Hacker Newsnew | past | comments | ask | show | jobs | submit | skyo's commentslogin

It's one of the largest parking garages in the world

Exactly. It was also a way to train customers to navigate directly to Amazon instead of through search engines (where Amazon pays for ads).


The Dark Sky API is getting shut down in a few months: https://blog.darksky.net/


Right, TSA even refers to it as "TSA PreCheck" on their website: https://www.tsa.gov/precheck


Same. I stopped reading halfway through because I'm on battery and don't want to run it down just reading a blog post. Also I got tired of the fan noise.


Probably the best way to check is https://haveibeenpwned.com/


Or https://monitor.firefox.com/ (which is basically the same thing)


It's pretty good, but I feel like the screenshots don't really convey the app's value very well. Maps wants to connect to maps.apple.com? Of course it should. Itunes wants to itunes.apple.com? Well, yeah.

I'd much rather see a screenshot of some app trying to connect to a sketchy or surprising domain. I think that would really drive home the app's purpose and make it look less like nuisance that's going to bug me every time I launch Apple Maps.


And that's why I fail to see the value for this.

Does anyone use this for reasons other than blocking license validation checks on pirated software? Because that's the only reason I can think of for getting this.


That was my first use case.

But then I found others, like monitoring my banking websites reaching out to odd domains and ports. Or virus detection (some virii uninstall if they detect Little Snitch). The more I used it, the more I liked it. So I unblocked the Little Snitch license checks and bought a legit copy.


You'd be surprised how many apps try and make requests to ad servers e.g. doubleclick. It's also a pretty good network monitor if you want a coarse profile of which apps are using network badnwidth (and how much).


Whitelist for phone tethering. Use it almost every day!


I use it to lockdown network traffic before my VPN kicks in, and to throttle anything data hungry when I'm tethering.


I'm going to try it right now for controlling what's using data when I'm tethering via my phone.


I use it while tethering so that automatic updates don't start chewing up expensive bandwidth.


Yes. I use this to control what information my Mac sends back to Apple.

My workflow for the first system on a network is to install the OS offline, then install Little Snitch from a thumb drive from a trusted system.

I set it to Silent, Deny All mode and turn off all rules except for the rules that allow software to make (not receive) connections to the local network. Then, and only then, I connect the network cable and try to pull an IP address. If you're using dhcp then this will fail. To deal with that, I create a profile that applies only when connected to my home network and then add an allow rule to let dhcpd/discoveryd (IIRC) to pull IP addresses.

I then try to open up Safari and browse to, say, Google. This will typically fail for two reasons: outgoing DNS queries are not allowed outside of the network and Safari doesn't have rights to connect outside the local network. If my DNS servers are outside of my local network I add a rule to allow the DNS lookup process to connect to only the DNS servers I have defined. I then give Safari allow rules for ports 80 and 443. Both of these rules are added to the home network only profile.

From there, I'll try to access the App Store and sort out what rules are needed for that, adding them and then adding them to my home network only profile. At this point, I'll take a firewall rules backup. Now, if I need to reinstall, I can load this rules backup and be able to browse the Internet, pull system updates, and then evaluate other software that needs network requests.

Software that tries to connect is logged, and each connection is logged. For software that is too "chatty", trying to talk to the network when it shouldn't, I'll add deny rules so they don't spam the failed connections log. Other software will have case-by-case exceptions made for it as necessary.

Generally, all of my allow rules will stay in my home network only profile, but there are a few that I'll always allow out. These are often SSH connections as they should be secure no matter where I'm at.


This would be a lot like Google's how "artificial lens blur" feature works[1]. I don't think it would be too difficult to teach a user to move their phone a little to scan the scene.

[1] http://googleresearch.blogspot.com/2014/04/lens-blur-in-new-...


Yes, it's a feature that was introduced with Mavericks.

https://developer.apple.com/notifications/safari-push-notifi...


Yeah, for some reason the link doesn't show up when searching the page. You can find it at the bottom of the page, under the header "Connect". It's between the links for "Become a Reseller" and "Privacy Policy"


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: