It’s easier than you think—and super useful.
🎧 Subscribe so you don't miss an episode: https://twit.tv/shows/hands-on-apple
#ApplePrivacy #iOSTips
🔒La tua sicurezza prima di tutto! Apple punta sulla privacy come chiave per conquistare l'IA. #ApplePrivacy #FuturoSicuro #socialmedia #artificialintelligence #technology
🔗 https://aibay.it/notizie/apple-punta-sulla-privacy-per-conquistare-lia-2025-06-11
During a one hour period today, my computer contacted 63 different Apple domains while i was not logged on and using it. I have been trying to minimize to the extent possible the reach of big tech into my life. A full 25% of the DNS queries from one of my computers (M2 MBA with macOS 15.4) are to Apple owned domains - even though my DNS provider (NextDNS) blocks Apple's native telemetry. Additionally, since I do not use Apple for my mail, contacts, calendars, podcasts or news, I already have the routes to those Apple services blacklisted. Interestingly, my 2019 Intel MBP with the same DNS settings has less than 3% of it's DNS queries hitting Apple domains. Here are the domains Apple contacted during one 60-Minute Period When I Was Not Using My ComputerOne Hour - 63 Apple Domains • 1-courier.push.apple.com - Apple Push Notification Service • 1-courier.sandbox.push.apple.com - Apple Push Notification Service • api.apple-cloudkit.com - CloudKit, Apple's backend service for developers to store and sync app data • api.apple-cloudkit.fe2.apple-dns.net - DNS/gateway services for Apple's infrastructure • app-site-association.cdn-apple.com - Used for Universal Links • apple-relay.cloudflare.com • apple.com - Core Apple websites • bag.itunes.apple.com - iTunes/App Store purchase container • configuration.apple.com - for fetching various system configurations, including location services • configuration.ls.apple.com - for fetching various system configurations, including location services • cts.cdn-apple.com - CDN for network content • entitlements.itunes.apple.com - Checks your entitlements for apps and content • fbs.smoot.apple.com - for crash reports, analytics, or user feedback. • fpinit.itunes.apple.com - Initialization for iTunes/App Store services • gateway.fe2.apple-dns.net - DNS/gateway services for Apple's infrastructure • gdmf.apple.com - Device Management Framework • gsa.apple.com - Apple ID (IDMS) and Game Center Services (GSAS) • gsa.idms-apple.com.akadns.net - Apple ID (IDMS) and Game Center Services (GSAS) • gsas.apple.com - Apple ID (IDMS) and Game Center Services (GSAS) • gsas.idms-apple.com.akadns.net - Apple ID (IDMS) and Game Center Services (GSAS) • gspe1-ssl.ls.apple.com - related to Location Services (LS) and certificate validation (SSL) • gspe35-ssl.ls.apple.com - related to Location Services (LS) and certificate validation (SSL) • iadsdk.apple.com - Apple's iAd advertising network SDK • init-p01md.apple.com • init.ess.apple.com - Apple's Entitlement Services • init.itunes.apple.com - Initialization for iTunes/App Store services • kt-prod.ess.apple.com - Apple's Entitlement Services • lcdn-registration.apple.com - related to Software Update and (CDN) registration • musicstatus.itunes.apple.com - For checking the status of Apple Music or iTunes Match • ocsp2.apple.com - Online Certificate Status Protocol • p44-buy-lb.itunes-apple.com.akadns.net - related to the iTunes Store and App Store purchase • p44-buy.itunes.apple.com - related to the iTunes Store and App Store purchase • pancake.apple.com - telemetry • pd.itunes.apple.com - related to the iTunes Store and App Store purchase • proxy.safeBrowse.apple - for Apple's Safari Fraudulent Website Warning (Safe Browse) • sandbox.itunes-apple.com.akadns.net - used by developers for testing in-app purchases • sandbox.itunes.apple.com - used by developers for testing in-app purchases • sas-uw2-pcms.apple.com - related to purchase or content management systems within Apple's retail or media ecosystem. • sas.pcms.apple.com - related to purchase or content management systems within Apple's retail or media ecosystem. • setup.fe2.apple-dns.net - DNS/gateway services for Apple's infrastructure • st11p01su-lcdnreg.isu.apple.com.akadns.net - related to Software Update and (CDN) registration • suconfig.apple.com - related to Software Update and (CDN) registration • swallow-apple-com.v.aaplimg.com - related to content delivery or image services • swallow.apple.com - related to content delivery or image services • testflight.apple.com - for TestFlight, Apple's platform for beta testing apps • time.apple.com - Network Time Protocol • token.safeBrowse.apple - for Apple's Safari Fraudulent Website Warning (Safe Browse) • us-ne-courier-4.push-apple.com.akadns.net - Apple Push Notification Service • us-sandbox-courier-4.push-apple.com.akadns.net - Apple Push Notification Service • use1-wps-prod.apple.com • weatherkit.apple.com • wps.apple.com • www.apple.com - Core Apple websites • xp.apple.com - telemetry • gateway.icloud.com • p177-content.icloud.com • edge-062.usatl5.icloud-content.com • p104-content.icloud.com • setup.icloud.com • p150-content.icloud.com • p176-content.icloud.com • p101-content.icloud.com • mask-api.icloud.com Apple Domains I Already Block• apple.news • apple.tv • podcasts.apple.com • siri.apple.com • caldav.icloud.com • contacts.icloud.com • mask.apple-dns.net • mask-api.icloud.com • doh.dns.apple.com.v.aaplimg.com • doh.dns.apple.com • apple-relay.cloudflare.com • mask-canary.icloud.com • mask-h2.icloud.com • mask.icloud.com • p120-caldav.icloud.com
My Mac Contacted 63 Different Apple Owned Domains in One Hour – While Not Is Use
#HackerNews #MyMacContactedDomains #ApplePrivacy #SecurityConcerns #TechNews #DataTracking
During a one hour period today, my computer contacted 63 different Apple domains while i was not logged on and using it. I have been trying to minimize to the extent possible the reach of big tech into my life. A full 25% of the DNS queries from one of my computers (M2 MBA with macOS 15.4) are to Apple owned domains - even though my DNS provider (NextDNS) blocks Apple's native telemetry. Additionally, since I do not use Apple for my mail, contacts, calendars, podcasts or news, I already have the routes to those Apple services blacklisted. Interestingly, my 2019 Intel MBP with the same DNS settings has less than 3% of it's DNS queries hitting Apple domains. Here are the domains Apple contacted during one 60-Minute Period When I Was Not Using My ComputerOne Hour - 63 Apple Domains • 1-courier.push.apple.com - Apple Push Notification Service • 1-courier.sandbox.push.apple.com - Apple Push Notification Service • api.apple-cloudkit.com - CloudKit, Apple's backend service for developers to store and sync app data • api.apple-cloudkit.fe2.apple-dns.net - DNS/gateway services for Apple's infrastructure • app-site-association.cdn-apple.com - Used for Universal Links • apple-relay.cloudflare.com • apple.com - Core Apple websites • bag.itunes.apple.com - iTunes/App Store purchase container • configuration.apple.com - for fetching various system configurations, including location services • configuration.ls.apple.com - for fetching various system configurations, including location services • cts.cdn-apple.com - CDN for network content • entitlements.itunes.apple.com - Checks your entitlements for apps and content • fbs.smoot.apple.com - for crash reports, analytics, or user feedback. • fpinit.itunes.apple.com - Initialization for iTunes/App Store services • gateway.fe2.apple-dns.net - DNS/gateway services for Apple's infrastructure • gdmf.apple.com - Device Management Framework • gsa.apple.com - Apple ID (IDMS) and Game Center Services (GSAS) • gsa.idms-apple.com.akadns.net - Apple ID (IDMS) and Game Center Services (GSAS) • gsas.apple.com - Apple ID (IDMS) and Game Center Services (GSAS) • gsas.idms-apple.com.akadns.net - Apple ID (IDMS) and Game Center Services (GSAS) • gspe1-ssl.ls.apple.com - related to Location Services (LS) and certificate validation (SSL) • gspe35-ssl.ls.apple.com - related to Location Services (LS) and certificate validation (SSL) • iadsdk.apple.com - Apple's iAd advertising network SDK • init-p01md.apple.com • init.ess.apple.com - Apple's Entitlement Services • init.itunes.apple.com - Initialization for iTunes/App Store services • kt-prod.ess.apple.com - Apple's Entitlement Services • lcdn-registration.apple.com - related to Software Update and (CDN) registration • musicstatus.itunes.apple.com - For checking the status of Apple Music or iTunes Match • ocsp2.apple.com - Online Certificate Status Protocol • p44-buy-lb.itunes-apple.com.akadns.net - related to the iTunes Store and App Store purchase • p44-buy.itunes.apple.com - related to the iTunes Store and App Store purchase • pancake.apple.com - telemetry • pd.itunes.apple.com - related to the iTunes Store and App Store purchase • proxy.safeBrowse.apple - for Apple's Safari Fraudulent Website Warning (Safe Browse) • sandbox.itunes-apple.com.akadns.net - used by developers for testing in-app purchases • sandbox.itunes.apple.com - used by developers for testing in-app purchases • sas-uw2-pcms.apple.com - related to purchase or content management systems within Apple's retail or media ecosystem. • sas.pcms.apple.com - related to purchase or content management systems within Apple's retail or media ecosystem. • setup.fe2.apple-dns.net - DNS/gateway services for Apple's infrastructure • st11p01su-lcdnreg.isu.apple.com.akadns.net - related to Software Update and (CDN) registration • suconfig.apple.com - related to Software Update and (CDN) registration • swallow-apple-com.v.aaplimg.com - related to content delivery or image services • swallow.apple.com - related to content delivery or image services • testflight.apple.com - for TestFlight, Apple's platform for beta testing apps • time.apple.com - Network Time Protocol • token.safeBrowse.apple - for Apple's Safari Fraudulent Website Warning (Safe Browse) • us-ne-courier-4.push-apple.com.akadns.net - Apple Push Notification Service • us-sandbox-courier-4.push-apple.com.akadns.net - Apple Push Notification Service • use1-wps-prod.apple.com • weatherkit.apple.com • wps.apple.com • www.apple.com - Core Apple websites • xp.apple.com - telemetry • gateway.icloud.com • p177-content.icloud.com • edge-062.usatl5.icloud-content.com • p104-content.icloud.com • setup.icloud.com • p150-content.icloud.com • p176-content.icloud.com • p101-content.icloud.com • mask-api.icloud.com Apple Domains I Already Block• apple.news • apple.tv • podcasts.apple.com • siri.apple.com • caldav.icloud.com • contacts.icloud.com • mask.apple-dns.net • mask-api.icloud.com • doh.dns.apple.com.v.aaplimg.com • doh.dns.apple.com • apple-relay.cloudflare.com • mask-canary.icloud.com • mask-h2.icloud.com • mask.icloud.com • p120-caldav.icloud.com
Privacy reminder! Have you disabled AirDrop yet?
One of the most innocuous features enabled on millions of iPhones is also one of the most dangerous for those seeking to protect their privacy in public. Apple's AirDrop protocol uses trivially bypassed security measures that authorities like the Chinese government have openly bragged about cracking to identify users since at least 2022.
You should assume that any device with AirDrop enabled is constantly broadcasting your name, email address, and phone number to everyone around you, even if you have it set to "Contacts Only." Apple has known about this flaw since 2019 and has not issued any fix.
UK Court Rejects Secrecy in Apple’s iCloud Encryption Dispute with the UK Home Office
#ApplePrivacy #EndToEndEncryption #iCloudSecurity #iCloud #Surveillance #UK #Cybersecurity #DataProtection #Backdoors #OpenJustice #TechRegulation
The UK has issued a legal order demanding Apple create an iCloud backdoor #Apple #iCloud #UK #ApplePrivacy #Encryption #CyberSecurity #DataPrivacy #DigitalSurveillance
Building user trust is super important in today’s app ecosystem, and Apple’s App Privacy Labels play a central role in this process. I explore best practices to make sure transparency, comply with privacy guidelines, and build confidence among users.
https://www.bytescove.com/build-user-trust-with-apple-app-privacy-labels-best-practices/
#iOSDeveloper #Privacy #PrivacyLabels #AppPrivacy #UserTrust #DataTransparency #AppDevelopment #ApplePrivacy #PrivacyMatters #UserExperience #MobileApps #DeveloperTips