89
submitted 1 year ago* (last edited 1 year ago) by octalfudge@lemmy.world to c/apple_enthusiast@lemmy.world

The NightOwl application has existed since 2018 and is used to automatically switch between light/dark modes on the operating system. It is an alternative to the built in macOS automatic mode which only switches when the user steps away from the computer.

However, the application has been bought out by “TPE.FYI LLC” in late 2022 that forcibly joins your devices into a botnet for use of market research, without your knowledge (other than the TOS in small text on the download page) or express consent (this feature cannot be turned off, even when the app is quit). This is documented in their terms of service.

you are viewing a single comment's thread
view the rest of the comments
[-] steven@feddit.nl 21 points 1 year ago

This is extremely shady. How do I know if other apps I have are making me part of a botnet?

[-] pineapplelover@lemm.ee 7 points 1 year ago

Use free and open source software

[-] the_vale@apollo.town 16 points 1 year ago

Something being open source doesn't automatically make it safe to use. Sure, it means it's easier for people to check for security issues, but how many people actually have the knowledge and the time to do it? And even then, take the log4j vulnerability from a while ago, it's been present in the code since 2013 and only reported in like 2021.

[-] sarchar@programming.dev 2 points 1 year ago

FOSS isn't generally vulnerable to the "buyout" vulnerability. It's not new that a valuable browser extension is bought out and repurposed, but FOSS is less likely to fall to these bugs. (also fuck WEI. You'll get more of this with WEI)

[-] Stovetop@lemmy.world 4 points 1 year ago

FOSS isn't generally vulnerable to the "buyout" vulnerability.

Oracle has entered the chat.

[-] steven@feddit.nl 2 points 1 year ago

I try to where I can, but unfortunately this is not always an option for me.

[-] LoafyLemon@kbin.social 0 points 1 year ago

You need to examine your devices packets and see what servers they're going to. You can do that through Wireshark on Windows, or use an external sniffer to examine them.

I'm not aware of any native apps for Mac that can do that, but maybe others will know.

[-] resurrexia@artemis.camp 2 points 1 year ago

Wireshark is available on intel and arm macs.

this post was submitted on 09 Aug 2023
89 points (98.9% liked)

Apple

17435 readers
26 users here now

Welcome

to the largest Apple community on Lemmy. This is the place where we talk about everything Apple, from iOS to the exciting upcoming Apple Vision Pro. Feel free to join the discussion!

Rules:
  1. No NSFW Content
  2. No Hate Speech or Personal Attacks
  3. No Ads / Spamming
    Self promotion is only allowed in the pinned monthly thread

Lemmy Code of Conduct

Communities of Interest:

Apple Hardware
Apple TV
Apple Watch
iPad
iPhone
Mac
Vintage Apple

Apple Software
iOS
iPadOS
macOS
tvOS
watchOS
Shortcuts
Xcode

Community banner courtesy of u/Antsomnia.

founded 1 year ago
MODERATORS