Someday hoping some billionaire decides to start a "third" operating system that is simple enough to be maintained by an OSS foundation.
These big tech co’s will harvest whatever is possible since user data equals hard cash and they will try and do it until they get found out, but even then it could take years until they actually get stopped or fined.
Its still the wild west out there since governments are so extremeley slow to react and they know that.
Also, Apples posturing as being the “privacy leader” doesnt mean anything anymore at this point.
Real question is, can other iOS applications trigger this data leaking behavior or can untrusted MacOS devices do this as well?
The fact that internal system daemons can silently trigger access to TCC-protected domains (like Contacts, FaceID, Microphone, and Bluetooth) without app association or user consent breaks Apple’s own stated privacy model.
This got flagged because you have not proven anything.
System Level Daemons and preinstall Apple developed applications are bypassing standard app level permissions. Are they doing anything nefarious with the data like sending it all to Apple or just using it to do the work people expect? You are running around acting like SystemD is doing nefarious stuff because it's bypass file permissions. Ok, it's a system daemon, not shocked, is it doing anything bad with that or just trying to make my system work out of the box as I expect.
Apple makes OS on the iPhone, they are in privileged spot.
FluGameAce007•5mo ago
System daemons silently initiate Bluetooth Low Energy (BLE) scans without app activity or user interaction.
GPS location harvesting occurs with no prompts, indicators, or active apps.
Internal frameworks bypass Apple’s Transparency, Consent, and Control (TCC) protections using undocumented flags.
Bluetooth trust metadata (e.g., IRKs, pairing history) is exposed even when devices are disconnected.
Cryptographic failures are silently ignored during trust operations.
These behaviors suggest an integrated telemetry pipeline that operates beneath iOS’s user-facing privacy model. The full report includes logs, technical breakdowns, and reproduction steps.
internet2000•5mo ago
ComputerGuru•5mo ago
iancarroll•5mo ago
kulahan•5mo ago
like_any_other•5mo ago
What does "harvesting" mean? Does the data stay on the device, or is it sent to Apple?