this post was submitted on 05 Sep 2024
        
      
      64 points (91.0% liked)
      Apple
    19597 readers
  
      
      48 users here now
      Welcome
to the largest Apple community on Lemmy. This is the place where we talk about everything Apple, from iOS to the exciting upcoming Apple Vision Pro. Feel free to join the discussion!
Rules:
- No NSFW Content
- No Hate Speech or Personal Attacks
- No Ads / Spamming
 Self promotion is only allowed in the pinned monthly thread
Communities of Interest:
Apple Hardware   
Apple TV   
Apple Watch     
iPad     
iPhone    
Mac  
Vintage Apple
Apple Software     
iOS   
iPadOS  
macOS  
tvOS
watchOS  
Shortcuts
Xcode
Community banner courtesy of u/Antsomnia.
        founded 2 years ago
      
      MODERATORS
      
    you are viewing a single comment's thread
view the rest of the comments
    view the rest of the comments
 
          
          
@TwilightKiddy @prousername bro really said hashing is a privacy violation??
I mean, they where hashing any lauched programs and sending the hashes unencryped to their servers to compare against their database. So, they literally knew every program you launched, when you did it, but also your ISP knew it and anyone smart enough to MITM your connection. Sounds like a privacy violation to me.
@TwilightKiddy I can see how you can get there, but the MITM would need to know the hashing algo, you can’t *really* just un-hash something, at least not reliably
But your original statement was that the hashing was the privacy violation, and that’s the part I took issue with, hashing is a generally accepted security measure, it is not inherently a privacy violation
I meant a pretty well-known case, not hashing in general. Thought that was obvious.