Lemmy: Bestiverse
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
RSS BotMB to Hacker NewsEnglish · 3 days ago

Time is running out for Tim Cook: Apple lacks strategic vision

unherd.com

external-link
message-square
40
fedilink
49
external-link

Time is running out for Tim Cook: Apple lacks strategic vision

unherd.com

RSS BotMB to Hacker NewsEnglish · 3 days ago
message-square
40
fedilink
Time is running out for Tim Cook
unherd.com
external-link

Comments

  • chrash0@lemmy.world
    link
    fedilink
    English
    arrow-up
    9
    arrow-down
    7
    ·
    3 days ago

    i really don’t agree. i see that the Vision Pro was probably too ahead of its time in terms of cost and hardware capability, but their AI strategy, while making similar mistakes, is one i agree with. while Nvidia and Microsoft et al are jerking off their investors by growing AI in wildly different directions with limited use cases, Apple clearly has a vision for bringing AI to users in a way that is private and secure first and not based on data mining their customers or glazing B2B partners. they’re not promising to reduce the professional workforce. they’re not predicting the end of the world. they want to create use experiences.

    this is a similar take you might have had in 2010, wringing your hands at Apple’s demise because they didn’t jump on the virtual private cloud bandwagon with GCP, AWS, and Azure (not to mention all the failed attempts). comparing Apple to Nvidia and Google is ludicrous to me. compare Apple to Samsung or Qualcomm, and the picture looks different.

    my biggest disagreement is that if Tim Cook gets ousted for someone who will do the same AI deepthroating we’ve seen from the rest of the tech industry it would be a tragedy.

    • JiveTurkey@lemmy.world
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      4
      ·
      3 days ago

      Apples AI exists because of the data mining others have done. They are no more private than other high end names in their markets. With Tim Cook or without him Apple deserves to fail and if this country wasn’t so engrossed in consumerism they probably would have. They’re anti-competition, anti-consumer, tax dodging, and willing to do any amount of knee bending to Donald to keep numbers up. Who cares about their vision.

      • 9tr6gyp3@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        ·
        3 days ago

        They are no more private than other high end names in their markets.

        Source for this?

        • JiveTurkey@lemmy.world
          link
          fedilink
          English
          arrow-up
          3
          ·
          3 days ago

          When it comes to user tracking for the purposes of targeting ads they’re pretty deceptive. https://blog.lockdownprivacy.com/2021/09/22/study-effectiveness-of-apples-app-tracking-transparency.html

          When it comes to Apple intelligence they skirt the question by not actually collecting the data themselves. Instead they rely on third parties to harvest the data and apple shows up to collect whatever they’ve rounded up.

          The rest is based on the fact that all security claims made by Apple are near impossible to audit. You just have to take their word for it and for a company that makes such a ridiculous effort to paint themselves as secure and private, you shouldn’t have to just take their word for it.

          • 9tr6gyp3@lemmy.world
            link
            fedilink
            English
            arrow-up
            7
            ·
            edit-2
            3 days ago

            I would highly recommend you go through their security compliance documentation before saying its not auditable. The systems are very thorough for auditing.

            Start here:

            https://support.apple.com/guide/certifications/intro-to-apple-security-assurance-apc3cea61877b/web

            Extra reading here:

            https://help.apple.com/pdf/security/en_US/apple-platform-security-guide.pdf

            https://support.apple.com/guide/certifications/ios-and-ipados-security-compliance-project-apcb2892d3b0/web

            https://support.apple.com/guide/certifications/macos-security-compliance-project-apc322685bb2/web

            https://github.com/usnistgov/macos_security/wiki

            https://support.apple.com/guide/certifications/national-regulations-security-certifications-apc37dae516c6/web

            https://support.apple.com/guide/certifications/apple-pay-security-certifications-apc3a0db329f/web

            https://support.apple.com/guide/certifications/apple-internet-services-security-apc34d2c0468b/web

            https://support.apple.com/guide/certifications/apple-app-security-certifications-apc392d0e98c3/web

            https://support.apple.com/guide/certifications/visionos-security-certifications-apcf57bea62a/web

            https://support.apple.com/guide/certifications/watchos-security-certifications-apc3dc9d68d91/web

            https://support.apple.com/guide/certifications/tvos-security-certifications-apc3c0bb26e2b/web

            https://support.apple.com/guide/certifications/macos-security-certifications-apc35eb3dc4fa/web

            https://support.apple.com/guide/certifications/ipados-security-certifications-apc38ef52880f/web

            https://support.apple.com/guide/certifications/ios-security-certifications-apc3fa917cb49/web

            https://support.apple.com/guide/certifications/apple-t2-security-chip-certifications-apc3225ccbd21/web

            https://support.apple.com/guide/certifications/secure-enclave-processor-security-apc3a7433eb89/web

            https://support.apple.com/guide/certifications/common-criteria-cc-certification-status-apc3eff7b4ca/web

            https://support.apple.com/guide/certifications/cryptographic-module-validation-status-apc33ea4bd77/web

            https://support.apple.com/guide/certifications/about-apple-security-certifications-apc30d0ed034/web

            • JiveTurkey@lemmy.world
              link
              fedilink
              English
              arrow-up
              4
              arrow-down
              1
              ·
              3 days ago

              None of these articles are proof of anything and again you’re just taking their word for it. None of this is apple open sourcing the software for audit and none of these certifications makes them special. This is like saying a Microsoft Surface device passed all of these certifications and checks so it can’t get malware.

              • 9tr6gyp3@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                arrow-down
                1
                ·
                3 days ago

                It literally describes their entire security process, which is vetted by NIST (a government agency of the United States of America who create standards), NASA (a government agency of the US that focuses on civil space programs, aeronautics research and space research), DISA (a DoD combat support agency that provides IT and communications support to the president, VP, Secretary of Defense, DoD, and any individual or system contributing to the defense of the US), and LANL (one of sixteen research and development laboratories of the DoE who conduct multidisciplinary research in fields such as national security, space exploration, nuclear fusion, renewable energy, medicine nanotechnology, and supercomputing).

                Those guys are always looking at Apple’s security. Always.

                Its vetted, tested, and hardened based on scientific research by many organizations. Its not just apple whipping this shit up willy nilly.

                • JiveTurkey@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  4
                  ·
                  3 days ago

                  You are still insisting that these stop apple from writing software to harvest user data. The chips can work and the software can still be flawed or malicious. You seem to think that these certifications make it impossible to write malicious software for this hardware. You fundamentals don’t understand what you’re implying.

                  • 9tr6gyp3@lemmy.world
                    link
                    fedilink
                    English
                    arrow-up
                    1
                    ·
                    3 days ago

                    https://security.apple.com/blog/private-cloud-compute/

                    Stateless computation and enforceable guarantees

                    With services that are end-to-end encrypted, such as iMessage, the service operator cannot access the data that transits through the system. One of the key reasons such designs can assure privacy is specifically because they prevent the service from performing computations on user data. Since Private Cloud Compute needs to be able to access the data in the user’s request to allow a large foundation model to fulfill it, complete end-to-end encryption is not an option. Instead, the PCC compute node must have technical enforcement for the privacy of user data during processing, and must be incapable of retaining user data after its duty cycle is complete.

                    We designed Private Cloud Compute to make several guarantees about the way it handles user data: A user’s device sends data to PCC for the sole, exclusive purpose of fulfilling the user’s inference request. PCC uses that data only to perform the operations requested by the user. User data stays on the PCC nodes that are processing the request only until the response is returned. PCC deletes the user’s data after fulfilling the request, and no user data is retained in any form after the response is returned. User data is never available to Apple — even to staff with administrative access to the production service or hardware.

                    What fundamentals am I missing?

                • JiveTurkey@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  3
                  arrow-down
                  1
                  ·
                  3 days ago

                  https://support.google.com/pixelphone/answer/11062200?hl=en#zippy=%2Cnist-fips----cmvp-cavp

                  Pixel devices have the same certificates. Does this mean Google can’t harvest my data?

                  • 9tr6gyp3@lemmy.world
                    link
                    fedilink
                    English
                    arrow-up
                    3
                    ·
                    3 days ago

                    Correct. It will not harvest data until you log into a Google service and agree to their ToS.

        • 0_o7@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          1
          arrow-down
          1
          ·
          3 days ago

          Source for this?

          https://arstechnica.com/tech-policy/2023/12/apple-admits-to-secretly-giving-governments-push-notification-data/

          https://www.macrumors.com/2023/12/06/apple-governments-surveil-push-notifications/

          People who think companies can be worth trillion dollars and not be guzzling or routing data through some loopholes are delusional. But do continue regurgitating their marketing and PR releases.

          • 9tr6gyp3@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            3 days ago

            Push notifications are a per app permission that you can allow or disallow.

            https://www.apple.com/legal/privacy/law-enforcement-guidelines-us.pdf

      • chrash0@lemmy.world
        link
        fedilink
        English
        arrow-up
        3
        arrow-down
        2
        ·
        3 days ago

        the perfect is the enemy of the good. the article is specifically about comparing Apple to companies like Nvidia and Google, who do all those things but worse, while advocating they go further in that direction.

        • JiveTurkey@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          3 days ago

          I get that but they aren’t constantly tooting their own horn about how private and secure they are.

          • chrash0@lemmy.world
            link
            fedilink
            English
            arrow-up
            2
            ·
            3 days ago

            i honestly don’t know what you’re advocating for

            • JiveTurkey@lemmy.world
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              1
              ·
              3 days ago

              I’m advocating for people to stop treating Apple like some defender of privacy and security. If any of these things comes between apple and profits, they will not hesitate to bend the rules like they’ve done for China.

              • chrash0@lemmy.world
                link
                fedilink
                English
                arrow-up
                2
                ·
                3 days ago

                pretty irrelevant to the point i was trying to make

Hacker News

hackernews

Subscribe from Remote Instance

You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !hackernews@lemmy.bestiver.se
lock
Community locked: only moderators can create posts. You can still comment on posts.

Posts from the RSS Feed of HackerNews.

The feed sometimes contains ads and posts that have been removed by the mod team at HN.

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 449 users / day
  • 1.66K users / week
  • 4.22K users / month
  • 9.48K users / 6 months
  • 2 local subscribers
  • 2.24K subscribers
  • 27.8K Posts
  • 10.8K Comments
  • Modlog
  • mods:
  • patrick
  • RSS Bot
  • BE: 0.19.5
  • Modlog
  • Instances
  • Docs
  • Code
  • join-lemmy.org