zlacker

[parent] [thread] 14 comments
1. heavys+(OP)[view] [source] 2022-01-09 04:49:14
> > Both Windows and macOS are approaching the iOS security model that depends on manufacturers blessing what software can run on their products, and banning software they don't want users to run.

> That's been said for years, and hasn't held true.

It certainly has. Unsigned binaries were recently deprecated entirely on M1 Macs. Microsoft even released versions of the Surface that can only run Windows and only run apps blessed by Microsoft. With each iteration on these products, the screws are tightened a bit more.

Software freedom is not just about being able to run Linux. Most Mac users buy Macs because of macOS and its integrations, running Linux doesn't help them out. Software freedom on macOS definitely does, though. As it stands, that freedom has been chipped away at with new releases of Apple's software and hardware.

For example, I'm the author of several open source utilities for macOS. Users had no problem using the utilities a few years ago, but because they're unsigned or not Notarized, macOS tricks users into thinking that they're either broken or malicious. Even self-signing the apps has macOS treating them as if they're radioactive. Users don't understand the scary signing and certificate alerts, so they end up thinking they've downloaded malware. The solution to this is to pay Apple $100 every year, and then regularly have them scan and approve of the apps via Notarization. That's antithetical to software freedom. Regular users who want to use un-Notarized software are left frightened and without having their needs met. Software freedom is important for everyone, not just developers and power users.

replies(3): >>gruez+Q2 >>mlyle+qd >>azalem+pq
2. gruez+Q2[view] [source] 2022-01-09 05:18:39
>>heavys+(OP)
>That's antithetical to software freedom. Regular users who want to use un-Notarized software are left frightened and without having their needs met.

It's easy to argue "give me software freedom or give me death!" if you're a technically competent user that probably won't fall for a trojan, but what about everyone else? Don't you think there's a reasonable argument to locking down systems to improve security? To be clear, I'm not arguing for sacrificing software freedom wholesale for security, only in default configurations.

replies(1): >>wiz21c+0e
3. mlyle+qd[view] [source] 2022-01-09 07:23:52
>>heavys+(OP)
> Unsigned binaries were recently deprecated entirely on M1 Macs.

Except bins signed by self-signed certs are still treated basically the same as unsigned binaries were before.

replies(2): >>my123+Qm >>heavys+u72
◧◩
4. wiz21c+0e[view] [source] [discussion] 2022-01-09 07:30:27
>>gruez+Q2
The argument doesn't hold. It uses the 99.9% of the users to crack down on the 0.1% (the devs) who have the ability to redefine what software is. Doing so, the big companies make sure they have the ability to rule their ecosystem. Using the argument of security, I'm sure they'll have the go from the governments.

So why would a company want total control on its ecosystem ? Because government don't want social unrest. So if you can ensure your platform is free of "terrorist", then you can discuss with government better. For example, if you're secure, you can position yourself as a reliable player on banking, e-health, etc. That is, you gain a very strong position to shape society in ways you're interested in. Don't forget that big companies have the power to do that and that those who command them are not required to be benevolent. They are private companies so there's no oversight on which interest they serve first.

It's not all doom and gloom though . As computer gets into our lives, more and more government and parliaments will become aware of the issue and there will be a place to fight for our rights. It's already the case.

The only thing that matter is : a computer is a general purpose machine and must stay a "general purpose" machine.

replies(3): >>JCWasm+Lg >>0dayz+Fq >>gruez+U41
◧◩◪
5. JCWasm+Lg[view] [source] [discussion] 2022-01-09 08:00:11
>>wiz21c+0e
> The only thing that matter is : a computer is a general purpose machine and must stay a "general purpose" machine.

Fully agreed. This is the most important point. No company or vendor should prevent me from running the software I want, in the way I want, be it modified for my own purposes or not.

Sure, if you only look onto the security side it may be more secure if you can only run approved software, but it is in no circumstances okay to reduce the freedom of a user on his/her private machine. (In a business setting it makes sense to only allow software approved by the IT-Department)

◧◩
6. my123+Qm[view] [source] [discussion] 2022-01-09 09:07:08
>>mlyle+qd
You don't even need a true signature. An ad-hoc one (which can be linker-generated) and has no cryptographic key attached is considered as valid.
replies(1): >>darkwa+nq
◧◩◪
7. darkwa+nq[view] [source] [discussion] 2022-01-09 09:47:38
>>my123+Qm
And in the next N releases of macOS those features will be quietly removed since 99% users are running properly notarized binaries anyway...
replies(2): >>myname+vJ >>user-t+fy1
8. azalem+pq[view] [source] 2022-01-09 09:47:51
>>heavys+(OP)
Heck, the amount of work it takes just to install gdb and debug another process on Mac OS is insane. There's no clear instructions on apple's website: the best thing to do is follow a stack overflow post with something like 14 instructions on how to generate the right kind of self-signed cert, acknowledge all the warning messages, and then follow the various comments for os-version specific alterations. It took me ages.
◧◩◪
9. 0dayz+Fq[view] [source] [discussion] 2022-01-09 09:51:15
>>wiz21c+0e
This rhetoric about evil """the government""" spying on you because terrorists is at this point quite out of date or even stale.

I'm far more worried about companies locking things down due to legitimate concern (security) with malicious intent.

Than being arrested for being mistaken for osama bin laden because I decided to grow a beard.

◧◩◪◨
10. myname+vJ[view] [source] [discussion] 2022-01-09 13:36:59
>>darkwa+nq
That’s certainly an option. But absolutely nothing points to it being the actual thing that will happen other than wild baseless speculation.
◧◩◪
11. gruez+U41[view] [source] [discussion] 2022-01-09 16:01:59
>>wiz21c+0e
>The argument doesn't hold. It uses the 99.9% of the users to crack down on the 0.1% (the devs) who have the ability to redefine what software is.

I'm not sure what the "crack down" is when you can disable it fairly easily.

>So why would a company want total control on its ecosystem ? Because government don't want social unrest.

You'd think that if they want to suppress uprisings, the mechanism they use to do so will be slightly more robust than a setting in the developer options.

>The only thing that matter is : a computer is a general purpose machine and must stay a "general purpose" machine.

How is this related to what we're talking about? What gatekeeper/smartscreen is doing is effectively operating a whitelist system. The platform itself is still open, and you could still do whatever you want before. What's more is that you can disable the system, so I'm not seeing what the issue is.

◧◩◪◨
12. user-t+fy1[view] [source] [discussion] 2022-01-09 18:54:38
>>darkwa+nq
Why would that happen in the next N releases, when it hasn't happened in the previous M releases? What's changed?
replies(1): >>mlyle+gD1
◧◩◪◨⬒
13. mlyle+gD1[view] [source] [discussion] 2022-01-09 19:27:57
>>user-t+fy1
I think there's some perception by people like this that --- there's some massive goal towards restricting users, and each change in the security policy is an incremental step.

But it doesn't really make sense:

- All the technical work to restrict users could certainly be done in one release: it's not that hard.

- As to market acceptance, I don't think any of the changes re: binary signing are "getting users used to" being restricted.

So, requiring signed binaries doesn't appreciably make the technical or market challenges of restricting unapproved apps easier.

◧◩
14. heavys+u72[view] [source] [discussion] 2022-01-09 23:10:06
>>mlyle+qd
From my post:

> Even self-signing the apps has macOS treating them as if they're radioactive.

replies(1): >>mlyle+Qf2
◧◩◪
15. mlyle+Qf2[view] [source] [discussion] 2022-01-10 00:09:17
>>heavys+u72
It's reasonable to know the app isn't self-signed and having to do the right-click "Open" for the first launch.

I appreciate that I can both benefit from PKI attestation of apps (for a small degree of protection against malware), and I can override it and run unsigned stuff.

[go to top]