Ars Technica has compiled a guide for how to encrypt laptops and phones. There are brief descriptions for all the relevant systems.
It looks like Apple “needs” to upload even your unsaved documents to its servers to make the newly introduced Continuity “feature” work.
Also it seems Apple silently uploads names and email addresses of all the people you correspond with–no, not only the ones in your address book–just to have a “consistent” experience when displaying recent addresses.
It scares me how little their customer’s privacy must be worth when they choose (these are not accidental data “leaks”) to silently violate them in order to provide comfort features.
It seems there is at least a hidden configuration option to turn this behavior off:
defaults write NSGlobalDomain NSDocumentSaveNewDocumentsToCloud -bool false
OS X Yosemite seems to have gained the feature to “phone home” when you do spotlight searches. It’ll send search terms and your location data to Apple’s servers. Of course it’s perfectly in line with Apple’s recent “trust us, we won’t collect unnecessary data” rhetoric.
[…] Ashkan Soltani, an independent researcher and consultant, confirmed the behavior, labeling it “probably the worst example of ‘privacy by design’ I’ve seen yet.” Users don’t even have to search to give up their privacy. Apple immediately sends the user’s location to the company, according to Soltani.
You can turn it off, but it’s on by default.
Just found a nice trick on TUAW on how to make the OS X Activity Monitor show graphs in place of its app icon.
If you find yourself–like me–in the situation that your Mac has crashed and you want to retrieve the crash reports (some call them logs 😉 )? Well, there are basically two ways.
You can look them up with the “Console” tool (find it in
or with Spotlight). Open the “System Diagnostic Reports” section on the left and find an entry similar to
at the top.
You can also find these reports as text files under
with the same names. OS X will open them with the Console tool per default.
I just needed to create an .iso file from a DVD and Disk Utility was no help. 🙁 So I turned to the internet and found my answer on SuperUser. 🙂
hdiutil makehybrid -iso -joliet -o Image.iso /input_path
There are other variants described on the linked page.
I recently finished introducing custom CA infrastructure in two instances. Each having two sub CAs, two Servers and a bunch of users. The “create your own CA” part was quite easy after I found a dated but still accurate tutorial. In hindsight it is quite silly why I didn’t do this before.
On the server side I had to make it work on:
Each expecting its own Format/Packing of certificates, keys and certificate chains. :/
On the client side I had to produce installation and configuration howtos for Windows and OS X and a bunch of popular browsers and email clients. Then there is the “user education” part … this is still in progress, but its looking good.
All in all, I’m happy with the result. 🙂
Even for those living under a rock it should be evident by now: owning a Mac doesn’t spare you from dealing with malware/viruses/trojans.
There are tools to detect and remove it … it seems I’m fine. 🙂
So it seems OS X keeps track of all your downloads (even if you are using the Incognito/Private Browsing mode of your browser).
It stores the information in the following files:
- ~/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2 on Lion
- ~/Library/Preferences/com.apple.LaunchServices.QuarantineEvents on Snow Leopard
They are SQLite databases and can be manipulated with the right tools.
So to delete all the contents you need to open the file for your version of OS X (Lion in my case).
In the SQLite console delete all entries in the one table it contains.
delete from LSQuarantineEvent where 1=1;
This statement works in either file, but if you have Lion you might as well get rid of the old file.