users (or at least fans) don't also call or consider Windows telemetry "spyware"? I suspect they hold that opinion too.

But yes, Year of the Linux Desktop, baby!


Look into the app Little Snitch. It's fantastic! https://www.obdev.at/products/littlesnitch/index.html

I'm unaffiliated with the owners.


Second Little Snitch.

> NOTE: Corporate IT departments no likee Little Snitch.


Do you have a story to tell us?

I don't have a story but Little Snitch is the kind of tool most corporate users don't need, but that many malicious actors love to use. Sort of like running nmap on your computer, yeah there are legitimate reasons to do so, but you will get a call from IT if you try it.

I jokingly told a coworker to try nmap when he was trying to figure out a port to use for something legitimate. He was on the phone with the security team seemingly within 90 seconds. I was actually pretty impressed.

interesting. don't malicious actors use much more advanced tools than little snitch?

In the case of the company I worked for, they worried as much about insider threats, as they did, external ones.

They didn’t like employees, exploring the network.


Malicious actors use every tool you can imagine, and many you can't.

That's not a very nice thing to say. You don't know me.

> Which then becomes a question of how much time/money to they invest in features for 1% of users?

The problem with Apple is that __anyone__ sits in a 1% group of users in one way or the other. But they try to make a one-size-fits-all product.

This is in contrast to Linux where everybody can do whatever they like, and most things are opt-in rather than opt-out.


Apple ships to satisfy the 80%. 3rd party devs generally fill the needs of the 20% in various ways.

This is no different with Linux. How many Linux users use a desktop environment as-is without any plugins or tweaks? How many Arch users don’t have a single package from the AUR?

There are tools like Little Snitch on macOS to monitor and block all kind of network traffic.


The problem is that you have to tweak it the wrong way. Products you buy should not invade your privacy by default.

Note that this holds for many other products too. So if you don't mind Apple invading your privacy, you should not complain about Meta, Google, your car, etc.


Should push really be going through Apple on a laptop? I kind of understand it on a phone (although users should be able to switch push providers if they want to eg use open source software that apple won't allow) but on a Laptop there's no reason to not just have the application manage the toasts/sockets itself.

Oh it's much more than that. Lots of 3rd party software vendors making macOS-only apps use Apple's CloudKit for state sync, all that data is stored by Apple.

Regular users don’t think of push notifications as something that needs to go through some central server owned by Apple. If Alice sends Bob a message, shouldn’t that require only their phones to communicate with one another, without some third party?

This would mean, that every app notification needs to contact a different server. Lets say you have 20 Apps that send notifications. 20 different connections would work in the background to fetch updates instead of 1.

Privacy vise this is an issue and the reason that messangers like signal and matrix would use their own services on android. However this reduced battery runtime by a good margin and android and ios get more aggressiv at killing background tasks each os iteration.

To make things worse, push notifications for matrix and signal where unrealiable, because manufacturers like oneplus, oppo and some others where killing all the background tasks against specification to win the influencer battery tests.


In the Alice and Bob scenario, what happens if Bob’s phone is off or doesn’t have a single when Alice sends the message? Does the message just get dropped? Does Alice’s phone keep trying forever to send the message until it gets a response back that Bob got it? How long does it try before giving up? What happens if Alice and Bob are far apart and the phones can’t directly talk, how does Alice in LA send a message to Bob in NY without a 3rd party to relay the message?

If regular users don’t think about these things, it’s because they’ve never thought about these ideas at all. If they did, and they are able to think, they should come to the conclusion that a 3rd party is necessary in some form.


But how would they make sure that conversation is safe and approved if it isn’t monitored?

(/s for those who need it)


Is it even a push notification if you have to fetch them from a server?

Is there mobile push technology which is actually fundamentally push, all the way down to the transport layer? Like open socket, listening for incoming packets only, no notifications-> no traffic?

I was under the impression it was all polling if you go down far enough, but at least because of central registration the phone only needs to poll one single pubsub service instead of a separate server per subscription.

Could be wrong though?


Yes, sms is "actually push" all the way down to the transport layer.

As far as I know, this is still what push notifications are built upon for an idle/sleeping device.

Carrier infrastructure knows which tower you last connected to, instructs that specific tower to broadcast a message telling your phone to wake up and fetch the remaining 80% of the notification content (the sms bit is usually just enough for your device to learn the UUIDs of the notifications)


> As far as I know, this is still what push notifications are built upon for an idle/sleeping device.

I thought so too, but can't find any evidence for it anymore, all I can find is mentions of the phone keeping a TCP connection alive and then some device driver level tweaks to make that power efficient. I think the older GSM-specific wakeup mechanism might have died when iPhones stopped being carrier-specific.


iOS or Android push notifications (can) use SMS for notifying the client that a new message is available ? That’s lovely. Do you have any links or any keywords to find more ? All I can find online is that iOS uses TCP (XMPP in fact :o TIL. )

It wasn't really SMS, it was another message type riding on top of the same lower-level protocol called SS7. But it seems that's no longer in use and it's all just TCP/IP now.

(Said differently, the radio firmware got good enough that it doesn't need a special "wake up" packet anymore, it can recognize a packet to itself in a low power state.)


No, Apple push cannot use SMS/Text. You need a cell modem to have working SMS/Text. Except the phone itself, most of the devices have no cell modem. Then Apple would need to keep a directory of all the cell phone numbers, because that is the way how the cell modem is addressed.

Both Apple and Google mobile notifications are long-lived TCP/IP sockets where the server writes bytes to the stream when it wants to wake up the phone.

The TCP/IP and protocol-specific handshake is started by the phone, but then the phone just waits to receive data. That counts as fundamentally push, all the way down to the transport layer.


In theory you could do that, that's how I had push set up on my Pinephone. Often the ssh connection that was used for it was still live after rtcwake came back up. It's kind of a moot point since the WiFi radio couldn't wake the CPU up on its own though.

> Is there mobile push technology which is actually fundamentally push, all the way down to the transport layer? Like open socket, listening for incoming packets only, no notifications-> no traffic?

That’s the end-to-end principle. Each host on the Internet is fully capable of listening on a socket and doing whatever its owner wants it to do.

The issue is when firewalls prevent incoming traffic, and when NAT prevents a host from even being on the internet. There’s not really a good reason for NAT with IPv6, but there are some good reasons for firewalls. They mostly boil down to human imperfection. The developers of one’s OS and software are imperfect, so the fact that a laptop sitting in Dallas can be probed by other computers in Frankfurt or Maseru thousands of times a second is an issue: a single bug will make one’s computer, and all its data, vulnerable. And users are imperfect, too. One might misconfigure one’s computer, and accidentally expose a service to the world.

There could be some approaches to mitigate these issues, but we’re probably stuck with firewalls forever. Which is really kind of sad.


How do you think push should work?

Any push service works this way. The client contacts the server to be updated. The server gives a no data or a data response. The server cannot magically contact the client.


Well, the server could contact the client. The client would just need to be listening on a port/address that the server knows. Which is completely infeasible for 99.99% of end user devices.

Well, then would work for less then 50%.

The majority of end user devices are run from within private networks protected from the Internet. If you have connected to your cell provider, then in the majority the cell providers are running their own private networks. For one reason the IPv4 address space is limited as such, that there are no other possibilities. IPv4 is still the important protocol compared to IPv6. Second, it is that those providers, want to protect you. Some don't even allow cross communication.

If you devices are connected with Wifi, then there is the very same situation. There is almost no campus, commercial, and home network, that gives you public route-able IP addresses. I only know a view deployments were you get public route-able IP addresses at conferences like C3, EMF, and alike.

tl/dr: No, the end user devices is not easily to reach without additional infrastructure.


What do you think the word "push" means in the word "push"? It doesn't mean "pull", btw.

I think this is one of those many cases where how the technology works doesn't match the actual meaning of the English word, but for whatever reason the word has stuck.

For better or worse, a lot of things on the Internet now assume that only "servers" can accept incoming connections, and therefore anything that needs to be "sent" to clients needs to be done by making the client poll a server over and over. True P2P apps (with no intermediary server) are pretty rare now, for a variety of reasons: some good reasons, some stupid reasons.


You're arguing semantics over a phrase that was decided upon 20 years ago. It's too late.

I ran into a bug at work where an app would crash and I’d get prompted to submit a report. It would happen several times per day. I often question how many bug reports I should submit for the same issue, and how detailed I need to be with each one, if the information has already been sent. I probably sent at least 40, hoping they’d fix it just so they wouldn’t have to hear from me anymore. Some were professional and helpful, others were mostly empty other than the log they generated, and others were a bit unhinged where I simply vented my frustration over all the crashes. I don’t think it was ever fixed, I just eventually didn’t need that software anymore.

This has been my experience as well.

I submitted a bug report on Things To Get Me (an Amazon wishlist alternative) on a holiday weekend, fully not expecting to hear anything until at least Monday. It wasn’t anything too major. Within the hour I not only had a response, but a change was pushed to prod after a little back and forth with the developer.

A couple years ago I signed up for write.as and the founder/ceo reached out to have video chat just to see how things were going or if there was anything I’d want to see in the future.


Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: