Skip to content
Thoughtful, detailed coverage of everything Apple for 34 years
and the TidBITS Content Network for Apple professionals
Show excerpts

#1524: ScanSnap Manager for Catalina, Camo turns an iPhone into a webcam, Apple Security Researcher Device, Micro Snitch warns of webcam/mic spying

This week’s surprise news is that—a year after Fujitsu announced it wouldn’t support older ScanSnap scanners in Catalina—the company has reversed course and released ScanSnap Manager V7 for macOS 10.15 Catalina. The rest of our issue revolves around security and webcams. First, on the security front, Apple has started a program that gives specially modified iPhones to security researchers to aid in their investigations. More immediately useful for those concerned about webcam spying is Micro Snitch, a utility that warns you when apps activate your Mac’s webcam or microphone. And if you’ve been unable to get a better webcam for your Mac, Glenn Fleishman provides a look at Camo, a system that lets you press your iPhone into service as a Mac webcam. Notable Mac app releases this week include Fantastical 3.1.2 and Carbon Copy Cloner 5.1.20.

Josh Centers 10 comments

Feeling Paranoid? Micro Snitch Tells You If Your Mac Is Spying on You

Our reporting on Apple’s warning against closing a MacBook with a webcam cover installed (see “Don’t Close Your MacBook with a Webcam Cover Attached,” 14 July 2020) sparked an interesting TidBITS Talk discussion about Mac webcam security.

In theory, malware can’t activate your Mac’s webcam without your knowledge, because the indicator light is wired in series to the webcam. That means the webcam cannot receive power without turning on the light. An earlier webcam implementation in pre-2008 Apple laptops was vulnerable to a firmware exploit, but a lengthy treatise by John Gruber of Daring Fireball quotes an unnamed Apple engineer as saying that this exploit is now impossible, because the connection is direct. No malware can bypass basic electrical connections.

Nothing’s Perfect

Or so we think. The problem with any sort of “unbreakable” security scheme is that there are a lot of bad guys out there, and security breaches have real monetary value to organized crime and government surveillance agencies. One TidBITS Talk reader pointed out that a clever attacker could use the webcam to take quick still images, flashing the indicator light so quickly that you might not even notice it.

Even if Apple’s webcam security is foolproof, what about third-party webcams? Built-in Mac webcams aren’t very high-quality (see “The 2020 MacBook Air’s FaceTime HD Camera Is Still Lousy,” 8 April 2020), so many people who rely on videoconferencing (a number that has skyrocketed during the COVID-19 pandemic) have a third-party camera attached.

The reality is that you probably don’t have much to fear from your webcam, because even years ago it would have taken a targeted attack to access it. But there’s something about having an electronic eye pointed at you all day long that can make you feel like you’re being watched…

Micro Snitch to the Rescue

If you’d like a little extra peace of mind, consider installing Micro Snitch from Objective Development, makers of LaunchBar and the famous Little Snitch network monitoring utility. Micro Snitch costs $3.99 either directly from Objective Development or in the Mac App Store, and Objective Development makes a free trial available.

Micro Snitch lives in your Mac’s menu bar. Whenever an app accesses your webcam or microphone, a large, square icon of a hat and glasses appears in the center of your screen and then moves to the lower-right corner. You also receive a notification. The hat and glasses icon doesn’t go away until you close it or the activity stops.

Micro Snitch indicator

Afraid that you somehow missed the little spy guy? Choose Open Activity Log from Micro Snitch’s menu bar icon to see a log of every time either the camera or the microphone has been accessed.

Micro Snitch log

The only downside I can find is that Micro Snitch can’t monitor some of the odd software devices I have installed, like Soundflower (which lets me reroute audio on my Mac) and the EpocCam driver that promised to let me use my iPhone as a webcam—I was planning a review, but recent security changes to Zoom and Skype prevented it from working. I recommend being careful about installing such drivers, and I’ve now uninstalled EpocCam. Soundflower, on the other hand, is now open source.

If your webcam causes you any anxiety, $3.99 for Micro Snitch is a small investment for additional peace of mind. Give it a try, and let us know if it reveals any unexpected behavior on your Mac!

Dave Kitabjian 111 comments

Surprise! Fujitsu Releases 64-Bit ScanSnap Manager for Older Scanners

Many of you have been following our coverage of Fujitsu’s decision to effectively drop support for some of its older but still popular ScanSnap scanners by not updating the ScanSnap Manager software to 64-bit so it could run in macOS 10.15 Catalina. To keep those scanners off the trash heap, we evaluated and reported on some third-party solutions that will keep them running under Catalina, including VueScan (see “VueScan: Not the ScanSnap Replacement You’re Looking For,” 2 December 2019) and ExactScan (see “ExactScan Might Be the ScanSnap Replacement You Need,” 6 May 2020). Neither was perfect, but they got the job done.

A Stunning Announcement

A few weeks back, TidBITS reader Stephen Miller shared the shocking observation that Fujitsu had updated ScanSnap Manager to V7, with the company saying “We’ll soon be making ScanSnap Manager available for the new iX1500, as well as for earlier models.”

A quick check of the specifications in Fujitsu’s announcement showed that ScanSnap Manager V7 works in macOS 10.12.4 Sierra and later, including Catalina, and the “earlier models” include the S1500, S1500M, and the S1300 that I’ve been using for many years.

ScanSnap Manager V7 Test Drive

Still in a state of shock, I went to the ScanSnap Manager V7 download page and fetched a copy for my S1300 to see if it really did work under Catalina in the same way it did in prior macOS versions.

ScanSnap Manager V7

Amazingly, it does work. And it’s almost indistinguishable from its previous 32-bit incarnation. But let me share a few observations:

  • ScanSnap Manager V7 remembered only two of my profiles, and reset their destination folders back to Pictures. I set the folder and changed the application to None (Scan to File), and it’s back to working as expected. Why it forgot the destination folders and remembered only two of the eight profiles I defined is a mystery.
  • Scan to Photos worked instantly, as expected, as did Scan to Email and Scan to Print.
  • The pretty icons in the Dock pop-up menu for profile selection that were present in the 32-bit app are gone, so now you have a plainer look.

    ScanSnap Manager Dock menus in Mojave and Catalina
    ScanSnap Manager Dock pop-up menu in Mojave (left) and Catalina (right)

On the download page, Fujitsu added a comment about a few features in the 6.x (32-bit) versions that are not yet in the V7 (64-bit) version:

Cloud linkage (*1), ScanSnap Page Merger, or [sic] Searchable PDF Converter, which are available with ScanSnap Manager V6.3 or earlier, are not available with ScanSnap Manager V7.0L20 for Mac. (They will be available in a later update.)

(*1) Cloud linkage functions: Scan to Dropbox, Scan to Evernote (Document), Scan to Evernote (Note), Scan to Google Drive, Scan to Salesforce Chatter, Scan to SugarSync

I’m not sure what the Searchable PDF Converter is, but it must not be the essential Convert to Searchable PDF feature that still has a checkbox in V7. I tested the latter just now in V7 and confirmed that Spotlight finds the document by searching for some of its content.

Although I haven’t done a comprehensive analysis, my takeaway is that all my key workflows still work, and all the features I remember seeing in ScanSnap Manager still appear to be there. It seems too good to be true, but it is.

Why Did Fujitsu Change Its Mind?

To me, this is the big question. Fujitsu announced it wouldn’t support Catalina well over a year ago, and many ScanSnap owners have already gone through the Five Stages of Grief and resolved to buy either a new scanner or one of the third-party software solutions I previously mentioned. In all likelihood, many have already done so.

One possible explanation is that the series of TidBITS articles on this topic and those from elsewhere on the Web may have resulted in enough negative press to get Fujitsu’s attention.

But another factor may have weighed more heavily in the decision. Lots of people have been complaining about ScanSnap Home, the 64-bit software that replaced ScanSnap Manager. Complaints center around its lack of features in comparison to the older ScanSnap Manager. Fujitsu has been saying that it would gradually update ScanSnap Home with the features that people missed from ScanSnap Manager. Perhaps that effort was later determined to be greater than just porting ScanSnap Manager to 64-bit.

I contacted Fujitsu to ask why the company made this move, and I received the following explanation (which I reproduce faithfully, errors and all):

Dear Valued Customer,

Thank you for contacting Fujitsu.  The newly release ScanSnap Manager software was released for those customer who upgraded to the new iX1500 as well as customers who did not want to use ScanSnap Home but rather wanted use ScanSnap Manager again for scanning.  We do not guarantee previous model scanners will work with the newly release ScanSnap Manager as well as there is no support for scanners not supported officially under OS Catalina.

Kind Regards,

Coreena, C.

Fujitsu Computer Products of America

The reply does provide some insight, suggesting that providing a solid software solution for the company’s new, higher-end iX1500 model may also have been a driving force behind exhuming ScanSnap Manager from its 32-bit grave. Support for older ScanSnap models, like my S1300, may have been a secondary motivation, or just a welcome side-effect of that process.

Curious about the comment that “there is no support for scanners not supported officially under OS Catalina,” I checked the S1300’s compatibility status, and sure enough, the S1300 is now listed as compatible with Catalina.

Interestingly, a TidBITS reader found that ScanSnap Manager V7 worked with his older ScanSnap S300M though it’s not listed as being compatible. So it’s worth giving the new ScanSnap Manager a try even if your older ScanSnap scanner isn’t explicitly included in the compatibility list.

All’s Well That Ends Well?

This is fantastic news for ScanSnap owners, especially those who have not already purchased a new scanner or new software. I have copies of VueScan and ExactScan, but I’m just going to use ScanSnap Manager V7 under Catalina. I do miss the scan-on-insert feature those third-party products offered but not enough to switch from the familiar, seamless experience provided by Fujitsu’s native solution.

If you have a previously orphaned ScanSnap scanner, please try ScanSnap Manager V7 out for yourself and report back if anything doesn’t work as you expect it should!

Rich Mogull 5 comments

Apple Releases Dedicated Security Research Device

Apple has announced that it is releasing a special version of the iPhone to approved security researchers as part of a new Apple Security Research Device Program (SRD). The SRD, which was originally announced during last year’s Black Hat information security conference, is a standard iPhone with key security controls disabled to allow security researchers to run their own tools. Apple will provide SRDs on one-year renewable loans to researchers who are accepted into the program.

Apple SRD

In a private briefing, Apple provided additional details about and background on the SRD program.

Who Can Get an SRD

Apple said that anyone with a track record of “systems security” research is encouraged to apply, even if they have little to no experience with iOS. The program has two key goals: to open up opportunities for those with experience on other platforms by lowering the bar for iOS research and to make security research more efficient for existing researchers.

Until now, researchers were largely limited to two options. They could use standard, secure devices and attack them almost blindly, which was inefficient at best. Or they could rely on jailbroken devices that were often limited to earlier versions of hardware and software because every jailbreak is a severe security vulnerability that Apple tends to patch swiftly.

What Makes an SRD Different from a Regular iPhone

The SRD lacks code execution and containment capabilities on multiple levels of the hardware and software to allow researchers to run their own toolchains, including common research tools (which we assume need to be compiled for the platform). As an example, the SRD ships with a terminal shell out of the box, so the researchers can employ a wide range of debugging tools and access low-level logs that are normally inaccessible. A researcher could, for example, deploy a full network monitor onto the device.

Researchers can also run their tools with arbitrary entitlements, including Apple’s own entitlements that are never available to developers. Entitlements are the key sandboxing control on iOS to restrict what applications can do.

Although the SRD will support iOS 14, it needs to run special Apple-provided versions of iOS since regular consumer builds have all the security controls enabled.

How the SRD Will Be Useful to Researchers

One of the interesting aspects of the SRD program is how it will enable research on the Apple iOS ecosystem beyond traditional device security. For example, in 2019, the Citizen Lab discovered that Tibetan groups were being targeted with government-sponsored mobile malware, including attacks on iOS devices.

An SRD could help researchers run security tooling to better identify and research these kinds of attacks. When asked if Apple would support this general kind of research, which differs from traditional vulnerability hunting, company reps responded, “They are supporting the security of our users… that would likely qualify as strong research.”

Additional Details

A few other interesting points came up in our discussion:

  • The SRD is based on “the latest hardware.” Apple did not specify a particular model but said that it’s important to keep the hardware up to date so it reflects what customers use. On the off-chance Apple releases new iPhones in the future, it’s likely that the company will update the SRDs.
  • Researchers are required to report vulnerabilities to Apple and withhold disclosure until fixes are available. This applies only to vulnerabilities discovered using the SRD and not anything discovered independently. Researchers who have policies to disclose vulnerabilities on a preset timeline won’t be able to participate in the program without changing that practice.
  • Researchers will need to comply with the terms and conditions of any App Store apps they install on the device; Apple is not adding its own restrictions. If they do discover a vulnerability, the researchers are expected to report it to both the vendor and Apple.
  • Aside from basic access to the device, Apple is also supporting the program with a dedicated forum that includes Apple security engineers. Apple security leadership is also available for program feedback.
  • Apple has not determined how many SRDs will be produced, and the initial run of devices is not representative of the overall program. The company plans to continue to evaluate and expand based on how things go. My assumption (which could be incorrect) is that the program will initially be relatively small and will grow over time.

Constructive Progress, but with Risks

Overall, I see this is as a highly positive move for Apple. It can be incredibly difficult to build a toolchain for a device as locked-down as the iPhone since you are effectively flying blind until you crack the security deeply enough to install some instrumentation. Assuming the SRD works as described, it will remove many of the major roadblocks to iOS security research and could result in discoveries that provide better security for us all.

On the whole, Apple’s program requirements and restrictions appear reasonable, and I look forward to seeing how they work in practice. However, there is some risk that the program restrictions will muzzle some researchers while Apple sits on vulnerabilities. Apple’s track record for fixing issues has been pretty good in recent years, but we can’t dismiss this concern out of hand.

As Michael Tsai notes, this restriction could inhibit program members from releasing other iOS vulnerability information discovered independently.  Researchers might lack solid records defending the origin of an independent discovery and thus feel constrained by Apple’s restrictions.

One final note: I don’t expect Apple’s highly gated access to the program to change in the future. An opportunity like this is ripe for abuse by malicious governments and private organizations that already pay large bounties for iOS vulnerabilities. The SRD reduces barriers for research that contributes to Apple’s ecosystem security without lowering the boundaries for malicious actors.

Glenn Fleishman 32 comments

Turn Your iPhone into a Powerful Webcam with Camo

Some of us have been living in videoconferencing sessions for months, which has presented many challenges. (“Kids, can you stop singing ‘Baby Shark’? I’m in a meeting” “Bill, can you grab the cat?”) One of them is the revelation of just how poor the video is that’s produced by the FaceTime HD camera on Mac laptops and iMacs. Apple has stuck with a low-quality, outdated 720p webcam through its very latest MacBook Air released this year (see “The 2020 MacBook Air’s FaceTime HD Camera Is Still Lousy,” 8 April 2020).

Meanwhile, Apple continuously improves the front and back cameras found in iPhones and iPads. The front-facing selfie camera in the iPhone 11 and iPhone 11 Pro records 4K video at up to 60 frames per second.

What if you could put your iPhone’s peanut butter in your Mac’s chocolate? The result is Reincubate’s Camo, a virtual-camera system that lets you treat the front- or rear-facing camera on your iPhone, iPad, or iPod touch as a full-fledged video source for many Mac videoconferencing, streaming, and video-editing apps. For dozens of compatible apps, Camo appears just like any camera built-in or attached to your Mac.

Unfortunately, it doesn’t work with FaceTime or Safari! However, compared to competing apps, like Kinomi’s EpocCam, which has been blocked by some Mac videoconferencing services, Camo has much wider support.

Why Camo Turns Your iPhone into a Great Webcam

Camo scratches an acute pandemic-era itch for Mac owners, particularly given the shortages of high-quality 1080p and higher-resolution USB-connected webcams, including several popular models from Logitech. Why not use the best camera you already own?

Many people with DSLR and mirrorless cameras are using virtual-camera software that lets them rely on those devices’ superior optics and lenses. However, the necessary software isn’t available from every camera maker or for every model, and the best solution, Ecamm Live, is priced for professionals at tiers of $15 and $25 per month. And if you don’t already have one, those cameras aren’t cheap! (If you do own one and the software doesn’t exist for your model, look into an HDMI-to-USB adapter; some electronics maker is pumping out an excellent generic adapter sold under many names, like this one for about $33.)

Camo comprises two parts: an iOS app for iOS 12 and later and Camo Studio for macOS 10.13 High Sierra or later. To ensure optimal video throughput and control, Camo Studio requires that you plug your device in via USB. (Connectivity via Wi-Fi and a Windows version of Camo Studio are both on Reincubate’s roadmap.)

Camo’s mobile app has no features: it merely provides a connection to Camo Studio, which has all the controls. You can choose among multiple connected devices, pick lenses (front or any rear lens), select resolutions up to 1080p (for now), and enable the built-in flash to add fill lighting. You can also rotate the image, zoom (and pan within the zoom), and control an array of video stream corrections and effects.

Camo Studio

These settings include a critical feature that’s difficult to manage with both the Mac’s FaceTime HD camera and the iPhone and iPad: setting focus and keeping it there. The iOS Camera app lets you press to create an auto-lock, but it doesn’t offer a manual setting, as found in many third-party camera and video apps. In Camo Studio, select the Focus Position checkbox, and then you can adjust focus and lock it in place, which avoids the camera picking a point you don’t want or moving in and out of focus as you move around or other people come into view.

Tips for Using Your iPhone as a Webcam

Camo works best with a way to elevate and stabilize your iPhone or iPad so the camera is level with your head and you can look directly at or just below it, as you would with a standard webcam.

That can be tricky: you may need a stable monopod-like stand, a small tripod, or some kind of swing arm. Although it seems logical to want to mount your iPhone above a laptop or iMac display, all mounting hardware I’ve found—like the Mountie and Mountie Plus—works only as a side mount, probably for reasons of stability and center of gravity.

Reincubate published a lengthy article in which the writer tested a staggering array of tripods, arms, magnetic mounts, gimbals, and other ways to hold an iPhone or iPad into place.

In some of my presentations over Zoom, I use a camera or my iPhone to point at places where I’m demoing something, such as a laser cutter in a recent letterpress/laser-cutting workshop I taught online. I mounted a camera swing-arm on the wall near the laser cutter for overhead shots while it’s in action. I can use the laser cutter as an ersatz document stand, too, by placing a piece of foam core on top.

However, to use my iPhone in that way and control it from my Mac, instead of running Zoom on the iPhone, I use Zoom’s screen-sharing feature. In macOS, Zoom lets you tap into an iPhone or iPad that’s connected via USB or sharing its display to Zoom via AirPlay. But in that mode, Zoom just streams what’s on the iPhone or iPad’s screen—including any interface elements in, say, the Camera app—and puts the Zoom session into screen-sharing mode for you and everyone watching. That’s useful for software demonstrations, like a walkthrough, or playing a video or showing images, but it’s not great when you want to treat the mobile device as an additional camera for input. (I could launch Zoom and join the meeting from my iPhone, but some Zoom options are available only by directly interacting with the interface on that device, and other features can be used only from Zoom’s desktop apps.)

With Camo, I can simply use my iPhone as another standard camera input to Zoom, control how it appears, and use Zoom’s Video pop-up menu to switch between Camo and my iMac’s built-in front-facing camera. For other videoconferencing software that doesn’t allow bringing in mobile camera feeds via screen sharing or other methods, Camo is an even more useful upgrade.

What Camo Works With

You can use Camo with nearly all videoconferencing apps, though some require an extra step. Out of the box, you can use BlueJeans, Google Meet, GoToMeeting, Houseparty, Jitsi, and the big gorilla, Zoom (5.0.5 or later required). Firefox, Google Chrome, and Microsoft Edge are also directly supported, so Web apps that rely on video components in those browsers should also work without a hitch. People who stream on Twitch or record with ScreenFlow or QuickTime Player can use Camo directly as well. (Reincubate has an annotated list of supported apps.)

Some other meeting apps, like Amazon Chime, Cisco WebEx, and Microsoft Skype and Teams; collaborative team discussion software, such as Discord and Slack; and several other packages require Camo to strip a security setting from the app. Specifically, Camo has to remove the app’s signature designed to let macOS know if the app has been modified. Once you grant your permission and enter an administrative password, Camo makes a modification in how the app handles video that allows the use of its virtual camera.

Camo also integrates well with OBS (Open Broadcaster Software). OBS is an open-source video-stream mixer that lets you bring in different sources to create a single output that is itself a virtual camera you can use in other software and with live streams at Twitch, YouTube Live, and elsewhere. The mmhmm video-mixing/presentation software currently in beta testing also works natively with Camo.

The Downsides of Camo

If you use an app that Camo needs to modify to patch into, you do create a small security hole: once Camo has stripped the app’s signature, malware could modify it, but that malware would have to get on your machine, too. Reincubate is open about such drawbacks and other updating issues with its approach.

What’s Camo still missing? The company is frank about what it lacks, publishing a roadmap of features it hopes to add after version 1.0. You can’t stream 4K video yet, although that seems to be a priority. While the background-blurring “bokeh” Portrait mode in Apple’s Camera app only works for still images, Reincubate has that feature on its list of video options; Apple makes the depth data necessary to isolate foreground and background available to developers. (Reincubate is also looking at supporting Wi-Fi connections, but it’s understandable that the company started with the reliability and throughput of USB.

Camo also lacks green-screen or “chroma key” removal, where software replaces a solid-color backdrop with an image or other video. Zoom and other software include green-screen removal, and Camo’s virtual camera doesn’t prevent that. But if Reincubate built it in, the option would become available in any supported app.

The free version of Camo offers fairly little: just 720p resolution, video mirroring, rotation, and zoom, and it requires a watermark. Pay $39.99 per year to unlock Camo Pro, and all features become available, including removing the Camo watermark. The free tier is useful for testing out how Camo works with your setup and apps, however, so you know if it’s a good fit. Zoom also currently limits video to 720p in most cases, making higher resolutions less useful, though Camo’s other camera features are significant enhancements over the Mac’s standard FaceTime HD camera.

While I own a Logitech C920 1080p webcam that I use with my iMac, it’s not as versatile as my iPhone and has just a single lens. I find Camo a great addition to my video arsenal, which is a great thing to expand, given the indefinite future of remote business meetings, workshops, and presentations ahead of us.

Watchlist

Fantastical 3.1.3 Agen Schmitz No comments

Fantastical 3.1.3

Flexibits issued Fantastical 3.1.2, a maintenance release of the calendar app with numerous improvements and fixes. Fantastical now syncs hidden read-only events across devices; gains a new option to manage hidden items in the calendar sets menu; displays anniversary events with options to message, call, or email the contact; opens the BlueJeans app when joining BlueJeans meetings; fixes a bug that prevented event details from being saved when moving an event across calendars while also making edits; and resolves an issue with Zoom meeting info not always being included in the notes. A quick 3.1.3 update addresses an issue signing into new accounts. ($39.99 annual subscription from Flexibits and the Mac App Store, free update, 22.6 MB, release notes, macOS 10.13.2+)

Carbon Copy Cloner 5.1.20 Agen Schmitz No comments

Carbon Copy Cloner 5.1.20

In response to the recent release of macOS 10.15.6 Catalina (see “iOS 13.6, iPadOS 13.6, macOS 10.15.6, watchOS 6.2.8, and tvOS 13.4.8 Add News Features, Car Keys, Symptom Tracking,” 15 July 2020), Bombich Software has released Carbon Copy Cloner 5.1.20 to remove the workaround added in 5.1.18 to address a handful of failure conditions in the version of Apple’s APFS replication utility introduced in macOS 10.15.5. The drive-cloning and backup utility now reverts to using its own file copier for establishing new bootable backups for those running 10.15.6. Although the workaround remains in place for 10.15.5 users, Bombich Software encourages such users to update to 10.15.6. ($39.99 new, free update, 14.6 MB, release notes, macOS 10.10+)

ExtraBITS

Josh Centers 1 comment

Hong Kong VPN Services Found to Log Connections and Leak User Data

Security researchers at vpnMentor have discovered that seven VPN services based in Hong Kong that promised to protect user privacy and not to record logs were, in fact, keeping logs and leaking user information. A single open database server contained information on over 20 million users of those services, including names, passwords, email addresses, and home addresses. The seven services are UFO VPN, FAST VPN, Free VPN, Super VPN, Flash VPN, Secure VPN, and Rabbit VPN.

VPN services often sell themselves as a silver bullet for privacy, but in reality, all you’re doing is sending your Internet traffic through the VPN service instead of through your ISP. That may be best if your ISP is slimy or if you’re in a compromised situation, like using an unsecured Wi-Fi network or working in an unfriendly country. But in the end, when connecting to the public Internet, you have to trust somebody.

Josh Centers 6 comments

Woz Sues YouTube Over Bitcoin Impersonation Scam

The Verge reports that, in conjunction with other famous tech entrepreneurs, Apple co-founder Steve Wozniak is suing YouTube for failing to police scam videos featuring his likeness. In the videos, the scammers promise that Wozniak will return double the amount of Bitcoin sent to a certain address. Other similar videos reportedly use the likenesses of other tech leaders, including Bill Gates and Elon Musk.

Bitcoin scams have been popular lately, most notably in the recent mass Twitter hack, in which hacked accounts of Joe Biden, Bill Gates, Elon Musk, Barack Obama, Kanye West, and others promised the same thing: a doubling of whatever Bitcoin was sent to a certain address. It exposed a major hole in Twitter security, and apparently netted the perpetrators over $100,000. If you’re interested in the details, Brian Krebs has a detailed analysis.

Josh Centers 6 comments

Apple Celebrates 25 Years of the Apple Distinguished Educator Program with Dr. Carl Owens

The Apple Distinguished Educator program is now 25 years old, with over 3000 participants, and the company celebrated the occasion by highlighting one of its first participants: Dr. Carl Owens, a College of Education professor at Tennessee Tech University. Owens has used Apple products in the classroom since the 1980s, and today, as he nears retirement, he provisions each of his students with an iPad in the classroom.

Dr. Carl Owens

Thanks to his encouragement for students to collaborate remotely, Tennessee Tech credits Owens for preparing the university for the COVID-19 pandemic. “Dr. Owens has absolutely laid the foundation for us to be as flexible as we have been with COVID-19. The pandemic happened so fast and so many things shut down quickly that it became really hard to find the necessary equipment, but we had a lot of that stuff already in place because of him,” said Dr. Jason Beach, a fellow professor at Tennessee Tech, who is on the school’s COVID-19 task force with Owens.

As a side note, my wife, Hannah Centers, was a student of Owens. “Dr. Owens’s class was my first introduction to the Mac world. I’ll never forget seeing an Apple TV for the first time in 2008. That was an experience. He really does have a passion for technology,” she said.

Josh Centers 18 comments

20 Years Later, Steven Levy Looks Back on the Power Mac G4 Cube

Over at Wired, veteran tech journalist Steven Levy looks back at the Power Mac G4 Cube, over 20 years after its release. Levy recounts how Steve Jobs revealed the Cube to him. While Levy was puzzled by how the Cube fit into Apple’s lineup, Jobs was enamored with the Cube’s proprietary plastics, motion sensors, and unique disc drive mechanism. (For our coverage of the Cube at the time, see “New iMacs, Multiprocessor G4s, and G4 Cubes,” 24 July 2000.)

G4 Cube with speakers, monitor, keyboard, and mouse

Unfortunately, the Cube was just a bit too cutting-edge. The plastic often cracked, the fanless design overheated, and the motion-sensing power “button” would often turn the machine on whether you wanted it on or not. Worst of all, it didn’t compete well on price or performance with the Power Mac G4 mini-tower. Many of Apple’s critics accuse the company of putting form well above function, and in the case of the Cube, it was all too true. The Cube sold fewer than 150,000 units in the one year Apple offered it for sale (see “Apple Discontinues G4 Cube,” 9 July 2001).

As TidBITS writer Glenn Fleishman pointed out on Twitter, Apple eventually perfected the concept of the Cube with the Mac mini.