pawb.fun is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance aimed at any and all within the furry fandom, though anyone is welcome! We're friendly towards members of the LGBTQ+ community and aiming to offer a safe space for our users.

Server stats:

297
active users

#ipados

2 posts2 participants0 posts today
Vivaldi<p>Hey! Our latest app update for iPhone and iPad is here!</p><p>🍎 Format your Notes with Markdown &amp; rich text<br>🍎 Fine-tune your Address Bar suggestions<br>🍎 Access past translations with Translation History<br>🍎 Set custom zoom levels for individual sites<br>🍎 7 new UI languages added</p><p>…and more. Go try it now, and check out our blog post for all the details: <a href="https://vivaldi.com/blog/vivaldi-on-ios-7-2/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">vivaldi.com/blog/vivaldi-on-io</span><span class="invisible">s-7-2/</span></a></p><p><a href="https://social.vivaldi.net/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://social.vivaldi.net/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> <a href="https://social.vivaldi.net/tags/iPhone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPhone</span></a> <a href="https://social.vivaldi.net/tags/iPad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPad</span></a> <a href="https://social.vivaldi.net/tags/Apps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apps</span></a> <a href="https://social.vivaldi.net/tags/Tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tech</span></a> <a href="https://social.vivaldi.net/tags/Vivaldi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vivaldi</span></a> <a href="https://social.vivaldi.net/tags/Browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Browser</span></a> <a href="https://social.vivaldi.net/tags/Notes" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Notes</span></a></p>
electron tamer in training 🍂<p>If you don’t know, Safari on iPad is crashing if you’re resuming it with more than 1200 tabs on your profile</p><p>If you reopen it (cold launch) after the crash, it will start as usual but with all tabs unloaded, it’s only crashing on resume</p><p>So you know :blabcat: </p><p><a href="https://woof.tech/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> <a href="https://woof.tech/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://woof.tech/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://woof.tech/tags/Safari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Safari</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> fixes <a href="https://mastodon.thenewoil.org/tags/WebKit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WebKit</span></a> <a href="https://mastodon.thenewoil.org/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ZeroDay</span></a> exploited in ‘extremely sophisticated’ attacks</p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-fixes-webkit-zero-day-exploited-in-extremely-sophisticated-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/appl</span><span class="invisible">e/apple-fixes-webkit-zero-day-exploited-in-extremely-sophisticated-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/iphone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iphone</span></a> <a href="https://mastodon.thenewoil.org/tags/Mac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mac</span></a> <a href="https://mastodon.thenewoil.org/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://mastodon.thenewoil.org/tags/MacOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MacOS</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/0Day" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>0Day</span></a> <a href="https://mastodon.thenewoil.org/tags/VisionPro" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VisionPro</span></a> <a href="https://mastodon.thenewoil.org/tags/iPad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPad</span></a> <a href="https://mastodon.thenewoil.org/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a></p>
IT News<p>Apple patches 0-day exploited in “extremely sophisticated attack” - Apple on Tuesday patched a critical zero-day vulnerability in virtually al... - <a href="https://arstechnica.com/security/2025/03/apple-patches-0-day-exploited-in-extremely-sophisticated-attack/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">03/apple-patches-0-day-exploited-in-extremely-sophisticated-attack/</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/zeroday" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>zeroday</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/ipados" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipados</span></a> <a href="https://schleuss.online/tags/iphone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iphone</span></a> <a href="https://schleuss.online/tags/apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>apple</span></a> <a href="https://schleuss.online/tags/ipad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipad</span></a> <a href="https://schleuss.online/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a></p>
choybc<p>I am using <span class="h-card" translate="no"><a href="https://social.vivaldi.net/@Vivaldi" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Vivaldi</span></a></span> as my main browser on <a href="https://mastodon.social/tags/Mac" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Mac</span></a>, <a href="https://mastodon.social/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> and <a href="https://mastodon.social/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> now for 2 weeks and it is an absolutely brilliant experience and there’s also a great community and top feelgood factor. Will keep it and move on from <a href="https://mastodon.social/tags/Safari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Safari</span></a> and <a href="https://mastodon.social/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a>. <a href="https://mastodon.social/tags/europeanalternatives" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>europeanalternatives</span></a> <a href="https://mastodon.social/tags/vivaldi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vivaldi</span></a> <a href="https://mastodon.social/tags/vivaldibrowser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>vivaldibrowser</span></a> <a href="https://mastodon.social/tags/dataprivacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dataprivacy</span></a> <a href="https://mastodon.social/tags/Europe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Europe</span></a></p>
Rusty Corgi<p>Greetings from an iPad :blobfoxaww: This tablet makes me a little crazy.</p><p>Like seriously iOS devices are so nice hardware-wise but software-wise it feels soooooo limiting. :blobfoxannoyed: I want a full OS on this thing so baaadddd.</p><p><a href="https://cubhub.social/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://cubhub.social/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> <a href="https://cubhub.social/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a></p>
Erklärbär<p><span class="h-card" translate="no"><a href="https://mastodon.social/@Tutanota" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Tutanota</span></a></span><br>Question regarding <a href="https://mastodon.social/tags/Tuta" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tuta</span></a> calendar:<br>I use the calendar on <a href="https://mastodon.social/tags/Android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Android</span></a> <a href="https://mastodon.social/tags/gos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gos</span></a> and <a href="https://mastodon.social/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a>. Both have the same timezone setup, both show the same date and time.<br>When I add a calendar item on my iPad, it appears on my gos three hours earlier. And vice versa. How can this be? I spend hours updating my iPad until I noticed that it does not show the right hour on my gos.</p>
Bhante Subharo :xmpp:<p><span class="h-card" translate="no"><a href="https://vis.social/@waeiski" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>waeiski</span></a></span> the elephant in the room there, is that <a href="https://c.im/tags/Signal" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Signal</span></a> servers are said to be mostly on Amazon AWS. </p><p>Maybe they are thinking of an alternative like <a href="https://c.im/tags/Deltachat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Deltachat</span></a> (with a posteo.net email address, or other such auto-encrypted email address not hosted on US soil)? This alternative exists right now, it's just that posteo.net addresses are not free to rent. Merely inexpensive. It's cross-platform: is said to be stable, even on <a href="https://c.im/tags/MacOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MacOS</span></a> and <a href="https://c.im/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> or <a href="https://c.im/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a></p>
heise Security<p>Angreifer attackieren Sicherheitslücken in iOS, Mitel SIP-Phones und PAN-OS</p><p>IT-Forscher haben Angriffe auf Sicherheitslücken in iPadOS, Mitel SIP-Phones und PAN-OS beobachtet. Updates dichten die Sicherheitslecks ab.</p><p><a href="https://www.heise.de/news/Angreifer-attackieren-Sicherheitsluecken-in-iOS-Mitel-SIP-Phones-und-PAN-OS-10284172.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Angreifer-attack</span><span class="invisible">ieren-Sicherheitsluecken-in-iOS-Mitel-SIP-Phones-und-PAN-OS-10284172.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Botnet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Botnet</span></a> <a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://social.heise.de/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>news</span></a></p>
Erik van Straten<p>Passkey/password bug: iOS 18.3.1</p><p>Ook in iOS versie 18.3.1 is de eerder door mij gemelde iCloud KeyChain (*) kwetsbaarheid nog niet gerepareerd (eerder schreef ik hierover, Engelstalig: <a href="https://infosec.exchange/@ErikvanStraten/113821443334366419" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/113821443334366419</span></a>).</p><p>(*) Tegenwoordig is dat de app genaamd "Wachtwoorden" (of "Passwords").</p><p>De kwetsbaarheid bestaat indien:</p><p>• De eigenaar een "passcode" (pincode of wachtwoord) gebruikt om de iPhone of iPad te ontgrendelen - en er GÉÉN biometrie is geconfigureerd;</p><p>ofwel:</p><p>• De gebruiker wel biometrie kan gebruiken om het scherm te ontgrendelen, doch in 'Instellingen' &gt; 'Touch ID en toegangscode' de instelling "Autom. invullen wachtw." is UITgezet.</p><p>Zie onderstaande screenshots (Engelstalig in <a href="https://infosec.exchange/@ErikvanStraten/113821443334366419" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/113821443334366419</span></a>). Meer info ziet u door op "Alt" in de plaatjes te drukken.</p><p>Probleem: iedereen met toegang tot de ontgrendelde iPhone of iPad kan dan, *zonder* opnieuw lokaal te hoeven authenticeren:</p><p>1) Op elke website inloggen waarvan het user-ID en wachtwoord in iCloud Keychain zijn opgeslagen;</p><p>2) Met passkeys op enkele specifieke websites inloggen (waaronder <a href="https://account.apple.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">account.apple.com</span><span class="invisible"></span></a> en <a href="https://icloud.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">icloud.com</span><span class="invisible"></span></a>), namelijk als volgt:</p><p>a) Open de website;<br>b) Druk op "Inloggen";<br>c) Druk op de "x" rechts bovenaan de pop-up die verschijnt (in de onderste schermhelft);<br>d) Druk kort in het veld waar om het e-mailadres gevraagd wordt;<br>e) Druk op de knop "gebruik passkey".</p><p>Risico: uitlenen van een unlocked iDevice (o.a. aan kinderen) maar ook diefstal nadat de passcode is afgekeken. Of als de dief geen passcode heeft, als deze wacht tot de eerstvolgende iOS/iPadOS kwetsbaarheid bekend wordt waarbij de schermontgrendeling omzeild kan worden.</p><p>Als u ze nog niet gezien heeft, bekijk in elk geval de eerste van de volgende twee video's van Joanna Stern (van de Wall Street Journal):<br><a href="https://youtube.com/watch?v=QUYODQB_2wQ" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtube.com/watch?v=QUYODQB_2wQ</span><span class="invisible"></span></a><br><a href="https://youtube.com/watch?v=tCfb9Wizq9Q" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtube.com/watch?v=tCfb9Wizq9Q</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/TouchID" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TouchID</span></a> <a href="https://infosec.exchange/tags/FaceID" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FaceID</span></a> <a href="https://infosec.exchange/tags/Passkeys" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Passkeys</span></a> <a href="https://infosec.exchange/tags/iCloudKeychain" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iCloudKeychain</span></a> <a href="https://infosec.exchange/tags/Passwords" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Passwords</span></a> <a href="https://infosec.exchange/tags/PadswordsApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PadswordsApp</span></a> <a href="https://infosec.exchange/tags/Wachtwoorden" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wachtwoorden</span></a> <a href="https://infosec.exchange/tags/WachtwoordenApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WachtwoordenApp</span></a> <a href="https://infosec.exchange/tags/Biometrie" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Biometrie</span></a> <a href="https://infosec.exchange/tags/Passcode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Passcode</span></a> <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> <a href="https://infosec.exchange/tags/iPhone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPhone</span></a> <a href="https://infosec.exchange/tags/iPad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPad</span></a> <a href="https://infosec.exchange/tags/iDevice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iDevice</span></a> <a href="https://infosec.exchange/tags/ScreenLock" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ScreenLock</span></a> <a href="https://infosec.exchange/tags/ScreenUnlock" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ScreenUnlock</span></a> <a href="https://infosec.exchange/tags/SchermVergrendeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SchermVergrendeling</span></a> <a href="https://infosec.exchange/tags/SchermOntgrendeling" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SchermOntgrendeling</span></a> <a href="https://infosec.exchange/tags/SchermOntgrendelCode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SchermOntgrendelCode</span></a> <a href="https://infosec.exchange/tags/PINcode" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PINcode</span></a> <a href="https://infosec.exchange/tags/Kwetsbaarheid" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Kwetsbaarheid</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/OngeautoriseerdeToegang" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OngeautoriseerdeToegang</span></a> <a href="https://infosec.exchange/tags/IdentiteitsFraude" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IdentiteitsFraude</span></a> <a href="https://infosec.exchange/tags/Inloggen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Inloggen</span></a> <a href="https://infosec.exchange/tags/Stern" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stern</span></a> <a href="https://infosec.exchange/tags/JoannaStern" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JoannaStern</span></a> <a href="https://infosec.exchange/tags/WSJ" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WSJ</span></a></p>
Tixie Salander<p>[⚠️] Update your iPhone, iPad and mac if you can, the last release includes a 0day security: <a href="https://support.apple.com/en-us/100100" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">support.apple.com/en-us/100100</span><span class="invisible"></span></a></p><p><a href="https://mastodon.guerilla.studio/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://mastodon.guerilla.studio/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://mastodon.guerilla.studio/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> <a href="https://mastodon.guerilla.studio/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> <a href="https://mastodon.guerilla.studio/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a></p>
Erik van Straten<p>iPhone/iPad gebuikers: security-tip!</p><p>Sinds iOS en iPadOS versie 18.2 heeft Safari (de standaard webbrowser, het blauwe kompas) een instelling die het openen van websites veiliger maakt, vooral als u van publieke WiFi gebruik maakt (restaurant, trein, hotels etc).</p><p>Sla hieronder gerust alle tekst over die u niet interessant lijkt. Maar zet die instelling aan, voor uw eigen bestwil (en doe dat ook bij uw ouders)!</p><p>🔹 Laatste update iOS/iPadOS<br>Controleer sowieso regelmatig of uw iPhone of iPad de laatste update geïnstalleerd heeft: open "Instellingen" (het grijze tandwieltje), open "Algemeen" en vervolgens "Software update" (doe dat alleen als u een WiFi-internetverbinding heeft, anders kan het ten koste gaan van uw telefoonrekening).</p><p>De laatste versie op dit moment is 18.3.</p><p>🔹 Nieuwe Safari instelling<br>Na het updaten en opnieuw opstarten opent u in "Instellingen" onderaan "Apps". Zoek naar "Safari" en open dat.</p><p>Scroll het scherm naar boven totdat u het lichtgrijze kopje "PRIVACY EN BEVEILIGING" ziet.</p><p>Daaronder zou moeten staan: "Waarschuwing voor onveilige verbindingen" (standaard staat die instelling uit).</p><p>Als u dat AAN zet toont Safari u een *waarschuwing* als er (ook tijdelijk) gebruik gemaakt wordt van een verbinding met<br> http://<br>in plaats van met<br> https://</p><p>🔹 Toelichting<br>Bij http:// weet u, vooral op een minder vertrouwd netwerk (zoals WiFi in een vliegveld, zie <a href="https://www.bleepingcomputer.com/news/security/australian-charged-for-evil-twin-wifi-attack-on-plane/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/australian-charged-for-evil-twin-wifi-attack-on-plane/</span></a>), niet zeker of Safari echt een verbinding heeft met de server waarvan u de website-naam in de adresbalk van Safari ziet.</p><p>(Techneuten zeggen "domeinnaam" i.p.v. "website-naam").</p><p>Sterker, u kunt http:// vergelijken met wegwijzers die door vandalen in een andere richting kunnen worden gedraaid, waardoor u (als u geen moderne navigatie gebruikt) de verkeerde kant op kunt worden gestuurd.</p><p>🔹 Risico: omleiding naar nepsite<br>Vergelijkbaar, bij http:// kan een aanvaller Safari, zonder dat u gewaarschuwd wordt, doorsturen naar een nepwebsite (die als twee druppels op de echte lijkt) - doch met een iets afwijkende (of totaal andere) website-naam. Als die nepwebsite https:// ondersteunt, merkt u *niet* dat Safari naar een andere website is gestuurd dan door u bedoeld. </p><p>🔹 Waarom https:// wél veilig is<br>Bij het gebruik van uitsluitend https:// is "omleiden" nagenoeg onmogelijk. Als genoemde Safari-instelling AAN staat, maakt het niets uit of u bijvoorbeeld google.com of <a href="http://google.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">google.com</span><span class="invisible"></span></a> intikt in de adresbalk: Safari: maakt daar dan automatisch https:// van vóórdat verbinding met de server wordt gemaakt.</p><p>🔸 Nadeel: thuisapparaten<br>Nadeel: sommige websites, vooral "smart" apparatuur in uw huis (waaronder de beheer-interface van uw modem, zoals de laatste van Ziggo) ondersteunt https:// vaak niet. Als u bijvoorbeeld http:⧸⧸192.168.178.1 moet openen, zal Safari u waarschuwen *voordat* de verbinding wordt gemaakt. Als u op "Ga verder" drukt, werkt alles als vanouds.</p><p>🔸 Nadeel: oude sites en "jumpsites"<br>Een ander voorbeeld zijn stompzinnige "jump sites" zoals <a href="http://gemeente.amsterdam" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">gemeente.amsterdam</span><span class="invisible"></span></a> (deze ondersteunt uitsluitend http:// en dat is, voor overheden, tegen de wet). Als het *goed* is stuurt bovenstaande link Safari door naar <a href="https://amsterdam.nl" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">amsterdam.nl</span><span class="invisible"></span></a> (die link begint wel met https://).</p><p>Risico: als u, op een onvertrouwd netwerk, <a href="http://gemeente.amsterdam" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">gemeente.amsterdam</span><span class="invisible"></span></a> opent, loopt u het risico dat Safari naar een nepwebsite wordt doorgestuurd, met bijvoorbeeld de naam<br> gemeenteamsterdam·com<br>of<br> amsterdam·top<br>en u geen enkele foutmelding ziet (en de getoonde pagina als twee druppels op de echte kan lijken). Nb. in die laatste twee websitenamen heb ik de laatste punt vervangen door · (een hoge punt) om onbedoeld openen te voorkómen.</p><p>🚨 Let op: "Ga verder" = http:// 🚨<br>Als u genoemde instelling in Safari aanzet (wat ik 100% aanraad, dit zou m.i. een standaard-instelling moeten zijn in alle browsers), en u krijgt het waarschuwingsscherm te zien (zie het tweede plaatje): als u op "Ga verder" drukt, wordt meteen de onveilige http:// verbinding gemaakt (zonder verdere vragen). Let dan dubbel goed op de vervolgens in de adresbalk van Safari getoonde websitenaam!</p><p>🔹 Resetten<br>Als u een http:// verbinding heeft toegestaan (zoals met <a href="http://gemeente.amsterdam" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">gemeente.amsterdam</span><span class="invisible"></span></a>), onthoudt Safari dat een tijd (ik weet nog niet of dit tijdbegrensd is, waarschijnlijk wel). Als u Safari sluit, door de geopende app van het scherm te vegen, *lijkt* Safari alle toestemmingen te vergeten die u voor http:// verbindingen gegeven heeft.</p><p>Desnoods (dit raad ik af) kunt u Safari dwingen om onthouden toestemmingen te verwijderen door de gehele geschiedenis van Safari te wissen. Advies: vóór dat u dat doet, exporteer eerst alle website-data, want onthouden inloggegevens bent u ook kwijt als u de hele browsergeschiedenis wist. Met zo'n export kunt u terug naar de oude situatie door het export-bestand weer te importeren.</p><p>🔹 Over de plaatjes hieronder<br>Meer informatie ziet u door op "Alt" in het plaatje te drukken. Het linkerplaatje laat de nieuwe instelling voor Safari zien.<br>Voor het rechterplaatje heb ik <a href="http://http.badssl.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">http.badssl.com</span><span class="invisible"></span></a> gekozen. Dat heb ik gedaan omdat ik wat wisselende ervaringen had met <a href="http://gemeente.amsterdam" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">gemeente.amsterdam</span><span class="invisible"></span></a>.</p><p>(Voor techneuten: Safari onthoudt onder mij nog onbekende omstandigheden dat het om een jumpsite gaat. In een export van de browsergeschiedenis zag ik in "Geschiedenis.json", onder "<a href="http://gemeente.amsterdam" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">gemeente.amsterdam</span><span class="invisible"></span></a>" o.a. een regel:<br>"destination.url" : "<a href="https://www.amsterdam.nl" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">amsterdam.nl</span><span class="invisible"></span></a>" - als de browser dat benut wordt er geen http gebruikt).</p><p>🔹 Over <a href="http://http.badssl.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">http.badssl.com</span><span class="invisible"></span></a><br>De website <a href="https://badssl.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">badssl.com</span><span class="invisible"></span></a> bevat allerlei pagina's en sub-website-namen om browsers te testen, en is -voor zover ik weet- betrouwbaar. Niet alles is up-to-date (bijv. het certificaat van <a href="https://extended-validation.badssl.com/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">extended-validation.badssl.com/</span><span class="invisible"></span></a> is verlopen).</p><p>🔹 Andere testsites<br>In plaats van te testen met <a href="http://gemeente.amsterdam" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">gemeente.amsterdam</span><span class="invisible"></span></a> kunt u ook testen met bijv. <a href="http://http.badssl.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">http.badssl.com</span><span class="invisible"></span></a> en <a href="http://www.buitenhoftv.nl" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://www.</span><span class="">buitenhoftv.nl</span><span class="invisible"></span></a>.</p><p>M.b t. die laatste: als u 2x op more/meer drukt in <a href="https://youtube.com/watch?v=WalOiq0mrNw" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtube.com/watch?v=WalOiq0mrNw</span><span class="invisible"></span></a> ziet u onder:<br>"Meer van Buitenhof: <br>» Vind"<br>een https:// link naar www.buitenhoftv.nl - maar u wordt belazerd (die jumpsite ondersteunt uitsluitend http). Precies daarom raad ik aan om deze Safari instelling aan te zetten. Ook sommige QR-codes bevatten http-links terwijl de site óók https ondersteunt.</p><p>Met enorme dank aan Thomas Bosboom ✅<br>(<span class="h-card" translate="no"><a href="https://infosec.exchange/@thomasbosboom" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>thomasbosboom</span></a></span>) die mij op deze instelling wees in <a href="https://infosec.exchange/@thomasbosboom/113945617133456130" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@thomasbosboo</span><span class="invisible">m/113945617133456130</span></a>!</p><p><a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> <a href="https://infosec.exchange/tags/Safari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Safari</span></a> <a href="https://infosec.exchange/tags/Beveiliging" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Beveiliging</span></a> <a href="https://infosec.exchange/tags/iPhone" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPhone</span></a> <a href="https://infosec.exchange/tags/iPad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPad</span></a> <a href="https://infosec.exchange/tags/httpVShttps" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>httpVShttps</span></a> <a href="https://infosec.exchange/tags/httpsVShttp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>httpsVShttp</span></a> <a href="https://infosec.exchange/tags/WiFi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>WiFi</span></a> <a href="https://infosec.exchange/tags/PubliekWifi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PubliekWifi</span></a> <a href="https://infosec.exchange/tags/EvilTwin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>EvilTwin</span></a> <a href="https://infosec.exchange/tags/AitM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AitM</span></a> <a href="https://infosec.exchange/tags/MitM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MitM</span></a> <a href="https://infosec.exchange/tags/Netwerken" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Netwerken</span></a> <a href="https://infosec.exchange/tags/OnbetrouwbaarNetwerk" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OnbetrouwbaarNetwerk</span></a> <a href="https://infosec.exchange/tags/Phishing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Phishing</span></a> <a href="https://infosec.exchange/tags/Spoofing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Spoofing</span></a> <a href="https://infosec.exchange/tags/ValseWebsites" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ValseWebsites</span></a> <a href="https://infosec.exchange/tags/NepWebsites" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NepWebsites</span></a></p>
𝕂𝚞𝚋𝚒𝚔ℙ𝚒𝚡𝚎𝚕<p>uBlockOrigin &amp; uBlacklist Huge AI Blocklist</p><p>A huge blocklist of manually curated sites (1000+) that contain AI generated content, for the purposes of cleaning image search engines (Google Search, DuckDuckGo, and Bing) with <span class="h-card" translate="no"><a href="https://lemmy.ml/c/ublockorigin" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>ublockorigin</span></a></span> or uBlacklist. Also works on mobile (iOS, iPadOS, Android) via uBlacklist, as well as pihole/adguard.</p><p>✋ <a href="https://github.com/laylavish/uBlockOrigin-HUGE-AI-Blocklist?tab=readme-ov-file#ublockorigin--ublacklist-huge-ai-blocklist" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/laylavish/uBlockOri</span><span class="invisible">gin-HUGE-AI-Blocklist?tab=readme-ov-file#ublockorigin--ublacklist-huge-ai-blocklist</span></a></p><p><a href="https://chaos.social/tags/blocklist" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blocklist</span></a> <a href="https://chaos.social/tags/ublockorigin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ublockorigin</span></a> <a href="https://chaos.social/tags/noai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>noai</span></a> <a href="https://chaos.social/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://chaos.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://chaos.social/tags/websec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websec</span></a> <a href="https://chaos.social/tags/online" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>online</span></a> <a href="https://chaos.social/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://chaos.social/tags/onlinesafety" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>onlinesafety</span></a> <a href="https://chaos.social/tags/android" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>android</span></a> <a href="https://chaos.social/tags/ios" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ios</span></a> <a href="https://chaos.social/tags/ipados" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ipados</span></a> <a href="https://chaos.social/tags/firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firefox</span></a> <a href="https://chaos.social/tags/browser" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>browser</span></a></p>
hal<p>Hallo <span class="h-card" translate="no"><a href="https://mastodon.online/@thunderbird" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>thunderbird</span></a></span> gibt's eine Roadmap, wann <a href="https://social.tchncs.de/tags/Thunderbird" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Thunderbird</span></a> auf <a href="https://social.tchncs.de/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> / <a href="https://social.tchncs.de/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> verfügbar sein wird? Oder überhaupt irgendeinen Status dazu?</p>
Erik van Straten<p>In a post that disappeared, <span class="h-card" translate="no"><a href="https://social.wildeboer.net/@jwildeboer" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jwildeboer</span></a></span> wrote:</p><p>"<span class="h-card" translate="no"><a href="https://hachyderm.io/@rmondello" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>rmondello</span></a></span> I do note that when I open mondello.com in my browser, I get a placeholder page that is http only, no https. This would be a reason that it *seems* that it is unreachable, because many browsers nowadays refuse to open sites without https."</p><p>Unfortunately, that is *not* true. Browsers unnecessarily make the internet LESS SAFE. IT'S CRAZY!</p><p>*Some* browsers will try https first when you type http:⧸⧸mondello.com (use // instead of ⧸⧸ I used to prevent Mastodon from showing http://). So far, so good.</p><p>However, if an AitM (Attacker in the Middle, such as on public WiFi) blocks traffic from your browser to TCP port 443 (https) on the server, the browser will *silently* try port 80 (http). Pwned.</p><p>This may happen in practice, for example on airports (<a href="https://www.bleepingcomputer.com/news/security/australian-charged-for-evil-twin-wifi-attack-on-plane/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/australian-charged-for-evil-twin-wifi-attack-on-plane/</span></a>).</p><p>Except for iOS and iPadOS, most browsers have an "https only" setting that is *OFF* by default, while it's name is misleading.</p><p>*On* means that you can still use http, but you'll have to manually agree (you can still access the http devices on your local network, or on the internet. But you will be WARNED).</p><p>However, Chrome appears to remember exceptions FOR EVER (I had to delete all browser data to make the last screenshot below. However, that also clears the browser's HSTS database).</p><p>On iOS/iPadOS, from Safari, Edge, Firefox and Chrome, only Chrome has this option. So only Chrome provides *some* protection. People do not type "https://" in front of domain names, and most QR-codes I check are insecure.</p><p>To test: open <a href="http://http.badssl.com" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">http.badssl.com</span><span class="invisible"></span></a>. Instead of immediately seeing a (red) webpage, your browser should protect you by asking whether you want to use an http-connection.</p><p>Alternative test-site (non-compliant with the Dutch law):<br><a href="http://gemeente.amsterdam" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">http://</span><span class="">gemeente.amsterdam</span><span class="invisible"></span></a><br>(Gemeente translates to municipality).</p><p>(Exactly that is why I wrote this, in Dutch: <a href="https://infosec.exchange/@ErikvanStraten/113855174617111536" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">infosec.exchange/@ErikvanStrat</span><span class="invisible">en/113855174617111536</span></a> earlier this afternoon).</p><p>Note: Firefox on Android seems to forget "http allowed" exceptions when the browser is fully closed (good).</p><p><span class="h-card" translate="no"><a href="https://hachyderm.io/@rmondello" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>rmondello</span></a></span> </p><p><a href="https://infosec.exchange/tags/httpsOnly" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>httpsOnly</span></a> <a href="https://infosec.exchange/tags/HSTS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HSTS</span></a> <a href="https://infosec.exchange/tags/httpsvshttp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>httpsvshttp</span></a> <a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://infosec.exchange/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> <a href="https://infosec.exchange/tags/Safari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Safari</span></a> <a href="https://infosec.exchange/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a> <a href="https://infosec.exchange/tags/Edge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Edge</span></a> <a href="https://infosec.exchange/tags/Chrome" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Chrome</span></a> <a href="https://infosec.exchange/tags/Insecure" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Insecure</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a></p>
Shawn Brink<p><a href="https://techhub.social/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> Releases <a href="https://techhub.social/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> and <a href="https://techhub.social/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> 18.2.1 <br><a href="https://www.elevenforum.com/t/apple-releases-ios-and-ipados-18-2-1.32133/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">elevenforum.com/t/apple-releas</span><span class="invisible">es-ios-and-ipados-18-2-1.32133/</span></a></p>
Rusty Corgi<p>Safari is... not great. It just renders things a bit off and nothing loads all that well. :blobfoxthinkgoogly: Not to keep complaining about how locked down iOS is, but the restriction on third-party browser layout engines is really frustrating. :drgn_sigh: </p><p><a href="https://cubhub.social/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a> <a href="https://cubhub.social/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> <a href="https://cubhub.social/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://cubhub.social/tags/Safari" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Safari</span></a></p>
WinFuture.de<p>Das Basis-<a href="https://mastodon.social/tags/iPad" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPad</span></a> erhält nach mehreren Jahren endlich ein <a href="https://mastodon.social/tags/Upgrade" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Upgrade</span></a>. <a href="https://mastodon.social/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> soll den Release des <a href="https://mastodon.social/tags/iPad11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPad11</span></a> angeblich schon in wenigen Wochen planen. Das <a href="https://mastodon.social/tags/Tablet" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tablet</span></a> könnte dann zusammen mit <a href="https://mastodon.social/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> 18.3 erscheinen. <a href="https://winfuture.de/news,147759.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,147759.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
WinFuture.de<p>Apple veröffentlicht <a href="https://mastodon.social/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a> 17.7.3: Kritisches Sicherheitsupdate für ältere iPads schließt 14 Lücken. Betroffen sind Kernel, WebKit und Passwort-App. Für iOS 17 auf iPhones bisher keine Aktualisierung in Sicht. <a href="https://mastodon.social/tags/Apple" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apple</span></a> <a href="https://winfuture.de/news,147526.html?utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">winfuture.de/news,147526.html?</span><span class="invisible">utm_source=Mastodon&amp;utm_medium=ManualStatus&amp;utm_campaign=SocialMedia</span></a></p>
SANS Internet Storm Center - SANS.edu - Go Sentinels!<p>Apple Updates Everything (<a href="https://infosec.exchange/tags/iOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iOS</span></a>, <a href="https://infosec.exchange/tags/iPadOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>iPadOS</span></a>, <a href="https://infosec.exchange/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a>, <a href="https://infosec.exchange/tags/watchOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>watchOS</span></a>, <a href="https://infosec.exchange/tags/tvOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tvOS</span></a>, <a href="https://infosec.exchange/tags/visionOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>visionOS</span></a>) <a href="https://isc.sans.edu/diary/31514" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">isc.sans.edu/diary/31514</span><span class="invisible"></span></a></p>