← Back to context

Comment by threeseed

1 month ago

> letting the feds see every time you use the product

This does not happen.

Traffic analysis by the government totally happens: https://lifehacker.com/how-cia-director-david-petraeuss-emai...

Now they probably don't care about you personally, but you'd be surprised how many people are connected indirectly to a person of interest. Google "Maher Arar" for the horrific consequences of false positives.

  • >you'd be surprised how many people are connected indirectly to a person of interest.

    I get called "paranoid," often, but I'm being honest when responding to people requesting my phone number: "you don't want my number in your phone, because it'll associate you with people you probably don't want to be associated with" [see Five Eyes' 3-Degrees of Separation].

Wrong. Anything that makes any network request is by definition a privacy leak. The network itself is always listening, and the act of making any connection says that you are using the computer, and where, and when.

  • If every app and system is making network connections by default without the user's knowledge or intervention then it doesn't really prove that you are using the computer at all.

    • Completely missing the point, but you're right that I should have said “using or in possession” of the computer. The point is that they reveal your physical location to the network, so if they make requests while not directly in use then it's actually even worse.

      For context, stationary desktop machines comprise single-digit percentages of Mac sales: https://appleinsider.com/articles/24/03/06/macbook-pro-and-m...

      Every other product sold by Apple (Mac notebooks, iPhones, watches, etc) are designed to be carried around with you, happily beaconing your presence to every network and to every other Apple device that will listen. I have seen this with my own eyes where my M3 MBP showed up on my WiFi AP status page as soon as I got home even though it was supposedly “““asleep””” in my bag.

      4 replies →

  • And so in this context.

    You are saying that every network request is going to a target controlled by the US government.

    • Yes, this is what I'm saying.

      Particularly among "controversial" product manufacturers.

      ----

      Entirely unrelated: I recently visited my favorite hometown (Austin) museum, UT's Harry Ransom Center. Their P.E.N. exhibit has an exposé on how various mid-20th Century authors were in fact funded by The Ford Foundation (a known CIA "investment vehicle"), including Aldous Huxley (author of Brave New World). One of the exhibits features multiple author signatories adamently denying this CIA-funding, over the 1950's decade... ultimately this conspiracy theory ended up being true/revealed. Adds an entirely new dimension to The Savage's [BNW's main character] decision to hang himself.