Question: Q: What is the purpose of Expose now?
I loved Expose in that I could see my minimized application windows. Mission control does not show any minimized windows and Expose seems to do nothing now. How do I see my minimized windows now? What is the purpose of Expose? This update is very dissapointing so far!
Posted on Jul 21, 2011 12:49 PM
All replies
Loading page content
Page content loaded
I am having difficulty understanding the differences between expose and Mission Control. I understand mission control shows more information, but if it shows more info, why still use expose?
Jul 21, 2011 12:50 PM
Exposé still provides you with the ability to view applications windows as always (although we now no longer can see «all windows» via Exposé.)
Mission Control is the replacement for «Spaces» not Exposé. The major backward step from Spaces to MC is that the user can’t activate MC and then drag a window from another space into the current one or another unselected deskop space. A major oversight that I hope will be soon corrected. You can however, drag windows from the current space into one of the other virtual spaces.
Jul 21, 2011 1:02 PM
The old expose was MUCH better, it showed all applications and not only ones revolving around your selected window.
How can I see EVERYTHING that’s running?
Jul 21, 2011 1:09 PM
I know this isn’t what you want to hear (and I don’t like saying it), but this is one of the one-step-back situations. Both Spaces and Exposé were more full-featured in Snow Leopard.
Jul 21, 2011 1:15 PM
So in expose now, you can only see the current application windows?
I still struggle to see how mission control is a replacement for spaces, because it shows all of the windows from what I can see on the screenshots. Can you explain in more depth?
Jul 21, 2011 1:18 PM
Spaces took some time to set up, you have to agree. And I understand Apple is trying to make things simpler with less of a hassle. But apple, this is taking features away from people who dont mind spending an hour configuring their spaces and those people who do take that time usually spend more time on the computer in general.
Jul 21, 2011 1:23 PM
The only thing that I can get Expose to do is show me the open windows of the program that I am working in ie. if I have four browser windows open at the the same time, Expose will show me those four windows. But that’s it! Why does Apple need to change things that worked just fine?
Jul 21, 2011 1:25 PM
Exposé has always technically just been a methodology to view and select windows and modes in a user friendly way. To my knowledge, what has been dropped from the Expose/Mission Control selection list is the All Windows and instead, we now have Application Windows, Desktop, MC, Dashboard, Launchpad, and a few other things we’ve always had.
Jul 21, 2011 1:26 PM
The old expose was MUCH better, it showed all applications and not only ones revolving around your selected window.
How can I see EVERYTHING that’s running?
I agree App Expose is fine if you knew the window you were looking for was minimized, instead of hidden behind another window.
Also you need to be in that app to bring up its minimised windows — which is irritating if you are using more than one app to manipulate files.
Jul 21, 2011 3:06 PM
Also, App Expose includes other files that are not open or minimized, making the search for the minimised one even harder!
Thankfully I haven’t upgraded my work Mac yet. It is staying with Snow Leopard.
Jul 21, 2011 3:27 PM
in MC you can hover over a group and scroll up w/ your mouse or trackpad to spread apart its contents (however it doesnt’ spread out far enough to clearly see each window). In this mode you can select a window and drag it to another space.
in the old Expose you used to be able to drag any window from any space to another. in MC you can only drag a window from the active space.
I also miss how zippy spaces was with switching where only the windows would slide. The transition now with the duplicate desktop feels so slow to me. I guess they made it this way because of full screen apps.
Jul 26, 2011 8:05 PM
Its mindless! 10.8 — Trying to please old world apple fans by keeping bits and bobs from the past, and unless you have been following each and every version of OS x over the years you are left clueless, that’s why iOS is so great, it was a blank slate, that’s what we need for mac OS, something completly new, we are stuck in a rabbit hole, its time to chuck in a grenade! Please Apple, do what you were created for and give us something completely new. Fulfil the prophecy!
Sep 5, 2012 3:49 PM
Its mindless! 10.8 — Trying to please old world apple fans by keeping bits and bobs from the past, and unless you have been following each and every version of OS x over the years you are left clueless, that’s why iOS is so great, it was a blank slate, that’s what we need for mac OS, something completly new, we are stuck in a rabbit hole, its time to chuck in a grenade! Please Apple, do what you were created for and give us something completely new. Fulfil the prophecy!
This thread is way over 12 month old and is in the Lion Forums. Nothing to achieve here.
Sep 5, 2012 6:03 PM
Question: Q: What is the purpose of Expose now? More Less
Источник
Hmmm, you are using a Gmail.com email address.
Google has declared war on the independent media and has begun blocking emails from NaturalNews from getting to our readers. We recommend GoodGopher.com as a free, uncensored email receiving service, or ProtonMail.com as a free, encrypted email send and receive service.
EXPOSED: Apple CEO Tim Cook signed secret $275 billion deal with the CCP, betraying America
(Natural News) It is being reported that Apple CEO Tim Cook signed a secret agreement with the Chinese Communist Party (CCP) promising to prop up China’s economy and technological capabilities.
The $275 billion contract, which was confirmed through “interviews and purported internal Apple documents,” was signed in 2016 with a timeline of five years. That five years is just about complete.
Concerned about bad publicity in China, Apple executives reportedly pushed for a closer alliance with the CCP. China, by the way, is where all Apple products are manufactured.
The alleged internal documents show that Cook “personally lobbied officials” in China over threats made against key company products such as iCloud, the App Store and Apple Pay, a cashless payment system.
A 1,250-word agreement was then forged by Apple’s government affairs team in China, establishing a “memorandum of understanding” between the tech giant and the communist regime.
This memorandum called on the National Development and Reform Commission to establish and agree upon various concessions in exchange for certain regulatory exemptions.
“In May 2016, Cook announced that Apple would be investing $1 billion in the Chinese ride-hailing startup Didi Chuxing in a pointed attempt to mollify authorities,” reports explain.
“Shortly after, Cook, Apple Chief Operating Officer Jeff Williams, and government affairs head Lisa Jackson met with senior government officials in Zhongnanhai, the central headquarters of the Communist Party of China.”
Apple censors Bible apps in China because CCP hates Christianity
With Cook at the helm, Apple was able to get the CCP to sign the multibillion-dollar agreement, eliminating all sorts of regulatory actions against the company with special exemptions.
In exchange, China received significant investments, business deals, and worker training in the country, among other perks.
Apple specifically pledged in the agreement to help Chinese manufacturers develop “the most advanced manufacturing technology,” as well as “support the training of high-quality Chinese talents.”
Apple further promised to use more Chinese suppliers’ components in its various products, as well as invest capital into Chinese tech companies. There was also a clause about assisting more than a dozen Chinese government causes, which sounds like treason.
If no objections were made to the agreement, then it was also baked into the deal that it would be extended for a sixth year with an expiration date of May 2022, whichВ is on the way.
Apple zealously promised “many billions of dollars more” to China for new retail stores, renewable energy projects, and research and development facilities as well.
Another key component of the deal was Apple’s agreement to censor certain apps that the CCP does not want Chinese people accessing, including popular Bible apps such as Olive Tree.
The Quran Majeed, developed by PDMS, is also banned in Apple’s Chinese App Store, as are a number of other religious apps.
“Helping the enemy in any endeavor is a crime, is it not?” wrote one commenter at Neon Nettle, which covered the revelation. “This puke (Cook) is unamerican at the least and treasonous at the most. Boycott Apple and their Chinese products!”
“It is obvious that Apple CEO Tim Cook hasn’t an inkling of allegiance to the U.S. nor to the idea of preserving unalienable individual rights, let alone any form of a limited government republic,” wrote another.
Another joked that Cook must be related to Hunter Biden because “both need to be tried for treason.”
Yet another asked, “Doesn’t America have a statute criminalizing trading with the enemy?”
This is a valid question indeed, and one that everyone should be asking themselves right about now as increasingly more of these tech “gods” get exposed for collusion and conspiracy with enemy powers.
Источник
Apple Exposes iOS Security Details
Yes, Apple’s Ivan Krstic announced a new bug bounty program at Black Hat. But before that he explained several components of iOS security in unprecedented detail.
You’ve heard by now that Apple announced a new bug bounty program at the recent Black Hat conference. In an unusual appearance, Ivan Krstic, Apple’s head of security engineering and architecture, made the announcement himself. But that was just the last 10 minutes of a 50-minute presentation. For The first 40 minutes, Krstic took an unprecedented deep dive into three components of iOS security. And by deep, I mean bathyspheric.
My overall takeaway was a sense of awe at how thoroughly these systems protect user data, even from Apple itself. I’ll try to convey what was said, without getting too technical.
Hardened WebKit JIT Mapping
Sorry, that’s what it’s called. JIT stands for Just In Time, and refers to the way Javascript code is compiled just in time for its execution. «This is necessary for high-performance JavaScript,» explained Krstic. «But the code-signing policy has to be relaxed. The JIT compiler emits new, unsigned code. An attacker who managed a write-anywhere attack could enable execution of arbitrary code.»
For a little background, areas of memory can be marked with read, write, and execute permissions. That distinction, introduced ages ago, snuffed out attacks that executed code in areas devoted to data. Briefly, Apple’s solution involves a technique putting the compiled JavaScript into a memory area that permits only execution. Processes can’t read what’s there or write new data. There’s a bit more to it than that, but this change, specific to iOS 10, wipes out a whole range of possible attacks.
Secure Enclave Processor
Applications on an Apple device run in a CPU called the Application Processor, or AP. Modern Apple devices have an entirely separate CPU called the Secure Enclave Processor, or SEP. «The SEP is protected by a strong cryptographic master key from the user’s passcode,» said Krstic. «Offline attack is not possible. It sidesteps the attack surface of the AP, even when the AP has been compromised. It arbitrates all user access and manages its own encrypted memory. On first initialization it uses a true random number generator to create a unique device key within the processor. It’s not exportable, and it’s stored in immutable secure ROM.»
Krstic went on to explain how the device uses four types of internal security keys with different characteristics. Type A exists only when the device is unlocked. Type B is an always-present public key, plus a private key that exists when the device is unlocked. Type C comes into existence the first time the device is unlocked after boot. And type D is always available.
The presentation moved on to a number of seriously intricate diagrams. One walked through the process of booting and unlocking the device, showing how each key type was created and stored. Every file on your device has its own, unique encryption key; another diagram showed the intricate dance that lets the SEP authenticate and decrypt that file while keeping the essential security keys inside itself. Another explained the complex process that makes it possible for you to choose «Update later.» And yet another walked through the process that permits unlocking via touch ID without keeping the master key visible in any way.
The key takeaway from this part of the talk is that Apple has really, really thought through what’s required to manage encryption completely inside the Secure Enclave Processor, without forcing the user to go to much trouble at all. If you’d like to see those diagrams for yourself, check out the Krstic’s full presentation.
Synchronizing Secrets
It’s awfully convenient that you can sync your data between multiple Apple devices. HomeKit lets you manage IoT devices, AutoUnlock makes your Mac unlock when your Apple Watch is nearby, your photos sync through iCloud, and so on. But security-wise, syncing is a problem.
«Traditional approaches are not good,» said Krstic. «One way is to make the user enter a strong ‘sock drawer key’ on all devices; lose it, and access to the secrets is lost. The other way is to wrap the data in a derived key that leaves the data exposed to the account provider.»
«We had a number of goals here,» continued Krstic. «Secrets must be available all devices, protected by strong crypto. Users can recover secrets even if they lose all connected devices. Data is not exposed to Apple, and there’s no possibility of a brute-force attack.»
Authentication in the basic iCloud Keychain system is simple. Every device has its own key pair, and in order to add a new device to the sync circle, you must approve it from one of your existing device. Apple’s backend is not involved; it has no privilege. If a user loses access to all devices, access can be regained using both the iCloud Security Key and the iCloud password.
Krstic explained in great detail how Apple manages this system without leaving open the slightest possibility that anyone, including anyone at Apple, could access data from the back end. The system involves what are called admin cards, created at the time a new fleet of crypto servers is commissioned. «Admin cards are created in a secure ceremony when the fleet is commissioned, and stored in separate physical safes in custody of three different organizations at Apple, in tamper-proof evidence bags,» said Krstic.
That situation lasts only until the fleet is actually put into operation. At that time, said Krstic, «We put the admin cards through a novel one-way hash function.» Pulling a clearly-used blender from under the podium, he continued, «Yes, a trip through the blender.» Once the fleet of crypto servers is active, it can’t be updated or modified in any way, not even by Apple, because the admin cards have been destroyed. If it happens that an update really is required, Apple must spin up a new fleet and send out a software update that makes user devices connect to the new fleet.
«Why do we do this,» said Krstic. «Why do we take this last step that’s extremely unusual? We go to great lengths to engineer the security systems to provide trust. When data leaves the device, the stakes are even higher. We need to maintain that trust. If we keep possession of those admin cards, there’s the possibility that’s not true. That’s how seriously we take our mission about user data.»
Asked, «Did you do this because of the FBI requests for information?» Krstic replied, «I’m an engineer. I can only answer questions about why I presented today.» OK, fair enough. But I think the questioner was right. Making a self-contained system that you can’t even modify yourself is a pretty good way to keep someone else from making unwanted changes.
I hope I’ve conveyed the level of detail in Krstic’s talk without making your eyes glaze over. Judging by the chatter as the group dispersed, the true byte-level security geeks in the room were highly impressed.
Like What You’re Reading?
Sign up for Security Watch newsletter for our top privacy and security stories delivered right to your inbox.
This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.
Your subscription has been confirmed. Keep an eye on your inbox!
Источник