Skip to content
Thoughtful, detailed coverage of everything Apple for 33 years
and the TidBITS Content Network for Apple professionals
Show excerpts

#1414: Cloudflare and Quad9 DNS, MacBook Pro battery replacements, TidBITS in Apple News

Apple has started a battery replacement program for certain non-Touch Bar 13-inch MacBook Pro units. Adam Engst has the details, along with instructions on how we’re now publishing TidBITS in Apple News Format for optimal display in the iOS News app. Glenn Fleishman joins us with a detailed look at the new DNS services from Cloudflare and Quad9 that could provide enhanced performance, security, and privacy. Finally, don’t miss our extensive collection of ExtraBITS — lots of interesting things happened last week. Notable software releases include iMovie 10.1.9, Things 3.5, Typinator 7.5, BusyContacts 1.2.11, Default Folder X 5.2.4, and ChronoSync 4.8.6.

Adam Engst 1 comment

Apple to Replace Faulty Batteries in Non-Touch Bar 13-Inch MacBook Pros

Apple has launched a battery replacement program for certain non-Touch Bar models of the 13-inch MacBook Pro whose batteries may expand following a component failure.

The problem doesn’t appear to be widespread based on online reports, but it can be quite severe, to judge from photos by wwwebtech on the MacRumors forums.

MacBook Pro with expanded battery

To see if your MacBook Pro may be affected, enter your serial number into the field on the replacement program’s page. If it’s covered, you can get the battery replaced at an Apple Authorized Service Provider or an Apple Retail Store, or by sending it to the Apple Repair Center.

Regarding related damage, Apple says:

If your 13-inch MacBook Pro has any damage which impairs the replacement of the battery, that issue will need to be resolved prior to the battery replacement. In some cases, there may be a cost associated with the repair.

However, the user whose MacBook Pro is pictured above reported that while Apple initially said he would be charged, the company later dropped all fees. If you’re seeing this expansion now, I suspect the repair will be free (and if it’s not, push back). Anyone who has already paid to replace the battery or have a MacBook Pro repaired because of this problem should contact Apple for a refund.

Adam Engst 20 comments

How to Read TidBITS in Apple News

In iOS 9, Apple introduced Apple News and its associated News app as a replacement for Newsstand (see “The News about News in iOS 9,” 30 September 2015). News was more of a traditional RSS reader, although Apple also eventually gave publishers more control over the display of their articles with the proprietary Apple News Format. The company has yet to bring the News app to the Mac, although perhaps we’ll see that in conjunction with whatever news service results from Apple’s purchase of Texture (see “Apple Acquires the Digital Magazine Service Texture,” 12 March 2018).

Before I get into how you can read TidBITS in Apple News, I’d like to run a quick survey — how often do you use the News app? We have a few hundred responses already, and we’ll report on the results next week.

For those who are already using the News app, I’m pleased to say that TidBITS is now available in Apple News via the Apple News Format, so our articles look better than ever before on both the iPhone and iPad, as you can see in these screenshots.

iPhone screenshots of Apple News headline and article screens

Screenshot of Apple News on the iPad

I hope providing our articles in Apple News Format will expose TidBITS to more people who are interested in Apple technology, but I have no idea if that will happen or even if we’ll be able to tell.

In the meantime, if you use the News app, you can easily add TidBITS to your Following list, which makes it directly available and should include TidBITS articles with everything else you see in For You.

The easiest way to do this is to click this link while reading on your iPhone or iPad. That’s the same as going to tidbits.com in Safari and tapping Get TidBITS > Apple News. (On the iPhone, tap the ellipsis button to the right of the logo, scroll down in the menu, and tap Apple News.) Either way, you’ll be sent to the TidBITS channel in the News app. Tap the heart icon in the upper right to follow TidBITS.

Screenshot of how to follow TidBITS on Apple News

Alternatively, you can follow these steps within the News app:

  1. Tap Following in the toolbar at the bottom of the News app to bring up the Following screen.
  2. In the search field, type “TidBITS” and when it appears, tap the heart button.
  3. From then on, TidBITS appears in your Following list, and you can access the latest stories by tapping it.

Steps for following TidBITS in the News app

A few quick notes about our Apple News integration:

  • We’ve created different sections for articles and Watchlist items — tap the links at the top to switch (Drafts is just for me). The Watchlist items aren’t working as well as we’d like yet. News sometimes cuts off the icons we use for Watchlist items; I don’t believe there’s anything we can do about that. And on the iPad, the icons are ridiculously large.
  • There are currently no links to the comments for our articles. I’m looking into if it’s possible to add them.
  • On an iPhone, screenshots can get pretty small. Remember that you can flip the iPhone to landscape orientation to make them bigger, or tap them and then pinch to zoom in, if you want to read some text or look at a detail.
  • If you use the standard iOS share sheet to share a link to one of our articles with a friend or colleague (please do!), you’ll be sharing an https://apple.news link. It may look unusual, but it will open in News on iOS devices and will work normally in Web browsers on all other devices.

Let us know if you have any questions or comments on how we have things set up with Apple News. It’s all done via the Publish To Apple News plug-in for WordPress from Alley Interactive, so we have only limited control.

Glenn Fleishman 18 comments

Cloudflare and Quad9 Aim to Improve DNS

Nearly every task on the Internet, from browsing to email to gaming to voice calls, involves domain-name lookups you never see happen and that are almost always insecure. Even when your activities are encrypted — whether you’re browsing https-protected Web sites or using a VPN — these domain name lookups can leak information. That can mean your Internet service provider, anyone with whom you share a Wi-Fi router (like in a coffee shop), data centers, governments, and others along the way might be able to glean insight into your behavior, including what you’re reading and with whom you’re interacting.

Proposals to improve security and reduce your exposure haven’t achieved much traction despite enormous effort expended. But two new public DNS services that you can use instead of the one provided by your ISP could make a big difference. These services expand on what existing public DNS services have offered, especially the well-known Google Public DNS.

Cloudflare and Quad9 offer public DNS servers that provide a combination of verification, privacy-focused protocols, and encryption to mitigate DNS’s information leaks.

I’ll cut to the chase to tell you how to configure your devices to use these services before getting into the nitty-gritty of how DNS works and how these services improve on an insecure and easy-to-corrupt design.

Configure Your Device to Use Cloudflare or Quad9

On your Mac, you can set DNS servers for specific network adapters (Ethernet, Wi-Fi) that stick no matter what network you connect to.

  1. Open System Preferences > Network > Advanced > DNS
  2. Click the + button under the DNS Servers box. Enter the IP address of the first DNS server.
  3. Repeat step 2 for a second server, if available, in case the first isn’t available or is very slow to respond. (You can drag server entries to change the order.)
  4. Click OK, and then click Apply.

macOS Network preference pane's DNS settings

For the different services, the IP addresses to enter are:

  • Cloudflare: 1.1.1.1 and 1.0.0.1 (see note below)
  • Google Public DNS: 8.8.8.8 and 8.8.4.4
  • Quad9: 9.9.9.9 and 149.112.112.112

There’s no harm in entering DNS servers for multiple services and rearranging them to see which you prefer.

Note that some operating systems, network hardware, and software treat Cloudflare’s 1.1.1.1 address as a catchall, garbage, or internal address. As a result, you might not be able to visit Cloudflare’s Web site at that address or use the DNS server there — I have this problem on my CenturyLink fiber connection in Seattle. You should be able to use the backup 1.0.0.1 address to reach the Web page and for DNS and omit the 1.1.1.1 address in the DNS setup.

Also note that Quad9’s address above includes a DNS blocklist, so that your devices won’t connect to millions of malicious addresses the organization has identified. You can use an alternate set of DNS servers that bypass that blocklist: 9.9.9.10 and 149.112.112.10.

In iOS, DNS server settings tend not to work the way most people want, which is as in macOS: setting the details once and having them work on every network to which you connect. The settings are required for each network. Worse, we’ve found in our testing that after changing DNS values, the settings revert to Automatic and the server IP addresses we entered are tossed. There’s also no way to set DNS servers for cellular connections.

On your own networks, I recommend changing the DNS server settings on your router. The details vary widely by manufacturer, but look for a DHCP or Network settings area in which you can specify both a range of addresses assigned on a local network and the DNS servers that are passed along with the address assignment.

For other operating systems, consult the services’ guides: Cloudflare, Google Public DNS, and Quad9.

If you’re curious about how DNS works, and the kinds of problems that Cloudflare and Quad9 promise to address, read on.

Recursive and Decentralized, DNS Predates Internet Risks

The domain name system dates back to the earliest days of the Internet, and it often shows. DNS has gained a lot of functions over the years, but at its core, it’s a directory that matches human-readable domain names (like www.tidbits.com) with their underlying IP addresses (64.62.135.130) necessary to make connections.

Nearly every Internet connection — like visiting a Web page — involves silently passing a DNS lookup to a DNS server that’s specified in your device’s network configuration. In many cases, your software looks up multiple domains for a single action, such as for a Web page that has images and style sheets hosted on different servers.

The lookup then bounces from DNS server to DNS server in a decentralized, distributed hierarchy to find the DNS server that’s the authoritative endpoint for that domain. Finally, that DNS server sends back a response with the answer required or an error that there’s no answer for that lookup.

Every Internet-savvy device and operating system has what’s called a “stub resolver” that knows just enough to pass your queries on to a DNS server, also called a “resolver.” That DNS server is generally run by your ISP. Or it might be a generally accessible one, like Google Public DNS. (You could even run one yourself, if you’re a masochist.)

How does this work? In a Web browser query for www.tidbits.com, for instance, your Mac or iPhone’s stub resolver passes that full query — called a “fully qualified domain name” — to your DNS server, which breaks it up into pieces. It starts with the end, which has an implicit “.” as in “www.tidbits.com.”, even though you rarely see that final dot. That dot indicates the root level of DNS, which is handled by a number of servers around the world that have authoritative information for all the top-level domains, like .com, .uk, and .aero. Your DNS server knows how to reach all the root servers, and, in this example, asks one of them for a .com server. Once it has been passed to a server that handles .com, your request for details about tidbits.com then goes to TidBITS’s DNS host, which runs nameservers that provide a response for www.tidbits.com in particular. Finally, the 64.62.135.130 IP address is then sent back your DNS server and on to the stub resolver.

DNS is distributed, in that there’s no authoritative list for every fully qualified domain name in the world. The root servers know only about the top-level domains; the top-level domain servers only know about the domains within their purview; and so on down the hierarchy. DNS is also decentralized, in that there’s no single point of authority, but, rather, responsibility for lower-level domains is delegated down a branching tree.

That explained, let’s look at what problems need to be solved.

DNS Weaknesses from Right to Left

Like DNS, the early Web was completely insecure, but the builders of those early servers and browsers, like Netscape, quickly discovered that e-commerce, banking, and other commercial uses required a secure path. Thus was SSL born, to provide negotiated encryption between the two points. It took almost two decades for Web encryption, with SSL now supplanted by TLS, to become standard even on sites that carry no financial or other confidential information.

DNS remains enormously behind the Web, even though many different and often competing efforts to make it better have been floated. Some have even been officially approved — just not fully deployed. In short, DNS leaks like a sieve and has many potential points of interception.

Most DNS lookups are sent in the clear, so even if everything else you do is secured with encryption, the domains you’re visiting, sending email to, uploading files to, and so on all pass over your local network and all intermediate networks. Anyone sniffing traffic anywhere along the line can see where your traffic is going, if not its contents.

If you use a VPN connection, your DNS lookups should pass through the VPN and not be revealed locally, but some information can still leak out. Sites like DNS Leak Test can help you check to see if your VPN is leaking and offer advice on how to fix problems.

Even if nobody is sniffing your local network or points in between, DNS servers always send the entire query to each point on the chain of resolution. So everything from the root on down to the individual domain DNS host knows the entire domain name you want. That makes the DNS servers themselves potential sources of information about your activities.

Also, DNS responses could once easily be “poisoned,” allowing correct results to be replaced with ones that attackers want to use. There was no effective way for a DNS server or stub resolver to identify whether or not a response came from the actual definitive source. One form of poisoning led to one of the Internet’s worst security flaws, which was patched by every operating system maker and DNS server developer before it became widely known in 2008.

While that vulnerability has been patched, it remains possible for someone to access a public Wi-Fi network and use a variety of simple techniques and readily available software to provide fake responses to DNS lookups. The encryption used for https connections largely prevents this from being effective: for instance, your browser would throw an error about a certificate being invalid and warn you that someone was trying to intercept your connection. But it remains possible.

All this could change if only all the institutions in the world providing DNS service would improve their systems, educate users, and agree on new initiatives that haven’t yet been fully adopted. If that sounds unlikely, you’re not wrong.

In the meantime, you can improve performance and likely increase privacy by switching to a new DNS server. The new public DNS services from Cloudflare and Quad9 address some of these problems. If you’ve been using Google Public DNS, you’ve received some, but not all of these benefits.

Plugging DNS Privacy and Integrity Leaks

Cloudflare and Quad9 both offer free public DNS with a variety of techniques and capabilities, some of which are not yet widely supported. I’ll start with what they provide before discussing the two organizations and issues of privacy and data collection. Google Public DNS also offers some of these features.

This will get a little technical, but it’s worth reading to understand where the points of weakness lie. Here are the main features of the different DNS services:

  • Validity: Using cryptographic signatures, DNS servers can now determine that answers are valid along the entire hierarchy of DNS servers. This technology, known as DNSSEC, blocks attempts to provide fake answers and poison DNS. While some DNS servers from ISPs support this too, it’s specifically offered by Cloudflare, Google Public DNS, and Quad9.
  • Reducing information leakage: Instead of sending the fully qualified domain name to the root and every server in between, a protocol called “query name minimization” breaks up the domain into its constituent parts. The DNS server then sends the minimum necessary information to each point on the chain. This prevents intermediate servers from gathering information about your queries and foils sniffers who gain access to the networks over which the queries pass. Cloudflare and Quad9 support query name minimization, but Google Public DNS doesn’t.
  • Encrypting DNS queries end-to-end: There are ways of encrypting DNS traffic to prevent sniffing. DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) are incompatible and in their early stages, but both encrypt DNS queries between a stub resolver and a DNS server. This encrypted connection reveals nothing to outside parties. It’s like a VPN for DNS queries, with the same sorts of advantages. Cloudflare offers both, while Google Public DNS offers DoH, and Quad9 offers DoT.

Most of these capabilities exist independently of your apps or operating system. DNSSEC requires certificates at each level of the hierarchy and at the domain’s DNS host, but you’re not involved in making that happen.

Similarly, query name minimization requires no effort on your part. Cloudflare also uses a technique to reduce repeated queries for non-existent domain information (called “aggressive negative answers”) to help global infrastructure.

DoT and DoH require new stub resolvers in operating systems to offer their full benefit. You can get this advantage now by installing software that acts as a proxy for your system’s stub resolver. Test DoT by installing software named “stubby” on desktop platforms, including macOS. Cloudflare also offers a DNS proxy that provides DoH support for several platforms, but it’s complicated enough that installing is best reserved for more advanced users. (I’m not going to install it!) DoH could wind up embedded in individual applications, too, which would improve DNS security before operating systems catch up. The Mozilla Foundation has tests underway using DoH directly within Firefox.

Improving DNS Performance

As you might imagine from all the steps involved, DNS resolution can sometimes be slow, and even though individual lookups can be fast, they’re a gating item. Some lookups happen sequentially, as one resource loads another that requires more lookups, and tens of milliseconds start to add up to full seconds.

Over a decade ago, OpenDNS pioneered public DNS service with super-fast lookup times and showed that DNS improvements could provide a better user experience. (OpenDNS is now owned by Cisco and focused more on other areas, which is why I haven’t included it here.)

Performance is one of Cloudflare’s claims for its service. DNSPerf reports back that up: Cloudflare serves queries in 10-12 milliseconds, while Google Public DNS and Quad9 take more than 30 milliseconds to respond to a DNS lookup.

Chart of DNS nameserver performance

Those are the benefits, but we have to talk about the tradeoffs, too.

With DNS Lookups, Who Do You Trust?

Despite all the above improvements in protecting the security of your DNS queries against unwanted eyeballs, queries are entirely unencrypted and available at the DNS server on the other end of the connection. In other words, you need to trust the organization that runs that DNS server, since it will be able to see all your DNS lookups and associated information, such as the IP address and details about the stub resolver making the query. So who are Cloudflare and Quad9?

Cloudflare offers commercial and free protection against distributed denial of service (DDoS) attacks, a constantly increasing scourge in frequency and scale worldwide. It’s partnered with APNIC (Asia-Pacific Network Information Center), which owns the 1.1.1.1 and 1.0.0.1 IP addresses. Cloudflare provides an extensive privacy policy for its service, detailing the information it collects and what it destroys. The company will be sharing some data with APNIC, which will in turn analyze it and destroy the source material.

Some people are uncomfortable with Cloudflare, because of its long-running policy to not discriminate in any fashion against customers who deploy its anti-DDoS caching and re-routing service, even if it’s being used for hate and other extreme speech. Others have a problem with how Cloudflare’s CEO abruptly dropped several extreme sites with no warning or change in policy, just because he had changed his mind.

Cloudflare offers a few fairly extensive free services as marketing tools — it’s an efficient and no-pressure way for the company to reach small businesses who might later purchase premium offerings. (TidBITS currently uses Cloudflare’s free service to reduce the load on its main server.) Cloudflare also gains valuable aggregated intelligence about how DNS is misused (notably by Internet of Things devices) through the DNS queries it handles.

In contrast, Quad9 is a non-profit organization that has as founding partners IBM, Packet Clearing House, and the Global Cyber Alliance. It operates all its services for free as part of a mission of to minimize exposure and risk, but, much like Cloudflare, it’s also gathering aggregated information that will help its partners with threat awareness and mitigation. Quad9’s privacy policy is equally detailed. Adam Engst’s long experience with one of Quad9’s key people helped him place a lot of trust in its adherence to its policies.

Finally, we all know Google, and people have varying feelings about how Google uses data from individuals to drive its advertising business. The privacy policy for Google Public DNS says that the information passing to it isn’t used for other Google services. I use many Google services and Web apps, but I don’t use Gmail and I’ve grown increasingly concerned over time about how well the company’s statements match its actions, and how much it’s concerned about public relations and governmental consequences.

The fact remains, however, that your queries may not stay private when they arrive at any of these organizations — a hacker could infiltrate their systems, or a government agency could demand details or seize control. To be fair, that’s true of any DNS provider, including your ISP, which might be even less capable of fighting off technical or legal attacks.

It is not unreasonable to worry that a company might stretch the limits of what it has promised in its privacy policy and public statements, and sell details about you or use it to market products and services to you. We simply can’t afford blind trust anymore, given the many ways companies have abused our personal metadata.

Small Steps to a Better DNS

A team of Princeton University researchers has proposed Oblivious DNS, which would dramatically mitigate the possibility of connecting someone’s query with the results returned. Unfortunately, it would require new DNS infrastructure — something that’s possible only if people are willing to try new DNS servers in large quantities, and if operating system makers like Apple, Google, and Microsoft decide the benefits are large enough for their customers. Will that happen? Probably not, since DNS is so pervasive and embedded, it’s seems impossible to fix it comprehensively for everyone.

Nevertheless, every step you take toward greater security and privacy is a positive one. It’s important to think about where your data ends up, and only you can decide whether having your queries available to Cloudflare, Google, or Quad9 is an improvement over your existing exposure to your ISP, which may not employ any of the aforementioned DNS protections.

I also hope these high-profile public DNS services put more pressure on Internet infrastructure providers to roll out these improvements to DNS resolvers everywhere.

Watchlist

iMovie 10.1.9 Agen Schmitz 5 comments

iMovie 10.1.9

Apple has released iMovie 10.1.9, adding support for the iPhone X and additional iPad resolutions and fixing bugs. The release resolves an issue that could prevent logging into Facebook, fixes a bug that could cause HEVC video clips and HEIF photos to appear black in the viewer, stops iMovie from hanging when quitting, addresses an issue that could lead to slower media import from SD cards on an iMac Pro, and improves stability when working with Camtwist Studio. (Free from the Mac App Store, 2.3 GB, 10.13.2+)

Things 3.5 Agen Schmitz No comments

Things 3.5

Cultured Code has released Things 3.5 with a lengthy list of additions and improvements for the task manager. The update adds collapsible areas so longer project lists can be hidden, broadens app-wide tag searches to include items with nested tags, enhances copy and paste to create to-dos when pasting text from other apps, improves the Today Widget to show inline icons for checklists and reminders, lets you  customize settings for the MacBook Pro’s Touch Bar, and detects links wherever they appear. ($49.99 new from the Mac App Store, 17.5 MB, release notes, macOS 10.11+)

Typinator 7.5 Agen Schmitz No comments

Typinator 7.5

Ergonis has released Typinator 7.5, adding more functionality to the text-expansion tool’s scripting features, including the capability to access expansion history, check which text input caused the current expansion, and cancel the currently processed expansion. The release also ensures that precompiled AppleScripts retain their properties within the same Typinator session, and that expansions are completed in order when a script in an expansion triggers additional expansions.

Typinator 7.5 also recovers better from memory-related crashes in macOS 10.13 High Sierra, adds a button for showing or hiding invisible characters in the expansion field, fixes a bug in the CSV export that produced empty lines in multi-line expansions, and updates some predefined subscription sets (including TidBITS AutoCorrection and Product Names). (€24.99 new with a 25 percent discount for TidBITS members, free update, 7.9 MB, release notes, 10.6.8+)

BusyContacts 1.2.11 Agen Schmitz 7 comments

BusyContacts 1.2.11

BusyMac has released BusyContacts 1.2.10, adding the capability to disable accounts without deleting them (in Preferences > Accounts). The contacts manager also gains account discovery for custom CalDAV and CardDAV servers, fixes a bug where sync would not automatically trigger upon network-state changes, and resolves a Google Authorization issue (if prompted, click Authorize one more time). Shortly after its release, BusyMac issued version 1.2.11 to fix a bug that prevented detection of BusyCal for showing Calendar events. ($49.99 new from BusyMac or the Mac App Store, free update, 7.3 MB, release notes, 10.11+)

Default Folder X 5.2.4 Agen Schmitz No comments

Default Folder X 5.2.4

St. Clair Software has released Default Folder X 5.2.3, bringing long-requested support for the Forklift Finder alternative and file transfer app. The Open/Save dialog enhancement utility rejiggers the underlying mechanism for switching from one folder to another in Open and Save dialogs, making the process faster and more reliable while also helping to eliminate compatibility issues with Magnet and BetterTouchTool.

The update also now shows all recent documents in applications that don’t have a native document type (such as Trello), fixes user interface glitches in the Folders tab of the Preferences window, enables you to set a keyboard shortcut to take you to the folder containing the current application (go to Preferences > Shortcuts), and resolves an issue that could prevent the Save button from working in Save As dialogs.

Shortly after the 5.2.3 release, St. Clair Software pushed out 5.2.4 to fix a bug that rendered the Favorites and Recent Folders menus inoperable. ($34.95 new, TidBITS members save $10 on new copies and $5 on upgrades, 7.7 MB, release notes, 10.10+)

ChronoSync 4.8.6 Agen Schmitz No comments

ChronoSync 4.8.6

Econ Technologies has released ChronoSync 4.8.6, adding support for the Backblaze B2 Cloud Storage service. The synchronization and backup app also adds new Dock menu items for faster access to the ChronoSync Organizer and Scheduled Task Manager windows, improves the accuracy of the “percentComplete” reported by a Sync Task, fixes a few bugs related to Google Cloud connections, resolves a potential hang when monitoring the startup of ChronoAgentLocal, and eliminates the duplicate ChronoSync Organizer window entry from the Window menu. ($49.99 new for ChronoSync with a 20 percent discount for TidBITS members, free update, 48.9 MB, release notes, 10.10+)

ExtraBITS

Apple’s “Do Not Disturb While Driving” Is Reducing Distracted Driving Josh Centers No comments

Apple’s “Do Not Disturb While Driving” Is Reducing Distracted Driving

When we first covered the Do Not Disturb While Driving feature in iOS 11 (see “iOS 11 to Bring Do Not Disturb While Driving,” 21 August 2017), we said: “We’re looking forward to seeing if those horrible distracted driving statistics drop once iOS 11 becomes widespread.” Good news: it looks like they will!

According to a study by EverQuote, makers of the EverDrive safe driving app, 70 percent of EverDrive users kept the Do Not Disturb While Driving feature on, and of those who kept it enabled, phone use while driving dropped by 8 percent.

While that’s not a mind-blowing figure, any decrease is notable when you consider that an estimated 92 percent of drivers in the United States use their phones while driving. According to the United States Department of Transportation, distracted driving killed 3450 people in 2016; we’re still waiting for the 2017 figures that will show if Do Not Disturb While Driving has reduced accidents.

Spotify and Hulu Offer $12.99-Per-Month Bundle Josh Centers 4 comments

Spotify and Hulu Offer $12.99-Per-Month Bundle

If you’re looking to reduce your monthly subscription payments but don’t want to let go of streaming music and video, Spotify and Hulu have a deal that will become widely available this summer: both services for $12.99 per month. That’s $5 less per month than you’d pay for Spotify Premium ($9.99 per month) and Hulu Limited Commercials ($7.99 per month). College students can get it even cheaper: $4.99 per month. The offer isn’t available for those who have or wish to use Hulu’s No Commercials or Live TV plans.

Although the bundle isn’t available for everyone for another few months, Spotify Premium members can try Hulu for 3 months for just $0.99 through 10 May 2018. Spotify said it would be offered “indefinitely.”

This move may put pressure on competing services like Apple Music and Netflix, and it raises the question of how Apple will charge for the original video content it’s producing — see Macworld’s list of everything that Apple has commissioned. Will Apple’s shows be available to Apple Music subscribers? Will there be a new Apple Video service? Or something else entirely?

Apple Introduces New iPhone Disassembly Robot and Recycling Program Josh Centers 5 comments

Apple Introduces New iPhone Disassembly Robot and Recycling Program

An article in the Austin American-Statesman looks at Daisy, a new robotic iPhone disassembly system that can take apart 200 iPhones per hour. That’s actually slower than Daisy’s predecessor, Liam (see“Apple Releases 10th Annual Environmental Responsibility Report,” 21 April 2017), but Liam could disassemble only the iPhone 6, whereas Daisy works with the iPhone 5 through the iPhone 7 Plus. Daisy also lets Apple harvest aluminum at a high-enough grade that the company can reuse the metal directly in its own products.

Apple has also announced a new recycling program called GiveBack, which aims to make trading in a device a more streamlined process. For each Apple device accepted through 30 April 2018, Apple will make a donation to Conservation International. So if you have any dead devices gathering dust in a drawer, send them back to Apple!

The Legacy of OLPC’s $100 Laptop Josh Centers No comments

The Legacy of OLPC’s $100 Laptop

When Nicholas Negroponte announced a $100 laptop for children in 2005, it seemed too good to be true. That was well before the iPhone and the iPad, so even the idea was revolutionary. But as the Verge documents in an in-depth article, while the One Laptop Per Child (OLPC) project did ship, it’s now a shadow of its former self.

In short, the project overpromised and underdelivered: the $100 laptop ended up being closer to $200, the crank that promised to power the laptop anywhere proved impractical, and while Negroponte liked to demonstrate the laptop’s durability by throwing it across the room, the real world turned out to be much harsher. Buyers were leery of the Linux-based Sugar OS and wanted children to learn Microsoft Windows. Most problematic, PC manufacturers saw the potential in cheap laptops, which kicked off the netbook boom and largely shut out OLPC before it could take off.

But perhaps it’s an exaggeration to call OLPC a failure. The project still exists, many of those original laptops remain operational in the field, and most importantly, its audacity helped radically reduce the price of computing hardware.

50 Shades of Space Gray Josh Centers No comments

50 Shades of Space Gray

Apple sells a plethora of products advertised as “space gray,” but have you ever noticed that they aren’t all quite the same color? If so, you’re going to love this in-depth guide to the various shades of Apple’s space gray assembled by 9to5Mac’s eagle-eyed Michael Steeber. Don’t miss the chart of every Apple product offered in space gray (or a dark gray that preceded space gray’s official 2013 launch). Steeber has charted six different forms of space gray, along with other variants like slate and space black.

Google Chrome 66 Promises to Mute Auto-Play Videos Josh Centers 1 comment

Google Chrome 66 Promises to Mute Auto-Play Videos

Google has released version 66 (specifically version 66.0.3359.117) of its Chrome Web browser, which the company says will mute auto-play videos. However, there are some exceptions, and in our testing, the results are mixed. If you have interacted with a site in any way, auto-play video is allowed, so the feature may not prove as useful as it could be.

It’s also worth noting that a previous Chrome release included an ad-blocker. It doesn’t block all ads but does filter out the most egregious ones, making the Web more tolerable for those who aren’t already using an ad-blocking extension. (And remember, stick with well-known ad blockers — there are some sketchy ones out there.)

To see if you have the update and install it if necessary, choose Chrome > About Google Chrome. If Chrome is not up to date, it will automatically download the latest version, and you’ll have to relaunch Chrome to finish the installation.

The Chrome 66 about screen.