(Sub)Urban boyscout.Tech-whisperer. Tech-skeptic.
1059 stories
·
12 followers

AirTag tracking busts rich kid stealing presidential campaign yard signs

1 Comment and 2 Shares
If you're planning to steal 60 presidential campaign yard signs, don't just check out the potential penalty, look for an AirTag too.

A hand holds a small, circular Apple device against a blurred outdoor background.
Yet again, an AirTag makes you wonder what we did before them

AirTags have found stolen cars, stolen mail, and unfortunately also been used to track car thief victims. But now one has been used in Springfield, MO, it track down someone stealing yard signs.

No formal charges have been filed yet, and police investigation is still continuing, so it's not fully clear what happened. But it is known that Laura McCaskill and her partner John included an AirTag with their Harris/Walz yard sign, and that was tracked to a car that had around 60 such signs in the trunk.


Continue Reading on AppleInsider | Discuss on our Forums
Read the whole story
freeAgent
13 days ago
reply
I do love the things some people do with location trackers.
Los Angeles, CA
chrisrosa
14 days ago
reply
San Francisco, CA
Share this story
Delete

Is that authentication request genuine or fake?

1 Share

It’s essential to know when an authentication request is genuine. Without that knowledge, it’s all too easy to give your password away to malware, or to a badly-behaved app that’s trying to work around macOS security rules. By far the best way to authenticate now is using Touch ID, but many Macs don’t support it, either because they can’t, or because their keyboard doesn’t, and macOS doesn’t always offer it anyway. This article looks at how you can recognise genuine requests.

All Macs

The traditional non-biometric dialog is still in widespread use, and can appear on any Mac, even when Touch ID is available, and in Sequoia. I’ve been trying to work out a simple rule to predict when you should expect to see a classic request, and it appears to be associated with more traditional apps like Keychain Access, and when asking to access a file-based keychain such as the login keychain. But there don’t appear to be any simple and robust rules.

When an app needs to access a secret that requires authentication, the security system, not the app, displays a dialog asking you for the password to that keychain to authenticate before it will provide the password or other secret to the app.

keychain

That authentication dialog is very important: although malware might try to forge it, it contains distinctive features you should always look for:

  • The icon consists of a locked padlock, on which is superimposed a miniature icon representing the app or component that has asked to access the keychain.
  • The bold text names the app or component that has called for keychain access, and states which item it’s asking to access: here, a named secure note.
  • The smaller lettering specifies that it’s asking for the keychain password, that is the password used to unlock the named keychain, not that for your Apple Account or any other password.
  • If you’re in any doubt about its authenticity, click on the Deny button and the request will be denied.
  • If you’re in any doubt about its authenticity, open Keychain Access, lock the keychain there, and repeat the action while watching the keychain to ensure that it’s unlocked and handled correctly.

Note that this doesn’t provide or ask for your user name, only the password for that keychain.

Macs without Touch ID

If Touch ID isn’t currently available to your Mac, either because it doesn’t support it, or because it doesn’t have a keyboard connected that includes Touch ID support, you should see the non-biometric versions of other dialogs requesting authentication. These are for purposes other than keychain access that require elevated privileges, such as for a process to run a privileged helper, or to make changes in System Settings.

keychain03

This new vertical format should contain the following:

  • The icon consists of a locked padlock, on which is superimposed a miniature icon representing the app or component that is asking for your password.
  • Bold text names the app making the request.
  • Below that is a general indication of the purpose of the request.
  • Below that is the instruction to Enter your password to allow this.
  • There are two text boxes, to contain your user name (already completed) and password.
  • There are only two buttons, one of which may be OK or something more specific, and the other is Cancel.
  • If you’re in any doubt as to its authenticity, click on the Cancel button to deny the request, and consult the app’s documentation.

Macs with Touch ID

If your Mac supports Touch ID (all Intel Macs with T2 chips, and all Apple silicon Macs), and currently has a keyboard connected to it with support for Touch ID, macOS should offer you the biometric version of that authentication dialog.

passwordeg3

This should contain the following:

  • The icon consists of a Touch ID fingerprint, on which is superimposed a miniature icon representing the app or component that is asking for your password.
  • Bold text names the app making the request.
  • Below that is a general indication of the purpose of the request.
  • Below that is the instruction to Touch ID or enter your password to allow this.
  • There are only two buttons, the upper being Use Password…, and the lower is Cancel.
  • If you’re in any doubt as to its authenticity, click on the Cancel button to deny the request, and consult the app’s documentation.

This dialog has distinctive behaviour that’s difficult to forge. When you place your fingertip on the Touch ID button on the keyboard, it will either authenticate successfully, so dismissing the dialog, or the dialog shakes to indicate you should try placing your fingertip on the button again.

pwordprompt1

If Touch ID authentication fails, or you click on the button to Use Password…, the dialog expands to resemble the non-biometric version above, with the following two important differences:

  • The icon still consists of a Touch ID fingerprint, with a superimposed miniature icon representing the app or component.
  • The instruction remains to Touch ID or enter your password to allow this.

Although you will continue to encounter classic non-biometric authentication dialogs on a Mac with full Touch ID support, you may also come across some that you might have expected still to use the old dialog, but which now use a biometric dialog, such as that below.

pwordprompt2

Perhaps as Touch ID support extends this will become more consistent.



Read the whole story
chrisrosa
14 days ago
reply
San Francisco, CA
Share this story
Delete

Scammers use AI to create scarily convincing phishing calls

1 Share
A security expert has recounted how close he came to being fooled by a new AI-based scam call that aimed to get his Gmail account details.

A smartphone screen displays the Gmail logo, a colorful M, with the word Gmail below it.
Scammers tried to gain control of a security expert's Gmail account

There were already scam ChatGPT apps on the App Store, but now artificial intelligence has been deployed by scammers in what expert Sam Mitrovic describes as "super realistic."

"People are busy and this scam sounded and looked legitimate enough that I would give them an A for their effort," wrote Mitrovic in a blog post. "Many people are likely to fall for it."


Continue Reading on AppleInsider | Discuss on our Forums
Read the whole story
chrisrosa
23 days ago
reply
San Francisco, CA
Share this story
Delete

A brief history of defragging

1 Share

When the first Macs with internal hard disks started shipping in 1987, they were revolutionary. Although they still used 800 KB floppy disks, here at last was up to 80 MB of reliable high-speed storage. It’s worth reminding yourself of just how tiny those capacities are, and the fact that the largest of those hard disks contained one hundred times as much as each floppy disk. By the 1990s, with models like the Mac IIfx, internal hard disks had doubled in capacity, and reached as much as 12 GB at the end of the century.

Over that period we discovered that hard disks also needed routine maintenance if they were to perform optimally, and all the best users started to defrag their hard disks.

Consider a large library containing tens or even hundreds of thousands of books. Major reference works are often published in a series of volumes. When you need to consult several consecutive volumes of such a work, how they’re stored is critical to the task. If someone has tucked each volume away in a different location within the stack, assembling those you need is going to take a long while. If all its volumes are kept in sequence on a single shelf, that’s far quicker. That’s why fragmentation of data has been so important in computer storage.

The story of defragging on the Mac is perhaps best illustrated in the rise and fall of Coriolis Systems and iDefrag. Coriolis was started in 2004, initially to develop iPartition, a tool for non-destructive re-partitioning of HFS+ disks, but its founder Alastair Houghton was soon offering iDefrag, which became a popular defragging tool. This proved profitable until SSDs became more widespread and Apple released APFS in High Sierra, forcing Coriolis to shut down in 2019, when defragging Macs effectively ceased.

All storage media, including memory, SSDs and rotating hard disks, can develop fragmentation, but most serious attention has been paid to the problem on hard disks. This is because of their electro-mechanical mechanism for seeking to locations on the spinning platter they use for storage. To read a fragmented file sequentially, the read-write head has to keep physically moving to new positions, which takes time and contributes to ageing of the mechanism and eventual failure. Although solid-state media can have slight overhead accessing disparate storage blocks sequentially, this isn’t thought significant and attempts to address that invariably have greater disadvantages.

Fragmentation on hard disks comes in three quite distinct forms: file data across most of the storage, file system metadata, and free space. Different strategies and products have been used to tackle each of those, with varying degrees of success. While few doubt the performance benefits achieved immediately after defragging each of those, little attention has been paid to demonstrating more lasting benefits, which remain more dubious.

Manually defragging HFS+ hard disks was always a questionable activity, as Apple added background defragmentation to Mac OS X 10.2, released two years before Coriolis was even founded. By El Capitan and Sierra that built-in defragging was highly effective, and the need for manual defragging had almost certainly become a popular myth. Neither did many consider the adverse effects on hard disk longevity of those intense periods of disk activity.

techtoolpro1999

The second version of TechTool Pro in 1999 offered a simplified volume map for what it termed optimisation, offering the options to defragment only files, or the whole disk contents including free space.

techtoolpro2000

By the following year, TechTool Pro was paying greater attention to defragging file system metadata, here shown in white. This view was animated during the process of defragmentation, showing its progress in gathering together all the files and free space into contiguous areas. TechTool Pro is still developed and sold by MicroMat, and now in version 20.

speeddisk2001

A similar approach was adopted by its competitor Speed Disk, here with even more categories of contents.

drivegenius2010

By 2010, my preferred defragger was Drive Genius 3, shown here working on a 500 GB SATA hard disk, one of four in my desktop Mac; version 6 is still sold by Prosoft. One popular technique for defragmentation with systems like that was to keep one of its four internal disks empty, then periodically clone one of the other disks to that, and clone it back again.

diskwarrior2000

Alsoft’s DiskWarrior is another popular maintenance tool, shown here in 2000. This doesn’t perform conventional defragmentation, but restructures the trees used for file system metadata, and remains an essential tool for anyone maintaining HFS+ disks.

Since switching to APFS on SSDs several years ago, I have missed defragging like a hole in the head.



Read the whole story
chrisrosa
30 days ago
reply
San Francisco, CA
Share this story
Delete

YouTube gets Apple Vision Pro app Juno kicked from App Store

1 Share
Despite a lack of first-party YouTube clients on Apple Vision Pro, YouTube has prompted Apple to remove Juno from the App Store, citing vague guideline violations.

Search screen showing 'No Results' for YouTube, with options for Apple Vision or iPhone & iPad apps. Background with snowy landscape and trees.
YouTube doesn't offer a client for Apple Vision Pro

Juno was a third-party YouTube client built for Apple Vision Pro by Cristian Selig of Apollo fame. The app was a basic web view for YouTube that didn't go out of its way to alter content beyond aesthetics to make the app appear visionOS native.

Despite that, YouTube has pushed Apple to remove Juno from the App Store with no clarification or discussion. Selig shared the removal via a blog post.


Continue Reading on AppleInsider | Discuss on our Forums
Read the whole story
chrisrosa
35 days ago
reply
San Francisco, CA
Share this story
Delete

How the Hugely Acclaimed Shōgun TV Series Makes Translation Interesting

1 Share

Many of us grew up seeing hardback copies of Shōgun on various domestic bookshelves. Whether their owners ever actually got through James Clavell’s famously hefty novel of seventeenth-century Japan is open to question, but they may well have seen the first television adaptation, which aired on NBC in 1980. Starring Richard Chamberlain and Toshiro Mifune (and narrated by Orson Welles), that ten-hour miniseries offered an unprecedentedly cinematic experience to the home viewers of America, presenting them with things they’d never before seen on television — and things they’d never heard on television, not least numerous lines delivered in untranslated Japanese.

The idea, according to screenwriter Eric Bercovici, was to put the viewers in the shoes of Chamberlain’s protagonist John Blackthorne, an English ship pilot marooned in Japan with no knowledge of the local language. During the show’s run, newspapers printed glossaries of the Japanese words most important to the story. The second adaptation of Shōgun, which aired earlier this year on FX, does things differently. For one thing, it makes use of those helpful devices known as subtitles, which over the past four and a half decades have become not just accepted but demanded by Western audiences (even for productions in their own language).

This choice, as Evan “Nerdwriter” Puschak says in his video on the new Shōgun, “lets us into the minds and conversations of the Japanese characters,” much like the omniscient narration of Clavell’s novel. Puschak highlights how the series “uses the act of translation to explore the possibilities and limitations of communication across cultures and communication, period.” One notable example is its portrayal of the various bilingual characters who interpret for Blackthorne, each of whom does so differently according to his or her motivations. The 1980 Shōgun also had a few such scenes, but their dramatic irony was inaccessible to monolingual viewers.

Even if you speak both English and Japanese, you know how little protection that really offers against cultural misunderstandings. The new Shōgun’s dramatization of that truth has surely done its part to win the show more Emmy awards than any other single season of television. A comparison to the 1980 adaptation, which represented the height of dramatic television in its day, reveals the ways in which our expectations of the form have changed over time. Nevertheless, even the 2024 Shōgun takes its liberties, the most brazen being the use of English instead of Portuguese, the real language of first contact between Japan and the West. Clearly, Portugal has its work cut out: to raise a generation of actors ready to star in the next adaptation by the late twenty-sixties. がんば っ て and boa sorte.

Related content:

16th-Century Japanese Historians Describe the Oddness of Meeting the First Europeans They Ever Saw

The 17th-Century Japanese Samurai Who Sailed to Europe, Met the Pope & Became a Roman Citizen

The History of Ancient Japan: The Story of How Japan Began, Told by Those Who Witnessed It (297‑1274)

Meet Yasuke, Japan’s First Black Samurai Warrior

Let’s Learn Japanese: Two Classic Video Series to Get You Started in the Language

The Entire History of Japan in 9 Quirky Minutes

Based in Seoul, Colin Marshall writes and broadcasts on cities, language, and culture. His projects include the Substack newsletter Books on Cities and the book The Stateless City: a Walk through 21st-Century Los Angeles. Follow him on Twitter at @colinmarshall or on Facebook.

Read the whole story
chrisrosa
50 days ago
reply
San Francisco, CA
Share this story
Delete
Next Page of Stories