#[1]Normcore Tech
[2]Normcore Tech Normcore Tech
(BUTTON) Subscribe (BUTTON)
* [3]About
* [4]Archive
* [5]Help
* [6]Sign in
One very bad Apple
Why is Apple's commitment to privacy going down the drain?
[7][https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.ama
zonaws.com%2Fpublic%2Fimages%2Ff5f0220a-eaa9-474c-8017-696fadd92d53_400
x400.jpeg]
[8]Vicki Boykis
Feb 4 [9]5
(BUTTON)
Sign up to like post
____________________ (BUTTON) Subscribe
[10]Login[11]Privacy[12]Terms
(BUTTON)
[13]One very bad Apple[14]Why is Apple's commitment to privacy going
down the drain?
[15]Vicki Boykis
Feb 4 [16]5
(BUTTON)
Sign up to like post
____________________ (BUTTON) Subscribe
[17]Login[18]Privacy[19]Terms
Share
Art: Apple Gatherers, Camille Pissaro, 1891
My fifth grade teacher, Mr. Stains, had a big energy about him. He
imparted two American cultural norms upon me. First, he taught me about
the religion of American football. (If you’re also interested in
learning more, I recommend [20]Billy Lynn’s Long Halftime Walk.) And
second, he taught me about bumper stickers. He loved collecting them,
and had a bunch tacked up on his bulletin board.
One of his favorites was, “Just because you’re paranoid, doesn’t mean
they’re not out to get you, because they are.” The phrase has lately
turned from a funny school memory, into a jaded way of viewing a world
that’s stacked against the end-consumer. Which is probably what Joseph
Heller intended when he originally wrote [21]Catch-22.
Bugs don’t get through closed windows
Recently, I’ve been thinking about this phrase in the context of
Apple’s “commitment to privacy.”
Apple has always made a marketing pitch that it was the most secure
platform. This all started with Steve Jobs, who was famously obsessive
about having complete control over every aspect of the hardware and
software.
[JohnDCook.jpg] John D. Cook@JohnDCook
From Walter Isaacson's biography of Steve Jobs: The architects wanted
the windows to open. Jobs said no. He had never liked the idea of
people being able to open things. ‘That would just allow people to
screw things up.”
January 30th 2020
4 Retweets25 Likes
Apple [22]started this process early on.
By late 2013, when Apple released its iOS 7 system, the company was
encrypting by default all third-party data stored on customers’
phones.
[23]Since Apple is closed, it’s harder for hackers to get in. Security
also means that Apple itself can’t reverse-engineer the code to see
underlying messages.
The Apple of my FBI
This theory was put to a horrific stress test in 2015, when two
shooters killed 15 people and injured 22 in San Bernardino, California.
The shooters were killed in a shoot-out, and the police recovered three
phones from the crime scene. One of them, the shooter’s work phone, was
still in-tact, and locked with a numeric passcode. In the aftermath,
the shooting was declared act of terrorism. As a result, the federal
government wanted to get involved.
In 2016, the FBI asked Apple to unlock the phone. Apple [24]did not
want to unlock the phone.
The iPhone was locked with a four-digit passcode that the FBI had
been unable to crack. The FBI wanted Apple to create a special
version of iOS that would accept an unlimited combination of
passwords electronically, until the right one was found. The new iOS
could be side-loaded onto the iPhone, leaving the data intact.
But Apple had refused. Cook and his team were convinced that a new
unlocked version of iOS would be very, very dangerous.
After thinking on the issue with a small group, at 4:30 in the morning,
[25]Tim Apple released a statement that talked about the vital need for
encryption, and the threat against data security that the FBI’s request
had resulted in.
Specifically, the FBI wants us to make a new version of the iPhone
operating system, circumventing several important security features,
and install it on an iPhone recovered during the investigation. In
the wrong hands, this software — which does not exist today — would
have the potential to unlock any iPhone in someone’s physical
possession.
The FBI may use different words to describe this tool, but make no
mistake: Building a version of iOS that bypasses security in this
way would undeniably create a backdoor. And while the government may
argue that its use would be limited to this case, there is no way to
guarantee such control.
The Apple of my iMessage
This was perhaps the first time I heard any large company CEO talking
about privacy and actually putting his money where his mouth was. I was
super impressed. That year, I switched over to the iPhone.
With everything I read after that, I became reassured,[26] both by
Apple and by third-party commentators, that Apple had no interest in
anything except user privacy, because they didn’t need to sell data.
[27]Tim said so.
The truth is we could make a ton of money if we monetized our
customer, if our customer was our product," Cook said. "We’ve
elected not to do that.""Privacy to us is a human right. It's a
civil liberty, and something that is unique to America. This is like
freedom of speech and freedom of the press," Cook said. "Privacy is
right up there with that for us.
And if I didn’t believe Tim, there were his[28] privacy czars.
Indeed, any collection of Apple customer data requires sign-off from
a committee of three “privacy czars” and a top executive, according
to four former employees who worked on a variety of products that
went through privacy vetting.
Approval is anything but automatic: products including the Siri
voice-command feature and the recently scaled-back iAd advertising
network were restricted over privacy concerns, these people said.
And if I didn’t believe Tim and the privacy czars, in 2016 Apple’s
machine learning teams started talking publicly about the
[29]differential privacy they were working on.
Differential privacy is the practice of adding enough fake data, or
noise, to a given machine learning algorithm that you can no longer
tie back data to individuals, but it still allows ML predictions to
work. Combined with federated privacy, where machine learning models
are trained and run directly on the mobile device without directly
connecting to Apple’s server, differential privacy results in really
good, strong privacy.
Differential privacy[30] [2] provides a mathematically rigorous
definition of privacy and is one of the strongest guarantees of
privacy available. It is rooted in the idea that carefully
calibrated noise can mask a user’s data. When many people submit
data, the noise that has been added averages out and meaningful
information emerges.
But trusting a company is one thing. Trusting an independent person
that you yourself trust is another. And Maciej Cegłowski said he
trusted Apple.
Maciej runs [31]Pinboard. He’s written essays that I’ve linked to so
many times that I should be giving him royalties. Some of my favorites
include [32]Haunted by Data, the [33]Website Obesity Crisis, and
[34]Build a Better Monster, which I saw him deliver live in Philly.
Right now he’s in Hong Kong doing [35]some of the best reporting on the
protests, in spite of the fact that he is not a journalist.
In 2017, Macjiei started [36]working with political campaigns and
journalists on securing their devices. He’s since advocated many times
for people to use iPhones.
[Pinboard.jpg] Pinboard@Pinboard
@buzigde it’s not a joke. I think a 5 or later iPhone is the safest
piece of phone hardware you can use right now. cc /@tqbf for
corrections
November 19th 2016
1 Retweet7 Likes
So, if Tim, the developers, the data scientists, the journalists, and
Maciej were all telling me that I should use an Apple phone, I was
going to use an Apple phone.
Doubts
And things were great for a year or so. But then, the paranoia started
creeping in.
First, cryptographers were not really happy with the way iMessages were
encrypted. In 2016, they[37] wrote a paper about ways you could exploit
iMessage.
In this paper, we conduct a thorough analysis of iMessage to
determine the security of the protocol against a variety of attacks.
Our analysis shows that iMessage has significant vulnerabilities
that can be exploited by a sophisticated attacker. The practical
implication of these attacks is that any party who gains access to
iMessage ciphertexts may potentially decrypt them remotely and after
the fact.
The researchers, including [38]Matthew Green, went on to say,
“Our main recommendation is that Apple should replace the entirety
of iMessage with a messaging system that has been properly designed
and formally verified. "
That sounds serious? But I’m not a cryptography expert. So I let that
one slide.
Then, there were reports that Apple contractors [39]were listening to
Siri.
According to that contractor, Siri interactions are sent to workers,
who listen to the recording and are asked to grade it for a variety
of factors, like whether the request was intentional or a false
positive that accidentally triggered Siri, or if the response was
helpful.
But I have never, ever [40]turned on Siri, and the reports said that
Apple anonymized the commands. I let it slide.
Then, there was the story that you[41] still had to opt out of ad
tracking on your iPhone because [42]third-party apps were collecting
stuff about you.
You might assume you can count on Apple to sweat all the privacy
details. After all, it [43]touted in a recent ad, “What happens on
your iPhone stays on your iPhone.” My investigation suggests
otherwise.
iPhone apps I discovered tracking me by passing information to third
parties — just while I was asleep — include Microsoft OneDrive,
Intuit’s Mint, Nike, Spotify, The Washington Post and IBM’s The
Weather Channel. One app, the crime-alert service Citizen, shared
personally identifiable information in violation of its published
privacy policy.
Then, there were reports that Apple was running [44]part of iCloud on
AWS, a move that is fraught with its own security considerations and
implications, not the least of which is that Apple is trusting a
significant part of its infrastructure to a competitor.
Then, there was the paper put out (by Google, but still) about how
Apple’s intelligent tracking protection on Safari[45] leaks data.
[lukOlejnik.jpg] Lukasz Olejnik@lukOlejnik
Apple/Safari Intelligent Tracking Prevention is a mechanism intended to
improve privacy. It was found to have privacy vulnerabilities allowing
sites to track the user (and fingerprint), and to stealing web browser
history of a user. Incredible find. [46]arxiv.org/pdf/2001.07421…
[https%3A%2F%2Fpbs.substack.com%2Fmedia%2FEO3cSX7W4AAPlgO.png]
[https%3A%2F%2Fpbs.substack.com%2Fmedia%2FEO3cSX7X4AAT9Vf.jpg]
[https%3A%2F%2Fpbs.substack.com%2Fmedia%2FEO3cSX6WkAATX6H.jpg]
January 22nd 2020
177 Retweets329 Likes
Then, the last straw this January, when it was revealed that [47]Apple
was not encrypting iCloud backups, at the request of the FBI. And,
Apple is again facing pressure from as the FBI is again asking it to
hand over phones, related to another shooting that happened this
January [48]in Florida.
And, finally, whatever happened to the 5C iPhone that Tim Apple so
valiantly fought the FBI for? The government [49]was able to backdoor
into it anyway, without Apple’s help.
Why, Apple, why?
In theory, we should all be very, very mad at Apple, who is playing in
a big game of [50]cross-hatch.
At the same time that it is giving over unencrypted data to
governments, [51]has a big presence in China by doing what the Chinese
government asks it to do, and allowing targeted advertising, it’s doing
an enormous pro-privacy advertising campaign.
Just look at this:
IFRAME:
[52]
https://www.youtube-nocookie.com/embed/A_6uV9A12ok?rel=0&autoplay=0
&showinfo=0
And [53]look at this ad that it put up at CES in Las Vegas this year, a
trade show which it hasn’t even attended as a vendor in years.
What’s up
All we have to do is look at the workhorse models of Normcorian
analysis: Apple’s history, its 10-K forms, and systems theory.
[vboykis.jpg] Vicki Boykis@vboykis
Probably the most important thing business school taught me was to read
10-Ks - public company annual reports, which are required SEC filings.
Companies reveal who they really are in them, more so than any news
story. ✨🌈This has been your free MBA🌈✨
January 25th 2020
41 Retweets352 Likes
First, I think it’s important to differentiate two things: the privacy
of Apple systems themselves (iCloud, iMessage, the phone), and the
third-party app ecosystem on which the company also relies. The first
is entirely Apple’s responsibility.
Apple started out with the Jobsian premise of being closed ,because
being closed means you can control every aspect. Its corporate
structure was basically just product decisions coming down from on
high.
But when Tim Cook took over the small, sleek systems that Steve had
such a tight grip over, exploded in size. For example, Apple’s employee
numbers [54]have increased exponentially, from 20k to over 100k, since
2008.
This in and of itself makes things hard to manage. There are [55]800
people working on the new iPhone camera alone. Imagine how many moving
pieces that is. Now, add in iMessage. Add in the browser. Look!
[56]This diagram shows how many services are involved, and this is just
for the AUDIO part of the phone. ([57]Remember how complicated Ring is?
Now multiply that by a million.)
So, how many people are working on the iOS ecosystem? Anywhere upwards
of 5,000 (based on a super loose Google search.) The phone itself and
the OS have also grown exponentially more complicated.
And the services Apple is offering are also a lot more diverse. It’s
not just hardware anymore. It’s also software, streaming services, and
peripherals like Watch.
However, Apple is facing [58]immense competition.
The markets for the Company’s products and services are highly
competitive and the Company is confronted by aggressive competition
in all areas of its business.
This means the company has to move quickly and differentiate. It’s
already gotten planned obsolescence down to a science for its current
phone owners:
the Company must continually introduce new products, services and
technologies, enhance existing products and services, effectively
stimulate customer demand for new and upgraded products and services
So it has to lure new phone owners. And what better way to do that than
to play up the privacy angle, something that’s been [59]a growing
concern for consumers? In the[60] GDPR and CCPA era, privacy is a
competitive advantage.
Given all of this, it’s impossible to monitor every single security
threat. So when Apple goofs on a privacy thing, I assume that half of
it was intentional, and half was because a group of project managers
simply can’t oversee all the ways that a privacy setting can go wrong
on a phone connected to the internet.
As [61]Bruce Schneier said, security is really hard. And this is not
even going into all the possible attack vectors that arise when a phone
actively connects to the internet, including GPS tracking, which
affects [62]every phone.
Second, when the app store launched in 2008, there were 500 apps. There
are now over 2 million, and each of them could be tracking user data in
any number of given ways. Apple has to tread a fine line. If it locks
everything down at the phone level, apps would get angry and leave the
platform. If it doesn’t, people get angry. [63]Like YouTube, Apple has
to tread a fine line between being permissive enough and being
cancelled.
The truth of the matter is that any modern cell phone is like a very
data-rich, leaky sieve, constantly giving out information about you in
any number of ways, to any number of parties, without incentives for
companies to reign it in. Which is why Edward Snowden had [64]lawyers
put their phones in the fridge.
Speaking of the NSA, Apple’s finally gotten so big that many
governmental agencies are listening and making demands to get access to
phones. There is the FBI. Then there is China, for whom Apple has
already made a ton of concessions. And now, Apple now has a Russia
problem, too. [65]Russia recently mandated that all cell phones
pre-load software that tells the Russian government what’s up.
In November 2019, Russian parliament passed what’s become known as
the “law against Apple.” The legislation will require all smartphone
devices to preload a host of applications that may provide the
Russian government with a glut of information about its citizens,
including their location, finances, and private communications.
So, here we are, in 2020, with Apple in a bit of a pickle. It’s
becoming so big that it’s not prioritizing security. At the same time,
it needs to advertise privacy as a key differentiator as consumer
tastes change. And, at the same time, it’s about to get canclled by the
FBI, China, and Russia.
And while it’s thinking over all of these things, it’s royally screwing
over the consumer who came in search of a respite from being tracked.
And what is the consumer doing? Well, this one in particular has
[66]limited ad tracking, stopped iCloud backups of messages, and has
resumed her all-encompassing paranoia.
What I’m reading lately:
1. I’m on Python Bytes this week!
[pythonbytes.jpg] Python Bytes Podcast@pythonbytes
Big #python news of the week? Cheating at Kaggle and uWSGI in prod +
more on @pythonbytes with special guest @vboykis and the usual
@mkennedy (cc @brianokken ): [67]Episode #167 Cheating at Kaggle and
uWSGI in prod - [Python Bytes Podcast]Python Bytes podcast delivers
headlines directly to your earbuds.buff.ly
February 3rd 2020
3 Retweets17 Likes
2. Big if True:
[vboykis.jpg] Vicki Boykis@vboykis
OpenAI published that they're moving all of their deep learning work to
PyTorch (from Tensorflow, ostensibly.) It'll be interesting to see how
that impacts the offerings at Azure. Context:
[68]vicki.substack.com/p/i-spent-1-bi…
[https%3A%2F%2Fpbs.substack.com%2Fmedia%2FEPjCsGGWkAk1-WQ.jpg]
January 30th 2020
21 Retweets76 Likes
3. [69]Elon Musk is on SoundCloud
__________________________________________________________________
The Newsletter:
This newsletter is about a different angle on tech news. It goes out
once a week to free subscribers, and once more to paid subscribers. If
you like it, forward it!
Swag: [70]Stickers. [71]Mug. [72]Notepad.
The Author:
I’m a data scientist. Most of my free time is spent wrangling a
preschooler and a baby, reading, and [73]writing bad tweets. Find out
more [74]here or follow me [75]on Twitter.
[76]5
(BUTTON)
Sign up to like post
____________________ (BUTTON) Subscribe
[77]Login[78]Privacy[79]Terms
(BUTTON)
[80]One very bad Apple[81]Why is Apple's commitment to privacy going
down the drain?
[82]Vicki Boykis
Feb 4 [83]5
(BUTTON)
Sign up to like post
____________________ (BUTTON) Subscribe
[84]Login[85]Privacy[86]Terms
Share
[87](BUTTON) Subscribe
[88]← Previous
Ready for more?
____________________ (BUTTON) Subscribe
© 2020 Vicki Boykis. See [89]privacy and [90]terms
[91]Publish on Substack
This site requires JavaScript to run correctly. Please [92]turn on
JavaScript or unblock scripts
References
Visible links
1.
https://vicki.substack.com/feed/
2.
https://vicki.substack.com/
3.
https://vicki.substack.com/about?utm_source=menu-dropdown
4.
https://vicki.substack.com/archive?utm_source=menu-dropdown
5.
https://support.substack.com/hc/en-us?s[email protected]
6.
https://vicki.substack.com/account/login?redirect=/p/one-very-bad-apple&email=&with_password=
7.
https://vicki.substack.com/people/919000
8.
https://vicki.substack.com/people/919000
9. javascript:void(0)
10.
https://vicki.substack.com/account/login?redirect=/p/one-very-bad-apple&email=&with_password=
11.
https://vicki.substack.com/privacy
12.
https://vicki.substack.com/tos
13.
https://vicki.substack.com/p/one-very-bad-apple
14.
https://vicki.substack.com/p/one-very-bad-apple
15.
https://vicki.substack.com/people/919000
16. javascript:void(0)
17.
https://vicki.substack.com/account/login?redirect=/p/one-very-bad-apple&email=&with_password=
18.
https://vicki.substack.com/privacy
19.
https://vicki.substack.com/tos
20.
https://www.goodreads.com/book/show/13325079-billy-lynn-s-long-halftime-walk
21.
https://www.goodreads.com/quotes/665107-just-because-you-re-paranoid-doesn-t-mean-they-aren-t-after-you
22.
https://www.nytimes.com/2016/02/21/technology/apple-sees-value-in-privacy-vow.html
23.
https://us.norton.com/internetsecurity-mobile-android-vs-ios-which-is-more-secure.html
24.
https://www.wired.com/story/the-time-tim-cook-stood-his-ground-against-fbi/
25.
https://www.apple.com/customer-letter/
26.
https://nypost.com/2018/04/03/why-microsoft-and-apple-dont-need-to-sell-your-data/
27.
https://www.nbcnews.com/tech/tech-news/apple-ceo-tim-cook-slams-facebook-privacy-human-right-it-n860816
28.
https://www.reuters.com/article/us-apple-encryption-privacy-insight/apple-privacy-czars-grapple-with-internal-conflicts-over-user-data-idUSKCN0WN0BO
29.
https://machinelearning.apple.com/2017/12/06/learning-with-privacy-at-scale.html
30.
https://machinelearning.apple.com/2017/12/06/learning-with-privacy-at-scale.html#DMNS06
31.
http://pinboard.in/
32.
https://idlewords.com/talks/haunted_by_data.htm
33.
https://idlewords.com/talks/website_obesity.htm
34.
https://idlewords.com/talks/build_a_better_monster.htm
35.
https://idlewords.com/2019/08/a_walk_in_hong_kong.htm
36.
https://idlewords.com/2019/08/who_should_secure_congressional_campaigns.htm
37.
https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_garman.pdf
38.
https://twitter.com/matthew_d_green
39.
https://www.theverge.com/2019/7/26/8932064/apple-siri-private-conversation-recording-explanation-alexa-google-assistant
40.
https://vicki.substack.com/p/id-do-anything-for-tech-but-i-wont
41.
https://support.apple.com/en-us/HT202074
42.
https://www.washingtonpost.com/technology/2019/05/28/its-middle-night-do-you-know-who-your-iphone-is-talking/
43.
https://www.washingtonpost.com/technology/2019/01/07/apple-burns-google-giant-billboard-touting-privacy-ces/?utm_term=.098a6ad77172&tid=lk_inline_manual_11
44.
https://www.theverge.com/2019/4/22/18511148/apple-icloud-cloud-services-amazon-aws-30-million-per-month
45.
https://arxiv.org/ftp/arxiv/papers/2001/2001.07421.pdf
46.
https://arxiv.org/pdf/2001.07421.pdf
47.
https://www.reuters.com/article/us-apple-fbi-icloud-exclusive/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sources-idUSKBN1ZK1CT
48.
https://abcnews.go.com/Business/wireStory/fbi-asks-apple-phone-data-saudi-shooting-suspect-68152458
49.
https://thenextweb.com/apple/2020/01/23/the-fbi-is-cracking-iphone-11s-without-apples-help-so-why-does-it-need-a-backdoor/
50.
https://vicki.substack.com/p/edward-snowden-and-our-great-cross
51.
https://9to5mac.com/2019/10/10/apples-relationship-with-china/
52.
https://www.youtube-nocookie.com/embed/A_6uV9A12ok?rel=0&autoplay=0&showinfo=0
53.
https://www.macworld.com/article/3331597/apple-privacy-billboard.html
54.
https://dazeinfo.com/2019/09/28/number-of-apple-employees-worldwide-graphfarm/
55.
https://www.theverge.com/2015/12/20/10631330/iphone-camera-team-800-people
56.
https://developer.apple.com/library/archive/documentation/MusicAudio/Conceptual/CoreAudioOverview/WhatisCoreAudio/WhatisCoreAudio.html
57.
https://vicki.substack.com/p/good-rings-dont-scale
58.
https://d18rn0p25nwr6d.cloudfront.net/CIK-0000320193/1a919118-a594-44f3-92f0-4ecca47b1a7d.pdf
59.
https://www2.deloitte.com/content/dam/Deloitte/us/Documents/consumer-business/us-retail-privacy-survey-2019.pdf
60.
https://vicki.substack.com/p/logs-were-our-lifeblood-now-theyre
61.
https://www.schneier.com/blog/archives/2018/11/ios_121_vulnera.html
62.
https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html
63.
https://vicki.substack.com/p/the-reign-of-big-recsys
64.
https://thelede.blogs.nytimes.com/2013/06/25/why-snowdens-visitors-put-their-phones-in-the-fridge/
65.
https://www.fastcompany.com/90456530/apple-has-a-vladimir-putin-problem
66.
https://www.groovypost.com/howto/reset-your-ad-tracking-id-on-your-android-or-ios-device/
67.
https://buff.ly/2GU57gU
68.
https://vicki.substack.com/p/i-spent-1-billion-and-all-i-got-was
69.
https://www.bloomberg.com/opinion/authors/ARbTQlRLRjE/matthew-s-levine
70.
https://normcore-tech.myshopify.com/
71.
https://www.redbubble.com/people/veekaybee/works/43009292-untitled?p=mug&style=standard&asc=u
72.
http://www.redbubble.com/people/veekaybee/works/43009292-untitled?p=spiral-notebook&asc=u
73.
https://twitter.com/vboykis/status/1077024069126668289
74.
http://vickiboykis.com/
75.
https://twitter.com/vboykis
76. javascript:void(0)
77.
https://vicki.substack.com/account/login?redirect=/p/one-very-bad-apple&email=&with_password=
78.
https://vicki.substack.com/privacy
79.
https://vicki.substack.com/tos
80.
https://vicki.substack.com/p/one-very-bad-apple
81.
https://vicki.substack.com/p/one-very-bad-apple
82.
https://vicki.substack.com/people/919000
83. javascript:void(0)
84.
https://vicki.substack.com/account/login?redirect=/p/one-very-bad-apple&email=&with_password=
85.
https://vicki.substack.com/privacy
86.
https://vicki.substack.com/tos
87.
https://vicki.substack.com/subscribe?utm_campaign=button-below-meta
88.
https://vicki.substack.com/p/apples-memoji-and-the-uncanny-valley
89.
https://vicki.substack.com/privacy
90.
https://vicki.substack.com/tos
91.
https://substack.com/about?utm_source=substack&utm_medium=web&utm_content=footer
92.
https://enable-javascript.com/
Hidden links:
94.
https://vicki.substack.com/p/one-very-bad-apple/comments
95. javascript:void(0)
96.
https://vicki.substack.com/p/one-very-bad-apple/comments
97.
https://cdn.substack.com/image/fetch/c_limit,f_auto,q_auto:good/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F494297ae-d861-418e-81bf-d667ea881999_764x900.png
98.
https://twitter.com/JohnDCook/status/1222906075898437634
99.
https://cdn.substack.com/image/fetch/c_limit,f_auto,q_auto:good/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4acb701-a77a-46d9-ac84-6ffe02479570_984x278.png
100.
https://twitter.com/Pinboard/status/800078389163872256
101.
https://twitter.com/lukolejnik/status/1219873289230856198?s=21
102.
https://twitter.com/vboykis/status/1221080347611488256
103.
https://cdn.substack.com/image/fetch/c_limit,f_auto,q_auto:good/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F100fc06d-1ead-4614-944c-60c034d9ddce_620x604.jpeg
104.
https://cdn.substack.com/image/fetch/c_limit,f_auto,q_auto:good/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0f2002b8-54b9-472f-99ba-02faeadd1828_1068x801.png
105.
https://twitter.com/pythonbytes/status/1224378404490948609
106.
https://twitter.com/vboykis/status/1222941367225212928
107.
https://vicki.substack.com/p/one-very-bad-apple/comments
108. javascript:void(0)
109.
https://vicki.substack.com/p/one-very-bad-apple/comments