Engineers at Cloudflare and Apple have created a new internet protocol, ODoH, to fill one of the biggest internet security gaps many people don’t even know existed. The protocol named Oblivious DNS-over-HTTPS (ODoH), will make it much more difficult for ISPs to track user activity on the Web. Each time a user visits a site… Continue reading New Internet Protocol ODoH will hide websites visited by users from ISPs
Tag: Apple
Linus Torvalds doubts that Linux will run on Apple M1
Recently on the Real World Technologies forum Linus Torvalds was asked what he thinks of Apple’s new M1 laptops. Torvalds then vague replied, “I would love to have this [laptop] if ran on Linux.” Then, not everyone understood what exactly Torvalds saw as the problem, and now, in an interview with ZDNet journalists, the Linux… Continue reading Linus Torvalds doubts that Linux will run on Apple M1
Attackers again deceived Apple’s notarization process
In September 2020, I talked about how the Shlayer malware successfully passed the notarization process and was able to run on any Mac running macOS Catalina and newer. Now there is information that the attackers again deceived the notarization process. Apple introduced the “notarization process” security mechanism in February of this year: any Mac software… Continue reading Attackers again deceived Apple’s notarization process
Shlayer malware bypassed Apple security checks
Security expert Peter Dantini discovered that the Shlayer malware bypassed Apple’s checks: it successfully passed the software notarization process and could run on any Mac running macOS Catalina and newer. In February of this year, Apple introduced a new security mechanism: any Mac software distributed outside the App Store must go through a notarization process… Continue reading Shlayer malware bypassed Apple security checks
Google experts talked about vulnerabilities in Apple operating systems
Google Project Zero specialists discovered and described many vulnerabilities in Apple’s operating systems. For example, they are part of the Image I/O framework, which is used for parsing images and is part of iOS, macOS, tvOS and watchOS. Overall were identified 14 vulnerabilities, six of which directly affect Apple Image I/O, and eight more problems… Continue reading Google experts talked about vulnerabilities in Apple operating systems
Sindhi Language Symbols Disable iPhone and iPad
Users found that a messages with certain characters in the Sindhi language symbols (used primarily in India and Pakistan) disable OS 13.4.1 and crash the iPhone and iPad. A “text bomb” will affect the operation of the device, even if the user simply received a notification from Messages or WhatsApp, or from social networks (for… Continue reading Sindhi Language Symbols Disable iPhone and iPad
Vulnerabilities allowed access to cameras on Mac, iPhone and iPad
Apple paid $75,000 to the IS researcher Ryan Pickren in the frameworks of the bug bounty program for vulnerabilities in Safari, due to which it was possible to access someone else’s cameras on Mac, iPhone and iPad, simply by directing a person to a special site. In total, Picren discovered seven vulnerabilities in the Apple… Continue reading Vulnerabilities allowed access to cameras on Mac, iPhone and iPad