66
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 05 Sep 2024
66 points (91.2% liked)
Apple
17610 readers
281 users here now
Welcome
to the largest Apple community on Lemmy. This is the place where we talk about everything Apple, from iOS to the exciting upcoming Apple Vision Pro. Feel free to join the discussion!
Rules:
- No NSFW Content
- No Hate Speech or Personal Attacks
- No Ads / Spamming
Self promotion is only allowed in the pinned monthly thread
Communities of Interest:
Apple Hardware
Apple TV
Apple Watch
iPad
iPhone
Mac
Vintage Apple
Apple Software
iOS
iPadOS
macOS
tvOS
watchOS
Shortcuts
Xcode
Community banner courtesy of u/Antsomnia.
founded 2 years ago
MODERATORS
@TwilightKiddy @prousername bro really said hashing is a privacy violation??
I mean, they where hashing any lauched programs and sending the hashes unencryped to their servers to compare against their database. So, they literally knew every program you launched, when you did it, but also your ISP knew it and anyone smart enough to MITM your connection. Sounds like a privacy violation to me.
@TwilightKiddy I can see how you can get there, but the MITM would need to know the hashing algo, you can’t *really* just un-hash something, at least not reliably
But your original statement was that the hashing was the privacy violation, and that’s the part I took issue with, hashing is a generally accepted security measure, it is not inherently a privacy violation
I meant a pretty well-known case, not hashing in general. Thought that was obvious.