this post was submitted on 11 Jul 2023
131 points (97.1% liked)

Apple

17421 readers
119 users here now

Welcome

to the largest Apple community on Lemmy. This is the place where we talk about everything Apple, from iOS to the exciting upcoming Apple Vision Pro. Feel free to join the discussion!

Rules:
  1. No NSFW Content
  2. No Hate Speech or Personal Attacks
  3. No Ads / Spamming
    Self promotion is only allowed in the pinned monthly thread

Lemmy Code of Conduct

Communities of Interest:

Apple Hardware
Apple TV
Apple Watch
iPad
iPhone
Mac
Vintage Apple

Apple Software
iOS
iPadOS
macOS
tvOS
watchOS
Shortcuts
Xcode

Community banner courtesy of u/Antsomnia.

founded 1 year ago
MODERATORS
top 14 comments
sorted by: hot top controversial new old
[–] [email protected] 10 points 1 year ago

Why the hell is Meta doing user-agent parsing in the year 2023? It's not like they need to enable IE quirks mode!

[–] [email protected] 5 points 1 year ago

This is so dumb. I'd rather install an update that bricks the services of a spyware company that I avoid at all costs rather than having an active vulnerability in my OS. Heck, that shouldn't even be called a bug as it kind of is a feature I actually want.

[–] [email protected] 2 points 1 year ago

It’ll likely be back in a day.

[–] [email protected] 1 points 1 year ago

If we don't have the option to remove, can we assume it wasn't installed? No wifi time for my phone today, but also no alerts to install anything??

[–] [email protected] -5 points 1 year ago* (last edited 1 year ago) (3 children)

how can it come that a no.1 company in revenue, releases a security fix to the public, that breaks dozen of apps?
like, do they even test their work?

[–] [email protected] 2 points 1 year ago

They are security fixes so they try to get them out as fast as they can

[–] [email protected] 1 points 1 year ago

I’d be surprised by this, if it didn’t happen so often.

[–] [email protected] -4 points 1 year ago

probably their Security team are slacking off. Typically you can catch some of these in CI/CD pipeline scanners

load more comments
view more: next ›