🙈 Want to keep certain apps private? @mikahsargent shows you how to lock and hide apps on iOS & iPadOS in tomorrow’s Hands-On Apple.
It’s easier than you think—and super useful.
🎧 Subscribe so you don't miss an episode: https://twit.tv/shows/hands-on-apple
#ApplePrivacy #iOSTips

🔒La tua sicurezza prima di tutto! Apple punta sulla privacy come chiave per conquistare l'IA. #ApplePrivacy #FuturoSicuro #socialmedia #artificialintelligence #technology

🔗 https://aibay.it/notizie/apple-punta-sulla-privacy-per-conquistare-lia-2025-06-11

Apple punta sulla privacy per conquistare l'IA

Apple Intelligence punta sulla privacy elaborando i dati direttamente sul dispositivo anziché nel cloud, trasformando questo approccio in un vantaggio competitivo.

AiBay
😂 Oh no, your Mac is sneaking out for some late-night gossip with Apple HQ while you sleep! 🙄 Clearly, Apple's cult of connectivity missed the memo about your digital detox resolutions. 🚨 Spoiler alert: Blocking Apple's chatty circuits is as effective as a screen door on a submarine. 🛑
https://appaddict.app/post/my-mac-contacted-63-different-apple-owned-domains-in-one-hour-while-not-is-use #MacGossip #DigitalDetox #ApplePrivacy #TechHumor #ConnectivityIssues #HackerNews #ngated
My Mac Contacted 63 Different Apple Owned Domains in One Hour - While Not is Use

During a one hour period today, my computer contacted 63 different Apple domains while i was not logged on and using it. I have been trying to minimize to the extent possible the reach of big tech into my life. A full 25% of the DNS queries from one of my computers (M2 MBA with macOS 15.4) are to Apple owned domains - even though my DNS provider (NextDNS) blocks Apple's native telemetry. Additionally, since I do not use Apple for my mail, contacts, calendars, podcasts or news, I already have the routes to those Apple services blacklisted. Interestingly, my 2019 Intel MBP with the same DNS settings has less than 3% of it's DNS queries hitting Apple domains. Here are the domains Apple contacted during one 60-Minute Period When I Was Not Using My ComputerOne Hour - 63 Apple Domains • 1-courier.push.apple.com - Apple Push Notification Service • 1-courier.sandbox.push.apple.com - Apple Push Notification Service • api.apple-cloudkit.com - CloudKit, Apple's backend service for developers to store and sync app data • api.apple-cloudkit.fe2.apple-dns.net - DNS/gateway services for Apple's infrastructure • app-site-association.cdn-apple.com - Used for Universal Links • apple-relay.cloudflare.com • apple.com - Core Apple websites • bag.itunes.apple.com - iTunes/App Store purchase container • configuration.apple.com - for fetching various system configurations, including location services • configuration.ls.apple.com - for fetching various system configurations, including location services • cts.cdn-apple.com - CDN for network content • entitlements.itunes.apple.com - Checks your entitlements for apps and content • fbs.smoot.apple.com - for crash reports, analytics, or user feedback. • fpinit.itunes.apple.com - Initialization for iTunes/App Store services • gateway.fe2.apple-dns.net - DNS/gateway services for Apple's infrastructure • gdmf.apple.com - Device Management Framework • gsa.apple.com - Apple ID (IDMS) and Game Center Services (GSAS) • gsa.idms-apple.com.akadns.net - Apple ID (IDMS) and Game Center Services (GSAS) • gsas.apple.com - Apple ID (IDMS) and Game Center Services (GSAS) • gsas.idms-apple.com.akadns.net - Apple ID (IDMS) and Game Center Services (GSAS) • gspe1-ssl.ls.apple.com - related to Location Services (LS) and certificate validation (SSL) • gspe35-ssl.ls.apple.com - related to Location Services (LS) and certificate validation (SSL) • iadsdk.apple.com - Apple's iAd advertising network SDK • init-p01md.apple.com • init.ess.apple.com - Apple's Entitlement Services • init.itunes.apple.com - Initialization for iTunes/App Store services • kt-prod.ess.apple.com - Apple's Entitlement Services • lcdn-registration.apple.com - related to Software Update and (CDN) registration • musicstatus.itunes.apple.com - For checking the status of Apple Music or iTunes Match • ocsp2.apple.com - Online Certificate Status Protocol • p44-buy-lb.itunes-apple.com.akadns.net - related to the iTunes Store and App Store purchase • p44-buy.itunes.apple.com - related to the iTunes Store and App Store purchase • pancake.apple.com - telemetry • pd.itunes.apple.com - related to the iTunes Store and App Store purchase • proxy.safeBrowse.apple - for Apple's Safari Fraudulent Website Warning (Safe Browse) • sandbox.itunes-apple.com.akadns.net - used by developers for testing in-app purchases • sandbox.itunes.apple.com - used by developers for testing in-app purchases • sas-uw2-pcms.apple.com - related to purchase or content management systems within Apple's retail or media ecosystem. • sas.pcms.apple.com - related to purchase or content management systems within Apple's retail or media ecosystem. • setup.fe2.apple-dns.net - DNS/gateway services for Apple's infrastructure • st11p01su-lcdnreg.isu.apple.com.akadns.net - related to Software Update and (CDN) registration • suconfig.apple.com - related to Software Update and (CDN) registration • swallow-apple-com.v.aaplimg.com - related to content delivery or image services • swallow.apple.com - related to content delivery or image services • testflight.apple.com - for TestFlight, Apple's platform for beta testing apps • time.apple.com - Network Time Protocol • token.safeBrowse.apple - for Apple's Safari Fraudulent Website Warning (Safe Browse) • us-ne-courier-4.push-apple.com.akadns.net - Apple Push Notification Service • us-sandbox-courier-4.push-apple.com.akadns.net - Apple Push Notification Service • use1-wps-prod.apple.com • weatherkit.apple.com • wps.apple.com • www.apple.com - Core Apple websites • xp.apple.com - telemetry • gateway.icloud.com • p177-content.icloud.com • edge-062.usatl5.icloud-content.com • p104-content.icloud.com • setup.icloud.com • p150-content.icloud.com • p176-content.icloud.com • p101-content.icloud.com • mask-api.icloud.com Apple Domains I Already Block• apple.news • apple.tv • podcasts.apple.com • siri.apple.com • caldav.icloud.com • contacts.icloud.com • mask.apple-dns.net • mask-api.icloud.com • doh.dns.apple.com.v.aaplimg.com • doh.dns.apple.com • apple-relay.cloudflare.com • mask-canary.icloud.com • mask-h2.icloud.com • mask.icloud.com • p120-caldav.icloud.com

My Mac Contacted 63 Different Apple Owned Domains in One Hour - While Not is Use

During a one hour period today, my computer contacted 63 different Apple domains while i was not logged on and using it. I have been trying to minimize to the extent possible the reach of big tech into my life. A full 25% of the DNS queries from one of my computers (M2 MBA with macOS 15.4) are to Apple owned domains - even though my DNS provider (NextDNS) blocks Apple's native telemetry. Additionally, since I do not use Apple for my mail, contacts, calendars, podcasts or news, I already have the routes to those Apple services blacklisted. Interestingly, my 2019 Intel MBP with the same DNS settings has less than 3% of it's DNS queries hitting Apple domains. Here are the domains Apple contacted during one 60-Minute Period When I Was Not Using My ComputerOne Hour - 63 Apple Domains • 1-courier.push.apple.com - Apple Push Notification Service • 1-courier.sandbox.push.apple.com - Apple Push Notification Service • api.apple-cloudkit.com - CloudKit, Apple's backend service for developers to store and sync app data • api.apple-cloudkit.fe2.apple-dns.net - DNS/gateway services for Apple's infrastructure • app-site-association.cdn-apple.com - Used for Universal Links • apple-relay.cloudflare.com • apple.com - Core Apple websites • bag.itunes.apple.com - iTunes/App Store purchase container • configuration.apple.com - for fetching various system configurations, including location services • configuration.ls.apple.com - for fetching various system configurations, including location services • cts.cdn-apple.com - CDN for network content • entitlements.itunes.apple.com - Checks your entitlements for apps and content • fbs.smoot.apple.com - for crash reports, analytics, or user feedback. • fpinit.itunes.apple.com - Initialization for iTunes/App Store services • gateway.fe2.apple-dns.net - DNS/gateway services for Apple's infrastructure • gdmf.apple.com - Device Management Framework • gsa.apple.com - Apple ID (IDMS) and Game Center Services (GSAS) • gsa.idms-apple.com.akadns.net - Apple ID (IDMS) and Game Center Services (GSAS) • gsas.apple.com - Apple ID (IDMS) and Game Center Services (GSAS) • gsas.idms-apple.com.akadns.net - Apple ID (IDMS) and Game Center Services (GSAS) • gspe1-ssl.ls.apple.com - related to Location Services (LS) and certificate validation (SSL) • gspe35-ssl.ls.apple.com - related to Location Services (LS) and certificate validation (SSL) • iadsdk.apple.com - Apple's iAd advertising network SDK • init-p01md.apple.com • init.ess.apple.com - Apple's Entitlement Services • init.itunes.apple.com - Initialization for iTunes/App Store services • kt-prod.ess.apple.com - Apple's Entitlement Services • lcdn-registration.apple.com - related to Software Update and (CDN) registration • musicstatus.itunes.apple.com - For checking the status of Apple Music or iTunes Match • ocsp2.apple.com - Online Certificate Status Protocol • p44-buy-lb.itunes-apple.com.akadns.net - related to the iTunes Store and App Store purchase • p44-buy.itunes.apple.com - related to the iTunes Store and App Store purchase • pancake.apple.com - telemetry • pd.itunes.apple.com - related to the iTunes Store and App Store purchase • proxy.safeBrowse.apple - for Apple's Safari Fraudulent Website Warning (Safe Browse) • sandbox.itunes-apple.com.akadns.net - used by developers for testing in-app purchases • sandbox.itunes.apple.com - used by developers for testing in-app purchases • sas-uw2-pcms.apple.com - related to purchase or content management systems within Apple's retail or media ecosystem. • sas.pcms.apple.com - related to purchase or content management systems within Apple's retail or media ecosystem. • setup.fe2.apple-dns.net - DNS/gateway services for Apple's infrastructure • st11p01su-lcdnreg.isu.apple.com.akadns.net - related to Software Update and (CDN) registration • suconfig.apple.com - related to Software Update and (CDN) registration • swallow-apple-com.v.aaplimg.com - related to content delivery or image services • swallow.apple.com - related to content delivery or image services • testflight.apple.com - for TestFlight, Apple's platform for beta testing apps • time.apple.com - Network Time Protocol • token.safeBrowse.apple - for Apple's Safari Fraudulent Website Warning (Safe Browse) • us-ne-courier-4.push-apple.com.akadns.net - Apple Push Notification Service • us-sandbox-courier-4.push-apple.com.akadns.net - Apple Push Notification Service • use1-wps-prod.apple.com • weatherkit.apple.com • wps.apple.com • www.apple.com - Core Apple websites • xp.apple.com - telemetry • gateway.icloud.com • p177-content.icloud.com • edge-062.usatl5.icloud-content.com • p104-content.icloud.com • setup.icloud.com • p150-content.icloud.com • p176-content.icloud.com • p101-content.icloud.com • mask-api.icloud.com Apple Domains I Already Block• apple.news • apple.tv • podcasts.apple.com • siri.apple.com • caldav.icloud.com • contacts.icloud.com • mask.apple-dns.net • mask-api.icloud.com • doh.dns.apple.com.v.aaplimg.com • doh.dns.apple.com • apple-relay.cloudflare.com • mask-canary.icloud.com • mask-h2.icloud.com • mask.icloud.com • p120-caldav.icloud.com

Privacy reminder! Have you disabled AirDrop yet?

One of the most innocuous features enabled on millions of iPhones is also one of the most dangerous for those seeking to protect their privacy in public. Apple's AirDrop protocol uses trivially bypassed security measures that authorities like the Chinese government have openly bragged about cracking to identify users since at least 2022.

You should assume that any device with AirDrop enabled is constantly broadcasting your name, email address, and phone number to everyone around you, even if you have it set to "Contacts Only." Apple has known about this flaw since 2019 and has not issued any fix.

#AirDrop #Apple #Privacy #PrivacyGuides #ApplePrivacy

The Protesters' Guide to Smartphone Security

Your phone is an essential tool, but it also represents a huge risk to your privacy and security. Understanding these best practices when it comes to securing your smartphone will help keep you and your data safe.

Privacy Guides
🕵️‍♂️✨ UK attempts to play cloak-and-dagger with Apple encryption drama, only to have their invisibility cloak yanked off by the courts. 📜🔍 Nice try, but your "top secret" shenanigans were as hidden as a neon sign in the dark! 😂🔓
https://www.msn.com/en-us/money/other/uk-effort-to-keep-apple-encryption-fight-secret-is-blocked/ar-AA1CsokD #UKEncryptionDrama #ApplePrivacy #CourtRuling #CloakAndDagger #TechNews #CyberSecurity #HackerNews #ngated
MSN

Apples Verschlüsselungs-Dilemma in Großbritannien: Risiken für Datenschutz und Sicherheit

Entdecken Sie die Kontroversen um die Apple Verschlüsselung in Großbritannien, während die Regierung eine Hintertür fordert.

Apfeltalk Magazin

Building user trust is super important in today’s app ecosystem, and Apple’s App Privacy Labels play a central role in this process. I explore best practices to make sure transparency, comply with privacy guidelines, and build confidence among users.

https://www.bytescove.com/build-user-trust-with-apple-app-privacy-labels-best-practices/

#iOSDeveloper #Privacy #PrivacyLabels #AppPrivacy #UserTrust #DataTransparency #AppDevelopment #ApplePrivacy #PrivacyMatters #UserExperience #MobileApps #DeveloperTips

Build user trust with Apple App Privacy labels: Best practices

You’ve probably noticed that privacy isn’t just a technical box to tick anymore. It’s a massive factor in how people choose apps these days.

Bytes Cove - Mobile Solutions & Expertise | Principal Mobile Engineer