apple OS updates still transmit your ECID (unchangable permanent hardware identifier) in port 80 cleartext http on EVERY OS UPDATE on m1/m2/t2 for device-specific boot tickets. this allows intel agencies to track approximate location of all m1/m2/t2 macs on each update as they see the client IP and unique identifier across the backbones. this has been reported to apple multiple times, and they disallow such PII transmission unencrypted in all apps on the app store, but the OS still does it.
https://www.howtogeek.com/710509/apples-imessage-is-secure...-unless-you-have-icloud-enabled/
pretty sure this is a more detailed write up of a few of my old HN comments, but i'm happy to see it regardless.
garak supercut
one of my favorite youtube videos
Hacker, researcher, entrepreneur. Make sure we're connected at https://sneak.berlin/list
these toots are also available at https://s.sneak.berlin/@sneak.rss if you're into that.