#[1]Normcore Tech

  [2]Normcore Tech Normcore Tech
  (BUTTON) Subscribe (BUTTON)
    * [3]About
    * [4]Archive
    * [5]Help
    * [6]Sign in

One very bad Apple

Why is Apple's commitment to privacy going down the drain?

  [7][https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.ama
  zonaws.com%2Fpublic%2Fimages%2Ff5f0220a-eaa9-474c-8017-696fadd92d53_400
  x400.jpeg]
  [8]Vicki Boykis
  Feb 4 [9]5
  (BUTTON)

Sign up to like post

  ____________________ (BUTTON) Subscribe
  [10]Login[11]Privacy[12]Terms
  (BUTTON)
  [13]One very bad Apple[14]Why is Apple's commitment to privacy going
  down the drain?
  [15]Vicki Boykis
  Feb 4 [16]5
  (BUTTON)

Sign up to like post

  ____________________ (BUTTON) Subscribe
  [17]Login[18]Privacy[19]Terms

Share

  Art: Apple Gatherers, Camille Pissaro, 1891

  My fifth grade teacher, Mr. Stains, had a big energy about him. He
  imparted two American cultural norms upon me. First, he taught me about
  the religion of American football. (If you’re also interested in
  learning more, I recommend [20]Billy Lynn’s Long Halftime Walk.)   And
  second, he taught me about bumper stickers. He loved collecting them,
  and had a bunch tacked up on his bulletin board.

  One of his favorites was, “Just because you’re paranoid, doesn’t mean
  they’re not out to get you, because they are.”  The phrase has lately
  turned from a funny school memory, into a jaded way of viewing a world
  that’s stacked against the end-consumer.  Which is probably what Joseph
  Heller intended when he originally wrote [21]Catch-22.

  Bugs don’t get through closed windows

  Recently, I’ve been thinking about this phrase in the context of
  Apple’s “commitment to privacy.”

  Apple has always made a marketing pitch that it was the most secure
  platform. This all started with Steve Jobs, who was famously obsessive
  about having complete control over every aspect of the hardware and
  software.
  [JohnDCook.jpg] John D. Cook@JohnDCook
  From Walter Isaacson's biography of Steve Jobs: The architects wanted
  the windows to open. Jobs said no. He had never liked the idea of
  people being able to open things. ‘That would just allow people to
  screw things up.”

  January 30th 2020
  4 Retweets25 Likes

   Apple [22]started this process early on.

    By late 2013, when Apple released its iOS 7 system, the company was
    encrypting by default all third-party data stored on customers’
    phones.

  [23]Since Apple is closed, it’s harder for hackers to get in. Security
  also means that Apple itself can’t reverse-engineer the code to see
  underlying messages.

  The Apple of my FBI

  This theory was put to a horrific stress test in 2015, when two
  shooters killed 15 people and injured 22 in San Bernardino, California.
  The shooters were killed in a shoot-out, and the police recovered three
  phones from the crime scene. One of them, the shooter’s work phone, was
  still in-tact, and locked with a numeric passcode. In the aftermath,
  the shooting was declared act of terrorism. As a result, the federal
  government wanted to get involved.

  In 2016, the FBI asked Apple to unlock the phone. Apple [24]did not
  want to unlock the phone.

    The iPhone was locked with a four-digit passcode that the FBI had
    been unable to crack. The FBI wanted Apple to create a special
    version of iOS that would accept an unlimited combination of
    passwords electronically, until the right one was found. The new iOS
    could be side-loaded onto the iPhone, leaving the data intact.

    But Apple had refused. Cook and his team were convinced that a new
    unlocked version of iOS would be very, very dangerous.

  After thinking on the issue with a small group, at 4:30 in the morning,
  [25]Tim Apple released a statement that talked about the vital need for
  encryption, and the threat against data security that the FBI’s request
  had resulted in.

    Specifically, the FBI wants us to make a new version of the iPhone
    operating system, circumventing several important security features,
    and install it on an iPhone recovered during the investigation. In
    the wrong hands, this software — which does not exist today — would
    have the potential to unlock any iPhone in someone’s physical
    possession.

    The FBI may use different words to describe this tool, but make no
    mistake: Building a version of iOS that bypasses security in this
    way would undeniably create a backdoor. And while the government may
    argue that its use would be limited to this case, there is no way to
    guarantee such control.

  The Apple of my iMessage

  This was perhaps the first time I heard any large company CEO talking
  about privacy and actually putting his money where his mouth was. I was
  super impressed. That year, I switched over to the iPhone.

  With everything I read after that, I became reassured,[26] both by
  Apple and by third-party commentators, that Apple had no interest in
  anything except user privacy, because they didn’t need to sell data.

  [27]Tim said so.

    The truth is we could make a ton of money if we monetized our
    customer, if our customer was our product," Cook said. "We’ve
    elected not to do that.""Privacy to us is a human right. It's a
    civil liberty, and something that is unique to America. This is like
    freedom of speech and freedom of the press," Cook said. "Privacy is
    right up there with that for us.

  And if I didn’t believe Tim, there were his[28] privacy czars.

    Indeed, any collection of Apple customer data requires sign-off from
    a committee of three “privacy czars” and a top executive, according
    to four former employees who worked on a variety of products that
    went through privacy vetting.

    Approval is anything but automatic: products including the Siri
    voice-command feature and the recently scaled-back iAd advertising
    network were restricted over privacy concerns, these people said.

  And if I didn’t believe Tim and the privacy czars, in 2016 Apple’s
  machine learning teams started talking publicly about the
  [29]differential privacy they were working on.

  Differential privacy is the practice of adding enough fake data, or
  noise, to a given machine learning algorithm that you can  no longer
  tie back data to individuals, but it still allows ML predictions to
  work. Combined with federated privacy, where machine learning models
  are trained and run directly on the mobile device without directly
  connecting to Apple’s server, differential privacy results in really
  good, strong privacy.

    Differential privacy[30] [2] provides a mathematically rigorous
    definition of privacy and is one of the strongest guarantees of
    privacy available. It is rooted in the idea that carefully
    calibrated noise can mask a user’s data. When many people submit
    data, the noise that has been added averages out and meaningful
    information emerges.

  But trusting a company is one thing. Trusting an independent person
  that you yourself trust is another. And Maciej Cegłowski said he
  trusted Apple.

  Maciej runs [31]Pinboard. He’s written essays that I’ve linked to so
  many times that I should be giving him royalties. Some of my favorites
  include [32]Haunted by Data, the [33]Website Obesity Crisis, and
  [34]Build a Better Monster, which I saw him deliver live in Philly.
  Right now he’s in Hong Kong doing [35]some of the best reporting on the
  protests, in spite of the fact that he is not a journalist.

  In 2017, Macjiei started [36]working with political campaigns and
  journalists on securing their devices. He’s since advocated many times
  for people to use iPhones.
  [Pinboard.jpg] Pinboard@Pinboard
  @buzigde it’s not a joke. I think a 5 or later iPhone is the safest
  piece of phone hardware you can use right now. cc /@tqbf for
  corrections

  November 19th 2016
  1 Retweet7 Likes

  So, if Tim, the developers, the data scientists, the journalists, and
  Maciej were all telling me that I should use an Apple phone, I was
  going to use an Apple phone.

  Doubts

  And things were great for a year or so. But then, the paranoia started
  creeping in.

  First, cryptographers were not really happy with the way iMessages were
  encrypted. In 2016, they[37] wrote a paper about ways you could exploit
  iMessage.

    In this paper, we conduct a thorough analysis of iMessage to
    determine the security of the protocol against a variety of attacks.
    Our analysis shows that iMessage has significant vulnerabilities
    that can be exploited by a sophisticated attacker. The practical
    implication of these attacks is that any party who gains access to
    iMessage ciphertexts may potentially decrypt them remotely and after
    the fact.

  The researchers, including [38]Matthew Green, went on to say,

    “Our main recommendation is that Apple should replace the entirety
    of iMessage with a messaging system that has been properly designed
    and formally verified. "

  That sounds serious? But I’m not a cryptography expert. So I let that
  one slide.

  Then, there were reports that Apple contractors [39]were listening to
  Siri.

    According to that contractor, Siri interactions are sent to workers,
    who listen to the recording and are asked to grade it for a variety
    of factors, like whether the request was intentional or a false
    positive that accidentally triggered Siri, or if the response was
    helpful.

  But I have never, ever [40]turned on Siri, and the reports said that
  Apple anonymized the commands. I let it slide.

  Then, there was the story that you[41] still had to opt out of ad
  tracking on your iPhone because [42]third-party apps were collecting
  stuff about you.

    You might assume you can count on Apple to sweat all the privacy
    details. After all, it [43]touted in a recent ad, “What happens on
    your iPhone stays on your iPhone.” My investigation suggests
    otherwise.

    iPhone apps I discovered tracking me by passing information to third
    parties — just while I was asleep — include Microsoft OneDrive,
    Intuit’s Mint, Nike, Spotify, The Washington Post and IBM’s The
    Weather Channel. One app, the crime-alert service Citizen, shared
    personally identifiable information in violation of its published
    privacy policy.

  Then, there were reports that Apple was running [44]part of iCloud on
  AWS, a move that is fraught with its own security considerations and
  implications, not the least of which is that Apple is trusting a
  significant part of its infrastructure to a competitor.

  Then, there was the paper put out (by Google, but still) about how
  Apple’s intelligent tracking protection on Safari[45] leaks data.
  [lukOlejnik.jpg] Lukasz Olejnik@lukOlejnik
  Apple/Safari Intelligent Tracking Prevention is a mechanism intended to
  improve privacy. It was found to have privacy vulnerabilities allowing
  sites to track the user (and fingerprint), and to stealing web browser
  history of a user. Incredible find. [46]arxiv.org/pdf/2001.07421…
  [https%3A%2F%2Fpbs.substack.com%2Fmedia%2FEO3cSX7W4AAPlgO.png]
  [https%3A%2F%2Fpbs.substack.com%2Fmedia%2FEO3cSX7X4AAT9Vf.jpg]
  [https%3A%2F%2Fpbs.substack.com%2Fmedia%2FEO3cSX6WkAATX6H.jpg]

  January 22nd 2020
  177 Retweets329 Likes

  Then, the last straw this January, when it was revealed that [47]Apple
  was not encrypting iCloud backups, at the request of the FBI.  And,
  Apple is again facing pressure from as the FBI is again asking it to
  hand over phones, related to another shooting that happened this
  January [48]in Florida.

  And, finally, whatever happened to the 5C iPhone that Tim Apple so
  valiantly fought the FBI for? The government [49]was able to backdoor
  into it anyway, without Apple’s help.

  Why, Apple, why?

  In theory, we should all be very, very mad at Apple, who is playing in
  a big game of [50]cross-hatch.

  At the same time that it is giving over unencrypted data to
  governments, [51]has a big presence in China by doing what the Chinese
  government asks it to do, and allowing targeted advertising, it’s doing
  an enormous pro-privacy advertising campaign.

  Just look at this:

  IFRAME:
  [52]https://www.youtube-nocookie.com/embed/A_6uV9A12ok?rel=0&autoplay=0
  &showinfo=0

  And [53]look at this ad that it put up at CES in Las Vegas this year, a
  trade show which it hasn’t even attended as a vendor in years.

  What’s up

  All we have to do is look at the workhorse models of Normcorian
  analysis: Apple’s history, its 10-K forms, and systems theory.
  [vboykis.jpg] Vicki Boykis@vboykis
  Probably the most important thing business school taught me was to read
  10-Ks - public company annual reports, which are required SEC filings.
  Companies reveal who they really are in them, more so than any news
  story. ✨🌈This has been your free MBA🌈✨

  January 25th 2020
  41 Retweets352 Likes

  First, I think it’s important to differentiate two things: the privacy
  of Apple systems themselves (iCloud, iMessage, the phone), and the
  third-party app ecosystem on which the company also relies. The first
  is entirely Apple’s responsibility.

  Apple started out with the Jobsian premise of being closed ,because
  being closed means you can control every aspect. Its corporate
  structure was basically just product decisions coming down from on
  high.

  But when Tim Cook took over the small, sleek systems that Steve had
  such a tight grip over, exploded in size. For example, Apple’s employee
  numbers [54]have increased exponentially, from 20k to over 100k, since
  2008.

  This in and of itself makes things hard to manage. There are [55]800
  people working on the new iPhone camera alone. Imagine how many moving
  pieces that is. Now, add in iMessage. Add in the browser. Look!
  [56]This diagram shows how many services are involved, and this is just
  for the AUDIO part of the phone. ([57]Remember how complicated Ring is?
  Now multiply that by a million.)

  So, how many people are working on the iOS ecosystem? Anywhere upwards
  of 5,000 (based on a super loose Google search.) The phone itself and
  the OS have also grown exponentially more complicated.

  And the services Apple is offering are also a lot more diverse. It’s
  not just hardware anymore. It’s also software, streaming services, and
  peripherals like Watch.

  However, Apple is facing [58]immense competition.

    The markets for the Company’s products and services are highly
    competitive and the Company is confronted by aggressive competition
    in all areas of its business.

  This means the company has to move quickly and differentiate. It’s
  already gotten planned obsolescence down to a science for its current
  phone owners:

    the Company must continually introduce new products, services and
    technologies, enhance existing products and services, effectively
    stimulate customer demand for new and upgraded products and services

  So it has to lure new phone owners. And what better way to do that than
  to play up the privacy angle, something that’s been [59]a growing
  concern for consumers? In the[60] GDPR and CCPA era, privacy is a
  competitive advantage.

  Given all of this, it’s impossible to monitor every single security
  threat. So when Apple goofs on a privacy thing, I assume that half of
  it was intentional, and half was because a group of project managers
  simply can’t oversee all the ways that a privacy setting can go wrong
  on a phone connected to the internet.

  As [61]Bruce Schneier said, security is really hard. And this is not
  even going into all the possible attack vectors that arise when a phone
  actively connects to the internet, including GPS tracking, which
  affects [62]every phone.

  Second, when the app store launched in 2008, there were 500 apps. There
  are now over 2 million, and each of them could be tracking user data in
  any number of given ways. Apple has to tread a fine line. If it locks
  everything down at the phone level, apps would get angry and leave the
  platform. If it doesn’t, people get angry. [63]Like YouTube, Apple has
  to tread a fine line between being permissive enough and being
  cancelled.

  The truth of the matter is that any modern cell phone is like a very
  data-rich, leaky sieve, constantly giving out information about you in
  any number of ways, to any number of parties, without incentives for
  companies to reign it in. Which is why Edward Snowden had [64]lawyers
  put their phones in the fridge.

  Speaking of the NSA, Apple’s finally gotten so big that many
  governmental agencies are listening and making demands to get access to
  phones. There is the FBI. Then there is China, for whom Apple has
  already made a ton of concessions.  And now, Apple now has a Russia
  problem, too. [65]Russia recently mandated that all cell phones
  pre-load software that tells the Russian government what’s up.

    In November 2019, Russian parliament passed what’s become known as
    the “law against Apple.” The legislation will require all smartphone
    devices to preload a host of applications that may provide the
    Russian government with a glut of information about its citizens,
    including their location, finances, and private communications.

  So, here we are, in 2020, with Apple in a bit of a pickle. It’s
  becoming so big that it’s not prioritizing security. At the same time,
  it needs to advertise privacy as a key differentiator as consumer
  tastes change. And, at the same time, it’s about to get canclled by the
  FBI, China, and Russia.

  And while it’s thinking over all of these things, it’s royally screwing
  over the consumer who came in search of a respite from being tracked.
  And what is the consumer doing? Well, this one in particular has
  [66]limited ad tracking, stopped iCloud backups of messages, and has
  resumed her all-encompassing paranoia.

  What I’m reading lately:
   1. I’m on Python Bytes this week!

  [pythonbytes.jpg] Python Bytes Podcast@pythonbytes
  Big #python news of the week? Cheating at Kaggle and uWSGI in prod +
  more on @pythonbytes with special guest @vboykis and the usual
  @mkennedy (cc @brianokken ): [67]Episode #167 Cheating at Kaggle and
  uWSGI in prod - [Python Bytes Podcast]Python Bytes podcast delivers
  headlines directly to your earbuds.buff.ly

  February 3rd 2020
  3 Retweets17 Likes
   2. Big if True:

  [vboykis.jpg] Vicki Boykis@vboykis
  OpenAI published that they're moving all of their deep learning work to
  PyTorch (from Tensorflow, ostensibly.) It'll be interesting to see how
  that impacts the offerings at Azure. Context:
  [68]vicki.substack.com/p/i-spent-1-bi…
  [https%3A%2F%2Fpbs.substack.com%2Fmedia%2FEPjCsGGWkAk1-WQ.jpg]

  January 30th 2020
  21 Retweets76 Likes
   3. [69]Elon Musk is on SoundCloud
    __________________________________________________________________

  The Newsletter:

  This newsletter is about a different angle on tech news. It goes out
  once a week to free subscribers, and once more to paid subscribers. If
  you like it, forward it!

  Swag: [70]Stickers. [71]Mug. [72]Notepad.

  The Author:
  I’m a data scientist. Most of my free time is spent wrangling a
  preschooler and a baby, reading, and [73]writing bad tweets. Find out
  more [74]here or follow me [75]on Twitter.
  [76]5
  (BUTTON)

Sign up to like post

  ____________________ (BUTTON) Subscribe
  [77]Login[78]Privacy[79]Terms
  (BUTTON)
  [80]One very bad Apple[81]Why is Apple's commitment to privacy going
  down the drain?
  [82]Vicki Boykis
  Feb 4 [83]5
  (BUTTON)

Sign up to like post

  ____________________ (BUTTON) Subscribe
  [84]Login[85]Privacy[86]Terms

Share

  [87](BUTTON) Subscribe
  [88]← Previous

Ready for more?

  ____________________ (BUTTON) Subscribe
  © 2020 Vicki Boykis. See [89]privacy and [90]terms
  [91]Publish on Substack

  This site requires JavaScript to run correctly. Please [92]turn on
  JavaScript or unblock scripts

References

  Visible links
  1. https://vicki.substack.com/feed/
  2. https://vicki.substack.com/
  3. https://vicki.substack.com/about?utm_source=menu-dropdown
  4. https://vicki.substack.com/archive?utm_source=menu-dropdown
  5. https://support.substack.com/hc/en-us?s[email protected]
  6. https://vicki.substack.com/account/login?redirect=/p/one-very-bad-apple&email=&with_password=
  7. https://vicki.substack.com/people/919000
  8. https://vicki.substack.com/people/919000
  9. javascript:void(0)
 10. https://vicki.substack.com/account/login?redirect=/p/one-very-bad-apple&email=&with_password=
 11. https://vicki.substack.com/privacy
 12. https://vicki.substack.com/tos
 13. https://vicki.substack.com/p/one-very-bad-apple
 14. https://vicki.substack.com/p/one-very-bad-apple
 15. https://vicki.substack.com/people/919000
 16. javascript:void(0)
 17. https://vicki.substack.com/account/login?redirect=/p/one-very-bad-apple&email=&with_password=
 18. https://vicki.substack.com/privacy
 19. https://vicki.substack.com/tos
 20. https://www.goodreads.com/book/show/13325079-billy-lynn-s-long-halftime-walk
 21. https://www.goodreads.com/quotes/665107-just-because-you-re-paranoid-doesn-t-mean-they-aren-t-after-you
 22. https://www.nytimes.com/2016/02/21/technology/apple-sees-value-in-privacy-vow.html
 23. https://us.norton.com/internetsecurity-mobile-android-vs-ios-which-is-more-secure.html
 24. https://www.wired.com/story/the-time-tim-cook-stood-his-ground-against-fbi/
 25. https://www.apple.com/customer-letter/
 26. https://nypost.com/2018/04/03/why-microsoft-and-apple-dont-need-to-sell-your-data/
 27. https://www.nbcnews.com/tech/tech-news/apple-ceo-tim-cook-slams-facebook-privacy-human-right-it-n860816
 28. https://www.reuters.com/article/us-apple-encryption-privacy-insight/apple-privacy-czars-grapple-with-internal-conflicts-over-user-data-idUSKCN0WN0BO
 29. https://machinelearning.apple.com/2017/12/06/learning-with-privacy-at-scale.html
 30. https://machinelearning.apple.com/2017/12/06/learning-with-privacy-at-scale.html#DMNS06
 31. http://pinboard.in/
 32. https://idlewords.com/talks/haunted_by_data.htm
 33. https://idlewords.com/talks/website_obesity.htm
 34. https://idlewords.com/talks/build_a_better_monster.htm
 35. https://idlewords.com/2019/08/a_walk_in_hong_kong.htm
 36. https://idlewords.com/2019/08/who_should_secure_congressional_campaigns.htm
 37. https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_garman.pdf
 38. https://twitter.com/matthew_d_green
 39. https://www.theverge.com/2019/7/26/8932064/apple-siri-private-conversation-recording-explanation-alexa-google-assistant
 40. https://vicki.substack.com/p/id-do-anything-for-tech-but-i-wont
 41. https://support.apple.com/en-us/HT202074
 42. https://www.washingtonpost.com/technology/2019/05/28/its-middle-night-do-you-know-who-your-iphone-is-talking/
 43. https://www.washingtonpost.com/technology/2019/01/07/apple-burns-google-giant-billboard-touting-privacy-ces/?utm_term=.098a6ad77172&tid=lk_inline_manual_11
 44. https://www.theverge.com/2019/4/22/18511148/apple-icloud-cloud-services-amazon-aws-30-million-per-month
 45. https://arxiv.org/ftp/arxiv/papers/2001/2001.07421.pdf
 46. https://arxiv.org/pdf/2001.07421.pdf
 47. https://www.reuters.com/article/us-apple-fbi-icloud-exclusive/exclusive-apple-dropped-plan-for-encrypting-backups-after-fbi-complained-sources-idUSKBN1ZK1CT
 48. https://abcnews.go.com/Business/wireStory/fbi-asks-apple-phone-data-saudi-shooting-suspect-68152458
 49. https://thenextweb.com/apple/2020/01/23/the-fbi-is-cracking-iphone-11s-without-apples-help-so-why-does-it-need-a-backdoor/
 50. https://vicki.substack.com/p/edward-snowden-and-our-great-cross
 51. https://9to5mac.com/2019/10/10/apples-relationship-with-china/
 52. https://www.youtube-nocookie.com/embed/A_6uV9A12ok?rel=0&autoplay=0&showinfo=0
 53. https://www.macworld.com/article/3331597/apple-privacy-billboard.html
 54. https://dazeinfo.com/2019/09/28/number-of-apple-employees-worldwide-graphfarm/
 55. https://www.theverge.com/2015/12/20/10631330/iphone-camera-team-800-people
 56. https://developer.apple.com/library/archive/documentation/MusicAudio/Conceptual/CoreAudioOverview/WhatisCoreAudio/WhatisCoreAudio.html
 57. https://vicki.substack.com/p/good-rings-dont-scale
 58. https://d18rn0p25nwr6d.cloudfront.net/CIK-0000320193/1a919118-a594-44f3-92f0-4ecca47b1a7d.pdf
 59. https://www2.deloitte.com/content/dam/Deloitte/us/Documents/consumer-business/us-retail-privacy-survey-2019.pdf
 60. https://vicki.substack.com/p/logs-were-our-lifeblood-now-theyre
 61. https://www.schneier.com/blog/archives/2018/11/ios_121_vulnera.html
 62. https://www.nytimes.com/interactive/2019/12/19/opinion/location-tracking-cell-phone.html
 63. https://vicki.substack.com/p/the-reign-of-big-recsys
 64. https://thelede.blogs.nytimes.com/2013/06/25/why-snowdens-visitors-put-their-phones-in-the-fridge/
 65. https://www.fastcompany.com/90456530/apple-has-a-vladimir-putin-problem
 66. https://www.groovypost.com/howto/reset-your-ad-tracking-id-on-your-android-or-ios-device/
 67. https://buff.ly/2GU57gU
 68. https://vicki.substack.com/p/i-spent-1-billion-and-all-i-got-was
 69. https://www.bloomberg.com/opinion/authors/ARbTQlRLRjE/matthew-s-levine
 70. https://normcore-tech.myshopify.com/
 71. https://www.redbubble.com/people/veekaybee/works/43009292-untitled?p=mug&style=standard&asc=u
 72. http://www.redbubble.com/people/veekaybee/works/43009292-untitled?p=spiral-notebook&asc=u
 73. https://twitter.com/vboykis/status/1077024069126668289
 74. http://vickiboykis.com/
 75. https://twitter.com/vboykis
 76. javascript:void(0)
 77. https://vicki.substack.com/account/login?redirect=/p/one-very-bad-apple&email=&with_password=
 78. https://vicki.substack.com/privacy
 79. https://vicki.substack.com/tos
 80. https://vicki.substack.com/p/one-very-bad-apple
 81. https://vicki.substack.com/p/one-very-bad-apple
 82. https://vicki.substack.com/people/919000
 83. javascript:void(0)
 84. https://vicki.substack.com/account/login?redirect=/p/one-very-bad-apple&email=&with_password=
 85. https://vicki.substack.com/privacy
 86. https://vicki.substack.com/tos
 87. https://vicki.substack.com/subscribe?utm_campaign=button-below-meta
 88. https://vicki.substack.com/p/apples-memoji-and-the-uncanny-valley
 89. https://vicki.substack.com/privacy
 90. https://vicki.substack.com/tos
 91. https://substack.com/about?utm_source=substack&utm_medium=web&utm_content=footer
 92. https://enable-javascript.com/

  Hidden links:
 94. https://vicki.substack.com/p/one-very-bad-apple/comments
 95. javascript:void(0)
 96. https://vicki.substack.com/p/one-very-bad-apple/comments
 97. https://cdn.substack.com/image/fetch/c_limit,f_auto,q_auto:good/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F494297ae-d861-418e-81bf-d667ea881999_764x900.png
 98. https://twitter.com/JohnDCook/status/1222906075898437634
 99. https://cdn.substack.com/image/fetch/c_limit,f_auto,q_auto:good/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2Fb4acb701-a77a-46d9-ac84-6ffe02479570_984x278.png
100. https://twitter.com/Pinboard/status/800078389163872256
101. https://twitter.com/lukolejnik/status/1219873289230856198?s=21
102. https://twitter.com/vboykis/status/1221080347611488256
103. https://cdn.substack.com/image/fetch/c_limit,f_auto,q_auto:good/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F100fc06d-1ead-4614-944c-60c034d9ddce_620x604.jpeg
104. https://cdn.substack.com/image/fetch/c_limit,f_auto,q_auto:good/https%3A%2F%2Fbucketeer-e05bbc84-baa3-437e-9518-adb32be77984.s3.amazonaws.com%2Fpublic%2Fimages%2F0f2002b8-54b9-472f-99ba-02faeadd1828_1068x801.png
105. https://twitter.com/pythonbytes/status/1224378404490948609
106. https://twitter.com/vboykis/status/1222941367225212928
107. https://vicki.substack.com/p/one-very-bad-apple/comments
108. javascript:void(0)
109. https://vicki.substack.com/p/one-very-bad-apple/comments