Normal Users Don’t Code On Their Mac, But Apple Keeps Trying

Most people use their computer to run pre-packaged programs: usually a web browser, games, or office applications. Whether the machine is a PC or a Mac, they don’t generally write their own software. For them, the computer is an appliance, and they do what their computer allows them to do.

It shouldn’t have to be that way, if only programming were easier. The Eclectic Light Company has a fascinating article looking at the various attempts that Apple has made to lure their users into creative programming.

Probably the most familiar of them all is AppleScript, with its origins in late 1993. Or maybe you’re thinking of Hypertalk, the scripting component of 1987’s Hypercard. That would go on to be a mainstay of mid-1990s multimedia software, but while it’s fallen by the wayside it’s AppleScript which still has support in the latest MacOS.

The biggest surprise for us lies in the forgotten products. 1989’s Prograph graphical language looks amazing. Was it simply before its time? In the modern era, Apple describes the reach of Shortcuts diplomatically: “its impact has so far been limited”.

Maybe the most forward-thinking line on programming from Apple came in 2007, even if it wasn’t recognized as such. The original iPhone didn’t have any third-party apps, and instead developers were supposed to write web apps to take advantage of the always-connected device. Would that be such a bad piece of advice to give a non-developer writing software for their Mac today?

A Quarter Century Of The IMac

Growing older as an engineer turns out to be a succession of moments in which technologies and devices which you somehow still imagine to be cool or exciting, reveal themselves in fact to be obsolete, indeed, old. Such a moment comes today, with the25th anniversary of the most iconic of 1990s computers, Apple’s iMac. The translucent all-in-one machine was and remains more than simply yet another shiny Mac, it’s probably the single most influential home computer ever. A bold statement to be sure, but take a look at the computer you’re reading this on, indeed at all your electronic devices here in 2023, before you dismiss it.

Any colour you want, as long as it's beige
Any colour you want, as long as it’s beige. Leon Brooks, Public domain.

Computers in the 1990s were beige and boring. Breathtakingly so, a festival of the generic. If you had a PC it came in the same beige box as every single other PC, the only thing breaking the monotony being one of those LED 7-segment fake-MHz displays. Apple computers took the beige and ran with it, their PowerMac range being merely a smoother-fronted version of all those beige-box PCs. This was the period following the departure of Steve Jobs during which the company famously lost its way, and the Bondi blue Jonny Ive-designed iMac was the signature product of his triumphant return.

That’s enough pretending to have drunk the Apple Kool-Aid for one article, so  why are we marking this anniversary? The answer lies not in the iMac’s hardware, though its 233MHz PowerPC G3 and ATI graphics driving a 15″ CRT were no slouch for the day, nor even in its forsaking of all their previous proprietary interfaces for USB. Instead it’s the design influence of this machine, as it ushered in a new era of technological devices whose ethos lay around how they might be used rather than in simply showering the interface with features. At the time the iMac spawned a brief fashion for translucent blue in everything from peripherals to steam irons, but in the quarter century since your devices have changed immeasurably in its wake. We still don’t like that weird round mouse though.

Header image: Rama, CC BY-SA 4.0.

This Week In Security: TunnelCrack, Mutant, And Not Discord

Up first is a clever attack against VPNs, using some clever DNS and routing tricks. The technique is known as TunnelCrack (PDF), and every VPN tested was vulnerable to one of the two attacks, on at least one supported platform.
Continue reading “This Week In Security: TunnelCrack, Mutant, And Not Discord”

Apple III Slows Down To Smell The Roses

The most collectible items in the realm of vintage computers often weren’t the most popular of their era. Quite the opposite, in fact. Generally the more desireable systems were market failures when they first launched, and are now sought out because of a newly-appreciated quirk or simply because the fact that they weren’t widely accepted means there’s fewer of them. One of the retro computers falling into this category is the Apple III, which had fundamental hardware issues upon launch leading to a large recall and its overall commercial failure. [Ted] is trying to bring one of these devices back to life, though, by slowing its clock speed down to a crawl.

The CPU in these machines was a Synertek 6502 running at 1.8 MHz. With a machine that wouldn’t boot, though, [Ted] replaced it with his own MCL65+, a purpose-built accelerator card based on the 600 MHz Teensy 4.1 microcontroller in order to debug the motherboard. The first problem was found in a ROM chip which prevented the computer loading anything from memory, but his solution wouldn’t work at the system’s higher clock speeds. To solve that problem [Ted] disabled the higher clock speed in hardware, restricting the system to 1 MHz and allowing it to finally boot.

So far there haven’t been any issues running the computer at the slower speed, and it also helps keep the computer cooler and hopefully running longer as well, since the system won’t get as hot or unstable. This isn’t [Ted]’s first retrocomputing rodeo, either. His MCL chips have been featured in plenty of other computers like this Apple II which can run at a much faster rate than the original hardware thanks to the help of the modern microcontroller.

An exploded view of an AirPods Pro case. The outer case consists of two long, capsule-shaped sections that enclose several smaller parts including the wireless charging cable, contacts for charging the AirPods themselves, and the top rounded protective piece for the buds that nestles into the top capsule. This version includes screws to fasten everything together instead of adhesives.

Fixing Some More Of Apple’s Design Mistakes

Love them or hate them, there’s no denying that Apple has strayed from the Woz’s original open platform ideal for the Apple II. [Ken Pillonel] is back for another round of fixing Apple’s repairability mistakes with a full complement of 3D printable replacement parts for the AirPods Pro case.

While modeling all of the parts would be handy enough for repairing a device with a 0/10 iFixit score, [Pillonel] modified the parts to go together with screws instead of adhesive so any future repairs don’t require cracking the plastic egg. He says, “By showcasing the potential for repairability, I hope to inspire both consumers and multi-billion dollar companies, like Apple, to embrace sustainable practices in their products.”

[Pillonel]’s repairability exploits may seem familiar to readers from his previous work on adding USB-C to the iPhone and the AirPods Pro case. If you just need to retrieve a lost AirPod, you might try an electromagnet, or you can make a Bluetooth receiver from a pair of knock-off buds.

Continue reading “Fixing Some More Of Apple’s Design Mistakes”

This Week In Security: Apple’s 0-day, Microsoft’s Mess, And More

First up, Apple issued an emergency patch, then yanked, and re-issued it. The problem was a Remote Code Execution (RCE) vulnerability in WebKit — the basis of Apple’s cross-platform web browser. The downside of a shared code base,is that bugs too are write-once, exploit-anywhere. And with Apple’s walled garden insisting that every browser on iOS actually run WebKit under the hood, there’s not much relief without a patch like this one.

The vulnerability in question, CVE-2023-37450, is a bit light on further details except to say that it’s known to be exploited in the wild. The first fix also bumped the browser’s user-agent string, adding an (a) to denote the minor update. This was apparently enough to break some brittle user-agent detection code on popular websites, resulting in an unhelpful “This web browser is no longer supported” message. The second patch gets rid of the notification.

Microsoft Loses It

Microsoft has announced that on May 15th, an attack from Storm-0558 managed to breach the email accounts of roughly 25 customers. This was pulled off via “an acquired Microsoft account (MSA) consumer signing key.” The big outstanding question is how Microsoft lost control of that particular key. According to an anonymous source speaking to The Washington Post, some of the targeted accounts were government employees, including a member of cabinet. Apparently the FBI is asking Microsoft this very same question.

Speaking of Microsoft, there’s also CVE-2023-36884, a vulnerability in Microsoft Office. This one appears to be related to the handling of HTML content embedded in Office documents, and results in code execution upon opening the document. This along with another vulnerability (CVE-2023-36874) was being used by storm- another unknown threat actor, Storm-0978 in an ongoing attack.

There’s an interesting note that this vulnerability can be mitigated by an Attack Surface Reduction (ASR) rule, that blocks Office from launching child processes. This might be a worthwhile mitigation step for this and future vulnerabilities in office. Continue reading “This Week In Security: Apple’s 0-day, Microsoft’s Mess, And More”

Closeup of an Apple ][ terminal program. The background is blue and the text white. The prompt says, "how are you today?" and the ChatGPT response says, "As an AI language model, I don't have feelings, but I am functioning optimally. Thank you for asking. How may I assist you?"

Apple II – Now With ChatGPT

Hackers are finding no shortage of new things to teach old retrocomputers, and [Evan Michael] has taught his Apple II how to communicate with ChatGPT.

Written in Python, iiAI lets an Apple II access everyone’s favorite large language model (LLM) through the terminal. The program lives on a more modern computer and is accessed over a serial connection. OpenAI API credentials are stored in a file invoked by iiAI when you launch it by typing python3 openai_apple.py. The program should work on any device that supports TTY serial, but so far testing has only happened on [Michael]’s Apple IIGS.

For a really clean setup, you might try running iiAI internally on an Apple II Pi. ChatGPT has also found its way onto Commodore 64 and MS-DOS, and look here if you’d like some more info on how these AI chat bots work anyway.

Continue reading “Apple II – Now With ChatGPT”