Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>That's attestation. It isn't DRM.

True, but only if the validation code is vulnerable to an unpatchable vulnerability discovered in Apple M1, M2 and M3 chips. Otherwise your hardware, drivers, and or software likely still needs approved by Apple.

"> Why don't Homebrew, Mac Ports, and Nix, count here? Practically, I mean."

Generally, most users will never touch CLI, and the ones that do often know how to deal with nag-ware in the OS.

"This just isn't true though, "

Right, you try to publish some kernel level driver that touches the hardware signatures. These modern machines will usually brick into a lock-screen on most platforms now. Thus, no one will be developing 3rd party hardware/drivers/Software/Firmware inside that box. You must pay Apple to play... even to replace many broken components.

"> The checks involved in the attestation process are quite minimal and focus on whether your program is malware"

Or running something Apple doesn't want, like another store ecosystem ( https://en.wikipedia.org/wiki/Epic_Games_v._Apple ).

Arguably, modern Win11 and MacOS are already technically Malware collecting user telemetry, content, and metadata... in my opinion they arrive broken out of the box. Perhaps you are arguing some corporation is ethically superior to regular thieves. =3



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: