{"id":4918,"date":"2012-06-13T18:12:45","date_gmt":"2012-06-13T18:12:45","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=4918"},"modified":"2012-12-13T08:50:01","modified_gmt":"2012-12-13T16:50:01","slug":"more-transparent-apple","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/","title":{"rendered":"More Transparent Apple"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_AppleTransparency1.jpeg\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-4930\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_AppleTransparency1.jpeg\" alt=\"\" width=\"560\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_AppleTransparency1.jpeg 560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_AppleTransparency1-300x160.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_AppleTransparency1-100x53.jpg 100w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p>As the WWDC conference gets underway, there has been a ton of coverage about hardware and software updates. There were a couple of nuggets in all this that I found particularly interesting, as a security researcher.<\/p>\n<p>More and more, app and website developers are playing fast and loose with our data. The large number of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/linkedin-security-woes\/\">websites experiencing password breaches<\/a>, LinkedIn and Path\u2019s apps being caught sending potentially confidential data in plain text; these are just a few examples. Undoubtedly there are other examples that have yet to be discovered.<\/p>\n<p>But it looks like maybe Apple is trying to make moves to reverse this trend.<br \/>\nA few months ago, they started rejecting apps that used the Unique Device Identifier (UDID). The <a href=\"http:\/\/www.idownloadblog.com\/2012\/06\/11\/ios-6-brings-brand-new-privacy-settings-you-cant-miss\/\">next version of iOS<\/a> is expected to have more granular warnings and privacy settings to let you choose what data apps are able to access.<\/p>\n<p>It remains to be seen if these privacy settings will improve our data security overall, but it does bring up interesting possibilities in terms of increasing transparency. Right now we have to take a lot on faith about what apps are doing and how they\u2019re protecting our data.<\/p>\n<p>But Apple is not stopping there with their possible moves towards transparency. The Black Hat security briefings in Las Vegas next month will be including a handful of presentations about iOS security, but most notably, it will include a <a href=\"http:\/\/www.blackhat.com\/usa\/bh-us-12-briefings.html#DeAtley\">presentation from Dallas De Atley<\/a>, manager of Apple\u2019s Platform Security team.<\/p>\n<p>This will be Apple\u2019s first time presenting at this conference, which is really a big deal. The attendees at this conference are not known for sitting quietly and slurping up corporate platitudes. They\u2019re usually a pretty rowdy bunch. Apple has to be aware of this, and presumably they will be planning for plenty of incredibly pointed and articulate questions. If not at the conference, then they\u2019ll have plenty to answer in response to blog posts and articles of attendees after the fact. Do not tempt the nerd rage!<\/p>\n<p>The optimist in me hopes that this is a view into a more transparent future with Apple, when it comes to security. They can double down on secrecy all they like. But I hope that the future includes more cooperation with those people helping to improve security for everyone.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the WWDC conference gets underway, there has been a ton of coverage about hardware and software updates. There were a couple of nuggets in all this that I found particularly interesting, as a security researcher.<\/p>\n","protected":false},"author":6,"featured_media":8813,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13,5,11],"tags":[3151,69,106,3154],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"As the WWDC conference gets underway, there has been a ton of coverage about hardware and software updates. There were a couple of nuggets in all this that I found particularly interesting, as a security researcher.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"More Transparent Apple - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"As the WWDC conference gets underway, there has been a ton of coverage about hardware and software updates. There were a couple of nuggets in all this that I found particularly interesting, as a security researcher.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-13T18:12:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-12-13T16:50:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/\",\"name\":\"More Transparent Apple - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#primaryimage\"},\"datePublished\":\"2012-06-13T18:12:45+00:00\",\"dateModified\":\"2012-12-13T16:50:01+00:00\",\"description\":\"As the WWDC conference gets underway, there has been a ton of coverage about hardware and software updates. There were a couple of nuggets in all this that I found particularly interesting, as a security researcher.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"More Transparent Apple\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"More Transparent Apple\",\"datePublished\":\"2012-06-13T18:12:45+00:00\",\"dateModified\":\"2012-12-13T16:50:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#webpage\"},\"wordCount\":389,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"keywords\":[\"Apple\",\"iOS\",\"Privacy\",\"Security &amp; Privacy\"],\"articleSection\":[\"Apple\",\"Security &amp; Privacy\",\"Security News\",\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"As the WWDC conference gets underway, there has been a ton of coverage about hardware and software updates. There were a couple of nuggets in all this that I found particularly interesting, as a security researcher.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/","og_locale":"en_US","og_type":"article","og_title":"More Transparent Apple - The Mac Security Blog","og_description":"As the WWDC conference gets underway, there has been a ton of coverage about hardware and software updates. There were a couple of nuggets in all this that I found particularly interesting, as a security researcher.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-06-13T18:12:45+00:00","article_modified_time":"2012-12-13T16:50:01+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/","name":"More Transparent Apple - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#primaryimage"},"datePublished":"2012-06-13T18:12:45+00:00","dateModified":"2012-12-13T16:50:01+00:00","description":"As the WWDC conference gets underway, there has been a ton of coverage about hardware and software updates. There were a couple of nuggets in all this that I found particularly interesting, as a security researcher.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"More Transparent Apple"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"More Transparent Apple","datePublished":"2012-06-13T18:12:45+00:00","dateModified":"2012-12-13T16:50:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#webpage"},"wordCount":389,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","keywords":["Apple","iOS","Privacy","Security &amp; Privacy"],"articleSection":["Apple","Security &amp; Privacy","Security News","Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/more-transparent-apple\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1hk","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4918"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=4918"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4918\/revisions"}],"predecessor-version":[{"id":4934,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4918\/revisions\/4934"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8813"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=4918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=4918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=4918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}