{"id":30388,"date":"2024-02-04T13:16:51","date_gmt":"2024-02-04T21:16:51","guid":{"rendered":"https:\/\/www.podfeet.com\/blog\/?p=30388"},"modified":"2024-02-19T20:22:01","modified_gmt":"2024-02-20T04:22:01","slug":"sb-2024-02-04","status":"publish","type":"post","link":"https:\/\/www.podfeet.com\/blog\/2024\/02\/sb-2024-02-04\/","title":{"rendered":"Security Bits \u2014 4 February 2024"},"content":{"rendered":"<pre><code>&lt;li&gt;## Feedback &amp; Followups\n<\/code><\/pre>\n<aside class=\"small-aside\">Listener and community feedback, developments in recently covered stories, and developments in long-running stories we&#8217;re tracking over time.<\/aside>\n<ul>\n<li>Apple have released iOS 17.3, which includes the new <em>Stolen Device Protection<\/em> mode designed to thwart the recent spike in iPhone thefts by thieves who have observed or socially engineered passcodes allowing them to change iCloud passwords to disable FindMy and activate lock, and in the process, lock people out of their data. The general advice is to enable it (<strong>Settings<\/strong> \u2192 <strong>Face\/Touch ID &amp; Passcode<\/strong> \u2192 <strong>Turn On Stolen Device Mode<\/strong>) \u2014 <a href=\"https:\/\/tidbits.com\/2024\/01\/25\/turn-on-stolen-device-protection-in-ios-17-3\/\">tidbits.com\/\u2026<\/a> &amp; <a href=\"https:\/\/www.cultofmac.com\/844215\/stolen-device-protection\/\">www.cultofmac.com\/\u2026<\/a><\/li>\n<li>\ud83c\uddfa\ud83c\uddf8 We now know how the SEC&#8217;s X account was hacked, and, we get a timely reminder that SMS-based 2FA is the least-good 2FA: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/sec-confirms-x-account-was-hacked-in-sim-swapping-attack\/\">SEC confirms X account was hacked in SIM swapping attack \u2014 www.bleepingcomputer.com\/\u2026<\/a>\n<ul>\n<li><strong>Related:<\/strong> the SEC now have a better choice: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/x-adds-passkeys-support-for-ios-users-in-the-united-states\/\">X adds passkeys support for iOS users in the United States \u2014 www.bleepingcomputer.com\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>\ud83c\uddfa\ud83c\uddf8 US federal and state agencies continue to crack down on companies shirking their cybersecurity responsibilities:\n<ul>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ftc-orders-blackbaud-to-boost-security-after-massive-data-breach\/\">FTC orders Blackbaud to boost security after massive data breach \u2014 www.bleepingcomputer.com\/\u2026<\/a> (cloud service provider for non-profits, many in the healthcare and education sectors)<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/technology\/citibank-sued-over-failure-to-defend-customers-against-hacks-fraud\/\">Citibank sued over failure to defend customers against hacks, fraud \u2014 www.bleepingcomputer.com\/\u2026<\/a> (by NY State AG Leticia James)<\/li>\n<li><strong>Related:<\/strong> <a href=\"https:\/\/thehackernews.com\/2024\/01\/nsa-admits-secretly-buying-your.html\">NSA Admits Secretly Buying Your Internet Browsing Data without Warrants \u2014 thehackernews.com\/\u2026<\/a> (more excellent work by Sen. Ron Wyden, triggered by the recent FEC actions against data brokers discussed in the previous Security Bits)<\/li>\n<li><strong>Related:<\/strong> Just in time for tax session in the US: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/technology\/ftc-orders-intuit-to-stop-pushing-free-software-that-isnt-really-free\/\">FTC orders Intuit to stop pushing &#8220;free&#8221; software that isn&#8217;t really free \u2014 www.bleepingcomputer.com\/\u2026<\/a><\/li>\n<li><strong>Related Podcast Recommendation:<\/strong> \ud83c\udfa7 <a href=\"https:\/\/overcast.fm\/+Ys-7l4T-U\">The Indicator from Planet Money: Why the FTC is cracking down on location data brokers \u2014 overcast.fm\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<li>More details continue to emerge about the 23andMe hack, and the news does not get any better: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/23andme-data-breach-hackers-stole-raw-genotype-data-health-reports\/\">23andMe data breach: Hackers stole raw genotype data, health reports \u2014 www.bleepingcomputer.com\/\u2026<\/a> (we also now know it was a password stuffing attack, which went un-noticed for 5 months, which means their monitoring systems and processes were sub-standard)<\/p>\n<\/li>\n<\/ul>\n<h2>Deep Dive 1 \u2014 Push Notification Abuse on iOS<\/h2>\n<p>To understand what &#8216;freepy&#8217; (free in exchange for your privacy) services (including Facebook\/Meta and TikTok) have been discovered doing we need some context.<\/p>\n<p>Apple do a lot to stop apps abusing users security and privacy, which is why iOS is much more secure than desktop OSes, and a big part of that is controlling when apps can run. In early versions of iOS apps ran when they were the one foreground app, and when you switched to another app or the Home Screen they immediately paused. This made some features impossible, so APIs have been added over the years to allow limited background code execution. This is done using app entitlements that have specific purposes, e.g. background audio, background download, and rich notifications.<\/p>\n<p>In the past less scrupulous apps were caught abusing the background audio entitlement and APIs to play silence in order to stay running and retain access to location data. This caused big battery drains and Apple soon cracked down on this kind of API abuse.<\/p>\n<p>Now, a new type of entitlement &amp; API abuse has been discovered \u2014 apps have been caught abusing the fact that the rich notifications APIs allow apps to briefly run to react to push notifications. This is intended to allow apps to provide useful functionality as part of push notifications, like replying right from a notification, but Meta and others have been caught using push notifications to trigger their apps to push the user&#8217;s current locations to their servers.<\/p>\n<p>It seems likely Apple will update the app review process to detect this dark pattern, but in the meantime, the only fix is to turn off notifications for apps you don&#8217;t trust.<\/p>\n<h3>Links<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.cultofmac.com\/844574\/push-notification-tracking-how-to-block-iphone-apps-spying\/\">How to block iPhone apps from using push notification tracking to spy on you \u2014 www.cultofmac.com\/\u2026<\/a><\/li>\n<\/ul>\n<h2>Deep Dive 2 \u2014 \ud83c\uddea\ud83c\uddfa What Apple&#8217;s EU Digital Markets Act Changes Mean from a Security &amp; Privacy POV<\/h2>\n<p>In March the EU&#8217;s <em>&#8216;Digital Markets Act&#8217;<\/em> will go into effect, which means so-called <em>gatekeepers<\/em> will need to make changes to better facilitate competition. Apple has been designated a gatekeeper in a number of areas, including Safari on iOS, iOS itself, and the iOS App Store. We&#8217;ve known this would require Apple to do <strong>something<\/strong> by March, but we had no idea what they would do. Now, thanks to a very long press release, we do!<\/p>\n<p>Much of the detail and discussion focuses on changes to the various contracts and fees for developers, and while that&#8217;s important, it&#8217;s outside the scope of this segment (Bart dives into detail in <a href=\"https:\/\/lets-talk.ie\/lta125\">Let&#8217;s Talk Apple 125<\/a>. What I want to focus on here is the user-facing security and privacy implications.<\/p>\n<p>First and foremost, all the changes we&#8217;ll be discussing will apply in the EU only. And secondly, all of this could easily change if the EU Commission do not consider Apple&#8217;s plans sufficient to meet the law&#8217;s requirements. Similar to how Apple makes developers do all the work before deciding whether or not they will allow the app, the Commission will not begin their review of Apple&#8217;s changes until the law goes into effect.<\/p>\n<p>Apple have been forced to create over 600 new APIs without any kind of pre-approval from the Commission. Should the Commission find issue with some or all of Apple&#8217;s approach, the first step is engagement with the Commission, only if that proves unfruitful would things move to the courts. My expectation is that the Commission will negotiate at least some tweaks over the coming year.<\/p>\n<h3>3rd-party Browser Engines and Browser Ballots<\/h3>\n<p>We have had 3rd-party browsers on iOS for years, but they have all been skins over WebKit, the HTML\/CSS\/Javascript engine that powers Safari. This gives Apple control over the security and performance of all iOS browsers.<\/p>\n<p>Browsers in the EU App Store will be permitted to use their own browser engine, though it will be confined within a newly developed browser sandbox so Apple can still protect user data and other apps from abuses and vulnerabilities. The biggest risks for users are security and privacy leaks within and between web pages within the browser and performance hits, probably manifest as battery drain.<\/p>\n<p>Realistically, there are likely to be few takers because it&#8217;s a lot of work to maintain two different mobile browsers with different brains for iOS. Unless and until Apple open this entitlement up to the whole world, I doubt we&#8217;ll see many if any 3rd-party engines.<\/p>\n<p>What all EU users will see is a &#8216;Browser Ballot&#8217; letting them pick their preferred default browser from and randomly ordered list of the most popular ones in their country the first time they launch Safari. This is basically the same as what Microsoft were ordered to do in IE in Europe back when IE was found to be a monopoly by the Commission.<\/p>\n<p>Choice is great, and many 3rd-party browsers are more privacy-forward than even Safari, but not all, so the user&#8217;s choice will affect their privacy.<\/p>\n<h3>Portable App Store Data Reports<\/h3>\n<p>One of the DMA&#8217;s rules requires gatekeepers that operate a store they also sell their own products in to provide additional information to others in the marketplace. This is partly addressed by a worldwide change that gives all developers access to new reports, but it also gives EU users new data in their exportable data privacy report detailing their interaction with the App Store, and it can be shared with 3-rd party app stores.<\/p>\n<h3>Third-Party Payment Processors<\/h3>\n<p>European apps will have the option of using payment processors other than Apple, regardless of whether they are distributed via Apple&#8217;s app store or a third-party App Store. The APIs Apple have built to facilitate this will show users a message telling them they are leaving the walled garden, making it clear that if anything goes wrong, Apple can&#8217;t help.<\/p>\n<p>Apple make it easy to do things like family sharing and parental controls, they do a very good job protecting your privacy from developers, and in my experience are good at dealing with disputes, simply refunding the money and un-doing the purchase each time I&#8217;ve asked. 3rd party processors can&#8217;t support the family features, and they may or may not do a good job protecting your privacy or dealing with disputes.<\/p>\n<p>3rd party payment processors don&#8217;t help users, it&#8217;s only developers who want them because they would like to save on processing fees. Because Apple will only be charging EU developers 3% credit card processing fees, only extremely large developers with existing in-house payment processing infrastructure are likely to find it economically advantageous to use external payment processing, and they should be big enough to have robust processes in place. \ud83e\udd1e<\/p>\n<h3>There is no Sideloading!<\/h3>\n<p>Yes, there will be places to get apps outside the App Store, but users will not be able to bypass Apple&#8217;s security to run arbitrary apps from anywhere. No iOS app executable files to download and just run!<\/p>\n<p>All apps will need to be &#8216;notarised&#8217; by Apple, this is an automated and human security review to fight malware and detect apps that attempt to bypass iOS security features, including App Tracking Transparency and app sandboxes, so no new technical capabilities for apps.<\/p>\n<p>By law, noterisation <strong>cannot contain any content review<\/strong> \u2014 under the DMA app content moderation is 100% the responsibility of the App Store operator. So, adult content, gambling, etc. can get in via 3rd party stores, but technically currently impossible things like an Audio Hijack clone for iOS can&#8217;t.<\/p>\n<p>An interesting point is that when an app is submitted for notarisation, its metadata must also be submitted, Apple then verify it, add some screenshots, and include that in the finally digitally signed app bundle, so notarised apps will contain their own description and other metadata, and iOS will be able to show it, regardless of which App Store the app was obtained from.<\/p>\n<h3>3rd-Party App Stores<\/h3>\n<p>Developers who meet some criteria will be able to apply for a special entitlement to create an App Store app that can install other apps, in other words, 3rd-party app stores will be apps in the iOS App Store.<\/p>\n<p>All apps in these stores will be notarised, and the OS will show the app&#8217;s notarised metadata before users confirm the install.<\/p>\n<h3>Final Thoughts<\/h3>\n<p>This is very far from any kind of <em>wild west<\/em> security dystopia, Apple have put a lot of work into protecting users from malicious apps, regardless of their source. There are hundreds of new APIs they&#8217;ve developed make that very clear.<\/p>\n<p>While we can argue about the motivation (user or profit protection, probably both IMO), it&#8217;s equally clear that Apple have opted for a minimalist approach to compliance \u2014 as many as possible of Apple&#8217;s restrictions remain in place. So, the risk to users is minimised. What is likely to curtail the risks even more is that Apple appear to have made the terms economically un-attractive to most developers, and they have made these new rules entirely optional, allowing developers to choose to continue under the current arrangements, even in Europe. So, realistically, I doubt many app will be deployed under these new arrangements.<\/p>\n<p>Over time, other governments could well require Apple give their developers the same terms, in which case adoption might pick up, but at least for now, I&#8217;m not expecting any dramatic changes.<\/p>\n<h3>Links<\/h3>\n<ul>\n<li>Apple&#8217;s full press release \u2014 <a href=\"https:\/\/www.apple.com\/ie\/newsroom\/2024\/01\/apple-announces-changes-to-ios-safari-and-the-app-store-in-the-european-union\/\">www.apple.com\/\u2026<\/a><\/li>\n<li>A good overview: <a href=\"https:\/\/www.macstories.net\/news\/apple-details-how-it-plans-to-comply-with-the-eus-digital-markets-act\/\">Apple Details How It Plans to Comply with the EU&#8217;s Digital Markets Act \u2014 www.macstories.net\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/appleinsider.com\/inside\/app-store\/tips\/apples-new-app-store-rules-apply-to-these-27-countries\">Apple&#8217;s new App Store rules apply to these 27 countries \u2014 appleinsider.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/appleinsider.com\/articles\/24\/01\/25\/browsers-like-chrome-and-firefox-can-abandon-webkit-in-eu-with-ios-174\">Browsers like Chrome and Firefox can abandon WebKit in EU with iOS 17.4 \u2014 appleinsider.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/appleinsider.com\/articles\/24\/01\/25\/apple-is-enhancing-reports-about-what-it-knows-about-eu-users-in-ios-174\">Apple is enhancing reports about what it knows about EU users in iOS 17.4 \u2014 appleinsider.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/appleinsider.com\/articles\/24\/02\/03\/phil-schiller-warns-third-party-app-stores-are-a-risk-to-iphone-users\">Phil Schiller warns third-party app stores are a risk to iPhone users \u2014 appleinsider.com\/\u2026<\/a><\/li>\n<\/ul>\n<h2>\u2757 Action Alerts<\/h2>\n<aside class=\"small-aside\">Calls to action, if any stories in this section are relevant to you there is some action you should take.<\/aside>\n<ul>\n<li><a href=\"https:\/\/isc.sans.edu\/diary\/rss\/30578\">Apple Updates Everything &#8211; New 0 Day in WebKit \u2014 isc.sans.edu\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/google-chrome-browser-patches-1st-zero-day-of-2024\/\">Google Chrome browser patches 1st zero-day of 2024 \u2014 www.intego.com\/\u2026<\/a> (the other major Chromium-based browsers like Edge &amp; Brave have been patched too, remember to quit and re-start these browsers to let them patch themselves)<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-linux-glibc-flaw-lets-attackers-get-root-on-major-distros\/\">New Linux glibc flaw lets attackers get root on major distros \u2014 www.bleepingcomputer.com\/\u2026<\/a> (local privilege escalation, so attackers need to be able to run code locally, so a much bigger deal for cloud providers than home users, but still important for us all to patch promptly)<\/li>\n<li>If you&#8217;re running your own Mastodon server, patch it ASAP: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/mastodon-vulnerability-allows-attackers-to-take-over-accounts\/\">Mastodon vulnerability allows attackers to take over accounts \u2014 www.bleepingcomputer.com\/\u2026<\/a> (why I chose for a SaaS approach to hosting my own server at <code>social.bartificer.ie<\/code>, my server got patched for me by my provider <a href=\"https:\/\/masto.host\">Masto.host<\/a>)<\/li>\n<\/ul>\n<h2>Worthy Warnings<\/h2>\n<aside class=\"small-aside\">Potentially relevant warnings from government organisations, public interest groups, or the security community.<\/aside>\n<ul>\n<li>\ud83c\uddfa\ud83c\uddf8 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-tech-support-scams-now-use-couriers-to-collect-victims-money\/\">FBI: Tech support scams now use couriers to collect victims&#8217; money \u2014 www.bleepingcomputer.com\/\u2026<\/a><\/li>\n<li>A timely reminder of why it&#8217;s important to stay patched: \ud83c\uddfa\ud83c\uddf8 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-warns-of-patched-iphone-kernel-bug-now-exploited-in-attacks\/\">CISA warns of patched iPhone kernel bug now exploited in attacks \u2014 www.bleepingcomputer.com\/\u2026<\/a> (U.S. Cybersecurity and Infrastructure Security Agency, and the bug under active exploitation was patched in December <strong>2022<\/strong>) <\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/watch-out-for-i-cant-believe-he-is-gone-facebook-phishing-posts\/\">Watch out for &#8220;I can&#8217;t believe he is gone&#8221; Facebook phishing posts \u2014 www.bleepingcomputer.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trello-api-abused-to-link-email-addresses-to-15-million-accounts\/\">Trello API abused to link email addresses to 15 million accounts \u2014 www.bleepingcomputer.com\/\u2026<\/a> (The big danger is automated, credible, targeted phishing attacks, so if you use Trello, be extra suspicious)<\/li>\n<\/ul>\n<h2>Notable News<\/h2>\n<ul>\n<li>\ud83c\uddec\ud83c\udde7 The very controversial <em>Investigatory Powers Act<\/em> raises it&#8217;s head again, this time a proposed provision would allow the UK government to block OS &amp; software vendors from patching or even disclosing bugs they are using for surveillance\/espionage <strong>world wide<\/strong>, Apple currently complaining the loudest, but they&#8217;re not alone \u2014 <a href=\"https:\/\/arstechnica.com\/?p=1999789\">arstechnica.com\/\u2026<\/a><\/li>\n<li>\ud83c\uddfa\ud83c\uddf8 \ud83c\udde8\ud83c\uddf3 <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-disrupts-chinese-botnet-by-wiping-malware-from-infected-routers\/\">FBI disrupts Chinese botnet by wiping malware from infected routers \u2014 www.bleepingcomputer.com\/\u2026<\/a> (this story is notable because the FBI, with court permission, effectively hacked routers owned by private businesses to remove the foreign hackers and then make unauthorised changes to add a &#8216;fix&#8217; of their own creation that is not supported by the vendor \u2014 seems like a good thing IMO, but governments hacking privately owned devices for the good of the internet is a big deal, and it should probably be getting more public debate than it is)<\/li>\n<li>\ud83e\uddef<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/europcar-denies-data-breach-of-50-million-users-says-data-is-fake\/\">Europcar denies data breach of 50 million users, says data is fake \u2014 www.bleepingcomputer.com\/\u2026<\/a> (Europcar are saying the fake data was probably AI-generated, general consensus is that the data is indeed fake, but many, including Troy Hunt from Have I Been Pwned disagree that it was AI Generated, but you can easily see how it&#8217;s just a matter of time until something like that does happen!)<\/li>\n<li>A timely reminder not to plugin USB thumb drives you find lying around or are given by strangers: \ud83c\uddee\ud83c\uddf9 <a href=\"https:\/\/thehackernews.com\/2024\/01\/italian-businesses-hit-by-weaponized.html\">Italian Businesses Hit by Weaponized USBs Spreading Cryptojacking Malware \u2014 thehackernews.com\/\u2026<\/a><\/li>\n<li>An important reminder that modern cars are as much computers as cars, so their cybersecurity matters: <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/pwn2own-automotive-13m-for-49-zero-days-tesla-hacked-twice\/\">Pwn2Own Automotive: $1.3M for 49 zero-days, Tesla hacked twice \u2014 www.bleepingcomputer.com\/\u2026<\/a> (This is a good news story, the fact that Pwn-2-Own Automotive exists at all is great progress, and all vendors have been responsibly notified and have 90 days to patch before any details are published)<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/ransomware-payments-drop-to-record-low-as-victims-refuse-to-pay\/\">Ransomware payments drop to record low as victims refuse to pay \u2014 www.bleepingcomputer.com\/\u2026<\/a> (we just might be nearing the end of the ransomeware epidemic \u2014 cybercrime is economically motivated, so if the money dries up, so will the attacks)<\/li>\n<\/ul>\n<h2>Top Tips<\/h2>\n<aside class=\"small-aside\">Tip, tricks, or advice that is likely to be useful to the NosillaCast audience or the family members and friends whose IT they support.<\/aside>\n<ul>\n<li><a href=\"https:\/\/tidbits.com\/2024\/01\/25\/how-to-avoid-ai-voice-impersonation-and-similar-scams\/\">How To Avoid AI Voice Impersonation and Similar Scams \u2014 tidbits.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/tidbits.com\/2024\/01\/23\/eight-secure-ways-to-share-sensitive-information-over-the-internet\/\">Eight Secure Ways to Share Sensitive Information over the Internet \u2014 tidbits.com\/\u2026<\/a><\/li>\n<\/ul>\n<h2>Interesting Insights<\/h2>\n<aside class=\"small-aside\">High-quality opinion and editorial content recommended by Bart.<\/aside>\n<ul>\n<li>A good insight into how collections of breach data like the MOAB (<em>&#8216;Mother of all Breaches&#8217;<\/em>) 12TB data set recently added to Have I Been Pwned come into being: <a href=\"https:\/\/www.troyhunt.com\/the-data-breach-personal-stash-ecosystem\/\">The Data Breach &#8220;Personal Stash&#8221; Ecosystem \u2014 www.troyhunt.com\/\u2026<\/a><\/li>\n<li>Good insights into <strong>how<\/strong> so many malicious software ads have been making their way into Google search results recently: <a href=\"https:\/\/krebsonsecurity.com\/2024\/01\/using-google-search-to-find-software-can-be-risky\/\">Using Google Search to Find Software Can Be Risky \u2014 krebsonsecurity.com\/\u2026<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-mac-and-iphone-malware-of-2023-and-what-to-expect-in-2024\/\">The Mac and iPhone malware of 2023\u2014and what to expect in 2024 \u2014 www.intego.com\/\u2026<\/a><\/li>\n<\/ul>\n<h2>Palate Cleansers<\/h2>\n<aside class=\"small-aside\">Anything upbeat and nerdy Bart and\/or Allison think you might enjoy.<\/aside>\n<ul>\n<li>From Bart:\n<ul>\n<li>\ud83c\udfa7 <a href=\"https:\/\/overcast.fm\/+qXyWYx9CA\">Unexplainable: The math problem that could break the internet \u2014 overcast.fm\/\u2026<\/a> (no, not Quantum Computing, something <strong>much<\/strong> more fundamental)<\/li>\n<li>\ud83c\udfa7 A very interesting new collection of episodes has kicked off: <a href=\"https:\/\/overcast.fm\/+WaLHXjo94\">Freakonomics Radio: The Curious Mr. Feynman \u2014 overcast.fm\/\u2026<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2>Legend<\/h2>\n<p>When the textual description of a link is part of the link it is the title of the page being linked to, when the text describing a link is not part of the link it is a description written by <a href=\"https:\/\/bartb.ie\/\">Bart<\/a>.<\/p>\n<table>\n<thead>\n<tr>\n<th align=\"center\">Emoji<\/th>\n<th align=\"left\">Meaning<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td align=\"center\">\ud83c\udfa7<\/td>\n<td align=\"left\">A link to <strong>audio content<\/strong>, probably a podcast.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\u2757<\/td>\n<td align=\"left\">A <strong>call to action<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><em>flag<\/em><\/td>\n<td align=\"left\">The story is particularly relevant to people living in a <strong>specific country<\/strong>, or, the organisation the story is about is affiliated with the government of a specific country.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\ud83d\udcca<\/td>\n<td align=\"left\">A link to <strong>graphical content<\/strong>, probably a chart, graph, or diagram.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\ud83e\uddef<\/td>\n<td align=\"left\">A story that has been <strong>over-hyped<\/strong> in the media, or, <em>&#8220;no need to light your hair on fire&#8221;<\/em> \ud83d\ude42<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\ud83d\udcb5<\/td>\n<td align=\"left\">A link to an article behind a <strong>paywall<\/strong>.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\ud83d\udccc<\/td>\n<td align=\"left\">A <strong>pinned<\/strong> story, i.e. one to keep an eye on that&#8217;s likely to develop into something significant in the future.<\/td>\n<\/tr>\n<tr>\n<td align=\"center\">\ud83c\udfa9<\/td>\n<td align=\"left\">A <strong><em>tip of the hat<\/em><\/strong> to thank a member of the community for bringing the story to our attention.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>&lt;li&gt;## Feedback &amp; Followups Listener and community feedback, developments in recently covered stories, and developments in long-running stories we&#8217;re tracking over time. Apple have released iOS 17.3, which includes the new Stolen Device Protection mode designed to thwart the recent spike in iPhone thefts by thieves who have observed or socially engineered passcodes allowing them [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":28385,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[147,214],"tags":[5163,6316,6315,50,6317,569,6318],"class_list":["post-30388","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-posts","category-security-bits","tag-dma","tag-eu-dma","tag-push-notification-abuse","tag-security","tag-security-and-privacy","tag-security-bits","tag-sideloading"],"jetpack_featured_media_url":"https:\/\/www.podfeet.com\/blog\/wp-content\/uploads\/2023\/05\/Security-Bits-Logo_1040x520.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/30388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/comments?post=30388"}],"version-history":[{"count":3,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/30388\/revisions"}],"predecessor-version":[{"id":30510,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/posts\/30388\/revisions\/30510"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media\/28385"}],"wp:attachment":[{"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/media?parent=30388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/categories?post=30388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.podfeet.com\/blog\/wp-json\/wp\/v2\/tags?post=30388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}