• Breaking News

    Friday, June 1, 2018

    Apple Daily Tech Support Thread [May 31]

    Apple Daily Tech Support Thread [May 31]


    Daily Tech Support Thread [May 31]

    Posted: 31 May 2018 08:13 AM PDT

    Welcome to the daily Tech Support thread for /r/Apple.

    Have a question you need answered? Ask away! Please remember to adhere to our rules, which can be found in the sidebar. On mobile? Here is a screenshot with our rules.

    Join our Discord and IRC chat rooms:

    Discord

    IRC

    Note: Comments are sorted by /new for your convenience

    Here is an archive of all previous "Tech Support" threads. This is best viewed on a browser. If on mobile, type on the searchbar [title:"Daily Tech Support Thread" author:"AutoModerator"] (without the brackets, and including the quotation marks around the title and author.)

    submitted by /u/AutoModerator
    [link] [comments]

    [Megathread] Messages in iCloud - What is it? How does it work? Can I get some help?

    Posted: 31 May 2018 10:23 AM PDT

    Hey /r/Apple!

    Ever since Apple released iOS 11.4 on Tuesday with Messages in iCloud, we've had a high number of people posting on the sub asking for help, and other queries. In order to decrease the amount of these posts, this megathread will be used. Please post all Messages in iCloud questions here. Future posts will be removed with or without a heads-up.

    What is Messages in iCloud?

    Messages in iCloud is a new feature that allows iCloud to keep your entire message history updated and available on all your devices. Even when you set up a brand-new device.

    What should I know?

    • You need to update to the latest iOS version (iOS 11.4), and macOS (10.13.5, whenever it comes out) in order to have this feature.

    • Your messages will take up iCloud space just as if you are syncing Photos, Notes, Contacts and etc

    • When you delete a message, photo, or conversation on one device, it's removed from all of your devices.

    • You need to have the Apple ID in iMessage match the Apple ID being used for iCloud. It doesn't need to match the iTunes/App Store ID.

    • You need 2FA enabled. Link to Apple's article about 2FA: https://support.apple.com/kb/HT204915

    • Messages in iCloud is turned off by default. You can turn it on by going to Settings -> Tap your name at the top -> iCloud -> Messages

    • It is best to leave your devices to sync overnight while they are plugged in.

    • If nothing works, sign out and sign in to iCloud and then sign out and sign in to iMessage.

    These notes still don't answer your question? Ask away under this megathread. Again, all future posts will be removed while this megathread is active.

    submitted by /u/exjr_
    [link] [comments]

    Well this got me enable erase iPhone feature

    Posted: 31 May 2018 04:48 PM PDT

    Erase after 10 attempts

    For many years now, iOS has offered an option in the Passcode section of the Settings all: "Erase all data on this iPhone after 10 failed passcode attempts." ... but it turns out this feature is far more clever than I realized, and it's highly unlikely that your kids or jackass drinking buddies could ever trigger it. After the 5th failed attempt, iOS requires a 1-minute timeout before you can try again. During this timeout the only thing you can do is place an emergency call to 911. After the 6th attempt, you get a 5-minute timeout. After the 7th, 15 minutes. These timeouts escalate such that it would take over 3 hours to enter 10 incorrect passcodes.

    That mean who ever tried 10 times but be intentional or he/she already stole my phone.

    submitted by /u/deardickson
    [link] [comments]

    Xiaomi Mi 8 has been revealed and it’s a blatant copy of the iPhone X.

    Posted: 31 May 2018 08:34 AM PDT

    Can you tell which is which?

    We all know that other companies putting our designs that are similar to Apple's is nothing new, but this is one of the most blatant ripoffs of one of Apple's designs by a somewhat reputable company I've ever seen.

    Surely Apple will have to go after them for this. If it were only a similar design, I could see there being a potential case for defending Xiaomi. But not only is the design more than similar (it's almost identical, down to the camera housing and notch), the marketing style and color scheme are nearly exactly the same as well.

    These companies can't get away with this. I hope Apple takes action.

    edit: I'll add that even the software was copied. Battery, WiFi, and Signal icons are all in the exact same location and look nearly identical, as well as the time on the lock screen. The writing in the top left, if it is displaying the carrier name, is a copy as well. Wow.

    submitted by /u/burritosandpuppies
    [link] [comments]

    Apple is doing a cool Apple Pay promotion at my university

    Posted: 31 May 2018 02:46 PM PDT

    At the University of Washington, Apple has a ton of signs out that say stuff along the lines of "Lose your wallet" around "The Ave". (A street near the campus where there are a lot of apartments and restaurants)

    They're selling succulents, candles, and local ice cream for $1 each outside the book store, but only for users who pay with Apple Pay. They also have free tote bags that are stylized for Seattle if you prove you have Apple Pay Cash activated. It would have been much cooler to see them with University of Washington bags (go dawgs!) but the Seattle ones are cool too!

    Here are pictures of what I got. Sorry the lighting is odd, I'm not the best photographer.

    submitted by /u/AFRUITPIE
    [link] [comments]

    Yes you can sync messages to the cloud and still have end to end encryption.

    Posted: 31 May 2018 04:52 PM PDT

    So I've seen a lot of FUD recently regarding the cloud sync feature coming to messages - that it's impossible to do without breaking end to end security, that it'll be easier for the spooks to get your data etc.

    Well let's dispel that myth with a simple to follow semi-concrete proof of concept.

    Priors:

    • H(message) = secure one way hash of message returning arbitrarily sized number, knowing H(m) implies having known m at some point
    • HMAC(key, message) = like H(message) except H is unique/tweaked-by key, equivalent to H(key + message) for prefect H so knowing HMAC(k, m) implies knowing k and m
    • KDF(salt, password, ...) = behaves like a extremely inefficient HMAC(key, message), the cost of computation, min memory and min operations required to get the correct result, is parametric to some extra parameters p.
    • KEY_WRAP(key_encryption_key, message_key_plaintext) = encrypts with the encryption key, the message key along with a magic number
    • KEY_UNWRAP(key_encryption_key, message_key_ciphertext) = decrypts with the key encryption key, the message key along with the magic number, only succeeds if the magic number matches
    • ASYM_ENCAP(recipient_public_key, message_key_plaintext) = asymmetric encryption of message key returning ciphertext
    • ASYM_DECAP(recipient_private_key, message_key_ciphertext) = asymmetric decryption of message key ciphertext returning plaintext
    • SYM_ENCRYPT(key, plaintext) = simple symmetric encryption of plaintext returning ciphertext
    • SYM_DECRYPT(key, ciphertext) = simple symmetric decryption of plaintext returning plaintext
    • SIGN(priv_key, message) = sign msg with private key returns signature
    • AUTH(pub_key, message, signature) = check to see the signature matches the key and message

    • Each device has a public private key pair that is secured via device keychain or some other scheme

    • Each subsequent key requires the signature of one of the previous private keys to join the public key pool PKP

    • Messages Mx are encrypted symmetrically for every individual key pk in PKP

    Adding the cloud key:

    1. A new symmetric key key_encryption_key is generated from a user password user_pass and salt key_encrytpion_key_salt from KDF(key_encrytpion_key_salt, user_pass)
    2. A new asymmetric key cloud_message_key_pub and cloud_message_key_priv is generated on a trusted device and wrapped via KEY_WRAP(key_encryption_key, cloud_message_key_priv) to form wrapped_cloud_message_key_priv
    3. cloud_message_key_pub is signed by an existing key pk in PKP
    4. wrapped_cloud_message_key_priv, cloud_message_key_pub and key_encrytpion_key_salt is transferred to the cloud for storage
    5. the cloud authenticates the signed cloud_message_key_pub and adds it to PKP
    • the cloud never sees user_pass or key_encryption_key so can't decrypt wrapped_cloud_message_key_priv

    Using the cloud key:

    1. User authenticates with cloud by sending user_name and client_hash = KDF(user_client_salt, user_pass) where user_client_salt is a pseudorandom number specific to the user
    2. Server computes H(user_server_salt, client_hash) and compares it against a stored copy for authentication and/or KDF(user_server_salt, client_hash) to decrypt the user's data on the server
    3. Client requests the wrapped_cloud_message_key_priv and key_encrytpion_key_salt which may or may not be further encrypted in the cloud
    4. Client uses user_pass and key_encrytpion_key_salt to re-generate the key_encryption_key which allows it to recover cloud_message_key_priv and associated metadata like whitelisted keys.
    5. The client now has everything it needs to behave like any other messaging device
    • the cloud again never sees user_pass and doesn't have to store client_hash and so isn't able to decrypt wrapped_cloud_message_key_priv

    Changing Password:

    1. Client recovers the cloud_message_key_priv via the steps described above
    2. Client generates a new symmetric key with the new user password and same or different salt
    3. Client wraps the existing cloud_message_key_priv with new key_encryption_key
    4. Client submits a self signed wrapped key to the cloud which accepts it
    • since the public/private keys themselves haven't changed, this is completely transparent to the other devices and no new permissions have been granted
    • since the cloud_message_key_priv is semi independent from the user_pass and cloud authentication, the various keys can change independently
    • since key wrap is used to store the key, a malicious actor with server access could modify or swap the wrapped key but then the key unwrap operation would fail as the magic numbers would not match

    Sending a message

    1. Pull keys from the PKP and authenticate new keys by checking that it was signed by a whitelisted key (chain of trust), if it was, add it to the whitelisted keys
    2. Sign message m with private key key_priv to form m_sig = SIGN(key_priv, m), and encrypt with some randomly generated key mk m_ct = SYM_ENCRYPT(mk, m)
    3. encapsulate mk for every whitelisted key pk in PKP for the recipient via ASYM_ENCAP(pk, mk) to form mk_cts
    4. save the combined m_sig + m_ct + mk_cts
    • note how nothing special is happening for the new cloud key - it works just like any other device
    • note how you can't add/modify PKP and have the existing clients trust new keys it without already having access to a trusted private key in which case the system is already compromised
    • note that a tampered wrapped key does not compromise security as the public keys haven't been touched
    • note how the client doesn't encapsulate the key for unverified clients

    Receiving a Message

    1. Pull keys from the PKP and authenticate new keys by checking that it was signed by a whitelisted key (chain of trust)
    2. Retrieve encrypted the m_sig + m_ct + mk_cts corresponding to a message from the cloud
    3. Find the mk_ct in mk_cts corresponding to the current private key and recover it that using the private key via ASYM_DECAP(pk, mk_ct)
    4. use mk to decrypt m_ct and check that the m_sig matches a key in the whitelist (you cal also do auth before decrypt)
    • note how again nothing special is happening for the new cloud key - it works just like any other device
    • note as above how you can't add/modify PKP and have the existing clients trust new keys it without already having access to a trusted private key in which case the system is already compromised
    • note how the authentication of the message would fail if the signature could not be verified to be from a trusted key
    submitted by /u/CheapAlternative
    [link] [comments]

    Bloomberg: MacBooks and iPads not coming at WWDC, redesigned Apple Watch will work with same bands

    Posted: 31 May 2018 08:31 AM PDT

    Microsoft and Apple helped build new braille display standard

    Posted: 31 May 2018 12:30 PM PDT

    Dolphin will be getting Vulkan support on macOS using MoltenVK

    Posted: 31 May 2018 05:29 PM PDT

    Pixelmator Team releases major update to Pixelmator Pro, Monsoon

    Posted: 31 May 2018 04:43 PM PDT

    TIL Photos knows your pets

    Posted: 31 May 2018 12:58 PM PDT

    Wanted to quickly find all the pictures of my cat over the years, typed "Cat" in the search box and bam! all of my cat photos I've ever taken. Thought that was pretty rad.

    submitted by /u/TheJadedSF
    [link] [comments]

    Guess the name for macOS 10.14

    Posted: 31 May 2018 10:22 AM PDT

    It's that time of the year again...

    submitted by /u/jli678
    [link] [comments]

    For anyone who's gone to a WWDC before, what's the experience like?

    Posted: 31 May 2018 06:02 AM PDT

    I just learned holding option+shift while adjusting brightness/volume does so in 1/4 increments. What other Mac/iPhone tips and tricks have I been missing out on?

    Posted: 31 May 2018 07:24 AM PDT

    Honestly, I just learned you could Airdrop between iPhone and Mac. Unfortunately my current Mac is too old for it but I'm really looking forward to using that with my next computer.

    submitted by /u/MountainMantologist
    [link] [comments]

    Does anybody else need a new laptop for school in the fall?

    Posted: 31 May 2018 02:28 PM PDT

    Given that new MacBooks at WWDC are unlikely, a refresh probably won't happen before September.

    What do you guys plan on doing?

    submitted by /u/Mvnqaztaqoioqn473257
    [link] [comments]

    WWDC for macOS: The best way to watch the keynote (Now with iCloud Sync, Calendar Integration, & more)

    Posted: 01 Jun 2018 01:55 AM PDT

    Apple Releases First Beta of macOS High Sierra 10.13.6 to Public Beta Testers

    Posted: 31 May 2018 10:14 AM PDT

    Apple has Setup a Hardware Engineering Lab in Oregon, Hiring Several Former Senior Intel Engineers

    Posted: 31 May 2018 03:09 AM PDT

    Where the Hell is 10.13.5?

    Posted: 31 May 2018 07:56 AM PDT

    After updating to 11.4 the other day I'm now sitting here texting people on my Mac during work and none of my outgoing texts are being synced to my phone at all... All I'm getting is the return texts on my phone. Looks like they're just having 1 sided conversations that I'm ignoring. Why do they only release partial updates that affect their whole ecosystem? So fucking dumb.

    submitted by /u/Munkadunk667
    [link] [comments]

    iPad question

    Posted: 01 Jun 2018 12:01 AM PDT

    Friend and I just got apple pencils for our iPads, are there any apps where we can both connect to the same canvas and draw together? Thanks

    submitted by /u/tomtom24ever
    [link] [comments]

    Apple Invents a Strong Cover Glass and/or Portion of an iDevice Housing using Sapphire or Fiberglass Ribbing

    Posted: 31 May 2018 09:14 AM PDT

    Anybody used Stereo HomePods as a soundbar yet to report sound quality?

    Posted: 31 May 2018 07:32 AM PDT

    I'm super curious 😊

    submitted by /u/scottyloveless
    [link] [comments]

    Presentations from Apple WWDC 1997 featuring Jobs, Schiller, Ive, Rubinstein and Tevanian.

    Posted: 31 May 2018 07:49 PM PDT

    Is using Apple Pay on a website (linked to my credit card) more secure than using only the credit card?

    Posted: 31 May 2018 12:24 PM PDT

    I need to update my recurring billing info on a website (NY Times). Using my phone, I can update the credit card info directly, or choose to pay using Apple Pay (linked to the same credit card). Looks like I can do this easily using Touch ID. I get the ease of use, butbis doing it this way more secure (like when you use it at Walgreens?)

    My CC number was recently compromised so I'm kind of paranoid. Thanks.

    submitted by /u/heynow941
    [link] [comments]

    Apple to Tout Digital Health, AR Features at Software Conference

    Posted: 31 May 2018 07:30 AM PDT

    No comments:

    Post a Comment

    Fashion

    Beauty

    Travel