Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is a moot point unless you always verify and check all hardware and software that you use, including communications devices.


You don't need to verify everything yourself. You can verify any small part and rely on the community to verify the rest. Or pay someone to verify. However, for all that you need verifiability, which Apple lacks.


> You can verify any small part and rely on the community to verify the rest. Or pay someone to verify.

The only difference in this is who you trust. Be it Apple, the community or someone you pay, you're still trusting that someone else's interests align with yours and they did things correctly.

In other words, this is not a technical problem. It's a problem that needs to be solved through regulation, because 99% of the people can't verify by themselves that their devices are actually private and secure.


> The only difference in this is who you trust.

Not really. There is a huge difference between trusting a single for-profit entity (who provides backdoor to iCloud in China) or huge number of independent people (each would like to get famous/rich for finding bugs).


Yes, because the "huge number of independent people" have never missed any serious bugs or backdoor, and they also verify every piece of equipment you use.


Nothing is ever perfectly secure. It's a question of whom you should trust for a lesser damage.


Apple spends a hell of a lot more time and money verifying that my iPhone is secure than say… the developers of any number of the mobile Linux ports.

Plus the hardware is nice and actually works.

I agree with what you say in principle but here I am using an iPhone to type this while it’s been nearly 2 years since I ordered my Librem 5.

Making decent mobile devices that are more secure than an iPhone is not an easy thing.


> Apple spends a hell of a lot more time and money verifying that my iPhone is secure than say… the developers of any number of the mobile Linux ports.

Secure against entities they don't like. But intentionally insecure against entities they do like.


I wondered whether this was sarcasm at first. Yes, making iCloud backups encrypted is not an easy thing I guess.


My comment was directed at the people who would say “don’t use apple” as if Android or any number of FOSS phone alternatives with 5 people maintaining them are more secure than IOS.


Yes - and for most people trusting Apple is still a better option, because the ‘community’ option is literally just wishful thinking at this point.


Linux kernel AFAIK has less security issues than Apple. Qubes even less. Not sure what the reason for your insult is.


No insult. You actually don’t know that the Linux kernel has less security issues than Apple’s kernel.

But the kernel is only a tiny fraction of the system. There simply is no Linux system that even attempts to solve the problems Apple solves. There could be, but there isn’t - this is what we mean by the term ‘wishful thinking’.


> You actually don’t know that the Linux kernel has less security issues than Apple’s kernel.

You are speaking as if you know the opposite. Any links?


That just shifts who controls the monopoly on verification. Not trusting anyone isn't a reasonable goal. Open verifiability allows you to choose which entities to put trust in and how much trust you can afford to eliminate by doing things yourself.


I don’t think that’s his point. The point is Apple made a laptop that did away technologies that allow PC ecosystem/choices we see today. The M1 MacBook feels like an iPhone, but sized as a laptop.


I recently bought an M1 (my first and only Apple product so far). Anecdotally, I only bought it knowing that it can execute arbitrary code without restrictions, unlike iOS. If they decide to change that then you can be sure I won't be purchasing any future models.


I bought the M1 Air and yes, it feels like an iPhone, but sized as a retro-ish laptop and able to run a dev stack which Apple still won't let me do on my plenty powerful enough iPad.


Importantly, it runs iOS games, which has otherwise been a weak point in the macos ecosystem.


AFAIK, the M1 is an ARM laptop and the Linux kernel already supports it. I also assume that it won't be too long until we see Bootcamp for M1 Macs. So I don't think that M1 or Intel changes anything in that regard.


Not at all. Here we have a manufacturer that thinks he would be allowed to scan the contents of your machine. If you scan a machine, you can read everything on the machine.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: