{"id":38227,"date":"2020-11-17T07:51:08","date_gmt":"2020-11-17T07:51:08","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/"},"modified":"2020-11-17T07:51:08","modified_gmt":"2020-11-17T07:51:08","slug":"apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/","title":{"rendered":"Apple&#8217;s privacy pledges: We sent dev checks over plain HTTP, logged IP addresses. We bypass firewall apps"},"content":{"rendered":"<p><strong class=\"trailer\">Analysis<\/strong> Apple plans to revise the way it checks the trustworthiness of Mac applications when they&#8217;re run \u2013 after server problems last week during the launch of macOS Big Sur prevented people&#8217;s desktop apps from starting.<\/p>\n<p>On Monday, Apple <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/web.archive.org\/web\/diff\/20201116034129\/20201105231721\/https:\/\/support.apple.com\/en-us\/HT202491\">modified<\/a> its <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/support.apple.com\/en-us\/HT202491\">Gatekeeper support page<\/a> to address privacy concerns raised in the wake of the breakdown.<\/p>\n<p>Gatekeeper is the system utility that checks that an application&#8217;s developer certificate is valid before it allows the user to run the program. This verification process involves contacting Apple&#8217;s servers to check the status of the certificates involved, and if those servers go down, those folks will find themselves unable to launch their software packages.<\/p>\n<p>Before the weekend, it became <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/sneak.berlin\/20201112\/your-computer-isnt-yours\">widely known<\/a> that macOS&#8217;s cert-checking code effectively sends a digital fingerprint \u2013 a hash \u2013 of the app developer under scrutiny to Apple&#8217;s back-end servers via plain-text HTTP. That means Apple as well as anyone eavesdropping on the network path can at least link you by your public IP address to the kinds of application you use.<\/p>\n<p>Now Apple has stressed that this app security check does not send anyone&#8217;s Apple IDs nor device identifiers over the &#8216;net, though it did log people&#8217;s public IP addresses. The tech giant promised to no longer retain this information, and said it will implement additional privacy improvements.<\/p>\n<p>&#8220;To further protect privacy, we have stopped logging IP addresses associated with Developer ID certificate checks, and we will ensure that any collected IP addresses are removed from logs,&#8221; Apple said.<\/p>\n<p>The Silicon Valley titan also said it plans to implement an encrypted protocol for developer ID certificate revocation checks, to take steps to make its servers more resilient, and to provide users with an opt-out mechanism. <i>The Register<\/i> understands that the certificate checks are cryptographically signed by Apple, so they cannot be tampered with in transit without detection, though they can be observed, and so now Apple will wrap that communication channel in encryption to shield it from prying eyes.<\/p>\n<p>Various Apple services <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/11\/13\/apple_releases_big_sur\/\" rel=\"noopener noreferrer\">failed last week<\/a>. Though the Mac goliath has yet to publish any analysis of the incident \u2013 a common practice among cloud service providers \u2013 Apple&#8217;s system status page showed service degradation and outages. These issues are separate from the <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.reddit.com\/r\/apple\/comments\/jumlvn\/macos_big_sur_update_bricking_some_older_macbook\/\">problems<\/a> <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/discussions.apple.com\/thread\/252033190\">reported<\/a> by people who have apparently bricked older MacBook Pro models (2013-2014) by applying the Big Sur update.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/01\/08\/shutterstock_apple_juice.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"A glass of apple juice\"><\/p>\n<h2 title=\"Server problems mar operating system version 11 rollout\">Apple drops macOS Big Sur on the world \u2013 and it arrives with a thud, sound of breaking glass, sirens in the distance&#8230;<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2020\/11\/13\/apple_releases_big_sur\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>One of the services that fell over was Apple&#8217;s Online Certificate Status Protocol (<a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/datatracker.ietf.org\/doc\/rfc6960\/\">OCSP<\/a>) responder, which performs the aforementioned developer certification checks: it reveals if a cert is valid or has been revoked. The purpose of these certificates is ostensibly to limit the spread of malware. In a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/lapcatsoftware.com\/articles\/ocsp.html\">blog post<\/a>, Jeff Johnson, who runs app development biz Lapcat Software, explains that if Apple finds a developer has distributed malware, it can revoke the developer&#8217;s code-signing certificate and prevent macOS from launching all programs signed by that certificate.<\/p>\n<p>&#8220;Unfortunately, if there&#8217;s an internet connection problem involving the Developer ID OCSP, that can also prevent Mac apps from launching,&#8221; said Johnson. &#8220;For several hours on Thursday, Mac users around the world experienced extreme slowness when launching their installed apps.&#8221;<\/p>\n<p>In other words, if a Mac loses its internet connection, the operating system&#8217;s cert-checking code is supposed to fail in a way that allows the application to run in the meantime, but because people&#8217;s Macs were able to connect to the internet, and it was Apple&#8217;s servers that fell over, the OS failed to let apps launch.<\/p>\n<h3 class=\"crosshead\"> <span>Hanlon&#8217;s razor<\/span><br \/>\n<\/h3>\n<p>Complicating matters further is the use of plain-text HTTP for the certificate checks, which means anyone with access to that network traffic, like an ISP, can determine the developer certificate involved and at least guess the associated app. That&#8217;s less than ideal from a privacy perspective, particularly given Apple&#8217;s efforts to market itself as a corporation that cares about privacy, for users outside China.<\/p>\n<p>Developers who have looked into the transmitted data <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.jacopo.io\/en\/post\/apple-ocsp\/\">argue<\/a> it&#8217;s not particularly sensitive. However, Apple&#8217;s decision to stop logging IP addresses associated with developer ID certificate checks demonstrates that the privacy concerns aren&#8217;t entirely imagined.<\/p>\n<p>After various technically inclined types looked into ways to prevent the OCSP slowdown and perhaps block it persistently, word spread that network filtering apps weren&#8217;t up to the task, thanks to API changes in macOS Big Sur.<\/p>\n<p>Patrick Wardle, principal security researcher at Jamf and founder of Objective-See, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/patrickwardle\/status\/1327726496203476992?s=20\">noted<\/a> that in Big Sur, Apple requires third-party firewall apps and app-based VPNs to use network monitoring and proxy software interfaces that are sidestepped by traffic from Apple&#8217;s own apps and operating system processes. Thus, data packets from Apple&#8217;s own programs and OS code goes straight out to the network, and aren&#8217;t funneled through these firewall and VPN apps.<\/p>\n<p>In a phone interview with <i>The Register<\/i>, Wardle explained that the various kernel programming interfaces (KPIs) previously available to developers for network monitoring are <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/developer.apple.com\/support\/kernel-extensions\">no longer allowed<\/a>. Officially endorsed APIs, <code><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/developer.apple.com\/documentation\/networkextension\/nefilterdataprovider\">NEFilterDataProvider<\/a><\/code> and <code><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/developer.apple.com\/documentation\/networkextension\/neappproxyprovider\">NEAppProxyProvider<\/a><\/code>, don&#8217;t allow third-party firewalls apps like Objective Development&#8217;s Little Snitch or Objective-See&#8217;s LuLu, or app-based VPNs, to block OCSP requests or other Apple-exempted processes. (System-wide VPNs implementing <code><a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/developer.apple.com\/documentation\/networkextension\/netunnelprovidermanager\">NETunnelProviderManager<\/a><\/code> reportedly do cover Apple traffic.)<\/p>\n<p>&#8220;There are legitimate processes on macOS that need to talk to various Apple endpoints for the system to function properly,&#8221; Wardle explained. &#8220;Apple decided to make sure these could always talk to the internet, even with a third-party firewall installed.&#8221;<\/p>\n<p>Wardle said while he understands Apple&#8217;s reasoning for doing so and doesn&#8217;t believe there&#8217;s any malice or conspiracy involved, he still has privacy and security concerns.<\/p>\n<p>&#8220;There are users out there who probably don&#8217;t want their traffic going to Apple&#8217;s servers,&#8221; he said, pointing to past reports about how intelligence agencies monitor network traffic. He also noted that the inability to block Apple network traffic might not be appreciated by macOS users tethered to a cellular device since they would have to bear the cost of Apple data \u2013 an issue that recently led to <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2020\/11\/14\/google_android_data_allowance\/\" rel=\"noopener noreferrer\">a lawsuit against Google<\/a>.<\/p>\n<p>Wardle said he developed a proof-of-concept file exfiltration exploit that takes advantage of the exemption Apple gives to its own network traffic to get past firewall applications.<\/p>\n<p>&#8220;That&#8217;s problematic,&#8221; he said. &#8220;I think a firewall should be able to do its job and comprehensively analyze traffic.&#8221;<\/p>\n<p>Wardle repeatedly expressed sympathy for the challenge Apple faces balancing usability and security. But he argues the Cupertino titan hasn&#8217;t thought through the repercussions of its approach. He pointed to recent changes Apple made to prevent scans of remote process memory space as a defense against code injection. Hackers known as the Lazarus Group responded by creating <a target=\"_blank\" href=\"https:\/\/www.theregister.com\/2019\/12\/05\/lazarus_group_macos_malware\/\" rel=\"noopener noreferrer\">memory-only payloads<\/a>, knowing that macOS security tools could no longer scan or capture the malicious code.<\/p>\n<p>&#8220;It just seems that as Apple locks down the operating system, that lockdown process also locks out some of the capability of third-party security tools,&#8221; said Wardle.<\/p>\n<p>However, he endorsed Apple&#8217;s decision to revise its OCSP process and said he was happily running Big Sur, despite the rough start. &#8220;From a security and privacy point of view, it&#8217;s still a no-brainer,&#8221; he said. &#8220;Launching a new operating system is always difficult.&#8221; \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/11\/17\/apple_big_sur_privacy\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Big Sur highlights shortcomings in OCSP comms, APIs Analysis\u00a0 Apple plans to revise the way it checks the trustworthiness of Mac applications when they&#8217;re run \u2013 after server problems last week during the launch of macOS Big Sur prevented people&#8217;s desktop apps from starting.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":38228,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-38227","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apple&#039;s privacy pledges: We sent dev checks over plain HTTP, logged IP addresses. We bypass firewall apps 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple&#039;s privacy pledges: We sent dev checks over plain HTTP, logged IP addresses. We bypass firewall apps 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-17T07:51:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Apple&#8217;s privacy pledges: We sent dev checks over plain HTTP, logged IP addresses. We bypass firewall apps\",\"datePublished\":\"2020-11-17T07:51:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\\\/\"},\"wordCount\":1252,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\\\/\",\"name\":\"Apple's privacy pledges: We sent dev checks over plain HTTP, logged IP addresses. We bypass firewall apps 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps.jpg\",\"datePublished\":\"2020-11-17T07:51:08+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps.jpg\",\"width\":\"174\",\"height\":\"115\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple&#8217;s privacy pledges: We sent dev checks over plain HTTP, logged IP addresses. We bypass firewall apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apple's privacy pledges: We sent dev checks over plain HTTP, logged IP addresses. We bypass firewall apps 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/","og_locale":"en_US","og_type":"article","og_title":"Apple's privacy pledges: We sent dev checks over plain HTTP, logged IP addresses. We bypass firewall apps 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-11-17T07:51:08+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Apple&#8217;s privacy pledges: We sent dev checks over plain HTTP, logged IP addresses. We bypass firewall apps","datePublished":"2020-11-17T07:51:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/"},"wordCount":1252,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/","url":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/","name":"Apple's privacy pledges: We sent dev checks over plain HTTP, logged IP addresses. We bypass firewall apps 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps.jpg","datePublished":"2020-11-17T07:51:08+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/11\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps.jpg","width":"174","height":"115"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/apples-privacy-pledges-we-sent-dev-checks-over-plain-http-logged-ip-addresses-we-bypass-firewall-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Apple&#8217;s privacy pledges: We sent dev checks over plain HTTP, logged IP addresses. We bypass firewall apps"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38227","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=38227"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/38227\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/38228"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=38227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=38227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=38227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}