<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://mirror.consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kirb</id>
	<title>Consumer Rights Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://mirror.consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Kirb"/>
	<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/w/Special:Contributions/Kirb"/>
	<updated>2026-05-21T23:28:28Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Talk:Apple_App_Store&amp;diff=42429</id>
		<title>Talk:Apple App Store</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Talk:Apple_App_Store&amp;diff=42429"/>
		<updated>2026-03-10T05:36:11Z</updated>

		<summary type="html">&lt;p&gt;Kirb: /* See also */ Reply&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==See also==&lt;br /&gt;
&lt;br /&gt;
Is the self promotion allowed?  [[User:Dosjdhdjdjdhdjdjdj|Dosjdhdjdjdhdjdjdj]] ([[User talk:Dosjdhdjdjdhdjdjdj|talk]]) 06:26, 19 February 2026 (UTC)&lt;br /&gt;
&lt;br /&gt;
:No issue with me if it&#039;s removed. This article was started before the wiki existed, and in general still needs tidying up into a format that properly suits the wiki. [[User:Kirb|kirb]] ([[User talk:Kirb|talk]]) 05:36, 10 March 2026 (UTC)&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=14039</id>
		<title>Apple App Store</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=14039"/>
		<updated>2025-05-01T08:41:36Z</updated>

		<summary type="html">&lt;p&gt;Kirb: /* Epic Games */ Fix link to Epic article&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:App Store (iOS).svg|thumb|150px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Apple]]&#039;&#039;&#039; uses a range of technical measures to protect their App Store ecosystem and reduce consumer choice. These measures obscure the company&#039;s business intentions, creating roadblocks for app developers and users, while typically citing security reasons for their existence. This actively hurts the ability for lawmakers to advocate for the rights of consumers and businesses in Apple&#039;s ecosystem, and prevents apps from being as useful as their customers expect.&lt;br /&gt;
&lt;br /&gt;
A never-ending demand for a cut of every sale of a digital product, ranging from game currency, to supporting content creators,&amp;lt;ref name=&amp;quot;patreon&amp;quot;&amp;gt;{{Cite web |last=Roth |first=Emma |date=12 Aug 2024 |title=Patreon: adding Apple’s 30 percent tax is the price of staying in the App Store |url=https://www.theverge.com/2024/8/12/24218629/patreon-membership-ios-30-percent-apple-tax |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; to booking a Zoom call with a local business,&amp;lt;ref name=&amp;quot;facebook&amp;quot;&amp;gt;{{Cite web |last=Paul |first=Katie |last2=Nellis |first2=Stephen |date=28 Aug 2020 |title=Exclusive: Facebook says Apple rejected its attempt to tell users about App Store fees |url=https://www.reuters.com/article/us-facebook-apple-exclusive/exclusive-facebook-says-apple-rejected-its-attempt-to-tell-users-about-app-store-fees-idUSKBN25O042/ |url-status=live |access-date=16 Mar 2025 |website=[[Reuters]]}}&amp;lt;/ref&amp;gt; hurts the ability for app developers to innovate. These developers, working hard and pulling countless hours to build a quality app, always need to take Apple&#039;s (and [[Google]]&#039;s) demands into account - specifically, a fee of between 15% and 30% of all revenue collected via the app. This is revenue that can be reinvested into the app, but instead must be earmarked for the platforms they are &#039;&#039;&#039;required&#039;&#039;&#039; to use to reach their customers.&lt;br /&gt;
&lt;br /&gt;
Because this is a clear problem, several governments, including South Korea,&amp;lt;ref&amp;gt;{{Cite web |date=8 Mar 2022 |title=South Korea approves rules on app store law targeting Apple, Google |url=https://www.reuters.com/technology/skorea-approves-rules-app-store-law-targeting-apple-google-2022-03-08/ |url-status=live |access-date=16 Mar 2025 |website=[[Reuters]]}}&amp;lt;/ref&amp;gt; Japan,&amp;lt;ref&amp;gt;{{Cite web |last=Sharwood |first=Simon |date=13 Jun 2024 |title=Japan forces Apple and Google to allow third-party app stores and payments |url=https://www.theregister.com/2024/06/13/japan_smartphone_software_law/ |url-status=live |access-date=16 Mar 2025 |website=[[The Register]]}}&amp;lt;/ref&amp;gt; the European Union,&amp;lt;ref&amp;gt;[[wikipedia:Digital Markets Act|Digital Markets Act]]&amp;lt;/ref&amp;gt; the United Kingdom,&amp;lt;ref&amp;gt;{{Cite web |last=Competition and Markets Authority |date=4 Mar 2021 |title=Investigation into Apple AppStore |url=https://www.gov.uk/cma-cases/investigation-into-apple-appstore |url-status=live |access-date=16 Mar 2025 |website=[[gov.uk]]}}&amp;lt;/ref&amp;gt; Australia,&amp;lt;ref&amp;gt;{{Cite web |date=28 Apr 2021 |title=Dominance of Apple and Google&#039;s app stores impacting competition and consumers |url=https://www.accc.gov.au/media-release/dominance-of-apple-and-googles-app-stores-impacting-competition-and-consumers |url-status=live |access-date=16 Mar 2025 |website=[[ACCC]]}}&amp;lt;/ref&amp;gt; as well as the US and a handful of states,&amp;lt;ref&amp;gt;[[wikipedia:Open App Markets Act|Open App Markets Act]]&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=20 Nov 2024 |title=S.5364 - App Store Accountability Act |url=https://www.congress.gov/bill/118th-congress/senate-bill/5364/text/is |url-status=live |access-date=16 Mar 2025 |website=[[congress.gov]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;doj&amp;quot;&amp;gt;{{Cite web |last=Balsamo |first=Mike |last2=Liedtke |first2=Mike |last3=Whitehurst |first3=Lindsay |last4=Bajak |first4=Frank |date=21 Mar 2024 |title=Justice Department sues Apple, alleging it illegally monopolized the smartphone market |url=https://apnews.com/article/apple-antitrust-monopoly-app-store-justice-department-822d7e8f5cf53a2636795fcc33ee1fc3 |url-status=live |access-date=16 Mar 2025 |website=[[APNews]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=19 Feb 2021 |title=It’s time to free ourselves from ‘Big Tech’ monopoly |url=https://azcapitoltimes.com/news/2021/02/19/its-time-to-free-ourselves-from-big-tech-monopoly/ |url-status=live |access-date=16 Mar 2025 |website=[[Arizona Capitol Times]]}}&amp;lt;/ref&amp;gt; have opened investigations into anti-competitive practices, or considered or already passed legislation to force &amp;quot;gatekeeper platforms&amp;quot; such as Apple to be more reasonable with third-party developers.&lt;br /&gt;
&lt;br /&gt;
This being a major threat to Apple&#039;s revenue stream (interestingly, one they claim to be unsure is profitable&amp;lt;ref&amp;gt;{{Cite web |last=Lovejoy |first=Ben |date=17 Apr 2024 |title=Schiller doesn’t know whether the App Store is profitable; there are no minutes of meetings |url=https://9to5mac.com/2024/04/17/app-store-is-profitable-apple-notes/ |url-status=live |access-date=16 Mar 2025 |website=[[9to5Mac]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=Lovejoy |first=Ben |date=17 Jan 2025 |title=Apple denies App Store profit margin is 75% – claims to have no clue |url=https://9to5mac.com/2025/01/17/apple-denies-app-store-profit-margin-is-75-claims-to-have-no-clue/ |url-status=live |access-date=16 Mar 2025 |website=[[9t05Mac]]}}&amp;lt;/ref&amp;gt;), they have responded with practices such as geoblocking certain operating system functionality based on physical location,&amp;lt;ref&amp;gt;{{Cite web |title=Eligibility |url=https://theapplewiki.com/wiki/Eligibility |url-status=live |access-date=16 Mar 2025 |website=[[The Apple Wiki]]}}&amp;lt;/ref&amp;gt; misrepresenting/overstating risks, and using careful wording with commonly-understood terms to describe unreasonably difficult-to-use systems.&lt;br /&gt;
&lt;br /&gt;
==Background info==&lt;br /&gt;
Important terms you&#039;ll run into in this article:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;[[wikipedia:Sandbox (computer security)|Sandbox]]&#039;&#039;&#039;: Reduces exposure of the user&#039;s device/data to security risks, by reducing what an app is allowed to do.&lt;br /&gt;
*&#039;&#039;&#039;[https://theapplewiki.com/wiki/Entitlements Entitlements]&#039;&#039;&#039;: Apple&#039;s method of &amp;quot;poking holes&amp;quot; in the sandbox, to give the app more permissions. Some are available to developers, while many are only available to Apple.&lt;br /&gt;
*&#039;&#039;&#039;[[wikipedia:Digital Markets Act|Digital Markets Act]]&#039;&#039;&#039;: The European Union&#039;s fairly sweeping recent regulations against forcing companies they classify as &amp;quot;gatekeepers&amp;quot; to play nice, giving smaller businesses access to software/hardware features they&#039;ve historically reserved for their own use.&lt;br /&gt;
&lt;br /&gt;
==In-app purchases==&lt;br /&gt;
Apple has been collecting users&#039; credit card numbers since launching the iTunes Store in 2004. The launch of the App Store in 2008, followed by the introduction of in-app purchases (IAPs) in 2009, gave iPhone app developers the opportunity to sell app features to users. The IAP system is provided as a developer framework named [https://developer.apple.com/storekit/ StoreKit]. Apps and their in-app purchases are managed through a dashboard named [https://developer.apple.com/app-store-connect/ App Store Connect]. App sales have eclipsed iTunes Store sales, and are now a primary focus of Apple&#039;s Media Services division.&lt;br /&gt;
&lt;br /&gt;
Apple requires any purchase of a digital good or service in an app to use their in-app purchase system. This may seem reasonable because the customer may inevitably call Apple support, demanding a refund for an app they have issues with. Apple would rather give that refund and leave the customer with a positive support experience, than to provide a messy process involving contacting a third-party, whose customer service is likely nowhere near the same experience.&lt;br /&gt;
&lt;br /&gt;
App Store purchase fees are between 15% and 30%. In September 2016, Apple expanded subscriptions to be available to any type of app, also introducing a 15% discount incentive when the user has already subscribed for a year.&amp;lt;ref&amp;gt;{{Cite web |last=Goode |first=Lauren |date=2 Sep 2016 |title=Apple’s new subscription offerings are now available to App Store developers |url=https://www.theverge.com/2016/9/2/12774758/apple-developers-app-store-new-subscription-rules |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; In November 2020, Apple introduced a reduced 15% fee for app developers with revenue below $1 million per year.&amp;lt;ref&amp;gt;{{Cite web |last=Centers |first=Josh |date=18 Nov 2020 |title=Apple Drops App Store Commission to 15% for Small Developers |url=https://tidbits.com/2020/11/18/apple-drops-app-store-commission-to-15-for-small-developers/ |access-date=16 Mar 2025 |website=[[TidBITS]]}}&amp;lt;/ref&amp;gt; For developers above this threshold, and for cases excluded from this program such as for games, the fee is 30%. In the 2008 announcement of the App Store, Apple considered this a reasonable, industry-standard fee. However, the way we use apps has significantly evolved since 2009 - the world has shifted to heavily depend upon on mobile apps, which have also evolved into more complex and sustainable business models than a simple one-time purchase.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Stripe, Inc.|Stripe]], a popular platform used for payments on the web, uses a base fee of 2.9% plus a fixed $0.30 in the United States.&amp;lt;ref&amp;gt;{{Cite web |title=Pricing |url=https://stripe.com/it/pricing |url-status=live |access-date=16 Mar 2025 |website=[[Stripe]]}}&amp;lt;/ref&amp;gt; With add-on services, before considering volume discounts, a Stripe transaction may rather have a cost of 6.4% + $1.10.&amp;lt;ref&amp;gt;Calculated from base fee (2.9% + $0.30) + international card (1.5%) + adaptive pricing (2%) + international payment methods ($0.80), as of January 2025&amp;lt;/ref&amp;gt; Stripe has been used by businesses ranging from small online stores, to [[OpenAI]] for ChatGPT Plus. Competing payments services have similar or identical fees to Stripe. &#039;&#039;&#039;The in-app purchase system does not provide sufficient value to justify considerably higher fees than alternative payment platforms.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The App Store system poorly handles secondary marketplaces of digital services that exist within the primary App Store marketplace, such as Patreon. Apple, however, still requires companies in the business of selling digital services to use this inadequate system. This requires the app to account for Apple&#039;s fee, which is significant enough to often warrant increasing prices, and to follow rules even if they do not make sense for the nature of service they are providing. Apple has frequently been found in disputes with such apps. This injects extra complication at no benefit to the marketplace, the creator, or the customer - only to Apple, who has little to no involvement after delivering the initial app download to the user&#039;s phone. The significant fee also often drives app developers to consider building their app around an advertising model instead, creating privacy concerns.&lt;br /&gt;
&lt;br /&gt;
Additionally, the 15% small businesses fee discount is judged based on the app&#039;s overall turnover, and is not based on individual creators in the app&#039;s marketplace. An app that turns over $1 million per year by providing services to creators that individually make less than $1 million per year does not have the opportunity to use the discount.&lt;br /&gt;
&lt;br /&gt;
Apple, often together with Google, use lobbying efforts in the United States and other countries in an attempt to minimize the issues. &amp;quot;ACT | The App Association&amp;quot;, pitched as an association of independent small business app developers, is at least 50% funded by Apple, and does not list its claimed 2,000 members.&amp;lt;ref&amp;gt;{{Cite web |date=1 Oct 2021 |title=Not a class ACT: the so-called App Association is simply an Apple Association and does NOT represent app developers&#039; interests in fair distribution terms |url=http://www.fosspatents.com/2021/10/not-class-act-so-called-app-association.html |url-status=live |access-date=16 Mar 2025 |website=[[FOSS Patents]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=19 Sep 2022 |title=Vast majority of ACT {{!}} The App Association&#039;s funding comes from Apple, former employees tell Bloomberg: astroturfing against app developers&#039; interests |url=http://www.fosspatents.com/2022/09/vast-majority-of-act-app-associations.html |url-status=live |access-date=16 Mar 2025 |website=[[FOSS Patents]]}}&amp;lt;/ref&amp;gt; In March 2024, the United States Department of Justice along with 16 state attorneys-general filed a lawsuit against Apple, including an accusation that the company &amp;quot;extracts more money from consumers, developers, content creators, artists, publishers, small businesses, and merchants, among others&amp;quot;.&amp;lt;ref name=&amp;quot;doj&amp;quot; /&amp;gt; The future of this lawsuit is unclear as of April 2025.&lt;br /&gt;
&lt;br /&gt;
Despite criticism of Apple forcing their fee into transactions with small businesses and creators on [[#Patreon|Patreon]], [[#Facebook online events|Facebook]], and similar platforms, on 23 January 2025, Apple announced the Advanced Commerce API. It &amp;quot;support[s] developers&#039; evolving business models - such as exceptionally large content catalogs, creator experiences, and subscriptions with optional add-ons&amp;quot;.&amp;lt;ref&amp;gt;{{Cite web |date=23 Jan 2025 |title=Introducing the Advanced Commerce API |url=https://developer.apple.com/news/?id=yxy958ya |url-status=live |access-date=16 Mar 2025 |website=[[Apple Developer]]}}&amp;lt;/ref&amp;gt; While positioned as a way for such businesses to save development time and avoid ongoing costs by building on top of Apple&#039;s mature payments platform, its use is in fact necessary for these businesses to work within the App Store guidelines, as seen in cases outlined below. The feature requires submitting a description of the app&#039;s business model to Apple for approval. This continues a trend of requiring Apple&#039;s consent to conduct business in a place users have been trained to expect it.&lt;br /&gt;
&lt;br /&gt;
Given Apple&#039;s strong incentives, and a ticking clock as legal pressure builds, it is not hard to find stories from app developers regarding poor experiences with Apple&#039;s app review process.&lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;This list is extremely incomplete. Please add examples if you know of any.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Epic Games===&lt;br /&gt;
{{hatnote|See also: [[wikipedia:Epic Games v. Apple|Epic Games v. Apple]] and [[wikipedia:Epic Games v. Google|Epic Games v. Google]]}}&lt;br /&gt;
&lt;br /&gt;
[[Epic Games, Inc.]] is a video game developer and publisher, known for games such as [[Fortnite]] and [[Unreal Tournament]], the [[Unreal Engine]], and the [[Epic Games Store]].&lt;br /&gt;
&lt;br /&gt;
In 2018, Epic Games launched Fortnite on the iOS and Android platforms. The company made the unusual decision to not release the app on the [[Google Play Store]] - rather, it was made available as a standalone [[wikipedia:apk (file format)|Android app package]] file (.apk), which must be installed by following a series of manual steps.&amp;lt;ref&amp;gt;{{Cite web |last=Statt |first=Nick |date=3 Aug 2018 |title=Fortnite for Android will ditch Google Play Store for Epic’s website |url=https://www.theverge.com/2018/8/3/17645982/epic-games-fortnite-android-version-bypass-google-play-store |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; The app was also released on the [[Samsung]] [[Samsung Galaxy Store|Galaxy Store]]. Google offered a $147 million deal for Epic Games to release Fortnite on the Play Store, which the company declined.&amp;lt;ref&amp;gt;{{Cite web |last=Robertson |first=Adi |date=9 Nov 2023 |title=Google offered Epic $147 million to launch Fortnite on the Play Store |url=https://www.theverge.com/2023/11/8/23953262/google-epic-fortnite-play-store-investment-antitrust-trial |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 22 April 2020, Fortnite was finally released on the Play Store.&amp;lt;ref&amp;gt;{{Cite web |last=Carpenter |first=Nicole |date=22 April 2020 |title=Fortnite available on the Google Play Store for the first time |url=https://www.polygon.com/2020/4/21/21229930/fortnite-available-on-google-play-android-mobile-devices |url-status=live |access-date=1 May 2025 |website=[[Polygon]]}}&amp;lt;/ref&amp;gt; In a statement, the company explained:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
After 18 months of operating Fortnite on Android outside of the Google Play Store, we&#039;ve come to a basic realization: Google puts software downloadable outside of Google Play at a disadvantage, through technical and business measures such as scary, repetitive security pop-ups for downloaded and updated software, restrictive manufacturer and carrier agreements and dealings, Google public relations characterizing third party software sources as malware, and new efforts such as Google Play Protect to outright block software obtained outside the Google Play store.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 13 August 2020, Epic Games launched a campaign against both Apple and Google&#039;s app store business practices. The company released app updates on both platforms, introducing a method for purchasing V-Bucks in-game currency at a 20% discount by directly transacting with Epic Games, against the developer rules of both platforms. The platforms responded by removing the game from their storefronts. Epic Games then filed civil antitrust lawsuits against both companies in the Northern District of California.&amp;lt;ref&amp;gt;{{Cite web |last=Statt |first=Nick |date=14 Aug 2020 |title=Epic Games is suing Apple |url=https://www.theverge.com/2020/8/13/21367963/epic-fortnite-legal-complaint-apple-ios-app-store-removal-injunctive-relief |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; The campaign, branded &amp;quot;Free Fortnite&amp;quot;, was later extended with lawsuits and complaints in Australia,&amp;lt;ref&amp;gt;{{Cite web |date=18 Nov 2020 |title=Epic Games extends its fight against Apple to Australia |url=https://www.epicgames.com/site/en-US/freefortnite-australia-press-release |url-status=live |access-date=16 Mar 2025 |website=[[Epic Games]]}}&amp;lt;/ref&amp;gt;, the European Union,&amp;lt;ref&amp;gt;{{Cite web |date=17 Feb 2021 |title=Epic Game Files EU Antitrust Complaint Against Apple |url=https://www.epicgames.com/site/en-US/news/epic-games-files-eu-antitrust-complaint-against-apple |url-status=live |access-date=16 Mar 2025 |website=[[Epic Games]]}}&amp;lt;/ref&amp;gt; and the United Kingdom.&amp;lt;ref&amp;gt;{{Cite web |date=30 Mar 2021 |title=Epic Games files complaint to support CMA Apple investigation |url=https://www.epicgames.com/site/en-US/news/epic-games-files-complaint-to-support-cma-apple-investigation |url-status=live |access-date=16 Mar 2025 |website=[[Epic Games]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 11 September 2021, Judge Yvonne Gonzalez Rogers decided on the case. While the lawsuit against Apple failed on 9 of 10 counts, Rogers ruled against Apple&#039;s use of &amp;quot;anti-steering&amp;quot; - their strategies of preventing the user from being &amp;quot;steered&amp;quot; to a third-party storefront for payment processing, placing a permanent injunction on this behavior.&amp;lt;ref&amp;gt;{{Cite web |last=Brandon |first=Russell |date=11 Sep 2021 |title=Apple must allow other forms of in-app purchase, rules judge in Epic v. Apple |url=https://www.theverge.com/2021/9/10/22662320/epic-apple-ruling-injunction-judge-court-app-store |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; Despite the case mostly failing, the discovery process provided significant insight into Apple&#039;s decisions around App Store policies, including decisions made in major app review disputes, and in one case, executive Phil Schiller arguing to reduce the fee from 30%.&amp;lt;ref&amp;gt;{{Cite web |last=Gurman |first=Mark |date=4 May 2021 |title=Apple’s Schiller Floated Cutting App Store Fees a Decade Ago |url=https://www.bloomberg.com/news/articles/2021-05-03/apple-s-schiller-floated-cutting-app-store-fees-a-decade-ago |url-status=live |access-date=1 May 2025 |website=[[Bloomberg]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Epic Games and Apple both appealed the decision. 35 state attorneys-general, the [[Electronic Frontier Foundation]] (EFF), [[Microsoft]], among others filed amicus briefs in support of Epic Games.&amp;lt;ref&amp;gt;{{Cite web |last=Peters |first=Jay |date=29 Jan 2022 |title=Epic largely lost to Apple, but 35 states are now backing its fight in a higher court |url=https://www.theverge.com/2022/1/28/22907106/epic-games-v-apple-amicus-briefs-states-eff-microsoft-appeal |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 11 December 2023, the jury in the case against Google decided on all 11 counts in favor of Epic Games.&amp;lt;ref&amp;gt;{{Cite web |last=Bensinger |first=Greg |last2=Scarcella |first2=Mike |date=13 Dec 2023 |title=Epic Games wins antitrust case against Google over Play app store |url=https://www.reuters.com/legal/google-epic-games-face-off-app-antitrust-trial-nears-end-2023-12-11/ |url-status=live |access-date=1 May 2025 |website=[[Reuters]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 1 May 2025, Rogers found that Apple willfully chose to not comply with the 2021 injunction, commenting &amp;quot;that it thought this court would tolerate such insubordination was a gross miscalculation&amp;quot;.&amp;lt;ref&amp;gt;{{Cite web |last=Peters |first=Jay |date=1 May 2025 |title=A judge just blew up Apple’s control of the App Store |url=https://www.theverge.com/news/659246/apple-epic-app-store-judge-ruling-control |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Facebook online events===&lt;br /&gt;
In August 2020, in response to the COVID-19 pandemic, Facebook introduced the ability for small businesses to accept an entrance fee for events. Previously, Facebook would only act as a way to RSVP for the event - the organizer must use a third-party event ticketing system to collect fees. The company pledged to not collect any fee on event sales &amp;quot;until 2023&amp;quot;.&amp;lt;ref&amp;gt;{{Cite web |date=14 Aug 2020 |title=Paid Online Events for Small Business Recovery |url=https://about.fb.com/news/2020/08/paid-online-events/ |url-status=live |access-date=16 Mar 2025 |website=[[Meta]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Apple disagreed, requiring the feature to use the in-app purchases system. This introduced Apple&#039;s 30% fee. As this increases the price the user pays, with no benefit to the small business the user intended to support, the fee was displayed as a line item in checkout. Apple did not accept this disclosure of the fee, referring to it as &amp;quot;irrelevant&amp;quot;.&amp;lt;ref name=&amp;quot;facebook&amp;quot; /&amp;gt; Facebook was allowed to compromise on displaying the fee, but &#039;&#039;without&#039;&#039; indicating that it is specifically an App Store fee.&lt;br /&gt;
&lt;br /&gt;
===HEY===&lt;br /&gt;
HEY.com is a paid webmail provider launched in June 2020 by long-time software company [[wikipedia:37signals|37signals]], specializing in inbox organization tools.&lt;br /&gt;
&lt;br /&gt;
After successfully launching the initial version of the app on the App Store, the company announced that an update was rejected due to a complaint about the business model. The app did not intend to support in-app purchases - instead, the user is expected to already have an account with the service. Apple did not like this arrangement, and demanded the company build an in-app subscription option. The company argued that they are being held to a different set of rules than apps such as [[Netflix, Inc.|Netflix]], whose app does not provide any way to purchase a subscription.&amp;lt;ref&amp;gt;{{Cite web |last=Kastrenakes |first=Jacob |date=17 Jun 2020 |title=Hey.com exec says Apple is acting like ‘gangsters,’ rejecting App Store updates and demanding cut of sales |url=https://www.theverge.com/2020/6/16/21293419/hey-apple-rejection-ios-app-store-dhh-gangsters-antitrust |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; After a suggestion from Apple executive Phil Schiller in the media, HEY introduced a 14 day free trial mode, which was approved.&amp;lt;ref&amp;gt;https://www.hey.com/apple/path/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://techcrunch.com/2020/06/18/interview-apples-schiller-says-position-on-hey-app-is-unchanged-and-no-rules-changes-are-imminent/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Patreon===&lt;br /&gt;
In August 2024, [[Patreon]] announced a change in arrangement with Apple for its App Store app. From November 2024, subscriptions started from the iOS app would be required to use the in-app purchase system, bypassing Patreon&#039;s own long-standing payments practices.&amp;lt;ref&amp;gt;{{Cite web |date=12 Aug 2024 |title=Apple’s requirements are about to hit creators and fans on Patreon. Here’s what you need to know. |url=https://news.patreon.com/articles/understanding-apple-requirements-for-patreon |url-status=live |access-date=16 Mar 2025 |website=[[Patreon]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;patreon&amp;quot; /&amp;gt; This change does not affect the Android app.&lt;br /&gt;
&lt;br /&gt;
By forcing Patreon out of the payments pipeline, certain payment models are no longer available to users of Patreon&#039;s iOS app. Creators who rely on the &amp;quot;per-creation&amp;quot; payment model, as opposed to the standard &amp;quot;per-month&amp;quot;, can no longer be subscribed to from the app. The app is also not able to support the &amp;quot;first-of-the-month&amp;quot; model, where payments from all subscribers are collected on the first day of the month, rather than every 30 days since each member&#039;s day of subscription. The price must also be rounded to a price tier supported by Apple.&lt;br /&gt;
&lt;br /&gt;
Patreon provides creators with the choice to increase their prices by 30% in the iOS app, or to keep the same prices but forfeit 30% to Apple. Creators frequently remind potential supporters to not use the Patreon iOS app, adding extra inconvenience to those wanting to support the work of small creators.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed&amp;quot; heights=&amp;quot;400px&amp;quot;&amp;gt;&lt;br /&gt;
File:Patreon iOS app pricing options - fee on top.png|&amp;quot;Maintain earnings and cover Apple&#039;s fee by increasing prices in iOS app&amp;quot; (Recommended)&lt;br /&gt;
File:Patreon iOS app pricing options - absorb fee.png|&amp;quot;Keep prices in the iOS app the same and cover Apple&#039;s fee yourself&amp;quot;&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A similar case occurred with the app Fanhouse in 2021.&amp;lt;ref&amp;gt;{{Cite web |last=@jasminericegirl |date=9 Jun 2021 |title=#fuckapple, a thread&lt;br /&gt;
I cofounded @fanhouseapp&lt;br /&gt;
 8 months ago to empower creators to monetize their content. We pay creators 90% of earnings. Now, Apple is threatening to remove Fanhouse from the app store unless we give them 30% of creator earnings. This is theft and exploitation. |url=https://x.com/jasminericegirl/status/1402691047940100100 |access-date=16 Mar 2025 |website=[[X]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Twitter===&lt;br /&gt;
In August 2021, [[Twitter]] introduced a feature named Super Follows (now Subscriptions), in which a user can pay a subscription fee to access more of a creator&#039;s content. For each user who enables Subscriptions, Twitter must submit a new in-app purchase SKU to the App Store, which will become available with the next update to the app.&amp;lt;ref&amp;gt;{{Cite web |last=@wongmjane |date=2 Sep 2021 |title=Each Super Follow is an In-App Purchase on the App Store, but because there are too many IAPs for the Twitter app, the App Store only shows 10 instead of the full list |url=https://x.com/wongmjane/status/1433372120080261120 |url-status=live |access-date=16 Mar 2025 |website=[[X]]}}&amp;lt;/ref&amp;gt; This, of course, is subject to the 30% fee. At the time of writing in January 2025, viewing the App Store listing reveals Elon Musk&#039;s $4.00 subscription as the fourth most popular IAP item.&lt;br /&gt;
&lt;br /&gt;
==Notarization==&lt;br /&gt;
Since 2015, Apple expects all Mac apps to be &amp;quot;notarized&amp;quot;. This is a preliminary, automated malware check, which upon passing, provides a notary certificate that gets &amp;quot;stapled&amp;quot; to the app. Apple&#039;s explanation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Notarization of macOS software is not App Review. The Apple notary service is an automated system that scans your software for malicious content, checks for code-signing issues, and returns the results to you quickly. If there are no issues, the notary service generates a ticket for you to staple to your software; the notary service also publishes that ticket online where Gatekeeper can find it.&amp;lt;ref&amp;gt;{{Cite web |title=Notarizing macOS software before distribution |url=https://developer.apple.com/documentation/security/notarizing-macos-software-before-distribution |url-status=live |access-date=16 Mar 2025 |website=[[Apple Developer]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whether this is actually a better approach than used by Windows antivirus, where they find out about new malware samples only when they end up on a user&#039;s computer, is a separate topic.&lt;br /&gt;
&lt;br /&gt;
To comply with the DMA&#039;s regulations on app marketplaces, Apple created a new channel of releasing apps outside of the iOS App Store. Apps go through a notarization process. But the process is definitely &#039;&#039;not&#039;&#039; notarization. The name is intentionally being abused, by contrast to notarization on macOS, to make you believe it is something other than the existing App Review system. Despite the pain some developers and users have with it, notarization on macOS has always been considered a net positive. It made sense to take advantage of its reputation for the entirely different &amp;quot;notarization&amp;quot; on iOS.&lt;br /&gt;
&lt;br /&gt;
See for yourself - view the [https://developer.apple.com/app-store/review/guidelines/ App Review Guidelines] and tick &amp;quot;Show Notarization Review Guidelines Only&amp;quot;. While most rules are knocked out by this, a good number of them are still in place. These apps are still reviewed and tested by the App Review team, must have a full product listing in App Store Connect, and can be outright rejected - all in the same way as an App Store app.&lt;br /&gt;
&lt;br /&gt;
By contrast, all that is required for notarization on macOS is for your app to not be malware. You submit it to an automated system that approves it within minutes. &#039;&#039;&#039;You don&#039;t need to convince Apple your app is worthy of existing on their platform.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The point of macOS notarization is that Apple has a record of all binaries that are intended for wide distribution on macOS, and can review them both in advance and on a regular basis for known malware/common malware patterns. Say a malware app manages to initially get through, when Apple finds out, they can go back in the notary records and find every sample of that malware to analyze and block. This is purely a technical process, managed by skilled security researchers, while iOS app review and &amp;quot;notarization&amp;quot; is a business process, managed by workers who have been given a checklist of violations to look for.&lt;br /&gt;
&lt;br /&gt;
Apple is retaining complete control over what&#039;s allowed to run on iOS. On macOS, you can choose to run apps that have not been notarized (even though the process to bypass the warning is intentionally difficult). On iOS, you never get even that option. What Apple created is the App Store but with more steps. It still goes on the App Store, just hidden so it can only be installed by the third-party store it&#039;s tied to.&lt;br /&gt;
&lt;br /&gt;
*Mysk: &amp;quot;iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens.&amp;quot;&amp;lt;ref&amp;gt;{{Cite web |last=@mysk_co |date=28 Jun 2024 |title=iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens: |url=https://x.com/mysk_co/status/1806638308455256242 |url-status=live |access-date=16 Mar 2025 |website=[[X]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==JIT==&lt;br /&gt;
Safari is allowed to [[wikipedia:Just-in-time compilation|just-in-time]] compile code worldwide. The super short version of what that means: it can run JavaScript code &#039;&#039;really fast&#039;&#039;. All browsers, and other runtimes like Microsoft .NET, Java, Lua use this. Ok, fine, it&#039;s the system web browser, it&#039;s very carefully written to be secure, and it&#039;s important to the platform to be doing well in performance benchmarks and all that.&lt;br /&gt;
&lt;br /&gt;
Apple&#039;s [https://apps.apple.com/app/swift-playgrounds/id908519492 Playgrounds] app on iPad is also allowed to JIT. It bundles Apple&#039;s [[wikipedia:Swift (programming language)|Swift]] compiler, and shares backend code with the version of Playgrounds found in [[wikipedia:Xcode|Xcode]].&lt;br /&gt;
&lt;br /&gt;
Competing apps like Pythonista (a Python IDE), emulators like Delta and UTM, and terminal environments like iSH, are not allowed to JIT. As such, they need to rely on inferior performance, potentially from an entirely separate implementation of their compiler/interpreter that may be less proven, because the JIT-less implementation doesn&#039;t need to exist on any other platform.&lt;br /&gt;
&lt;br /&gt;
Likely the most clear example is UTM SE. UTM is a port of the [[wikipedia:QEMU|QEMU]] emulator to iOS, allowing you to run desktop OSes (Linux, Windows 98, XP, classic Mac OS, etc). iPhone hardware is very capable these days and it runs impressively well, &#039;&#039;if&#039;&#039; you use a hack to enable JIT (which Apple has now patched). &amp;quot;SE&amp;quot; stands for &amp;quot;slow edition&amp;quot; - yes, really. If you compare the true version of UTM to the App Store UTM SE app, you &#039;&#039;will&#039;&#039; feel the loss in performance. It&#039;s impressive UTM even got to be on the App Store at all, and the DMA is to thank for it. But Apple is still holding the line on allowing JIT to apps that require that performance.&lt;br /&gt;
&lt;br /&gt;
While UTM SE releasing at all might seem like a pathway to getting Firefox and Chrome &amp;quot;slow editions&amp;quot; on the App Store, browser engines other than the built-in Apple WebKit/JavaScriptCore are still outlawed.&amp;lt;ref&amp;gt;{{Cite web |title=App Review Guidelines |url=https://developer.apple.com/app-store/review/guidelines/#2.5.6 |url-status=live |access-date=16 Mar 2025 |website=[[Apple Developer]]}}&amp;lt;/ref&amp;gt; In the EU, Apple has blessed web browser JavaScript engines with the option to use JIT. The app must be approved for an entitlement, and then must work within APIs provided by Apple for it. As of January 2025, no browsers have been released using this. We were all anticipating proper competition around web browsers on iOS, but almost a year later, we have nothing.&amp;lt;ref&amp;gt;{{Cite web |title=Mozilla says Apple’s new browser rules are ‘as painful as possible’ for Firefox&lt;br /&gt;
 |url=https://www.theverge.com/2024/1/26/24052067/mozilla-apple-ios-browser-rules-firefox |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Sandbox==&lt;br /&gt;
You might not like app sandboxing, but it&#039;s a powerful security feature used on all modern platforms. The reality is very few apps need more than a few basic permissions. [[wikipedia:Flatpak|Flatpak]] on Linux also sandboxes apps, and it seems to work great! Still, it&#039;s completely fair that there should be processes for doing things beyond what the sandbox allows. You see some of this with permission prompts - does a flashlight app &#039;&#039;really&#039;&#039; need access to your contacts? (Apple has been burned by apps abusing user data before the current permission system was built out.&amp;lt;ref&amp;gt;{{Cite web |last=Bohn |first=Dleter |date=15 Feb 2012 |title=iOS apps and the address book: who has your data, and how they’re getting it |url=https://www.theverge.com/2012/2/14/2798008/ios-apps-and-the-address-book-what-you-need-to-know |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
It can go further than this. As we established in previous sections, an app can be given more access to features of the system using entitlements. These come in a few flavors:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Completely safe&#039;&#039;&#039;: Entitlements any developer can opt into, with little to no risk.&lt;br /&gt;
*&#039;&#039;&#039;Approval required&#039;&#039;&#039;: Entitlements that might be more of a security risk to allow, e.g. giving considerably wider access to the system, or that Apple simply doesn&#039;t want to hand out to just &#039;&#039;anyone&#039;&#039; for competitive reasons. The developer must submit a request to Apple with evidence of why they need the entitlement.&lt;br /&gt;
*&#039;&#039;&#039;Private&#039;&#039;&#039;: Entitlements that are never allowed for any app developer to use. Many of these are reasonably fenced off because they handle user data that is very risky, or bypasses permission prompts, etc, but can just as well also be guarding features Apple wants to keep to itself.&lt;br /&gt;
&lt;br /&gt;
There have been [https://gizmodo.com/researchers-uber-s-ios-app-had-secret-permissions-that-1819177235 exceptions] where Apple quietly gave a company access to private entitlements anyway, raising eyebrows.&lt;br /&gt;
&lt;br /&gt;
On iOS, you also can&#039;t be &#039;&#039;more&#039;&#039; secure than the default sandbox. That might seem crazy if you&#039;re not a developer, but it&#039;s pretty important for security in a variety of situations. On macOS, there are several entitlements you must declare to decide whether you&#039;re allowed to access certain types of user data at all. Android used this design from the very start - you can&#039;t even do fundamental things like access the internet without declaring it in your manifest. It makes it very explicit what the app&#039;s intentions are.&lt;br /&gt;
&lt;br /&gt;
iOS has one sandbox used by all App Store apps. System apps, and App Store apps developed by Apple, are allowed to expand or reduce their sandbox permissions as needed. Third-party apps do not get the right to expand or reduce their sandbox permissions at all. This is clearly less secure. To take the example of Playgrounds again, while it&#039;s allowed to run your code from a separate process executing in an ultra locked down sandbox with very few permissions, competing apps such as Pythonista must run your code in the same sandbox and address space as the main app process. The Python interpreter crashing would therefore crash the entire app, possibly losing work. In the worst case, a vulnerability in third-party code could give access to all data stored by/accessible to the app. For example, it would be a nightmare if you can tap the wrong link in Safari and have a hacker easily steal your cookies from other websites. If that third-party code could run in its own limited sandbox, the risk is significantly reduced.&lt;br /&gt;
&lt;br /&gt;
The only known workaround is to execute the code via JavaScript, as Apple&#039;s JavaScriptCore engine runs in a heavily sandboxed process. This requires you to port the code to JS, which may be a lot of work, or just not viable. You wouldn&#039;t want to run the Python interpreter inside JavaScript - the performance would be terrible!&lt;br /&gt;
&lt;br /&gt;
==In-app browsers==&lt;br /&gt;
Safari&#039;s in-app browser, that is the minimal version you get when tapping a link from social media, uses an entirely separate data store for each app. The in-app browser isn&#039;t aware of cookies in the &amp;quot;full&amp;quot; Safari app, or any other app, and doesn&#039;t support Safari extensions. Apple claimed this was to protect malicious apps from stealing or setting cookies in Safari without your knowledge, which is a fair argument, but it&#039;s hard to not notice that it makes web browsing inconvenient, encouraging users to install native apps, where they can make transactions through Apple.&amp;lt;ref&amp;gt;{{Cite web |last=@whitehatguy |date=12 Jun 2017 |title=Impact of iOS 11 no longer providing shared cookies between Safari, Safari View Controller instances |url=https://github.com/openid/AppAuth-iOS/issues/120 |url-status=live |access-date=16 Mar 2025 |website=[[GitHub]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This also means your browsing in the in-app browser is just forgotten - there&#039;s no history menu, and it doesn&#039;t get logged to the history in the full Safari app either. Good luck recalling that article you read a few weeks ago.&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
*[https://theapplewiki.com/wiki/Eligibility Eligibility]&lt;br /&gt;
*Posts written by an author of this article:&lt;br /&gt;
**[https://adamdemasi.com/2024/04/19/app-marketplace-experience.html The iOS 17.4 app marketplace flow is a disaster]&lt;br /&gt;
**[https://adamdemasi.com/2024/04/20/ios-eligibility.html How I tricked iOS into giving me EU DMA features]&lt;br /&gt;
**[https://adamdemasi.com/2024/04/23/ios-eligibility-features.html Features controlled by iOS 17.4&#039;s eligibility system]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Apple App Store]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=14027</id>
		<title>Apple App Store</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=14027"/>
		<updated>2025-05-01T05:14:33Z</updated>

		<summary type="html">&lt;p&gt;Kirb: /* Epic Games */ Typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:App Store (iOS).svg|thumb|150px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Apple]]&#039;&#039;&#039; uses a range of technical measures to protect their App Store ecosystem and reduce consumer choice. These measures obscure the company&#039;s business intentions, creating roadblocks for app developers and users, while typically citing security reasons for their existence. This actively hurts the ability for lawmakers to advocate for the rights of consumers and businesses in Apple&#039;s ecosystem, and prevents apps from being as useful as their customers expect.&lt;br /&gt;
&lt;br /&gt;
A never-ending demand for a cut of every sale of a digital product, ranging from game currency, to supporting content creators,&amp;lt;ref name=&amp;quot;patreon&amp;quot;&amp;gt;{{Cite web |last=Roth |first=Emma |date=12 Aug 2024 |title=Patreon: adding Apple’s 30 percent tax is the price of staying in the App Store |url=https://www.theverge.com/2024/8/12/24218629/patreon-membership-ios-30-percent-apple-tax |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; to booking a Zoom call with a local business,&amp;lt;ref name=&amp;quot;facebook&amp;quot;&amp;gt;{{Cite web |last=Paul |first=Katie |last2=Nellis |first2=Stephen |date=28 Aug 2020 |title=Exclusive: Facebook says Apple rejected its attempt to tell users about App Store fees |url=https://www.reuters.com/article/us-facebook-apple-exclusive/exclusive-facebook-says-apple-rejected-its-attempt-to-tell-users-about-app-store-fees-idUSKBN25O042/ |url-status=live |access-date=16 Mar 2025 |website=[[Reuters]]}}&amp;lt;/ref&amp;gt; hurts the ability for app developers to innovate. These developers, working hard and pulling countless hours to build a quality app, always need to take Apple&#039;s (and [[Google]]&#039;s) demands into account - specifically, a fee of between 15% and 30% of all revenue collected via the app. This is revenue that can be reinvested into the app, but instead must be earmarked for the platforms they are &#039;&#039;&#039;required&#039;&#039;&#039; to use to reach their customers.&lt;br /&gt;
&lt;br /&gt;
Because this is a clear problem, several governments, including South Korea,&amp;lt;ref&amp;gt;{{Cite web |date=8 Mar 2022 |title=South Korea approves rules on app store law targeting Apple, Google |url=https://www.reuters.com/technology/skorea-approves-rules-app-store-law-targeting-apple-google-2022-03-08/ |url-status=live |access-date=16 Mar 2025 |website=[[Reuters]]}}&amp;lt;/ref&amp;gt; Japan,&amp;lt;ref&amp;gt;{{Cite web |last=Sharwood |first=Simon |date=13 Jun 2024 |title=Japan forces Apple and Google to allow third-party app stores and payments |url=https://www.theregister.com/2024/06/13/japan_smartphone_software_law/ |url-status=live |access-date=16 Mar 2025 |website=[[The Register]]}}&amp;lt;/ref&amp;gt; the European Union,&amp;lt;ref&amp;gt;[[wikipedia:Digital Markets Act|Digital Markets Act]]&amp;lt;/ref&amp;gt; the United Kingdom,&amp;lt;ref&amp;gt;{{Cite web |last=Competition and Markets Authority |date=4 Mar 2021 |title=Investigation into Apple AppStore |url=https://www.gov.uk/cma-cases/investigation-into-apple-appstore |url-status=live |access-date=16 Mar 2025 |website=[[gov.uk]]}}&amp;lt;/ref&amp;gt; Australia,&amp;lt;ref&amp;gt;{{Cite web |date=28 Apr 2021 |title=Dominance of Apple and Google&#039;s app stores impacting competition and consumers |url=https://www.accc.gov.au/media-release/dominance-of-apple-and-googles-app-stores-impacting-competition-and-consumers |url-status=live |access-date=16 Mar 2025 |website=[[ACCC]]}}&amp;lt;/ref&amp;gt; as well as the US and a handful of states,&amp;lt;ref&amp;gt;[[wikipedia:Open App Markets Act|Open App Markets Act]]&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=20 Nov 2024 |title=S.5364 - App Store Accountability Act |url=https://www.congress.gov/bill/118th-congress/senate-bill/5364/text/is |url-status=live |access-date=16 Mar 2025 |website=[[congress.gov]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;doj&amp;quot;&amp;gt;{{Cite web |last=Balsamo |first=Mike |last2=Liedtke |first2=Mike |last3=Whitehurst |first3=Lindsay |last4=Bajak |first4=Frank |date=21 Mar 2024 |title=Justice Department sues Apple, alleging it illegally monopolized the smartphone market |url=https://apnews.com/article/apple-antitrust-monopoly-app-store-justice-department-822d7e8f5cf53a2636795fcc33ee1fc3 |url-status=live |access-date=16 Mar 2025 |website=[[APNews]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=19 Feb 2021 |title=It’s time to free ourselves from ‘Big Tech’ monopoly |url=https://azcapitoltimes.com/news/2021/02/19/its-time-to-free-ourselves-from-big-tech-monopoly/ |url-status=live |access-date=16 Mar 2025 |website=[[Arizona Capitol Times]]}}&amp;lt;/ref&amp;gt; have opened investigations into anti-competitive practices, or considered or already passed legislation to force &amp;quot;gatekeeper platforms&amp;quot; such as Apple to be more reasonable with third-party developers.&lt;br /&gt;
&lt;br /&gt;
This being a major threat to Apple&#039;s revenue stream (interestingly, one they claim to be unsure is profitable&amp;lt;ref&amp;gt;{{Cite web |last=Lovejoy |first=Ben |date=17 Apr 2024 |title=Schiller doesn’t know whether the App Store is profitable; there are no minutes of meetings |url=https://9to5mac.com/2024/04/17/app-store-is-profitable-apple-notes/ |url-status=live |access-date=16 Mar 2025 |website=[[9to5Mac]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=Lovejoy |first=Ben |date=17 Jan 2025 |title=Apple denies App Store profit margin is 75% – claims to have no clue |url=https://9to5mac.com/2025/01/17/apple-denies-app-store-profit-margin-is-75-claims-to-have-no-clue/ |url-status=live |access-date=16 Mar 2025 |website=[[9t05Mac]]}}&amp;lt;/ref&amp;gt;), they have responded with practices such as geoblocking certain operating system functionality based on physical location,&amp;lt;ref&amp;gt;{{Cite web |title=Eligibility |url=https://theapplewiki.com/wiki/Eligibility |url-status=live |access-date=16 Mar 2025 |website=[[The Apple Wiki]]}}&amp;lt;/ref&amp;gt; misrepresenting/overstating risks, and using careful wording with commonly-understood terms to describe unreasonably difficult-to-use systems.&lt;br /&gt;
&lt;br /&gt;
==Background info==&lt;br /&gt;
Important terms you&#039;ll run into in this article:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;[[wikipedia:Sandbox (computer security)|Sandbox]]&#039;&#039;&#039;: Reduces exposure of the user&#039;s device/data to security risks, by reducing what an app is allowed to do.&lt;br /&gt;
*&#039;&#039;&#039;[https://theapplewiki.com/wiki/Entitlements Entitlements]&#039;&#039;&#039;: Apple&#039;s method of &amp;quot;poking holes&amp;quot; in the sandbox, to give the app more permissions. Some are available to developers, while many are only available to Apple.&lt;br /&gt;
*&#039;&#039;&#039;[[wikipedia:Digital Markets Act|Digital Markets Act]]&#039;&#039;&#039;: The European Union&#039;s fairly sweeping recent regulations against forcing companies they classify as &amp;quot;gatekeepers&amp;quot; to play nice, giving smaller businesses access to software/hardware features they&#039;ve historically reserved for their own use.&lt;br /&gt;
&lt;br /&gt;
==In-app purchases==&lt;br /&gt;
Apple has been collecting users&#039; credit card numbers since launching the iTunes Store in 2004. The launch of the App Store in 2008, followed by the introduction of in-app purchases (IAPs) in 2009, gave iPhone app developers the opportunity to sell app features to users. The IAP system is provided as a developer framework named [https://developer.apple.com/storekit/ StoreKit]. Apps and their in-app purchases are managed through a dashboard named [https://developer.apple.com/app-store-connect/ App Store Connect]. App sales have eclipsed iTunes Store sales, and are now a primary focus of Apple&#039;s Media Services division.&lt;br /&gt;
&lt;br /&gt;
Apple requires any purchase of a digital good or service in an app to use their in-app purchase system. This may seem reasonable because the customer may inevitably call Apple support, demanding a refund for an app they have issues with. Apple would rather give that refund and leave the customer with a positive support experience, than to provide a messy process involving contacting a third-party, whose customer service is likely nowhere near the same experience.&lt;br /&gt;
&lt;br /&gt;
App Store purchase fees are between 15% and 30%. In September 2016, Apple expanded subscriptions to be available to any type of app, also introducing a 15% discount incentive when the user has already subscribed for a year.&amp;lt;ref&amp;gt;{{Cite web |last=Goode |first=Lauren |date=2 Sep 2016 |title=Apple’s new subscription offerings are now available to App Store developers |url=https://www.theverge.com/2016/9/2/12774758/apple-developers-app-store-new-subscription-rules |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; In November 2020, Apple introduced a reduced 15% fee for app developers with revenue below $1 million per year.&amp;lt;ref&amp;gt;{{Cite web |last=Centers |first=Josh |date=18 Nov 2020 |title=Apple Drops App Store Commission to 15% for Small Developers |url=https://tidbits.com/2020/11/18/apple-drops-app-store-commission-to-15-for-small-developers/ |access-date=16 Mar 2025 |website=[[TidBITS]]}}&amp;lt;/ref&amp;gt; For developers above this threshold, and for cases excluded from this program such as for games, the fee is 30%. In the 2008 announcement of the App Store, Apple considered this a reasonable, industry-standard fee. However, the way we use apps has significantly evolved since 2009 - the world has shifted to heavily depend upon on mobile apps, which have also evolved into more complex and sustainable business models than a simple one-time purchase.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Stripe, Inc.|Stripe]], a popular platform used for payments on the web, uses a base fee of 2.9% plus a fixed $0.30 in the United States.&amp;lt;ref&amp;gt;{{Cite web |title=Pricing |url=https://stripe.com/it/pricing |url-status=live |access-date=16 Mar 2025 |website=[[Stripe]]}}&amp;lt;/ref&amp;gt; With add-on services, before considering volume discounts, a Stripe transaction may rather have a cost of 6.4% + $1.10.&amp;lt;ref&amp;gt;Calculated from base fee (2.9% + $0.30) + international card (1.5%) + adaptive pricing (2%) + international payment methods ($0.80), as of January 2025&amp;lt;/ref&amp;gt; Stripe has been used by businesses ranging from small online stores, to [[OpenAI]] for ChatGPT Plus. Competing payments services have similar or identical fees to Stripe. &#039;&#039;&#039;The in-app purchase system does not provide sufficient value to justify considerably higher fees than alternative payment platforms.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The App Store system poorly handles secondary marketplaces of digital services that exist within the primary App Store marketplace, such as Patreon. Apple, however, still requires companies in the business of selling digital services to use this inadequate system. This requires the app to account for Apple&#039;s fee, which is significant enough to often warrant increasing prices, and to follow rules even if they do not make sense for the nature of service they are providing. Apple has frequently been found in disputes with such apps. This injects extra complication at no benefit to the marketplace, the creator, or the customer - only to Apple, who has little to no involvement after delivering the initial app download to the user&#039;s phone. The significant fee also often drives app developers to consider building their app around an advertising model instead, creating privacy concerns.&lt;br /&gt;
&lt;br /&gt;
Additionally, the 15% small businesses fee discount is judged based on the app&#039;s overall turnover, and is not based on individual creators in the app&#039;s marketplace. An app that turns over $1 million per year by providing services to creators that individually make less than $1 million per year does not have the opportunity to use the discount.&lt;br /&gt;
&lt;br /&gt;
Apple, often together with Google, use lobbying efforts in the United States and other countries in an attempt to minimize the issues. &amp;quot;ACT | The App Association&amp;quot;, pitched as an association of independent small business app developers, is at least 50% funded by Apple, and does not list its claimed 2,000 members.&amp;lt;ref&amp;gt;{{Cite web |date=1 Oct 2021 |title=Not a class ACT: the so-called App Association is simply an Apple Association and does NOT represent app developers&#039; interests in fair distribution terms |url=http://www.fosspatents.com/2021/10/not-class-act-so-called-app-association.html |url-status=live |access-date=16 Mar 2025 |website=[[FOSS Patents]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=19 Sep 2022 |title=Vast majority of ACT {{!}} The App Association&#039;s funding comes from Apple, former employees tell Bloomberg: astroturfing against app developers&#039; interests |url=http://www.fosspatents.com/2022/09/vast-majority-of-act-app-associations.html |url-status=live |access-date=16 Mar 2025 |website=[[FOSS Patents]]}}&amp;lt;/ref&amp;gt; In March 2024, the United States Department of Justice along with 16 state attorneys-general filed a lawsuit against Apple, including an accusation that the company &amp;quot;extracts more money from consumers, developers, content creators, artists, publishers, small businesses, and merchants, among others&amp;quot;.&amp;lt;ref name=&amp;quot;doj&amp;quot; /&amp;gt; The future of this lawsuit is unclear as of April 2025.&lt;br /&gt;
&lt;br /&gt;
Despite criticism of Apple forcing their fee into transactions with small businesses and creators on [[#Patreon|Patreon]], [[#Facebook online events|Facebook]], and similar platforms, on 23 January 2025, Apple announced the Advanced Commerce API. It &amp;quot;support[s] developers&#039; evolving business models - such as exceptionally large content catalogs, creator experiences, and subscriptions with optional add-ons&amp;quot;.&amp;lt;ref&amp;gt;{{Cite web |date=23 Jan 2025 |title=Introducing the Advanced Commerce API |url=https://developer.apple.com/news/?id=yxy958ya |url-status=live |access-date=16 Mar 2025 |website=[[Apple Developer]]}}&amp;lt;/ref&amp;gt; While positioned as a way for such businesses to save development time and avoid ongoing costs by building on top of Apple&#039;s mature payments platform, its use is in fact necessary for these businesses to work within the App Store guidelines, as seen in cases outlined below. The feature requires submitting a description of the app&#039;s business model to Apple for approval. This continues a trend of requiring Apple&#039;s consent to conduct business in a place users have been trained to expect it.&lt;br /&gt;
&lt;br /&gt;
Given Apple&#039;s strong incentives, and a ticking clock as legal pressure builds, it is not hard to find stories from app developers regarding poor experiences with Apple&#039;s app review process.&lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;This list is extremely incomplete. Please add examples if you know of any.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Epic Games===&lt;br /&gt;
{{hatnote|See also: [[wikipedia:Epic Games v. Apple|Epic Games v. Apple]] and [[wikipedia:Epic Games v. Google|Epic Games v. Google]]}}&lt;br /&gt;
&lt;br /&gt;
[[Epic Games]] is a video game developer and publisher, known for games such as [[Fortnite]] and [[Unreal Tournament]], the [[Unreal Engine]], and the [[Epic Games Store]].&lt;br /&gt;
&lt;br /&gt;
In 2018, Epic Games launched Fortnite on the iOS and Android platforms. The company made the unusual decision to not release the app on the [[Google Play Store]] - rather, it was made available as a standalone [[wikipedia:apk (file format)|Android app package]] file (.apk), which must be installed by following a series of manual steps.&amp;lt;ref&amp;gt;{{Cite web |last=Statt |first=Nick |date=3 Aug 2018 |title=Fortnite for Android will ditch Google Play Store for Epic’s website |url=https://www.theverge.com/2018/8/3/17645982/epic-games-fortnite-android-version-bypass-google-play-store |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; The app was also released on the [[Samsung]] [[Samsung Galaxy Store|Galaxy Store]]. Google offered a $147 million deal for Epic Games to release Fortnite on the Play Store, which the company declined.&amp;lt;ref&amp;gt;{{Cite web |last=Robertson |first=Adi |date=9 Nov 2023 |title=Google offered Epic $147 million to launch Fortnite on the Play Store |url=https://www.theverge.com/2023/11/8/23953262/google-epic-fortnite-play-store-investment-antitrust-trial |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 22 April 2020, Fortnite was finally released on the Play Store.&amp;lt;ref&amp;gt;{{Cite web |last=Carpenter |first=Nicole |date=22 April 2020 |title=Fortnite available on the Google Play Store for the first time |url=https://www.polygon.com/2020/4/21/21229930/fortnite-available-on-google-play-android-mobile-devices |url-status=live |access-date=1 May 2025 |website=[[Polygon]]}}&amp;lt;/ref&amp;gt; In a statement, the company explained:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
After 18 months of operating Fortnite on Android outside of the Google Play Store, we&#039;ve come to a basic realization: Google puts software downloadable outside of Google Play at a disadvantage, through technical and business measures such as scary, repetitive security pop-ups for downloaded and updated software, restrictive manufacturer and carrier agreements and dealings, Google public relations characterizing third party software sources as malware, and new efforts such as Google Play Protect to outright block software obtained outside the Google Play store.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 13 August 2020, Epic Games launched a campaign against both Apple and Google&#039;s app store business practices. The company released app updates on both platforms, introducing a method for purchasing V-Bucks in-game currency at a 20% discount by directly transacting with Epic Games, against the developer rules of both platforms. The platforms responded by removing the game from their storefronts. Epic Games then filed civil antitrust lawsuits against both companies in the Northern District of California.&amp;lt;ref&amp;gt;{{Cite web |last=Statt |first=Nick |date=14 Aug 2020 |title=Epic Games is suing Apple |url=https://www.theverge.com/2020/8/13/21367963/epic-fortnite-legal-complaint-apple-ios-app-store-removal-injunctive-relief |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; The campaign, branded &amp;quot;Free Fortnite&amp;quot;, was later extended with lawsuits and complaints in Australia,&amp;lt;ref&amp;gt;{{Cite web |date=18 Nov 2020 |title=Epic Games extends its fight against Apple to Australia |url=https://www.epicgames.com/site/en-US/freefortnite-australia-press-release |url-status=live |access-date=16 Mar 2025 |website=[[Epic Games]]}}&amp;lt;/ref&amp;gt;, the European Union,&amp;lt;ref&amp;gt;{{Cite web |date=17 Feb 2021 |title=Epic Game Files EU Antitrust Complaint Against Apple |url=https://www.epicgames.com/site/en-US/news/epic-games-files-eu-antitrust-complaint-against-apple |url-status=live |access-date=16 Mar 2025 |website=[[Epic Games]]}}&amp;lt;/ref&amp;gt; and the United Kingdom.&amp;lt;ref&amp;gt;{{Cite web |date=30 Mar 2021 |title=Epic Games files complaint to support CMA Apple investigation |url=https://www.epicgames.com/site/en-US/news/epic-games-files-complaint-to-support-cma-apple-investigation |url-status=live |access-date=16 Mar 2025 |website=[[Epic Games]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 11 September 2021, Judge Yvonne Gonzalez Rogers decided on the case. While the lawsuit against Apple failed on 9 of 10 counts, Rogers ruled against Apple&#039;s use of &amp;quot;anti-steering&amp;quot; - their strategies of preventing the user from being &amp;quot;steered&amp;quot; to a third-party storefront for payment processing, placing a permanent injunction on this behavior.&amp;lt;ref&amp;gt;{{Cite web |last=Brandon |first=Russell |date=11 Sep 2021 |title=Apple must allow other forms of in-app purchase, rules judge in Epic v. Apple |url=https://www.theverge.com/2021/9/10/22662320/epic-apple-ruling-injunction-judge-court-app-store |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; Despite the case mostly failing, the discovery process provided significant insight into Apple&#039;s decisions around App Store policies, including decisions made in major app review disputes, and in one case, executive Phil Schiller arguing to reduce the fee from 30%.&amp;lt;ref&amp;gt;{{Cite web |last=Gurman |first=Mark |date=4 May 2021 |title=Apple’s Schiller Floated Cutting App Store Fees a Decade Ago |url=https://www.bloomberg.com/news/articles/2021-05-03/apple-s-schiller-floated-cutting-app-store-fees-a-decade-ago |url-status=live |access-date=1 May 2025 |website=[[Bloomberg]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Epic Games and Apple both appealed the decision. 35 state attorneys-general, the [[Electronic Frontier Foundation]] (EFF), [[Microsoft]], among others filed amicus briefs in support of Epic Games.&amp;lt;ref&amp;gt;{{Cite web |last=Peters |first=Jay |date=29 Jan 2022 |title=Epic largely lost to Apple, but 35 states are now backing its fight in a higher court |url=https://www.theverge.com/2022/1/28/22907106/epic-games-v-apple-amicus-briefs-states-eff-microsoft-appeal |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 11 December 2023, the jury in the case against Google decided on all 11 counts in favor of Epic Games.&amp;lt;ref&amp;gt;{{Cite web |last=Bensinger |first=Greg |last2=Scarcella |first2=Mike |date=13 Dec 2023 |title=Epic Games wins antitrust case against Google over Play app store |url=https://www.reuters.com/legal/google-epic-games-face-off-app-antitrust-trial-nears-end-2023-12-11/ |url-status=live |access-date=1 May 2025 |website=[[Reuters]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 1 May 2025, Rogers found that Apple willfully chose to not comply with the 2021 injunction, commenting &amp;quot;that it thought this court would tolerate such insubordination was a gross miscalculation&amp;quot;.&amp;lt;ref&amp;gt;{{Cite web |last=Peters |first=Jay |date=1 May 2025 |title=A judge just blew up Apple’s control of the App Store |url=https://www.theverge.com/news/659246/apple-epic-app-store-judge-ruling-control |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Facebook online events===&lt;br /&gt;
In August 2020, in response to the COVID-19 pandemic, Facebook introduced the ability for small businesses to accept an entrance fee for events. Previously, Facebook would only act as a way to RSVP for the event - the organizer must use a third-party event ticketing system to collect fees. The company pledged to not collect any fee on event sales &amp;quot;until 2023&amp;quot;.&amp;lt;ref&amp;gt;{{Cite web |date=14 Aug 2020 |title=Paid Online Events for Small Business Recovery |url=https://about.fb.com/news/2020/08/paid-online-events/ |url-status=live |access-date=16 Mar 2025 |website=[[Meta]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Apple disagreed, requiring the feature to use the in-app purchases system. This introduced Apple&#039;s 30% fee. As this increases the price the user pays, with no benefit to the small business the user intended to support, the fee was displayed as a line item in checkout. Apple did not accept this disclosure of the fee, referring to it as &amp;quot;irrelevant&amp;quot;.&amp;lt;ref name=&amp;quot;facebook&amp;quot; /&amp;gt; Facebook was allowed to compromise on displaying the fee, but &#039;&#039;without&#039;&#039; indicating that it is specifically an App Store fee.&lt;br /&gt;
&lt;br /&gt;
===HEY===&lt;br /&gt;
HEY.com is a paid webmail provider launched in June 2020 by long-time software company [[wikipedia:37signals|37signals]], specializing in inbox organization tools.&lt;br /&gt;
&lt;br /&gt;
After successfully launching the initial version of the app on the App Store, the company announced that an update was rejected due to a complaint about the business model. The app did not intend to support in-app purchases - instead, the user is expected to already have an account with the service. Apple did not like this arrangement, and demanded the company build an in-app subscription option. The company argued that they are being held to a different set of rules than apps such as [[Netflix, Inc.|Netflix]], whose app does not provide any way to purchase a subscription.&amp;lt;ref&amp;gt;{{Cite web |last=Kastrenakes |first=Jacob |date=17 Jun 2020 |title=Hey.com exec says Apple is acting like ‘gangsters,’ rejecting App Store updates and demanding cut of sales |url=https://www.theverge.com/2020/6/16/21293419/hey-apple-rejection-ios-app-store-dhh-gangsters-antitrust |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; After a suggestion from Apple executive Phil Schiller in the media, HEY introduced a 14 day free trial mode, which was approved.&amp;lt;ref&amp;gt;https://www.hey.com/apple/path/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://techcrunch.com/2020/06/18/interview-apples-schiller-says-position-on-hey-app-is-unchanged-and-no-rules-changes-are-imminent/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Patreon===&lt;br /&gt;
In August 2024, [[Patreon]] announced a change in arrangement with Apple for its App Store app. From November 2024, subscriptions started from the iOS app would be required to use the in-app purchase system, bypassing Patreon&#039;s own long-standing payments practices.&amp;lt;ref&amp;gt;{{Cite web |date=12 Aug 2024 |title=Apple’s requirements are about to hit creators and fans on Patreon. Here’s what you need to know. |url=https://news.patreon.com/articles/understanding-apple-requirements-for-patreon |url-status=live |access-date=16 Mar 2025 |website=[[Patreon]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;patreon&amp;quot; /&amp;gt; This change does not affect the Android app.&lt;br /&gt;
&lt;br /&gt;
By forcing Patreon out of the payments pipeline, certain payment models are no longer available to users of Patreon&#039;s iOS app. Creators who rely on the &amp;quot;per-creation&amp;quot; payment model, as opposed to the standard &amp;quot;per-month&amp;quot;, can no longer be subscribed to from the app. The app is also not able to support the &amp;quot;first-of-the-month&amp;quot; model, where payments from all subscribers are collected on the first day of the month, rather than every 30 days since each member&#039;s day of subscription. The price must also be rounded to a price tier supported by Apple.&lt;br /&gt;
&lt;br /&gt;
Patreon provides creators with the choice to increase their prices by 30% in the iOS app, or to keep the same prices but forfeit 30% to Apple. Creators frequently remind potential supporters to not use the Patreon iOS app, adding extra inconvenience to those wanting to support the work of small creators.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed&amp;quot; heights=&amp;quot;400px&amp;quot;&amp;gt;&lt;br /&gt;
File:Patreon iOS app pricing options - fee on top.png|&amp;quot;Maintain earnings and cover Apple&#039;s fee by increasing prices in iOS app&amp;quot; (Recommended)&lt;br /&gt;
File:Patreon iOS app pricing options - absorb fee.png|&amp;quot;Keep prices in the iOS app the same and cover Apple&#039;s fee yourself&amp;quot;&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A similar case occurred with the app Fanhouse in 2021.&amp;lt;ref&amp;gt;{{Cite web |last=@jasminericegirl |date=9 Jun 2021 |title=#fuckapple, a thread&lt;br /&gt;
I cofounded @fanhouseapp&lt;br /&gt;
 8 months ago to empower creators to monetize their content. We pay creators 90% of earnings. Now, Apple is threatening to remove Fanhouse from the app store unless we give them 30% of creator earnings. This is theft and exploitation. |url=https://x.com/jasminericegirl/status/1402691047940100100 |access-date=16 Mar 2025 |website=[[X]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Twitter===&lt;br /&gt;
In August 2021, [[Twitter]] introduced a feature named Super Follows (now Subscriptions), in which a user can pay a subscription fee to access more of a creator&#039;s content. For each user who enables Subscriptions, Twitter must submit a new in-app purchase SKU to the App Store, which will become available with the next update to the app.&amp;lt;ref&amp;gt;{{Cite web |last=@wongmjane |date=2 Sep 2021 |title=Each Super Follow is an In-App Purchase on the App Store, but because there are too many IAPs for the Twitter app, the App Store only shows 10 instead of the full list |url=https://x.com/wongmjane/status/1433372120080261120 |url-status=live |access-date=16 Mar 2025 |website=[[X]]}}&amp;lt;/ref&amp;gt; This, of course, is subject to the 30% fee. At the time of writing in January 2025, viewing the App Store listing reveals Elon Musk&#039;s $4.00 subscription as the fourth most popular IAP item.&lt;br /&gt;
&lt;br /&gt;
==Notarization==&lt;br /&gt;
Since 2015, Apple expects all Mac apps to be &amp;quot;notarized&amp;quot;. This is a preliminary, automated malware check, which upon passing, provides a notary certificate that gets &amp;quot;stapled&amp;quot; to the app. Apple&#039;s explanation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Notarization of macOS software is not App Review. The Apple notary service is an automated system that scans your software for malicious content, checks for code-signing issues, and returns the results to you quickly. If there are no issues, the notary service generates a ticket for you to staple to your software; the notary service also publishes that ticket online where Gatekeeper can find it.&amp;lt;ref&amp;gt;{{Cite web |title=Notarizing macOS software before distribution |url=https://developer.apple.com/documentation/security/notarizing-macos-software-before-distribution |url-status=live |access-date=16 Mar 2025 |website=[[Apple Developer]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whether this is actually a better approach than used by Windows antivirus, where they find out about new malware samples only when they end up on a user&#039;s computer, is a separate topic.&lt;br /&gt;
&lt;br /&gt;
To comply with the DMA&#039;s regulations on app marketplaces, Apple created a new channel of releasing apps outside of the iOS App Store. Apps go through a notarization process. But the process is definitely &#039;&#039;not&#039;&#039; notarization. The name is intentionally being abused, by contrast to notarization on macOS, to make you believe it is something other than the existing App Review system. Despite the pain some developers and users have with it, notarization on macOS has always been considered a net positive. It made sense to take advantage of its reputation for the entirely different &amp;quot;notarization&amp;quot; on iOS.&lt;br /&gt;
&lt;br /&gt;
See for yourself - view the [https://developer.apple.com/app-store/review/guidelines/ App Review Guidelines] and tick &amp;quot;Show Notarization Review Guidelines Only&amp;quot;. While most rules are knocked out by this, a good number of them are still in place. These apps are still reviewed and tested by the App Review team, must have a full product listing in App Store Connect, and can be outright rejected - all in the same way as an App Store app.&lt;br /&gt;
&lt;br /&gt;
By contrast, all that is required for notarization on macOS is for your app to not be malware. You submit it to an automated system that approves it within minutes. &#039;&#039;&#039;You don&#039;t need to convince Apple your app is worthy of existing on their platform.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The point of macOS notarization is that Apple has a record of all binaries that are intended for wide distribution on macOS, and can review them both in advance and on a regular basis for known malware/common malware patterns. Say a malware app manages to initially get through, when Apple finds out, they can go back in the notary records and find every sample of that malware to analyze and block. This is purely a technical process, managed by skilled security researchers, while iOS app review and &amp;quot;notarization&amp;quot; is a business process, managed by workers who have been given a checklist of violations to look for.&lt;br /&gt;
&lt;br /&gt;
Apple is retaining complete control over what&#039;s allowed to run on iOS. On macOS, you can choose to run apps that have not been notarized (even though the process to bypass the warning is intentionally difficult). On iOS, you never get even that option. What Apple created is the App Store but with more steps. It still goes on the App Store, just hidden so it can only be installed by the third-party store it&#039;s tied to.&lt;br /&gt;
&lt;br /&gt;
*Mysk: &amp;quot;iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens.&amp;quot;&amp;lt;ref&amp;gt;{{Cite web |last=@mysk_co |date=28 Jun 2024 |title=iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens: |url=https://x.com/mysk_co/status/1806638308455256242 |url-status=live |access-date=16 Mar 2025 |website=[[X]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==JIT==&lt;br /&gt;
Safari is allowed to [[wikipedia:Just-in-time compilation|just-in-time]] compile code worldwide. The super short version of what that means: it can run JavaScript code &#039;&#039;really fast&#039;&#039;. All browsers, and other runtimes like Microsoft .NET, Java, Lua use this. Ok, fine, it&#039;s the system web browser, it&#039;s very carefully written to be secure, and it&#039;s important to the platform to be doing well in performance benchmarks and all that.&lt;br /&gt;
&lt;br /&gt;
Apple&#039;s [https://apps.apple.com/app/swift-playgrounds/id908519492 Playgrounds] app on iPad is also allowed to JIT. It bundles Apple&#039;s [[wikipedia:Swift (programming language)|Swift]] compiler, and shares backend code with the version of Playgrounds found in [[wikipedia:Xcode|Xcode]].&lt;br /&gt;
&lt;br /&gt;
Competing apps like Pythonista (a Python IDE), emulators like Delta and UTM, and terminal environments like iSH, are not allowed to JIT. As such, they need to rely on inferior performance, potentially from an entirely separate implementation of their compiler/interpreter that may be less proven, because the JIT-less implementation doesn&#039;t need to exist on any other platform.&lt;br /&gt;
&lt;br /&gt;
Likely the most clear example is UTM SE. UTM is a port of the [[wikipedia:QEMU|QEMU]] emulator to iOS, allowing you to run desktop OSes (Linux, Windows 98, XP, classic Mac OS, etc). iPhone hardware is very capable these days and it runs impressively well, &#039;&#039;if&#039;&#039; you use a hack to enable JIT (which Apple has now patched). &amp;quot;SE&amp;quot; stands for &amp;quot;slow edition&amp;quot; - yes, really. If you compare the true version of UTM to the App Store UTM SE app, you &#039;&#039;will&#039;&#039; feel the loss in performance. It&#039;s impressive UTM even got to be on the App Store at all, and the DMA is to thank for it. But Apple is still holding the line on allowing JIT to apps that require that performance.&lt;br /&gt;
&lt;br /&gt;
While UTM SE releasing at all might seem like a pathway to getting Firefox and Chrome &amp;quot;slow editions&amp;quot; on the App Store, browser engines other than the built-in Apple WebKit/JavaScriptCore are still outlawed.&amp;lt;ref&amp;gt;{{Cite web |title=App Review Guidelines |url=https://developer.apple.com/app-store/review/guidelines/#2.5.6 |url-status=live |access-date=16 Mar 2025 |website=[[Apple Developer]]}}&amp;lt;/ref&amp;gt; In the EU, Apple has blessed web browser JavaScript engines with the option to use JIT. The app must be approved for an entitlement, and then must work within APIs provided by Apple for it. As of January 2025, no browsers have been released using this. We were all anticipating proper competition around web browsers on iOS, but almost a year later, we have nothing.&amp;lt;ref&amp;gt;{{Cite web |title=Mozilla says Apple’s new browser rules are ‘as painful as possible’ for Firefox&lt;br /&gt;
 |url=https://www.theverge.com/2024/1/26/24052067/mozilla-apple-ios-browser-rules-firefox |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Sandbox==&lt;br /&gt;
You might not like app sandboxing, but it&#039;s a powerful security feature used on all modern platforms. The reality is very few apps need more than a few basic permissions. [[wikipedia:Flatpak|Flatpak]] on Linux also sandboxes apps, and it seems to work great! Still, it&#039;s completely fair that there should be processes for doing things beyond what the sandbox allows. You see some of this with permission prompts - does a flashlight app &#039;&#039;really&#039;&#039; need access to your contacts? (Apple has been burned by apps abusing user data before the current permission system was built out.&amp;lt;ref&amp;gt;{{Cite web |last=Bohn |first=Dleter |date=15 Feb 2012 |title=iOS apps and the address book: who has your data, and how they’re getting it |url=https://www.theverge.com/2012/2/14/2798008/ios-apps-and-the-address-book-what-you-need-to-know |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
It can go further than this. As we established in previous sections, an app can be given more access to features of the system using entitlements. These come in a few flavors:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Completely safe&#039;&#039;&#039;: Entitlements any developer can opt into, with little to no risk.&lt;br /&gt;
*&#039;&#039;&#039;Approval required&#039;&#039;&#039;: Entitlements that might be more of a security risk to allow, e.g. giving considerably wider access to the system, or that Apple simply doesn&#039;t want to hand out to just &#039;&#039;anyone&#039;&#039; for competitive reasons. The developer must submit a request to Apple with evidence of why they need the entitlement.&lt;br /&gt;
*&#039;&#039;&#039;Private&#039;&#039;&#039;: Entitlements that are never allowed for any app developer to use. Many of these are reasonably fenced off because they handle user data that is very risky, or bypasses permission prompts, etc, but can just as well also be guarding features Apple wants to keep to itself.&lt;br /&gt;
&lt;br /&gt;
There have been [https://gizmodo.com/researchers-uber-s-ios-app-had-secret-permissions-that-1819177235 exceptions] where Apple quietly gave a company access to private entitlements anyway, raising eyebrows.&lt;br /&gt;
&lt;br /&gt;
On iOS, you also can&#039;t be &#039;&#039;more&#039;&#039; secure than the default sandbox. That might seem crazy if you&#039;re not a developer, but it&#039;s pretty important for security in a variety of situations. On macOS, there are several entitlements you must declare to decide whether you&#039;re allowed to access certain types of user data at all. Android used this design from the very start - you can&#039;t even do fundamental things like access the internet without declaring it in your manifest. It makes it very explicit what the app&#039;s intentions are.&lt;br /&gt;
&lt;br /&gt;
iOS has one sandbox used by all App Store apps. System apps, and App Store apps developed by Apple, are allowed to expand or reduce their sandbox permissions as needed. Third-party apps do not get the right to expand or reduce their sandbox permissions at all. This is clearly less secure. To take the example of Playgrounds again, while it&#039;s allowed to run your code from a separate process executing in an ultra locked down sandbox with very few permissions, competing apps such as Pythonista must run your code in the same sandbox and address space as the main app process. The Python interpreter crashing would therefore crash the entire app, possibly losing work. In the worst case, a vulnerability in third-party code could give access to all data stored by/accessible to the app. For example, it would be a nightmare if you can tap the wrong link in Safari and have a hacker easily steal your cookies from other websites. If that third-party code could run in its own limited sandbox, the risk is significantly reduced.&lt;br /&gt;
&lt;br /&gt;
The only known workaround is to execute the code via JavaScript, as Apple&#039;s JavaScriptCore engine runs in a heavily sandboxed process. This requires you to port the code to JS, which may be a lot of work, or just not viable. You wouldn&#039;t want to run the Python interpreter inside JavaScript - the performance would be terrible!&lt;br /&gt;
&lt;br /&gt;
==In-app browsers==&lt;br /&gt;
Safari&#039;s in-app browser, that is the minimal version you get when tapping a link from social media, uses an entirely separate data store for each app. The in-app browser isn&#039;t aware of cookies in the &amp;quot;full&amp;quot; Safari app, or any other app, and doesn&#039;t support Safari extensions. Apple claimed this was to protect malicious apps from stealing or setting cookies in Safari without your knowledge, which is a fair argument, but it&#039;s hard to not notice that it makes web browsing inconvenient, encouraging users to install native apps, where they can make transactions through Apple.&amp;lt;ref&amp;gt;{{Cite web |last=@whitehatguy |date=12 Jun 2017 |title=Impact of iOS 11 no longer providing shared cookies between Safari, Safari View Controller instances |url=https://github.com/openid/AppAuth-iOS/issues/120 |url-status=live |access-date=16 Mar 2025 |website=[[GitHub]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This also means your browsing in the in-app browser is just forgotten - there&#039;s no history menu, and it doesn&#039;t get logged to the history in the full Safari app either. Good luck recalling that article you read a few weeks ago.&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
*[https://theapplewiki.com/wiki/Eligibility Eligibility]&lt;br /&gt;
*Posts written by an author of this article:&lt;br /&gt;
**[https://adamdemasi.com/2024/04/19/app-marketplace-experience.html The iOS 17.4 app marketplace flow is a disaster]&lt;br /&gt;
**[https://adamdemasi.com/2024/04/20/ios-eligibility.html How I tricked iOS into giving me EU DMA features]&lt;br /&gt;
**[https://adamdemasi.com/2024/04/23/ios-eligibility-features.html Features controlled by iOS 17.4&#039;s eligibility system]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Apple App Store]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=14026</id>
		<title>Apple App Store</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=14026"/>
		<updated>2025-05-01T05:12:42Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Epic Games, clearer wording&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:App Store (iOS).svg|thumb|150px]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;[[Apple]]&#039;&#039;&#039; uses a range of technical measures to protect their App Store ecosystem and reduce consumer choice. These measures obscure the company&#039;s business intentions, creating roadblocks for app developers and users, while typically citing security reasons for their existence. This actively hurts the ability for lawmakers to advocate for the rights of consumers and businesses in Apple&#039;s ecosystem, and prevents apps from being as useful as their customers expect.&lt;br /&gt;
&lt;br /&gt;
A never-ending demand for a cut of every sale of a digital product, ranging from game currency, to supporting content creators,&amp;lt;ref name=&amp;quot;patreon&amp;quot;&amp;gt;{{Cite web |last=Roth |first=Emma |date=12 Aug 2024 |title=Patreon: adding Apple’s 30 percent tax is the price of staying in the App Store |url=https://www.theverge.com/2024/8/12/24218629/patreon-membership-ios-30-percent-apple-tax |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; to booking a Zoom call with a local business,&amp;lt;ref name=&amp;quot;facebook&amp;quot;&amp;gt;{{Cite web |last=Paul |first=Katie |last2=Nellis |first2=Stephen |date=28 Aug 2020 |title=Exclusive: Facebook says Apple rejected its attempt to tell users about App Store fees |url=https://www.reuters.com/article/us-facebook-apple-exclusive/exclusive-facebook-says-apple-rejected-its-attempt-to-tell-users-about-app-store-fees-idUSKBN25O042/ |url-status=live |access-date=16 Mar 2025 |website=[[Reuters]]}}&amp;lt;/ref&amp;gt; hurts the ability for app developers to innovate. These developers, working hard and pulling countless hours to build a quality app, always need to take Apple&#039;s (and [[Google]]&#039;s) demands into account - specifically, a fee of between 15% and 30% of all revenue collected via the app. This is revenue that can be reinvested into the app, but instead must be earmarked for the platforms they are &#039;&#039;&#039;required&#039;&#039;&#039; to use to reach their customers.&lt;br /&gt;
&lt;br /&gt;
Because this is a clear problem, several governments, including South Korea,&amp;lt;ref&amp;gt;{{Cite web |date=8 Mar 2022 |title=South Korea approves rules on app store law targeting Apple, Google |url=https://www.reuters.com/technology/skorea-approves-rules-app-store-law-targeting-apple-google-2022-03-08/ |url-status=live |access-date=16 Mar 2025 |website=[[Reuters]]}}&amp;lt;/ref&amp;gt; Japan,&amp;lt;ref&amp;gt;{{Cite web |last=Sharwood |first=Simon |date=13 Jun 2024 |title=Japan forces Apple and Google to allow third-party app stores and payments |url=https://www.theregister.com/2024/06/13/japan_smartphone_software_law/ |url-status=live |access-date=16 Mar 2025 |website=[[The Register]]}}&amp;lt;/ref&amp;gt; the European Union,&amp;lt;ref&amp;gt;[[wikipedia:Digital Markets Act|Digital Markets Act]]&amp;lt;/ref&amp;gt; the United Kingdom,&amp;lt;ref&amp;gt;{{Cite web |last=Competition and Markets Authority |date=4 Mar 2021 |title=Investigation into Apple AppStore |url=https://www.gov.uk/cma-cases/investigation-into-apple-appstore |url-status=live |access-date=16 Mar 2025 |website=[[gov.uk]]}}&amp;lt;/ref&amp;gt; Australia,&amp;lt;ref&amp;gt;{{Cite web |date=28 Apr 2021 |title=Dominance of Apple and Google&#039;s app stores impacting competition and consumers |url=https://www.accc.gov.au/media-release/dominance-of-apple-and-googles-app-stores-impacting-competition-and-consumers |url-status=live |access-date=16 Mar 2025 |website=[[ACCC]]}}&amp;lt;/ref&amp;gt; as well as the US and a handful of states,&amp;lt;ref&amp;gt;[[wikipedia:Open App Markets Act|Open App Markets Act]]&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=20 Nov 2024 |title=S.5364 - App Store Accountability Act |url=https://www.congress.gov/bill/118th-congress/senate-bill/5364/text/is |url-status=live |access-date=16 Mar 2025 |website=[[congress.gov]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;doj&amp;quot;&amp;gt;{{Cite web |last=Balsamo |first=Mike |last2=Liedtke |first2=Mike |last3=Whitehurst |first3=Lindsay |last4=Bajak |first4=Frank |date=21 Mar 2024 |title=Justice Department sues Apple, alleging it illegally monopolized the smartphone market |url=https://apnews.com/article/apple-antitrust-monopoly-app-store-justice-department-822d7e8f5cf53a2636795fcc33ee1fc3 |url-status=live |access-date=16 Mar 2025 |website=[[APNews]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=19 Feb 2021 |title=It’s time to free ourselves from ‘Big Tech’ monopoly |url=https://azcapitoltimes.com/news/2021/02/19/its-time-to-free-ourselves-from-big-tech-monopoly/ |url-status=live |access-date=16 Mar 2025 |website=[[Arizona Capitol Times]]}}&amp;lt;/ref&amp;gt; have opened investigations into anti-competitive practices, or considered or already passed legislation to force &amp;quot;gatekeeper platforms&amp;quot; such as Apple to be more reasonable with third-party developers.&lt;br /&gt;
&lt;br /&gt;
This being a major threat to Apple&#039;s revenue stream (interestingly, one they claim to be unsure is profitable&amp;lt;ref&amp;gt;{{Cite web |last=Lovejoy |first=Ben |date=17 Apr 2024 |title=Schiller doesn’t know whether the App Store is profitable; there are no minutes of meetings |url=https://9to5mac.com/2024/04/17/app-store-is-profitable-apple-notes/ |url-status=live |access-date=16 Mar 2025 |website=[[9to5Mac]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |last=Lovejoy |first=Ben |date=17 Jan 2025 |title=Apple denies App Store profit margin is 75% – claims to have no clue |url=https://9to5mac.com/2025/01/17/apple-denies-app-store-profit-margin-is-75-claims-to-have-no-clue/ |url-status=live |access-date=16 Mar 2025 |website=[[9t05Mac]]}}&amp;lt;/ref&amp;gt;), they have responded with practices such as geoblocking certain operating system functionality based on physical location,&amp;lt;ref&amp;gt;{{Cite web |title=Eligibility |url=https://theapplewiki.com/wiki/Eligibility |url-status=live |access-date=16 Mar 2025 |website=[[The Apple Wiki]]}}&amp;lt;/ref&amp;gt; misrepresenting/overstating risks, and using careful wording with commonly-understood terms to describe unreasonably difficult-to-use systems.&lt;br /&gt;
&lt;br /&gt;
==Background info==&lt;br /&gt;
Important terms you&#039;ll run into in this article:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;[[wikipedia:Sandbox (computer security)|Sandbox]]&#039;&#039;&#039;: Reduces exposure of the user&#039;s device/data to security risks, by reducing what an app is allowed to do.&lt;br /&gt;
*&#039;&#039;&#039;[https://theapplewiki.com/wiki/Entitlements Entitlements]&#039;&#039;&#039;: Apple&#039;s method of &amp;quot;poking holes&amp;quot; in the sandbox, to give the app more permissions. Some are available to developers, while many are only available to Apple.&lt;br /&gt;
*&#039;&#039;&#039;[[wikipedia:Digital Markets Act|Digital Markets Act]]&#039;&#039;&#039;: The European Union&#039;s fairly sweeping recent regulations against forcing companies they classify as &amp;quot;gatekeepers&amp;quot; to play nice, giving smaller businesses access to software/hardware features they&#039;ve historically reserved for their own use.&lt;br /&gt;
&lt;br /&gt;
==In-app purchases==&lt;br /&gt;
Apple has been collecting users&#039; credit card numbers since launching the iTunes Store in 2004. The launch of the App Store in 2008, followed by the introduction of in-app purchases (IAPs) in 2009, gave iPhone app developers the opportunity to sell app features to users. The IAP system is provided as a developer framework named [https://developer.apple.com/storekit/ StoreKit]. Apps and their in-app purchases are managed through a dashboard named [https://developer.apple.com/app-store-connect/ App Store Connect]. App sales have eclipsed iTunes Store sales, and are now a primary focus of Apple&#039;s Media Services division.&lt;br /&gt;
&lt;br /&gt;
Apple requires any purchase of a digital good or service in an app to use their in-app purchase system. This may seem reasonable because the customer may inevitably call Apple support, demanding a refund for an app they have issues with. Apple would rather give that refund and leave the customer with a positive support experience, than to provide a messy process involving contacting a third-party, whose customer service is likely nowhere near the same experience.&lt;br /&gt;
&lt;br /&gt;
App Store purchase fees are between 15% and 30%. In September 2016, Apple expanded subscriptions to be available to any type of app, also introducing a 15% discount incentive when the user has already subscribed for a year.&amp;lt;ref&amp;gt;{{Cite web |last=Goode |first=Lauren |date=2 Sep 2016 |title=Apple’s new subscription offerings are now available to App Store developers |url=https://www.theverge.com/2016/9/2/12774758/apple-developers-app-store-new-subscription-rules |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; In November 2020, Apple introduced a reduced 15% fee for app developers with revenue below $1 million per year.&amp;lt;ref&amp;gt;{{Cite web |last=Centers |first=Josh |date=18 Nov 2020 |title=Apple Drops App Store Commission to 15% for Small Developers |url=https://tidbits.com/2020/11/18/apple-drops-app-store-commission-to-15-for-small-developers/ |access-date=16 Mar 2025 |website=[[TidBITS]]}}&amp;lt;/ref&amp;gt; For developers above this threshold, and for cases excluded from this program such as for games, the fee is 30%. In the 2008 announcement of the App Store, Apple considered this a reasonable, industry-standard fee. However, the way we use apps has significantly evolved since 2009 - the world has shifted to heavily depend upon on mobile apps, which have also evolved into more complex and sustainable business models than a simple one-time purchase.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Stripe, Inc.|Stripe]], a popular platform used for payments on the web, uses a base fee of 2.9% plus a fixed $0.30 in the United States.&amp;lt;ref&amp;gt;{{Cite web |title=Pricing |url=https://stripe.com/it/pricing |url-status=live |access-date=16 Mar 2025 |website=[[Stripe]]}}&amp;lt;/ref&amp;gt; With add-on services, before considering volume discounts, a Stripe transaction may rather have a cost of 6.4% + $1.10.&amp;lt;ref&amp;gt;Calculated from base fee (2.9% + $0.30) + international card (1.5%) + adaptive pricing (2%) + international payment methods ($0.80), as of January 2025&amp;lt;/ref&amp;gt; Stripe has been used by businesses ranging from small online stores, to [[OpenAI]] for ChatGPT Plus. Competing payments services have similar or identical fees to Stripe. &#039;&#039;&#039;The in-app purchase system does not provide sufficient value to justify considerably higher fees than alternative payment platforms.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The App Store system poorly handles secondary marketplaces of digital services that exist within the primary App Store marketplace, such as Patreon. Apple, however, still requires companies in the business of selling digital services to use this inadequate system. This requires the app to account for Apple&#039;s fee, which is significant enough to often warrant increasing prices, and to follow rules even if they do not make sense for the nature of service they are providing. Apple has frequently been found in disputes with such apps. This injects extra complication at no benefit to the marketplace, the creator, or the customer - only to Apple, who has little to no involvement after delivering the initial app download to the user&#039;s phone. The significant fee also often drives app developers to consider building their app around an advertising model instead, creating privacy concerns.&lt;br /&gt;
&lt;br /&gt;
Additionally, the 15% small businesses fee discount is judged based on the app&#039;s overall turnover, and is not based on individual creators in the app&#039;s marketplace. An app that turns over $1 million per year by providing services to creators that individually make less than $1 million per year does not have the opportunity to use the discount.&lt;br /&gt;
&lt;br /&gt;
Apple, often together with Google, use lobbying efforts in the United States and other countries in an attempt to minimize the issues. &amp;quot;ACT | The App Association&amp;quot;, pitched as an association of independent small business app developers, is at least 50% funded by Apple, and does not list its claimed 2,000 members.&amp;lt;ref&amp;gt;{{Cite web |date=1 Oct 2021 |title=Not a class ACT: the so-called App Association is simply an Apple Association and does NOT represent app developers&#039; interests in fair distribution terms |url=http://www.fosspatents.com/2021/10/not-class-act-so-called-app-association.html |url-status=live |access-date=16 Mar 2025 |website=[[FOSS Patents]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=19 Sep 2022 |title=Vast majority of ACT {{!}} The App Association&#039;s funding comes from Apple, former employees tell Bloomberg: astroturfing against app developers&#039; interests |url=http://www.fosspatents.com/2022/09/vast-majority-of-act-app-associations.html |url-status=live |access-date=16 Mar 2025 |website=[[FOSS Patents]]}}&amp;lt;/ref&amp;gt; In March 2024, the United States Department of Justice along with 16 state attorneys-general filed a lawsuit against Apple, including an accusation that the company &amp;quot;extracts more money from consumers, developers, content creators, artists, publishers, small businesses, and merchants, among others&amp;quot;.&amp;lt;ref name=&amp;quot;doj&amp;quot; /&amp;gt; The future of this lawsuit is unclear as of April 2025.&lt;br /&gt;
&lt;br /&gt;
Despite criticism of Apple forcing their fee into transactions with small businesses and creators on [[#Patreon|Patreon]], [[#Facebook online events|Facebook]], and similar platforms, on 23 January 2025, Apple announced the Advanced Commerce API. It &amp;quot;support[s] developers&#039; evolving business models - such as exceptionally large content catalogs, creator experiences, and subscriptions with optional add-ons&amp;quot;.&amp;lt;ref&amp;gt;{{Cite web |date=23 Jan 2025 |title=Introducing the Advanced Commerce API |url=https://developer.apple.com/news/?id=yxy958ya |url-status=live |access-date=16 Mar 2025 |website=[[Apple Developer]]}}&amp;lt;/ref&amp;gt; While positioned as a way for such businesses to save development time and avoid ongoing costs by building on top of Apple&#039;s mature payments platform, its use is in fact necessary for these businesses to work within the App Store guidelines, as seen in cases outlined below. The feature requires submitting a description of the app&#039;s business model to Apple for approval. This continues a trend of requiring Apple&#039;s consent to conduct business in a place users have been trained to expect it.&lt;br /&gt;
&lt;br /&gt;
Given Apple&#039;s strong incentives, and a ticking clock as legal pressure builds, it is not hard to find stories from app developers regarding poor experiences with Apple&#039;s app review process.&lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;This list is extremely incomplete. Please add examples if you know of any.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Epic Games===&lt;br /&gt;
{{hatnote|See also: [[wikipedia:Epic Games v. Apple|Epic Games v. Apple]] and [[wikipedia:Epic Games v. Google|Epic Games v. Google]]}}&lt;br /&gt;
&lt;br /&gt;
[[Epic Games]] is a video game developer and publisher, known for games such as [[Fortnite]] and [[Unreal Tournament]], the [[Unreal Engine]], and the [[Epic Games Store]].&lt;br /&gt;
&lt;br /&gt;
In 2018, Epic Games launched Fortnite on the iOS and Android platforms. The company made the unusual decision to not release the app on the [[Google Play Store]] - rather, it was made available as a standalone [[wikipedia:apk (file format)|Android app package]] file (.apk), which must be installed by following a series of manual steps.&amp;lt;ref&amp;gt;{{Cite web |last=Statt |first=Nick |date=3 Aug 2018 |title=Fortnite for Android will ditch Google Play Store for Epic’s website |url=https://www.theverge.com/2018/8/3/17645982/epic-games-fortnite-android-version-bypass-google-play-store |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; The app was also released on the [[Samsung]] [[Samsung Galaxy Store|Galaxy Store]]. Google offered a $147 million deal for Epic Games to release Fortnite on the Play Store, which the company declined.&amp;lt;ref&amp;gt;{{Cite web |last=Robertson |first=Adi |date=9 Nov 2023 |title=Google offered Epic $147 million to launch Fortnite on the Play Store |url=https://www.theverge.com/2023/11/8/23953262/google-epic-fortnite-play-store-investment-antitrust-trial |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 22 April 2020, Fortnite was finally released on the Play Store.&amp;lt;ref&amp;gt;{{Cite web |last=Carpenter |first=Nicole |date=22 April 2020 |title=Fortnite available on the Google Play Store for the first time |url=https://www.polygon.com/2020/4/21/21229930/fortnite-available-on-google-play-android-mobile-devices |url-status=live |access-date=1 May 2025 |website=[[Polygon]]}}&amp;lt;/ref&amp;gt; In a statement, the company explained:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
After 18 months of operating Fortnite on Android outside of the Google Play Store, we&#039;ve come to a basic realization: Google puts software downloadable outside of Google Play at a disadvantage, through technical and business measures such as scary, repetitive security pop-ups for downloaded and updated software, restrictive manufacturer and carrier agreements and dealings, Google public relations characterizing third party software sources as malware, and new efforts such as Google Play Protect to outright block software obtained outside the Google Play store.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 13 August 2020, Epic Games launched a campaign against both Apple and Google&#039;s app store business practices. The company released app updates on both platforms, introducing a method for purchasing V-Bucks in-game currency at a 20% discount by directly transacting with Epic Games, against the developer rules of both platforms. The platforms responded by removing the game from their storefronts. Epic Games then filed civil antitrust lawsuits against both companies in the Northern District of California.&amp;lt;ref&amp;gt;{{Cite web |last=Statt |first=Nick |date=14 Aug 2020 |title=Epic Games is suing Apple |url=https://www.theverge.com/2020/8/13/21367963/epic-fortnite-legal-complaint-apple-ios-app-store-removal-injunctive-relief |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; The campaign, branded &amp;quot;Free Fortnite&amp;quot;, was later extended with lawsuits and complaints in Australia,&amp;lt;ref&amp;gt;{{Cite web |date=18 Nov 2020 |title=Epic Games extends its fight against Apple to Australia |url=https://www.epicgames.com/site/en-US/freefortnite-australia-press-release |url-status=live |access-date=16 Mar 2025 |website=[[Epic Games]]}}&amp;lt;/ref&amp;gt;, the European Union,&amp;lt;ref&amp;gt;{{Cite web |date=17 Feb 2021 |title=Epic Game Files EU Antitrust Complaint Against Apple |url=https://www.epicgames.com/site/en-US/news/epic-games-files-eu-antitrust-complaint-against-apple |url-status=live |access-date=16 Mar 2025 |website=[[Epic Games]]}}&amp;lt;/ref&amp;gt; and the United Kingdom.&amp;lt;ref&amp;gt;{{Cite web |date=30 Mar 2021 |title=Epic Games files complaint to support CMA Apple investigation |url=https://www.epicgames.com/site/en-US/news/epic-games-files-complaint-to-support-cma-apple-investigation |url-status=live |access-date=16 Mar 2025 |website=[[Epic Games]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 11 September 2021, Judge Yvonne Gonzalez Rogers decided on the case. While the lawsuit against Apple failed on 9 of 10 counts, Rogers ruled against Apple&#039;s use of &amp;quot;anti-steering&amp;quot; - their strategies of preventing the user from being &amp;quot;steered&amp;quot; to a third-party storefront for payment processing, placing a permanent injunction on this behavior.&amp;lt;ref&amp;gt;{{Cite web |last=Brandon |first=Russell |date=11 Sep 2021 |title=Apple must allow other forms of in-app purchase, rules judge in Epic v. Apple |url=https://www.theverge.com/2021/9/10/22662320/epic-apple-ruling-injunction-judge-court-app-store |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; Despite the case mostly failing, the discovery process provided significant insight into Apple&#039;s decisions around App Store policies, including decisions made in major app review disputes, and in one case, executive Phil Schiller arguing to reduce the fee from 30%.&amp;lt;ref&amp;gt;{{Cite web |last=Gurman |first=Mark |date=4 May 2021 |title=Apple’s Schiller Floated Cutting App Store Fees a Decade Ago |url=https://www.bloomberg.com/news/articles/2021-05-03/apple-s-schiller-floated-cutting-app-store-fees-a-decade-ago |url-status=live |access-date=1 May 2025 |website=[[iMore]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Epic Games and Apple both appealed the decision. 35 state attorneys-general, the [[Electronic Frontier Foundation]] (EFF), [[Microsoft]], among others filed amicus briefs in support of Epic Games.&amp;lt;ref&amp;gt;{{Cite web |last=Peters |first=Jay |date=29 Jan 2022 |title=Epic largely lost to Apple, but 35 states are now backing its fight in a higher court |url=https://www.theverge.com/2022/1/28/22907106/epic-games-v-apple-amicus-briefs-states-eff-microsoft-appeal |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 11 December 2023, the jury in the case against Google decided on all 11 counts in favor of Epic Games.&amp;lt;ref&amp;gt;{{Cite web |last=Bensinger |first=Greg |last2=Scarcella |first2=Mike |date=13 Dec 2023 |title=Epic Games wins antitrust case against Google over Play app store |url=https://www.reuters.com/legal/google-epic-games-face-off-app-antitrust-trial-nears-end-2023-12-11/ |url-status=live |access-date=1 May 2025 |website=[[Reuters]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 1 May 2025, Rogers found that Apple willfully chose to not comply with the 2021 injunction, commenting &amp;quot;that it thought this court would tolerate such insubordination was a gross miscalculation&amp;quot;.&amp;lt;ref&amp;gt;{{Cite web |last=Peters |first=Jay |date=1 May 2025 |title=A judge just blew up Apple’s control of the App Store |url=https://www.theverge.com/news/659246/apple-epic-app-store-judge-ruling-control |url-status=live |access-date=1 May 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Facebook online events===&lt;br /&gt;
In August 2020, in response to the COVID-19 pandemic, Facebook introduced the ability for small businesses to accept an entrance fee for events. Previously, Facebook would only act as a way to RSVP for the event - the organizer must use a third-party event ticketing system to collect fees. The company pledged to not collect any fee on event sales &amp;quot;until 2023&amp;quot;.&amp;lt;ref&amp;gt;{{Cite web |date=14 Aug 2020 |title=Paid Online Events for Small Business Recovery |url=https://about.fb.com/news/2020/08/paid-online-events/ |url-status=live |access-date=16 Mar 2025 |website=[[Meta]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Apple disagreed, requiring the feature to use the in-app purchases system. This introduced Apple&#039;s 30% fee. As this increases the price the user pays, with no benefit to the small business the user intended to support, the fee was displayed as a line item in checkout. Apple did not accept this disclosure of the fee, referring to it as &amp;quot;irrelevant&amp;quot;.&amp;lt;ref name=&amp;quot;facebook&amp;quot; /&amp;gt; Facebook was allowed to compromise on displaying the fee, but &#039;&#039;without&#039;&#039; indicating that it is specifically an App Store fee.&lt;br /&gt;
&lt;br /&gt;
===HEY===&lt;br /&gt;
HEY.com is a paid webmail provider launched in June 2020 by long-time software company [[wikipedia:37signals|37signals]], specializing in inbox organization tools.&lt;br /&gt;
&lt;br /&gt;
After successfully launching the initial version of the app on the App Store, the company announced that an update was rejected due to a complaint about the business model. The app did not intend to support in-app purchases - instead, the user is expected to already have an account with the service. Apple did not like this arrangement, and demanded the company build an in-app subscription option. The company argued that they are being held to a different set of rules than apps such as [[Netflix, Inc.|Netflix]], whose app does not provide any way to purchase a subscription.&amp;lt;ref&amp;gt;{{Cite web |last=Kastrenakes |first=Jacob |date=17 Jun 2020 |title=Hey.com exec says Apple is acting like ‘gangsters,’ rejecting App Store updates and demanding cut of sales |url=https://www.theverge.com/2020/6/16/21293419/hey-apple-rejection-ios-app-store-dhh-gangsters-antitrust |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt; After a suggestion from Apple executive Phil Schiller in the media, HEY introduced a 14 day free trial mode, which was approved.&amp;lt;ref&amp;gt;https://www.hey.com/apple/path/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://techcrunch.com/2020/06/18/interview-apples-schiller-says-position-on-hey-app-is-unchanged-and-no-rules-changes-are-imminent/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Patreon===&lt;br /&gt;
In August 2024, [[Patreon]] announced a change in arrangement with Apple for its App Store app. From November 2024, subscriptions started from the iOS app would be required to use the in-app purchase system, bypassing Patreon&#039;s own long-standing payments practices.&amp;lt;ref&amp;gt;{{Cite web |date=12 Aug 2024 |title=Apple’s requirements are about to hit creators and fans on Patreon. Here’s what you need to know. |url=https://news.patreon.com/articles/understanding-apple-requirements-for-patreon |url-status=live |access-date=16 Mar 2025 |website=[[Patreon]]}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;patreon&amp;quot; /&amp;gt; This change does not affect the Android app.&lt;br /&gt;
&lt;br /&gt;
By forcing Patreon out of the payments pipeline, certain payment models are no longer available to users of Patreon&#039;s iOS app. Creators who rely on the &amp;quot;per-creation&amp;quot; payment model, as opposed to the standard &amp;quot;per-month&amp;quot;, can no longer be subscribed to from the app. The app is also not able to support the &amp;quot;first-of-the-month&amp;quot; model, where payments from all subscribers are collected on the first day of the month, rather than every 30 days since each member&#039;s day of subscription. The price must also be rounded to a price tier supported by Apple.&lt;br /&gt;
&lt;br /&gt;
Patreon provides creators with the choice to increase their prices by 30% in the iOS app, or to keep the same prices but forfeit 30% to Apple. Creators frequently remind potential supporters to not use the Patreon iOS app, adding extra inconvenience to those wanting to support the work of small creators.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed&amp;quot; heights=&amp;quot;400px&amp;quot;&amp;gt;&lt;br /&gt;
File:Patreon iOS app pricing options - fee on top.png|&amp;quot;Maintain earnings and cover Apple&#039;s fee by increasing prices in iOS app&amp;quot; (Recommended)&lt;br /&gt;
File:Patreon iOS app pricing options - absorb fee.png|&amp;quot;Keep prices in the iOS app the same and cover Apple&#039;s fee yourself&amp;quot;&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A similar case occurred with the app Fanhouse in 2021.&amp;lt;ref&amp;gt;{{Cite web |last=@jasminericegirl |date=9 Jun 2021 |title=#fuckapple, a thread&lt;br /&gt;
I cofounded @fanhouseapp&lt;br /&gt;
 8 months ago to empower creators to monetize their content. We pay creators 90% of earnings. Now, Apple is threatening to remove Fanhouse from the app store unless we give them 30% of creator earnings. This is theft and exploitation. |url=https://x.com/jasminericegirl/status/1402691047940100100 |access-date=16 Mar 2025 |website=[[X]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Twitter===&lt;br /&gt;
In August 2021, [[Twitter]] introduced a feature named Super Follows (now Subscriptions), in which a user can pay a subscription fee to access more of a creator&#039;s content. For each user who enables Subscriptions, Twitter must submit a new in-app purchase SKU to the App Store, which will become available with the next update to the app.&amp;lt;ref&amp;gt;{{Cite web |last=@wongmjane |date=2 Sep 2021 |title=Each Super Follow is an In-App Purchase on the App Store, but because there are too many IAPs for the Twitter app, the App Store only shows 10 instead of the full list |url=https://x.com/wongmjane/status/1433372120080261120 |url-status=live |access-date=16 Mar 2025 |website=[[X]]}}&amp;lt;/ref&amp;gt; This, of course, is subject to the 30% fee. At the time of writing in January 2025, viewing the App Store listing reveals Elon Musk&#039;s $4.00 subscription as the fourth most popular IAP item.&lt;br /&gt;
&lt;br /&gt;
==Notarization==&lt;br /&gt;
Since 2015, Apple expects all Mac apps to be &amp;quot;notarized&amp;quot;. This is a preliminary, automated malware check, which upon passing, provides a notary certificate that gets &amp;quot;stapled&amp;quot; to the app. Apple&#039;s explanation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Notarization of macOS software is not App Review. The Apple notary service is an automated system that scans your software for malicious content, checks for code-signing issues, and returns the results to you quickly. If there are no issues, the notary service generates a ticket for you to staple to your software; the notary service also publishes that ticket online where Gatekeeper can find it.&amp;lt;ref&amp;gt;{{Cite web |title=Notarizing macOS software before distribution |url=https://developer.apple.com/documentation/security/notarizing-macos-software-before-distribution |url-status=live |access-date=16 Mar 2025 |website=[[Apple Developer]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whether this is actually a better approach than used by Windows antivirus, where they find out about new malware samples only when they end up on a user&#039;s computer, is a separate topic.&lt;br /&gt;
&lt;br /&gt;
To comply with the DMA&#039;s regulations on app marketplaces, Apple created a new channel of releasing apps outside of the iOS App Store. Apps go through a notarization process. But the process is definitely &#039;&#039;not&#039;&#039; notarization. The name is intentionally being abused, by contrast to notarization on macOS, to make you believe it is something other than the existing App Review system. Despite the pain some developers and users have with it, notarization on macOS has always been considered a net positive. It made sense to take advantage of its reputation for the entirely different &amp;quot;notarization&amp;quot; on iOS.&lt;br /&gt;
&lt;br /&gt;
See for yourself - view the [https://developer.apple.com/app-store/review/guidelines/ App Review Guidelines] and tick &amp;quot;Show Notarization Review Guidelines Only&amp;quot;. While most rules are knocked out by this, a good number of them are still in place. These apps are still reviewed and tested by the App Review team, must have a full product listing in App Store Connect, and can be outright rejected - all in the same way as an App Store app.&lt;br /&gt;
&lt;br /&gt;
By contrast, all that is required for notarization on macOS is for your app to not be malware. You submit it to an automated system that approves it within minutes. &#039;&#039;&#039;You don&#039;t need to convince Apple your app is worthy of existing on their platform.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The point of macOS notarization is that Apple has a record of all binaries that are intended for wide distribution on macOS, and can review them both in advance and on a regular basis for known malware/common malware patterns. Say a malware app manages to initially get through, when Apple finds out, they can go back in the notary records and find every sample of that malware to analyze and block. This is purely a technical process, managed by skilled security researchers, while iOS app review and &amp;quot;notarization&amp;quot; is a business process, managed by workers who have been given a checklist of violations to look for.&lt;br /&gt;
&lt;br /&gt;
Apple is retaining complete control over what&#039;s allowed to run on iOS. On macOS, you can choose to run apps that have not been notarized (even though the process to bypass the warning is intentionally difficult). On iOS, you never get even that option. What Apple created is the App Store but with more steps. It still goes on the App Store, just hidden so it can only be installed by the third-party store it&#039;s tied to.&lt;br /&gt;
&lt;br /&gt;
*Mysk: &amp;quot;iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens.&amp;quot;&amp;lt;ref&amp;gt;{{Cite web |last=@mysk_co |date=28 Jun 2024 |title=iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens: |url=https://x.com/mysk_co/status/1806638308455256242 |url-status=live |access-date=16 Mar 2025 |website=[[X]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==JIT==&lt;br /&gt;
Safari is allowed to [[wikipedia:Just-in-time compilation|just-in-time]] compile code worldwide. The super short version of what that means: it can run JavaScript code &#039;&#039;really fast&#039;&#039;. All browsers, and other runtimes like Microsoft .NET, Java, Lua use this. Ok, fine, it&#039;s the system web browser, it&#039;s very carefully written to be secure, and it&#039;s important to the platform to be doing well in performance benchmarks and all that.&lt;br /&gt;
&lt;br /&gt;
Apple&#039;s [https://apps.apple.com/app/swift-playgrounds/id908519492 Playgrounds] app on iPad is also allowed to JIT. It bundles Apple&#039;s [[wikipedia:Swift (programming language)|Swift]] compiler, and shares backend code with the version of Playgrounds found in [[wikipedia:Xcode|Xcode]].&lt;br /&gt;
&lt;br /&gt;
Competing apps like Pythonista (a Python IDE), emulators like Delta and UTM, and terminal environments like iSH, are not allowed to JIT. As such, they need to rely on inferior performance, potentially from an entirely separate implementation of their compiler/interpreter that may be less proven, because the JIT-less implementation doesn&#039;t need to exist on any other platform.&lt;br /&gt;
&lt;br /&gt;
Likely the most clear example is UTM SE. UTM is a port of the [[wikipedia:QEMU|QEMU]] emulator to iOS, allowing you to run desktop OSes (Linux, Windows 98, XP, classic Mac OS, etc). iPhone hardware is very capable these days and it runs impressively well, &#039;&#039;if&#039;&#039; you use a hack to enable JIT (which Apple has now patched). &amp;quot;SE&amp;quot; stands for &amp;quot;slow edition&amp;quot; - yes, really. If you compare the true version of UTM to the App Store UTM SE app, you &#039;&#039;will&#039;&#039; feel the loss in performance. It&#039;s impressive UTM even got to be on the App Store at all, and the DMA is to thank for it. But Apple is still holding the line on allowing JIT to apps that require that performance.&lt;br /&gt;
&lt;br /&gt;
While UTM SE releasing at all might seem like a pathway to getting Firefox and Chrome &amp;quot;slow editions&amp;quot; on the App Store, browser engines other than the built-in Apple WebKit/JavaScriptCore are still outlawed.&amp;lt;ref&amp;gt;{{Cite web |title=App Review Guidelines |url=https://developer.apple.com/app-store/review/guidelines/#2.5.6 |url-status=live |access-date=16 Mar 2025 |website=[[Apple Developer]]}}&amp;lt;/ref&amp;gt; In the EU, Apple has blessed web browser JavaScript engines with the option to use JIT. The app must be approved for an entitlement, and then must work within APIs provided by Apple for it. As of January 2025, no browsers have been released using this. We were all anticipating proper competition around web browsers on iOS, but almost a year later, we have nothing.&amp;lt;ref&amp;gt;{{Cite web |title=Mozilla says Apple’s new browser rules are ‘as painful as possible’ for Firefox&lt;br /&gt;
 |url=https://www.theverge.com/2024/1/26/24052067/mozilla-apple-ios-browser-rules-firefox |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Sandbox==&lt;br /&gt;
You might not like app sandboxing, but it&#039;s a powerful security feature used on all modern platforms. The reality is very few apps need more than a few basic permissions. [[wikipedia:Flatpak|Flatpak]] on Linux also sandboxes apps, and it seems to work great! Still, it&#039;s completely fair that there should be processes for doing things beyond what the sandbox allows. You see some of this with permission prompts - does a flashlight app &#039;&#039;really&#039;&#039; need access to your contacts? (Apple has been burned by apps abusing user data before the current permission system was built out.&amp;lt;ref&amp;gt;{{Cite web |last=Bohn |first=Dleter |date=15 Feb 2012 |title=iOS apps and the address book: who has your data, and how they’re getting it |url=https://www.theverge.com/2012/2/14/2798008/ios-apps-and-the-address-book-what-you-need-to-know |url-status=live |access-date=16 Mar 2025 |website=[[The Verge]]}}&amp;lt;/ref&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
It can go further than this. As we established in previous sections, an app can be given more access to features of the system using entitlements. These come in a few flavors:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Completely safe&#039;&#039;&#039;: Entitlements any developer can opt into, with little to no risk.&lt;br /&gt;
*&#039;&#039;&#039;Approval required&#039;&#039;&#039;: Entitlements that might be more of a security risk to allow, e.g. giving considerably wider access to the system, or that Apple simply doesn&#039;t want to hand out to just &#039;&#039;anyone&#039;&#039; for competitive reasons. The developer must submit a request to Apple with evidence of why they need the entitlement.&lt;br /&gt;
*&#039;&#039;&#039;Private&#039;&#039;&#039;: Entitlements that are never allowed for any app developer to use. Many of these are reasonably fenced off because they handle user data that is very risky, or bypasses permission prompts, etc, but can just as well also be guarding features Apple wants to keep to itself.&lt;br /&gt;
&lt;br /&gt;
There have been [https://gizmodo.com/researchers-uber-s-ios-app-had-secret-permissions-that-1819177235 exceptions] where Apple quietly gave a company access to private entitlements anyway, raising eyebrows.&lt;br /&gt;
&lt;br /&gt;
On iOS, you also can&#039;t be &#039;&#039;more&#039;&#039; secure than the default sandbox. That might seem crazy if you&#039;re not a developer, but it&#039;s pretty important for security in a variety of situations. On macOS, there are several entitlements you must declare to decide whether you&#039;re allowed to access certain types of user data at all. Android used this design from the very start - you can&#039;t even do fundamental things like access the internet without declaring it in your manifest. It makes it very explicit what the app&#039;s intentions are.&lt;br /&gt;
&lt;br /&gt;
iOS has one sandbox used by all App Store apps. System apps, and App Store apps developed by Apple, are allowed to expand or reduce their sandbox permissions as needed. Third-party apps do not get the right to expand or reduce their sandbox permissions at all. This is clearly less secure. To take the example of Playgrounds again, while it&#039;s allowed to run your code from a separate process executing in an ultra locked down sandbox with very few permissions, competing apps such as Pythonista must run your code in the same sandbox and address space as the main app process. The Python interpreter crashing would therefore crash the entire app, possibly losing work. In the worst case, a vulnerability in third-party code could give access to all data stored by/accessible to the app. For example, it would be a nightmare if you can tap the wrong link in Safari and have a hacker easily steal your cookies from other websites. If that third-party code could run in its own limited sandbox, the risk is significantly reduced.&lt;br /&gt;
&lt;br /&gt;
The only known workaround is to execute the code via JavaScript, as Apple&#039;s JavaScriptCore engine runs in a heavily sandboxed process. This requires you to port the code to JS, which may be a lot of work, or just not viable. You wouldn&#039;t want to run the Python interpreter inside JavaScript - the performance would be terrible!&lt;br /&gt;
&lt;br /&gt;
==In-app browsers==&lt;br /&gt;
Safari&#039;s in-app browser, that is the minimal version you get when tapping a link from social media, uses an entirely separate data store for each app. The in-app browser isn&#039;t aware of cookies in the &amp;quot;full&amp;quot; Safari app, or any other app, and doesn&#039;t support Safari extensions. Apple claimed this was to protect malicious apps from stealing or setting cookies in Safari without your knowledge, which is a fair argument, but it&#039;s hard to not notice that it makes web browsing inconvenient, encouraging users to install native apps, where they can make transactions through Apple.&amp;lt;ref&amp;gt;{{Cite web |last=@whitehatguy |date=12 Jun 2017 |title=Impact of iOS 11 no longer providing shared cookies between Safari, Safari View Controller instances |url=https://github.com/openid/AppAuth-iOS/issues/120 |url-status=live |access-date=16 Mar 2025 |website=[[GitHub]]}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This also means your browsing in the in-app browser is just forgotten - there&#039;s no history menu, and it doesn&#039;t get logged to the history in the full Safari app either. Good luck recalling that article you read a few weeks ago.&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
*[https://theapplewiki.com/wiki/Eligibility Eligibility]&lt;br /&gt;
*Posts written by an author of this article:&lt;br /&gt;
**[https://adamdemasi.com/2024/04/19/app-marketplace-experience.html The iOS 17.4 app marketplace flow is a disaster]&lt;br /&gt;
**[https://adamdemasi.com/2024/04/20/ios-eligibility.html How I tricked iOS into giving me EU DMA features]&lt;br /&gt;
**[https://adamdemasi.com/2024/04/23/ios-eligibility-features.html Features controlled by iOS 17.4&#039;s eligibility system]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Apple App Store]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=12429</id>
		<title>Artificial intelligence</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=12429"/>
		<updated>2025-04-02T10:54:13Z</updated>

		<summary type="html">&lt;p&gt;Kirb: /* Case studies */ More&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Artificial intelligence&#039;&#039;&#039; (AI) is a field of computer science producing software that aims to ultimately replace all manual labor. AI is not a new concept - it has been of interest as early as the 1950s. Since the November 2022 launch of [[ChatGPT]], [[wikipedia:Large language model|large language model]] (LLM) chatbots have been a main focus of the industry, with billions of dollars in funding allocated to producing more &amp;quot;intelligent&amp;quot; LLMs. Also a significant focus are [[wikipedia:Text-to-image model|text-to-image models]], which &amp;quot;draw&amp;quot; an image using written instructions, and [[wikipedia:Text-to-video model|text-to-video models]], which extend the text-to-image concept across several smooth video frames.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Generative artificial intelligence|Generative artificial intelligence]] models are trained through vast amounts of existing human-generated content. Using the example of an LLM, by learning about common trends in sentence structure, the model is able to form complete sentences and show artificial &amp;quot;knowledge&amp;quot; of a topic. The artificial nature may cause [[wikipedia:Hallucination (artificial intelligence)|hallucination]] through confidently-written, but mostly or entirely incorrect, output.&lt;br /&gt;
&lt;br /&gt;
The current well-funded, lucrative industry of artificial intelligence tools has resulted in rampant unethical use of content. Startups intending to produce AI services have been scraping the internet for content to train future models at a concerning pace, with no regard for copyright law, as members of the field are concerned that they are approaching the limit of publicly-available content to train from.&amp;lt;ref&amp;gt;https://observer.com/2024/12/openai-cofounder-ilya-sutskever-ai-data-peak/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Unethical website scraping==&lt;br /&gt;
While &amp;quot;mainstream&amp;quot; companies such as [[OpenAI]], [[Anthropic]], and [[Meta]] appear to correctly follow industry-standard practice for web crawlers, others ignore them, causing [[wikipedia:Denial-of-service attack|distributed denial of service attacks]] which damage access to freely-accessible websites. This is particularly an issue for websites that are large or contain many dynamic links.&lt;br /&gt;
&lt;br /&gt;
Ethical website scrapers, known as &amp;quot;spiders&amp;quot; that crawl the web, follow a certain set of minimum guidelines. Specifically, they follow [[wikipedia:robots.txt|robots.txt]], a text file found at the root of a domain that indicates:&lt;br /&gt;
&lt;br /&gt;
*Paths bots are allowed to index&lt;br /&gt;
*Paths bots should not index&lt;br /&gt;
*How long the bot should wait in between requests to the server, to reduce load&lt;br /&gt;
*The [[wikipedia:Sitemaps|sitemap]] of the website&#039;s content&lt;br /&gt;
&lt;br /&gt;
These rules are typically configured for all bots, with minor adjustments made to individual bots as needed. Additionally, specific web pages may use the [[wikipedia:noindex|robots meta tag]] to control use of their output.&lt;br /&gt;
&lt;br /&gt;
While it is good practice for a bot to respect robots.txt, there is no requirement for it, and there is no punishment for not following a website&#039;s wishes. It is additionally standard practice, but in no way enforced, that bots use a [[wikipedia:User-Agent header|User-Agent header]] to uniquely identify itself. This allows a website operator to observe a bot&#039;s traffic patterns, potentially blocking the bot outright if its scraping is not desirable. The header also typically contains a URL or email address that can be used to contact the operator in case of anomalies observed in its traffic.&lt;br /&gt;
&lt;br /&gt;
Unethical AI scraper bots do not follow robots.txt - in fact, they may not even request this file at all. They typically completely ignore it, instead opting to start from an entry point such as the root home page (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;), working its way through an exponentially growing list of links as it finds them, with little to no delay between requests. The bots use false User-Agent header strings that would correspond to real web browsers on desktop or mobile operating systems - blocking them would also block legitimate users, or at least legitimate users on VPNs.&lt;br /&gt;
&lt;br /&gt;
Some AI services opt to use separate User-Agent strings, potentially also ignoring robots.txt, when a request is made through user command rather than as part of model training. For example, ChatGPT identifies itself as &amp;lt;code&amp;gt;ChatGPT-User&amp;lt;/code&amp;gt; rather than its standard &amp;lt;code&amp;gt;OpenAI&amp;lt;/code&amp;gt; when it uses the &amp;quot;search the web&amp;quot; command - even if searching the web was an automatic decision. In a less favorable example, Perplexity AI in this same situation falsely identifies as a standard Chrome web browser running on Windows. AI companies defend this under the belief that they are not a &amp;quot;spider&amp;quot;, but rather a &amp;quot;user agent&amp;quot; (like a web browser), when called upon by a user&#039;s request.&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Less legitimate bots use a wide distribution of IP addresses, further reducing options for the website to protect itself. This is in a clear attempt to bypass IP-based request throttling and rate limiting the website may implement. They are also known to ignore HTTP response status codes that indicate a server error ([[wikipedia:HTTP status code#5xx server errors|5xx]]), or warnings that the client needs to slow down ([[wikipedia:HTTP status code#429|429 Too Many Requests]]) or has been entirely blocked ([[wikipedia:HTTP status code#403|403 Forbidden]]).&lt;br /&gt;
&lt;br /&gt;
===Effect on users===&lt;br /&gt;
To protect against unethical crawlers, due to concerns of both intellectual property and service disruption, websites adopt practices that affect the experience of real users:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Bot check walls&#039;&#039;&#039;: The user may be required to pass a security check &amp;quot;wall&amp;quot;. While usually automatic for the user, this can affect legitimate bots. When a website protection service such as [[Cloudflare]] is not confident as to whether the visitor is legitimate, it may present a CAPTCHA to be manually filled out. An example is &amp;quot;Google Sorry&amp;quot;, a CAPTCHA wall frequently seen when using Google Search via a VPN.&lt;br /&gt;
*&#039;&#039;&#039;Login walls&#039;&#039;&#039;: Should bots be found to pass CAPTCHA walls, the website may advance to requiring logging in to view content. A major recent example of this is [[YouTube]]&#039;s &amp;quot;Sign in to confirm you&#039;re not a bot&amp;quot; messages.&lt;br /&gt;
*&#039;&#039;&#039;JavaScript requirement&#039;&#039;&#039;: Most websites do not need JavaScript to deliver their content. However, as many scrapers expect content to be found directly in the HTML, it is often an easy workaround to use JavaScript to &amp;quot;insert&amp;quot; the content after the page has loaded. This may reduce the responsiveness of the website, increasing points of failure, and preventing security-conscious users who disable JavaScript from viewing the website.&lt;br /&gt;
*&#039;&#039;&#039;IP address blocking&#039;&#039;&#039;: Blocking IP addresses, especially by blocking entire providers via their [[wikipedia:Autonomous system (Internet)|autonomous system number]], always comes with some risk of blocking legitimate users. Particularly, this may restrict access to users making use of a VPN.&lt;br /&gt;
*&#039;&#039;&#039;Heuristic blocking&#039;&#039;&#039;: Patterns in request headers may give away that the request is being made by an unethical bot, despite attempts to act as a legitimate visitor. Heuristics are imperfect and may block legitimate users, especially those that may use less common browsers.&lt;br /&gt;
&lt;br /&gt;
In rare situations, a website operator may redirect detected bot traffic, such as to download speed test files hosted by ISPs containing multiple gigabytes of random garbage data. This may have the effect of disrupting the bot, but its effectiveness is unknown.&lt;br /&gt;
&lt;br /&gt;
The need to respond to unethical scraping also further consolidates the web into the control of a few large [[wikipedia:Web application firewall|web application firewall]] (WAF) services, most notably [[Cloudflare]], as website owners find themselves otherwise unable to protect their service from being disrupted by such traffic.&lt;br /&gt;
&lt;br /&gt;
===Case studies===&lt;br /&gt;
====Diaspora====&lt;br /&gt;
On 27 December 2024, the open-source social network project Diaspora noted that 70% of traffic across its infrastructure was in service of AI scrapers.&amp;lt;ref name=&amp;quot;geraspora&amp;quot;&amp;gt;https://pod.geraspora.de/posts/17342163&amp;lt;/ref&amp;gt; Particularly, the project noted that bots had followed links to crawl every individual edit in their [[#MediaWiki|MediaWiki]] instance, causing an exponential increase in the number of unique requests being made.&lt;br /&gt;
&lt;br /&gt;
====LVFS====&lt;br /&gt;
The [https://fwupd.org/ Linux Vendor Firmware Service] (LVFS) provides a free central store of firmware updates, such as for UEFI motherboards and SSD controllers. This feature is integrated with many Linux distributions through the &amp;lt;code&amp;gt;fwupd&amp;lt;/code&amp;gt; daemon. For situations where internet access is not permitted, the service allows users to make a local mirror of the entire 100+ GB store.&lt;br /&gt;
&lt;br /&gt;
On 9 January 2025, the project announced that it would introduce a login wall around its mirror feature, citing unnecessary use of its bandwidth.&amp;lt;ref&amp;gt;https://lore.kernel.org/lvfs-announce/zDlhotSvKqnMDfkCKaE_u4-8uvWsgkuj18ifLBwrLN9vWWrIJjrYQ-QfhpY3xuwIXuZgzOVajW99ymoWmijTdngeFRVjM0BxhPZquUzbDfM=@hughsie.com/T/&amp;lt;/ref&amp;gt; Up to 1,000 files may be downloaded per day without logging in. The author later mentioned on Mastodon that the problem appears to be caused by AI scraping.&amp;lt;ref&amp;gt;https://mastodon.social/@hughsie/113871373001227969&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====LWN.net====&lt;br /&gt;
On 21 January 2025, Jonathan Corbet, maintainer of the Linux news website [[wikipedia:LWN.net|LWN.net]], made the following [https://social.kernel.org/notice/AqJkUigsjad3gQc664 post] to social.kernel.org:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Should you be wondering why @LWN #LWN is occasionally sluggish... since the new year, the DDOS onslaughts from AI-scraper bots has picked up considerably. Only a small fraction of our traffic is serving actual human readers at this point. At times, some bot decides to hit us from hundreds of IP addresses at once, clogging the works. They don&#039;t identify themselves as bots, and robots.txt is the only thing they *don&#039;t* read off the site.&lt;br /&gt;
&lt;br /&gt;
This is beyond unsustainable. We are going to have to put time into deploying some sort of active defenses just to keep the site online. I think I&#039;d even rather be writing about accounting systems than dealing with this cr*p. And it&#039;s not just us, of course; this behavior is going to wreck the net even more than it&#039;s already wrecked.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He later commented:&amp;lt;ref&amp;gt;https://www.heise.de/en/news/AI-bots-paralyze-Linux-news-site-and-others-10252162.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
We do indeed see a kind of pattern. Every IP stays below the threshold for our fuses, but the overload is overwhelming. Any form of active defense will probably have to figure out to block entire subnets instead of individual addresses, and even that might not be enough.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====MediaWiki, Wikipedia, and the Wikimedia Foundation====&lt;br /&gt;
[[wikipedia:MediaWiki|MediaWiki]] is of particular interest to LLM training due to the vast amount of factual, plain-text content wikis tend to hold. While [[wikipedia:Wikipedia|Wikipedia]] and the [[wikipedia:Wikimedia Foundation|Wikimedia Foundation]] host the most well-known wikis, numerous smaller wikis exist thanks to the work of many independent editors. The strength of wiki architecture is its ability for every edit to be audited by anyone, at any time - you can still view [https://en.wikipedia.org/w/index.php?oldid=1 the first edit to Wikipedia] from 2002. This makes wikis a hybrid of a static website and a dynamic web app, which becomes problematic when poorly-designed bots attempt to scrape them.&amp;lt;ref name=&amp;quot;geraspora&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- COI alert: I, [[User:kirb]], am an admin for The Apple Wiki. Hopefully this is neutral enough?&lt;br /&gt;
--&amp;gt;The Apple Wiki, which documents internal details of Apple&#039;s hardware and software, holds more than 50,000 articles. On 2 August 2024, with a repeat occurrence on 5 January 2025, the service was disrupted by scraping efforts.&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/The_Apple_Wiki:Community_portal#Bot_traffic_abuse&amp;lt;/ref&amp;gt; The wiki contains a considerable amount of information that is scraped by legitimate security research tools, making it difficult for the website to block non-legitimate requests. Efforts to block unethical scraping and protect the wiki have disrupted these legitimate tools. The large article count, combined with more than 280,000 total edits over the wiki&#039;s lifetime, create an untenable situation where it is simply not possible to scrape the website without causing significant service disruption.&lt;br /&gt;
&lt;br /&gt;
On 1 April 2025, the Wikimedia Foundation indicated that its infrastructure has been under increasing pressure from content scraping bots since January 2024, with the particularly critical metric that &amp;quot;65% of our most expensive traffic comes from bots&amp;quot;, despite estimating 35% of all traffic as coming from bots. The bots create traffic patterns that are significantly unlike human traffic patterns, effectively bypassing Wikimedia&#039;s caching infrastructure and placing significant load on the core servers. A blog post provides an example where bot traffic caused the [[wikipedia:Wikimedia Commons|Wikimedia Commons]] service to become unstable during a human traffic spike. The Foundation is considering introduction of a Responsible Use of Infrastructure policy to ensure the continued stability of their services.&amp;lt;ref&amp;gt;https://diff.wikimedia.org/2025/04/01/how-crawlers-impact-the-operations-of-the-wikimedia-projects/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Perplexity AI and news outlets====&lt;br /&gt;
[[Perplexity AI]], founded in August 2022, is a large language model that aims to be viewed as a general search engine. It encourages users to consume news through its summaries of stories.&lt;br /&gt;
&lt;br /&gt;
On 15 June 2024, an investigation by Apple blog MacStories found that Perplexity does not follow its own documented policies when accessing content the user requests from the web. In their testing, the scraper pretended to be Chrome 111 running on Windows 10, connecting from an IP address not found in Perplexity&#039;s publicly-listed IP address ranges.&amp;lt;ref&amp;gt;https://rknight.me/blog/perplexity-ai-is-lying-about-its-user-agent/&amp;lt;/ref&amp;gt; MacStories&#039; findings were confirmed by a WIRED investigation.&amp;lt;ref&amp;gt;https://www.wired.com/story/perplexity-is-a-bullshit-machine/&amp;lt;/ref&amp;gt; Perplexity responded by removing its list of IP addresses.&lt;br /&gt;
&lt;br /&gt;
On 27 June 2024, [[Amazon]] announced an investigation into Perplexity AI, suggesting the behavior may be considered abusive under Amazon Web Services terms of service:&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot;&amp;gt;https://www.wired.com/story/aws-perplexity-bot-scraping-investigation/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
&amp;quot;AWS&#039;s terms of service prohibit abusive and illegal activities and our customers are responsible for complying with those terms,&amp;quot; [AWS spokesperson Patrick] Neighorn said in a statement. &amp;quot;We routinely receive reports of alleged abuse from a variety of sources and engage our customers to understand those reports.&amp;quot;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Read the Docs====&lt;br /&gt;
In an early example, on 25 July 2024, open source documentation website Read the Docs detailed cases of abusive bots downloading large amounts of content from the service. Particularly, the significant range of IP addresses used in an aggressive manner rendered existing rate limiting ineffective. Taking action to block traffic identified by Cloudflare as &amp;quot;AI crawlers&amp;quot; reduced bandwidth requirements by 75%, at a cost saving of $1,500 USD/month.&amp;lt;ref&amp;gt;https://about.readthedocs.com/blog/2024/07/ai-crawlers-abuse/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SourceHut and Fedora Linux====&lt;br /&gt;
On 15 March 2025, an infrastructure manager for the [[wikipedia:Fedora Linux|Fedora Linux]] open source project discussed an assumed large language model crawling attack against the Prague.io Git source code hosting service. The project made the decision to block the entire country of Brazil for some time, while also blocking access to certain repositories whose traffic was creating significant CPU usage.&amp;lt;ref&amp;gt;https://www.scrye.com/blogs/nirik/posts/2025/03/15/mid-march-infra-bits-2025/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://www.scrye.com/blogs/nirik/posts/2025/03/29/late-march-infra-bits-2025/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On 17 March 2025, the Git source code host SourceHut announced that the service was being disrupted by large language model crawlers. Mitigations deployed to reduce disruption involved requiring login for some areas of the service, and blocking IP ranges of cloud providers, affecting legitimate use of the website by its users.&amp;lt;ref&amp;gt;https://status.sr.ht/issues/2025-03-17-git.sr.ht-llms/&amp;lt;/ref&amp;gt; In response to the event, SourceHut founder Drew DeVault wrote a blog post entitled &amp;quot;[https://drewdevault.com/2025/03/17/2025-03-17-Stop-externalizing-your-costs-on-me.html Please stop externalizing your costs directly into my face]&amp;quot;, discussing his frustrations with having ongoing and ever-adapting attacks that must be addressed in a timely fashion to reduce disruption to legitimate SourceHut users. DeVault estimates that between &amp;quot;20-100%&amp;quot; of his time is now spent addressing such attacks.&lt;br /&gt;
&lt;br /&gt;
==Privacy concerns of online AI models==&lt;br /&gt;
There are several concerns with using online AI models like [[ChatGPT]] ([[OpenAI]]), not only because they are proprietary, but also because there is no guarantee to where your data ends up being stored or used for. Recent developments in local AI models are an alternative to these online AI models, as they work offline once they are downloaded from platforms like HuggingFace.&amp;lt;ref&amp;gt;https://huggingface.co/&amp;lt;/ref&amp;gt; Common models to run are like Llama ([[Meta]]), DeepSeek ([[DeepSeek]]), Phi ([[Microsoft]]), Mistral ([[Mistral AI]]), Gemma ([[Google]]).&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Artificial intelligence]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=12428</id>
		<title>Artificial intelligence</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=12428"/>
		<updated>2025-04-02T09:52:56Z</updated>

		<summary type="html">&lt;p&gt;Kirb: /* MediaWiki, Wikipedia, and the Wikimedia Foundation */ It&amp;#039;s not getting any better&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Artificial intelligence&#039;&#039;&#039; (AI) is a field of computer science producing software that aims to ultimately replace all manual labor. AI is not a new concept - it has been of interest as early as the 1950s. Since the November 2022 launch of [[ChatGPT]], [[wikipedia:Large language model|large language model]] (LLM) chatbots have been a main focus of the industry, with billions of dollars in funding allocated to producing more &amp;quot;intelligent&amp;quot; LLMs. Also a significant focus are [[wikipedia:Text-to-image model|text-to-image models]], which &amp;quot;draw&amp;quot; an image using written instructions, and [[wikipedia:Text-to-video model|text-to-video models]], which extend the text-to-image concept across several smooth video frames.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Generative artificial intelligence|Generative artificial intelligence]] models are trained through vast amounts of existing human-generated content. Using the example of an LLM, by learning about common trends in sentence structure, the model is able to form complete sentences and show artificial &amp;quot;knowledge&amp;quot; of a topic. The artificial nature may cause [[wikipedia:Hallucination (artificial intelligence)|hallucination]] through confidently-written, but mostly or entirely incorrect, output.&lt;br /&gt;
&lt;br /&gt;
The current well-funded, lucrative industry of artificial intelligence tools has resulted in rampant unethical use of content. Startups intending to produce AI services have been scraping the internet for content to train future models at a concerning pace, with no regard for copyright law, as members of the field are concerned that they are approaching the limit of publicly-available content to train from.&amp;lt;ref&amp;gt;https://observer.com/2024/12/openai-cofounder-ilya-sutskever-ai-data-peak/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Unethical website scraping==&lt;br /&gt;
While &amp;quot;mainstream&amp;quot; companies such as [[OpenAI]], [[Anthropic]], and [[Meta]] appear to correctly follow industry-standard practice for web crawlers, others ignore them, causing [[wikipedia:Denial-of-service attack|distributed denial of service attacks]] which damage access to freely-accessible websites. This is particularly an issue for websites that are large or contain many dynamic links.&lt;br /&gt;
&lt;br /&gt;
Ethical website scrapers, known as &amp;quot;spiders&amp;quot; that crawl the web, follow a certain set of minimum guidelines. Specifically, they follow [[wikipedia:robots.txt|robots.txt]], a text file found at the root of a domain that indicates:&lt;br /&gt;
&lt;br /&gt;
*Paths bots are allowed to index&lt;br /&gt;
*Paths bots should not index&lt;br /&gt;
*How long the bot should wait in between requests to the server, to reduce load&lt;br /&gt;
*The [[wikipedia:Sitemaps|sitemap]] of the website&#039;s content&lt;br /&gt;
&lt;br /&gt;
These rules are typically configured for all bots, with minor adjustments made to individual bots as needed. Additionally, specific web pages may use the [[wikipedia:noindex|robots meta tag]] to control use of their output.&lt;br /&gt;
&lt;br /&gt;
While it is good practice for a bot to respect robots.txt, there is no requirement for it, and there is no punishment for not following a website&#039;s wishes. It is additionally standard practice, but in no way enforced, that bots use a [[wikipedia:User-Agent header|User-Agent header]] to uniquely identify itself. This allows a website operator to observe a bot&#039;s traffic patterns, potentially blocking the bot outright if its scraping is not desirable. The header also typically contains a URL or email address that can be used to contact the operator in case of anomalies observed in its traffic.&lt;br /&gt;
&lt;br /&gt;
Unethical AI scraper bots do not follow robots.txt - in fact, they may not even request this file at all. They typically completely ignore it, instead opting to start from an entry point such as the root home page (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;), working its way through an exponentially growing list of links as it finds them, with little to no delay between requests. The bots use false User-Agent header strings that would correspond to real web browsers on desktop or mobile operating systems - blocking them would also block legitimate users, or at least legitimate users on VPNs.&lt;br /&gt;
&lt;br /&gt;
Some AI services opt to use separate User-Agent strings, potentially also ignoring robots.txt, when a request is made through user command rather than as part of model training. For example, ChatGPT identifies itself as &amp;lt;code&amp;gt;ChatGPT-User&amp;lt;/code&amp;gt; rather than its standard &amp;lt;code&amp;gt;OpenAI&amp;lt;/code&amp;gt; when it uses the &amp;quot;search the web&amp;quot; command - even if searching the web was an automatic decision. In a less favorable example, Perplexity AI in this same situation falsely identifies as a standard Chrome web browser running on Windows. AI companies defend this under the belief that they are not a &amp;quot;spider&amp;quot;, but rather a &amp;quot;user agent&amp;quot; (like a web browser), when called upon by a user&#039;s request.&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Less legitimate bots use a wide distribution of IP addresses, further reducing options for the website to protect itself. This is in a clear attempt to bypass IP-based request throttling and rate limiting the website may implement. They are also known to ignore HTTP response status codes that indicate a server error ([[wikipedia:HTTP status code#5xx server errors|5xx]]), or warnings that the client needs to slow down ([[wikipedia:HTTP status code#429|429 Too Many Requests]]) or has been entirely blocked ([[wikipedia:HTTP status code#403|403 Forbidden]]).&lt;br /&gt;
&lt;br /&gt;
===Effect on users===&lt;br /&gt;
To protect against unethical crawlers, due to concerns of both intellectual property and service disruption, websites adopt practices that affect the experience of real users:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Bot check walls&#039;&#039;&#039;: The user may be required to pass a security check &amp;quot;wall&amp;quot;. While usually automatic for the user, this can affect legitimate bots. When a website protection service such as [[Cloudflare]] is not confident as to whether the visitor is legitimate, it may present a CAPTCHA to be manually filled out. An example is &amp;quot;Google Sorry&amp;quot;, a CAPTCHA wall frequently seen when using Google Search via a VPN.&lt;br /&gt;
*&#039;&#039;&#039;Login walls&#039;&#039;&#039;: Should bots be found to pass CAPTCHA walls, the website may advance to requiring logging in to view content. A major recent example of this is [[YouTube]]&#039;s &amp;quot;Sign in to confirm you&#039;re not a bot&amp;quot; messages.&lt;br /&gt;
*&#039;&#039;&#039;JavaScript requirement&#039;&#039;&#039;: Most websites do not need JavaScript to deliver their content. However, as many scrapers expect content to be found directly in the HTML, it is often an easy workaround to use JavaScript to &amp;quot;insert&amp;quot; the content after the page has loaded. This may reduce the responsiveness of the website, increasing points of failure, and preventing security-conscious users who disable JavaScript from viewing the website.&lt;br /&gt;
*&#039;&#039;&#039;IP address blocking&#039;&#039;&#039;: Blocking IP addresses, especially by blocking entire providers via their [[wikipedia:Autonomous system (Internet)|autonomous system number]], always comes with some risk of blocking legitimate users. Particularly, this may restrict access to users making use of a VPN.&lt;br /&gt;
*&#039;&#039;&#039;Heuristic blocking&#039;&#039;&#039;: Patterns in request headers may give away that the request is being made by an unethical bot, despite attempts to act as a legitimate visitor. Heuristics are imperfect and may block legitimate users, especially those that may use less common browsers.&lt;br /&gt;
&lt;br /&gt;
In rare situations, a website operator may redirect detected bot traffic, such as to download speed test files hosted by ISPs containing multiple gigabytes of random garbage data. This may have the effect of disrupting the bot, but its effectiveness is unknown.&lt;br /&gt;
&lt;br /&gt;
The need to respond to unethical scraping also further consolidates the web into the control of a few large [[wikipedia:Web application firewall|web application firewall]] (WAF) services, most notably [[Cloudflare]], as website owners find themselves otherwise unable to protect their service from being disrupted by such traffic.&lt;br /&gt;
&lt;br /&gt;
===Case studies===&lt;br /&gt;
====Diaspora====&lt;br /&gt;
On 27 December 2024, the open-source social network project Diaspora noted that 70% of traffic across its infrastructure was in service of AI scrapers.&amp;lt;ref name=&amp;quot;geraspora&amp;quot;&amp;gt;https://pod.geraspora.de/posts/17342163&amp;lt;/ref&amp;gt; Particularly, the project noted that bots had followed links to crawl every individual edit in their [[#MediaWiki|MediaWiki]] instance, causing an exponential increase in the number of unique requests being made.&lt;br /&gt;
&lt;br /&gt;
====LVFS====&lt;br /&gt;
The [https://fwupd.org/ Linux Vendor Firmware Service] (LVFS) provides a free central store of firmware updates, such as for UEFI motherboards and SSD controllers. This feature is integrated with many Linux distributions through the &amp;lt;code&amp;gt;fwupd&amp;lt;/code&amp;gt; daemon. For situations where internet access is not permitted, the service allows users to make a local mirror of the entire 100+ GB store.&lt;br /&gt;
&lt;br /&gt;
On 9 January 2025, the project announced that it would introduce a login wall around its mirror feature, citing unnecessary use of its bandwidth.&amp;lt;ref&amp;gt;https://lore.kernel.org/lvfs-announce/zDlhotSvKqnMDfkCKaE_u4-8uvWsgkuj18ifLBwrLN9vWWrIJjrYQ-QfhpY3xuwIXuZgzOVajW99ymoWmijTdngeFRVjM0BxhPZquUzbDfM=@hughsie.com/T/&amp;lt;/ref&amp;gt; Up to 1,000 files may be downloaded per day without logging in. The author later mentioned on Mastodon that the problem appears to be caused by AI scraping.&amp;lt;ref&amp;gt;https://mastodon.social/@hughsie/113871373001227969&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====LWN.net====&lt;br /&gt;
On 21 January 2025, Jonathan Corbet, maintainer of the Linux news website [[wikipedia:LWN.net|LWN.net]], made the following [https://social.kernel.org/notice/AqJkUigsjad3gQc664 post] to social.kernel.org:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Should you be wondering why @LWN #LWN is occasionally sluggish... since the new year, the DDOS onslaughts from AI-scraper bots has picked up considerably. Only a small fraction of our traffic is serving actual human readers at this point. At times, some bot decides to hit us from hundreds of IP addresses at once, clogging the works. They don&#039;t identify themselves as bots, and robots.txt is the only thing they *don&#039;t* read off the site.&lt;br /&gt;
&lt;br /&gt;
This is beyond unsustainable. We are going to have to put time into deploying some sort of active defenses just to keep the site online. I think I&#039;d even rather be writing about accounting systems than dealing with this cr*p. And it&#039;s not just us, of course; this behavior is going to wreck the net even more than it&#039;s already wrecked.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He later commented:&amp;lt;ref&amp;gt;https://www.heise.de/en/news/AI-bots-paralyze-Linux-news-site-and-others-10252162.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
We do indeed see a kind of pattern. Every IP stays below the threshold for our fuses, but the overload is overwhelming. Any form of active defense will probably have to figure out to block entire subnets instead of individual addresses, and even that might not be enough.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====MediaWiki, Wikipedia, and the Wikimedia Foundation====&lt;br /&gt;
[[wikipedia:MediaWiki|MediaWiki]] is of particular interest to LLM training due to the vast amount of factual, plain-text content wikis tend to hold. While [[wikipedia:Wikipedia|Wikipedia]] and the [[wikipedia:Wikimedia Foundation|Wikimedia Foundation]] host the most well-known wikis, numerous smaller wikis exist thanks to the work of many independent editors. The strength of wiki architecture is its ability for every edit to be audited by anyone, at any time - you can still view [https://en.wikipedia.org/w/index.php?oldid=1 the first edit to Wikipedia] from 2002. This makes wikis a hybrid of a static website and a dynamic web app, which becomes problematic when poorly-designed bots attempt to scrape them.&amp;lt;ref name=&amp;quot;geraspora&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- COI alert: I, [[User:kirb]], am an admin for The Apple Wiki. Hopefully this is neutral enough?&lt;br /&gt;
--&amp;gt;The Apple Wiki, which documents internal details of Apple&#039;s hardware and software, holds more than 50,000 articles. On 2 August 2024, with a repeat occurrence on 5 January 2025, the service was disrupted by scraping efforts.&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/The_Apple_Wiki:Community_portal#Bot_traffic_abuse&amp;lt;/ref&amp;gt; The wiki contains a considerable amount of information that is scraped by legitimate security research tools, making it difficult for the website to block non-legitimate requests. Efforts to block unethical scraping and protect the wiki have disrupted these legitimate tools. The large article count, combined with more than 280,000 total edits over the wiki&#039;s lifetime, create an untenable situation where it is simply not possible to scrape the website without causing significant service disruption.&lt;br /&gt;
&lt;br /&gt;
On 1 April 2025, the Wikimedia Foundation indicated that its infrastructure has been under increasing pressure from content scraping bots since January 2024, with the particularly critical metric that &amp;quot;65% of our most expensive traffic comes from bots&amp;quot;, despite estimating 35% of all traffic as coming from bots. A blog post provides an example where bot traffic caused the [[wikipedia:Wikimedia Commons|Wikimedia Commons]] service to become unstable during a human traffic spike. The Foundation is considering introduction of a Responsible Use of Infrastructure policy to ensure the continued stability of their services.&amp;lt;ref&amp;gt;https://diff.wikimedia.org/2025/04/01/how-crawlers-impact-the-operations-of-the-wikimedia-projects/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Perplexity AI and news outlets====&lt;br /&gt;
[[Perplexity AI]], founded in August 2022, is a large language model that aims to be viewed as a general search engine. It encourages users to consume news through its summaries of stories.&lt;br /&gt;
&lt;br /&gt;
On 15 June 2024, an investigation by Apple blog MacStories found that Perplexity does not follow its own documented policies when accessing content the user requests from the web. In their testing, the scraper pretended to be Chrome 111 running on Windows 10, connecting from an IP address not found in Perplexity&#039;s publicly-listed IP address ranges.&amp;lt;ref&amp;gt;https://rknight.me/blog/perplexity-ai-is-lying-about-its-user-agent/&amp;lt;/ref&amp;gt; MacStories&#039; findings were confirmed by a WIRED investigation.&amp;lt;ref&amp;gt;https://www.wired.com/story/perplexity-is-a-bullshit-machine/&amp;lt;/ref&amp;gt; Perplexity responded by removing its list of IP addresses.&lt;br /&gt;
&lt;br /&gt;
On 27 June 2024, [[Amazon]] announced an investigation into Perplexity AI, suggesting the behavior may be considered abusive under Amazon Web Services terms of service:&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot;&amp;gt;https://www.wired.com/story/aws-perplexity-bot-scraping-investigation/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
&amp;quot;AWS&#039;s terms of service prohibit abusive and illegal activities and our customers are responsible for complying with those terms,&amp;quot; [AWS spokesperson Patrick] Neighorn said in a statement. &amp;quot;We routinely receive reports of alleged abuse from a variety of sources and engage our customers to understand those reports.&amp;quot;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SourceHut====&lt;br /&gt;
On 17 March 2025, the Git source code host SourceHut announced that the service was being disrupted by large language model crawlers. Mitigations deployed to reduce disruption involved requiring login for some areas of the service, and blocking IP ranges of cloud providers, affecting legitimate use of the website by its users.&amp;lt;ref&amp;gt;https://status.sr.ht/issues/2025-03-17-git.sr.ht-llms/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Privacy concerns of online AI models==&lt;br /&gt;
There are several concerns with using online AI models like [[ChatGPT]] ([[OpenAI]]), not only because they are proprietary, but also because there is no guarantee to where your data ends up being stored or used for. Recent developments in local AI models are an alternative to these online AI models, as they work offline once they are downloaded from platforms like HuggingFace.&amp;lt;ref&amp;gt;https://huggingface.co/&amp;lt;/ref&amp;gt; Common models to run are like Llama ([[Meta]]), DeepSeek ([[DeepSeek]]), Phi ([[Microsoft]]), Mistral ([[Mistral AI]]), Gemma ([[Google]]).&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Artificial intelligence]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=11939</id>
		<title>Artificial intelligence</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=11939"/>
		<updated>2025-03-18T07:43:42Z</updated>

		<summary type="html">&lt;p&gt;Kirb: /* Case studies */ Add SourceHut&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Artificial intelligence&#039;&#039;&#039; (AI) is a field of computer science producing software that aims to ultimately replace all manual labor. AI is not a new concept - it has been of interest as early as the 1950s. Since the November 2022 launch of [[ChatGPT]], [[wikipedia:Large language model|large language model]] (LLM) chatbots have been a main focus of the industry, with billions of dollars in funding allocated to producing more &amp;quot;intelligent&amp;quot; LLMs. Also a significant focus are [[wikipedia:Text-to-image model|text-to-image models]], which &amp;quot;draw&amp;quot; an image using written instructions, and [[wikipedia:Text-to-video model|text-to-video models]], which extend the text-to-image concept across several smooth video frames.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Generative artificial intelligence|Generative artificial intelligence]] models are trained through vast amounts of existing human-generated content. Using the example of an LLM, by learning about common trends in sentence structure, the model is able to form complete sentences and show artificial &amp;quot;knowledge&amp;quot; of a topic. The artificial nature may cause [[wikipedia:Hallucination (artificial intelligence)|hallucination]] through confidently-written, but mostly or entirely incorrect, output.&lt;br /&gt;
&lt;br /&gt;
The current well-funded, lucrative industry of artificial intelligence tools has resulted in rampant unethical use of content. Startups intending to produce AI services have been scraping the internet for content to train future models at a concerning pace, with no regard for copyright law, as members of the field are concerned that they are approaching the limit of publicly-available content to train from.&amp;lt;ref&amp;gt;https://observer.com/2024/12/openai-cofounder-ilya-sutskever-ai-data-peak/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Unethical website scraping==&lt;br /&gt;
While &amp;quot;mainstream&amp;quot; companies such as [[OpenAI]], [[Anthropic]], and [[Meta]] appear to correctly follow industry-standard practice for web crawlers, others ignore them, causing [[wikipedia:Denial-of-service attack|distributed denial of service attacks]] which damage access to freely-accessible websites. This is particularly an issue for websites that are large or contain many dynamic links.&lt;br /&gt;
&lt;br /&gt;
Ethical website scrapers, known as &amp;quot;spiders&amp;quot; that crawl the web, follow a certain set of minimum guidelines. Specifically, they follow [[wikipedia:robots.txt|robots.txt]], a text file found at the root of a domain that indicates:&lt;br /&gt;
&lt;br /&gt;
*Paths bots are allowed to index&lt;br /&gt;
*Paths bots should not index&lt;br /&gt;
*How long the bot should wait in between requests to the server, to reduce load&lt;br /&gt;
*The [[wikipedia:Sitemaps|sitemap]] of the website&#039;s content&lt;br /&gt;
&lt;br /&gt;
These rules are typically configured for all bots, with minor adjustments made to individual bots as needed. Additionally, specific web pages may use the [[wikipedia:noindex|robots meta tag]] to control use of their output.&lt;br /&gt;
&lt;br /&gt;
While it is good practice for a bot to respect robots.txt, there is no requirement for it, and there is no punishment for not following a website&#039;s wishes. It is additionally standard practice, but in no way enforced, that bots use a [[wikipedia:User-Agent header|User-Agent header]] to uniquely identify itself. This allows a website operator to observe a bot&#039;s traffic patterns, potentially blocking the bot outright if its scraping is not desirable. The header also typically contains a URL or email address that can be used to contact the operator in case of anomalies observed in its traffic.&lt;br /&gt;
&lt;br /&gt;
Unethical AI scraper bots do not follow robots.txt - in fact, they may not even request this file at all. They typically completely ignore it, instead opting to start from an entry point such as the root home page (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;), working its way through an exponentially growing list of links as it finds them, with little to no delay between requests. The bots use false User-Agent header strings that would correspond to real web browsers on desktop or mobile operating systems - blocking them would also block legitimate users, or at least legitimate users on VPNs.&lt;br /&gt;
&lt;br /&gt;
Some AI services opt to use separate User-Agent strings, potentially also ignoring robots.txt, when a request is made through user command rather than as part of model training. For example, ChatGPT identifies itself as &amp;lt;code&amp;gt;ChatGPT-User&amp;lt;/code&amp;gt; rather than its standard &amp;lt;code&amp;gt;OpenAI&amp;lt;/code&amp;gt; when it uses the &amp;quot;search the web&amp;quot; command - even if searching the web was an automatic decision. In a less favorable example, Perplexity AI in this same situation falsely identifies as a standard Chrome web browser running on Windows. AI companies defend this under the belief that they are not a &amp;quot;spider&amp;quot;, but rather a &amp;quot;user agent&amp;quot; (like a web browser), when called upon by a user&#039;s request.&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Less legitimate bots use a wide distribution of IP addresses, further reducing options for the website to protect itself. This is in a clear attempt to bypass IP-based request throttling and rate limiting the website may implement. They are also known to ignore HTTP response status codes that indicate a server error ([[wikipedia:HTTP status code#5xx server errors|5xx]]), or warnings that the client needs to slow down ([[wikipedia:HTTP status code#429|429 Too Many Requests]]) or has been entirely blocked ([[wikipedia:HTTP status code#403|403 Forbidden]]).&lt;br /&gt;
&lt;br /&gt;
===Effect on users===&lt;br /&gt;
To protect against unethical crawlers, due to concerns of both intellectual property and service disruption, websites adopt practices that affect the experience of real users:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Bot check walls&#039;&#039;&#039;: The user may be required to pass a security check &amp;quot;wall&amp;quot;. While usually automatic for the user, this can affect legitimate bots. When a website protection service such as [[Cloudflare]] is not confident as to whether the visitor is legitimate, it may present a CAPTCHA to be manually filled out. An example is &amp;quot;Google Sorry&amp;quot;, a CAPTCHA wall frequently seen when using Google Search via a VPN.&lt;br /&gt;
*&#039;&#039;&#039;Login walls&#039;&#039;&#039;: Should bots be found to pass CAPTCHA walls, the website may advance to requiring logging in to view content. A major recent example of this is [[YouTube]]&#039;s &amp;quot;Sign in to confirm you&#039;re not a bot&amp;quot; messages.&lt;br /&gt;
*&#039;&#039;&#039;JavaScript requirement&#039;&#039;&#039;: Most websites do not need JavaScript to deliver their content. However, as many scrapers expect content to be found directly in the HTML, it is often an easy workaround to use JavaScript to &amp;quot;insert&amp;quot; the content after the page has loaded. This may reduce the responsiveness of the website, increasing points of failure, and preventing security-conscious users who disable JavaScript from viewing the website.&lt;br /&gt;
*&#039;&#039;&#039;IP address blocking&#039;&#039;&#039;: Blocking IP addresses, especially by blocking entire providers via their [[wikipedia:Autonomous system (Internet)|autonomous system number]], always comes with some risk of blocking legitimate users. Particularly, this may restrict access to users making use of a VPN.&lt;br /&gt;
*&#039;&#039;&#039;Heuristic blocking&#039;&#039;&#039;: Patterns in request headers may give away that the request is being made by an unethical bot, despite attempts to act as a legitimate visitor. Heuristics are imperfect and may block legitimate users, especially those that may use less common browsers.&lt;br /&gt;
&lt;br /&gt;
In rare situations, a website operator may redirect detected bot traffic, such as to download speed test files hosted by ISPs containing multiple gigabytes of random garbage data. This may have the effect of disrupting the bot, but its effectiveness is unknown.&lt;br /&gt;
&lt;br /&gt;
The need to respond to unethical scraping also further consolidates the web into the control of a few large [[wikipedia:Web application firewall|web application firewall]] (WAF) services, most notably [[Cloudflare]], as website owners find themselves otherwise unable to protect their service from being disrupted by such traffic.&lt;br /&gt;
&lt;br /&gt;
===Case studies===&lt;br /&gt;
====Diaspora====&lt;br /&gt;
On 27 December 2024, the open-source social network project Diaspora noted that 70% of traffic across its infrastructure was in service of AI scrapers.&amp;lt;ref name=&amp;quot;geraspora&amp;quot;&amp;gt;https://pod.geraspora.de/posts/17342163&amp;lt;/ref&amp;gt; Particularly, the project noted that bots had followed links to crawl every individual edit in their [[#MediaWiki|MediaWiki]] instance, causing an exponential increase in the number of unique requests being made.&lt;br /&gt;
&lt;br /&gt;
====LVFS====&lt;br /&gt;
The [https://fwupd.org/ Linux Vendor Firmware Service] (LVFS) provides a free central store of firmware updates, such as for UEFI motherboards and SSD controllers. This feature is integrated with many Linux distributions through the &amp;lt;code&amp;gt;fwupd&amp;lt;/code&amp;gt; daemon. For situations where internet access is not permitted, the service allows users to make a local mirror of the entire 100+ GB store.&lt;br /&gt;
&lt;br /&gt;
On 9 January 2025, the project announced that it would introduce a login wall around its mirror feature, citing unnecessary use of its bandwidth.&amp;lt;ref&amp;gt;https://lore.kernel.org/lvfs-announce/zDlhotSvKqnMDfkCKaE_u4-8uvWsgkuj18ifLBwrLN9vWWrIJjrYQ-QfhpY3xuwIXuZgzOVajW99ymoWmijTdngeFRVjM0BxhPZquUzbDfM=@hughsie.com/T/&amp;lt;/ref&amp;gt; Up to 1,000 files may be downloaded per day without logging in. The author later mentioned on Mastodon that the problem appears to be caused by AI scraping.&amp;lt;ref&amp;gt;https://mastodon.social/@hughsie/113871373001227969&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====LWN.net====&lt;br /&gt;
On 21 January 2025, Jonathan Corbet, maintainer of the Linux news website [[wikipedia:LWN.net|LWN.net]], made the following [https://social.kernel.org/notice/AqJkUigsjad3gQc664 post] to social.kernel.org:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Should you be wondering why @LWN #LWN is occasionally sluggish... since the new year, the DDOS onslaughts from AI-scraper bots has picked up considerably. Only a small fraction of our traffic is serving actual human readers at this point. At times, some bot decides to hit us from hundreds of IP addresses at once, clogging the works. They don&#039;t identify themselves as bots, and robots.txt is the only thing they *don&#039;t* read off the site.&lt;br /&gt;
&lt;br /&gt;
This is beyond unsustainable. We are going to have to put time into deploying some sort of active defenses just to keep the site online. I think I&#039;d even rather be writing about accounting systems than dealing with this cr*p. And it&#039;s not just us, of course; this behavior is going to wreck the net even more than it&#039;s already wrecked.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He later commented:&amp;lt;ref&amp;gt;https://www.heise.de/en/news/AI-bots-paralyze-Linux-news-site-and-others-10252162.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
We do indeed see a kind of pattern. Every IP stays below the threshold for our fuses, but the overload is overwhelming. Any form of active defense will probably have to figure out to block entire subnets instead of individual addresses, and even that might not be enough.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====MediaWiki====&lt;br /&gt;
[[wikipedia:MediaWiki|MediaWiki]] is of particular interest to LLM training due to the vast amount of factual, plain-text content wikis tend to hold. While [[wikipedia:Wikipedia|Wikipedia]] and the [[wikipedia:Wikimedia Foundation|Wikimedia Foundation]] host the most well-known wikis, numerous smaller wikis exist thanks to the work of many independent editors. The strength of wiki architecture is its ability for every edit to be audited by anyone, at any time - you can still view [https://en.wikipedia.org/w/index.php?oldid=1 the first edit to Wikipedia] from 2002. This makes wikis a hybrid of a static website and a dynamic web app, which becomes problematic when poorly-designed bots attempt to scrape them.&amp;lt;ref name=&amp;quot;geraspora&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- COI alert: I, [[User:kirb]], am an admin for The Apple Wiki. Hopefully this is neutral enough?&lt;br /&gt;
--&amp;gt;The Apple Wiki, which documents internal details of Apple&#039;s hardware and software, holds more than 50,000 articles. On 2 August 2024, with a repeat occurrence on 5 January 2025, the service was disrupted by scraping efforts.&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/The_Apple_Wiki:Community_portal#Bot_traffic_abuse&amp;lt;/ref&amp;gt; The wiki contains a considerable amount of information that is scraped by legitimate security research tools, making it difficult for the website to block non-legitimate requests. Efforts to block unethical scraping and protect the wiki have disrupted these legitimate tools. The large article count, combined with more than 280,000 total edits over the wiki&#039;s lifetime, create an untenable situation where it is simply not possible to scrape the website without causing significant service disruption.&lt;br /&gt;
&lt;br /&gt;
====Perplexity AI and news outlets====&lt;br /&gt;
[[Perplexity AI]], founded in August 2022, is a large language model that aims to be viewed as a general search engine. It encourages users to consume news through its summaries of stories.&lt;br /&gt;
&lt;br /&gt;
On 15 June 2024, an investigation by Apple blog MacStories found that Perplexity does not follow its own documented policies when accessing content the user requests from the web. In their testing, the scraper pretended to be Chrome 111 running on Windows 10, connecting from an IP address not found in Perplexity&#039;s publicly-listed IP address ranges.&amp;lt;ref&amp;gt;https://rknight.me/blog/perplexity-ai-is-lying-about-its-user-agent/&amp;lt;/ref&amp;gt; MacStories&#039; findings were confirmed by a WIRED investigation.&amp;lt;ref&amp;gt;https://www.wired.com/story/perplexity-is-a-bullshit-machine/&amp;lt;/ref&amp;gt; Perplexity responded by removing its list of IP addresses.&lt;br /&gt;
&lt;br /&gt;
On 27 June 2024, [[Amazon]] announced an investigation into Perplexity AI, suggesting the behavior may be considered abusive under Amazon Web Services terms of service:&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot;&amp;gt;https://www.wired.com/story/aws-perplexity-bot-scraping-investigation/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
&amp;quot;AWS&#039;s terms of service prohibit abusive and illegal activities and our customers are responsible for complying with those terms,&amp;quot; [AWS spokesperson Patrick] Neighorn said in a statement. &amp;quot;We routinely receive reports of alleged abuse from a variety of sources and engage our customers to understand those reports.&amp;quot;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====SourceHut====&lt;br /&gt;
On 17 March 2025, the Git source code host SourceHut announced that the service was being disrupted by large language model crawlers. Mitigations deployed to reduce disruption involved requiring login for some areas of the service, and blocking IP ranges of cloud providers, affecting legitimate use of the website by its users.&amp;lt;ref&amp;gt;https://status.sr.ht/issues/2025-03-17-git.sr.ht-llms/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Privacy concerns of online AI models==&lt;br /&gt;
There are several concerns with using online AI models like [[ChatGPT]] ([[OpenAI]]), not only because they are proprietary, but also because there is no guarantee to where your data ends up being stored or used for. Recent developments in local AI models are an alternative to these online AI models, as they work offline once they are downloaded from platforms like HuggingFace.&amp;lt;ref&amp;gt;https://huggingface.co/&amp;lt;/ref&amp;gt; Common models to run are like Llama ([[Meta]]), DeepSeek ([[DeepSeek]]), Phi ([[Microsoft]]), Mistral ([[Mistral AI]]), Gemma ([[Google]]).&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Artificial intelligence]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=9859</id>
		<title>Artificial intelligence</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=9859"/>
		<updated>2025-02-25T05:30:30Z</updated>

		<summary type="html">&lt;p&gt;Kirb: /* Perplexity AI and news outlets */ Clarify it&amp;#039;s not about robots.txt, just general anti-abuse rules&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Artificial intelligence&#039;&#039;&#039; (AI) is a field of computer science producing software that aims to ultimately replace all manual labor. AI is not a new concept - it has been of interest as early as the 1950s. Since the November 2022 launch of [[ChatGPT]], [[wikipedia:Large language model|large language model]] (LLM) chatbots have been a main focus of the industry, with billions of dollars in funding allocated to producing more &amp;quot;intelligent&amp;quot; LLMs. Also a significant focus are [[wikipedia:Text-to-image model|text-to-image models]], which &amp;quot;draw&amp;quot; an image using written instructions, and [[wikipedia:Text-to-video model|text-to-video models]], which extend the text-to-image concept across several smooth video frames.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Generative artificial intelligence|Generative artificial intelligence]] models are trained through vast amounts of existing human-generated content. Using the example of an LLM, by learning about common trends in sentence structure, the model is able to form complete sentences and show artificial &amp;quot;knowledge&amp;quot; of a topic. The artificial nature may cause [[wikipedia:Hallucination (artificial intelligence)|hallucination]] through confidently-written, but mostly or entirely incorrect, output.&lt;br /&gt;
&lt;br /&gt;
The current well-funded, lucrative industry of artificial intelligence tools has resulted in rampant unethical use of content. Startups intending to produce AI services have been scraping the internet for content to train future models at a concerning pace, with no regard for copyright law, as members of the field are concerned that they are approaching the limit of publicly-available content to train from.&amp;lt;ref&amp;gt;https://observer.com/2024/12/openai-cofounder-ilya-sutskever-ai-data-peak/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Unethical website scraping==&lt;br /&gt;
While &amp;quot;mainstream&amp;quot; companies such as [[OpenAI]], [[Anthropic]], and [[Meta]] appear to correctly follow industry-standard practice for web crawlers, others ignore them, causing [[wikipedia:Denial-of-service attack|distributed denial of service attacks]] which damage access to freely-accessible websites. This is particularly an issue for websites that are large or contain many dynamic links.&lt;br /&gt;
&lt;br /&gt;
Ethical website scrapers, known as &amp;quot;spiders&amp;quot; that crawl the web, follow a certain set of minimum guidelines. Specifically, they follow [[wikipedia:robots.txt|robots.txt]], a text file found at the root of a domain that indicates:&lt;br /&gt;
&lt;br /&gt;
*Paths bots are allowed to index&lt;br /&gt;
*Paths bots should not index&lt;br /&gt;
*How long the bot should wait in between requests to the server, to reduce load&lt;br /&gt;
*The [[wikipedia:Sitemaps|sitemap]] of the website&#039;s content&lt;br /&gt;
&lt;br /&gt;
These rules are typically configured for all bots, with minor adjustments made to individual bots as needed. Additionally, specific web pages may use the [[wikipedia:noindex|robots meta tag]] to control use of their output.&lt;br /&gt;
&lt;br /&gt;
While it is good practice for a bot to respect robots.txt, there is no requirement for it, and there is no punishment for not following a website&#039;s wishes. It is additionally standard practice, but in no way enforced, that bots use a [[wikipedia:User-Agent header|User-Agent header]] to uniquely identify itself. This allows a website operator to observe a bot&#039;s traffic patterns, potentially blocking the bot outright if its scraping is not desirable. The header also typically contains a URL or email address that can be used to contact the operator in case of anomalies observed in its traffic.&lt;br /&gt;
&lt;br /&gt;
Unethical AI scraper bots do not follow robots.txt - in fact, they may not even request this file at all. They typically completely ignore it, instead opting to start from an entry point such as the root home page (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;), working its way through an exponentially growing list of links as it finds them, with little to no delay between requests. The bots use false User-Agent header strings that would correspond to real web browsers on desktop or mobile operating systems - blocking them would also block legitimate users, or at least legitimate users on VPNs.&lt;br /&gt;
&lt;br /&gt;
Some AI services opt to use separate User-Agent strings, potentially also ignoring robots.txt, when a request is made through user command rather than as part of model training. For example, ChatGPT identifies itself as &amp;lt;code&amp;gt;ChatGPT-User&amp;lt;/code&amp;gt; rather than its standard &amp;lt;code&amp;gt;OpenAI&amp;lt;/code&amp;gt; when it uses the &amp;quot;search the web&amp;quot; command - even if searching the web was an automatic decision. In a less favorable example, Perplexity AI in this same situation falsely identifies as a standard Chrome web browser running on Windows. AI companies defend this under the belief that they are not a &amp;quot;spider&amp;quot;, but rather a &amp;quot;user agent&amp;quot; (like a web browser), when called upon by a user&#039;s request.&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Less legitimate bots use a wide distribution of IP addresses, further reducing options for the website to protect itself. This is in a clear attempt to bypass IP-based request throttling and rate limiting the website may implement. They are also known to ignore HTTP response status codes that indicate a server error ([[wikipedia:HTTP status code#5xx server errors|5xx]]), or warnings that the client needs to slow down ([[wikipedia:HTTP status code#429|429 Too Many Requests]]) or has been entirely blocked ([[wikipedia:HTTP status code#403|403 Forbidden]]).&lt;br /&gt;
&lt;br /&gt;
===Effect on users===&lt;br /&gt;
To protect against unethical crawlers, due to concerns of both intellectual property and service disruption, websites adopt practices that affect the experience of real users:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Bot check walls&#039;&#039;&#039;: The user may be required to pass a security check &amp;quot;wall&amp;quot;. While usually automatic for the user, this can affect legitimate bots. When a website protection service such as [[Cloudflare]] is not confident as to whether the visitor is legitimate, it may present a CAPTCHA to be manually filled out. An example is &amp;quot;Google Sorry&amp;quot;, a CAPTCHA wall frequently seen when using Google Search via a VPN.&lt;br /&gt;
*&#039;&#039;&#039;Login walls&#039;&#039;&#039;: Should bots be found to pass CAPTCHA walls, the website may advance to requiring logging in to view content. A major recent example of this is [[YouTube]]&#039;s &amp;quot;Sign in to confirm you&#039;re not a bot&amp;quot; messages.&lt;br /&gt;
*&#039;&#039;&#039;JavaScript requirement&#039;&#039;&#039;: Most websites do not need JavaScript to deliver their content. However, as many scrapers expect content to be found directly in the HTML, it is often an easy workaround to use JavaScript to &amp;quot;insert&amp;quot; the content after the page has loaded. This may reduce the responsiveness of the website, increasing points of failure, and preventing security-conscious users who disable JavaScript from viewing the website.&lt;br /&gt;
*&#039;&#039;&#039;IP address blocking&#039;&#039;&#039;: Blocking IP addresses, especially by blocking entire providers via their [[wikipedia:Autonomous system (Internet)|autonomous system number]], always comes with some risk of blocking legitimate users. Particularly, this may restrict access to users making use of a VPN.&lt;br /&gt;
*&#039;&#039;&#039;Heuristic blocking&#039;&#039;&#039;: Patterns in request headers may give away that the request is being made by an unethical bot, despite attempts to act as a legitimate visitor. Heuristics are imperfect and may block legitimate users, especially those that may use less common browsers.&lt;br /&gt;
&lt;br /&gt;
In rare situations, a website operator may redirect detected bot traffic, such as to download speed test files hosted by ISPs containing multiple gigabytes of random garbage data. This may have the effect of disrupting the bot, but its effectiveness is unknown.&lt;br /&gt;
&lt;br /&gt;
The need to respond to unethical scraping also further consolidates the web into the control of a few large [[wikipedia:Web application firewall|web application firewall]] (WAF) services, most notably [[Cloudflare]], as website owners find themselves otherwise unable to protect their service from being disrupted by such traffic.&lt;br /&gt;
&lt;br /&gt;
===Case studies===&lt;br /&gt;
====Diaspora====&lt;br /&gt;
On 27 December 2024, the open-source social network project Diaspora noted that 70% of traffic across its infrastructure was in service of AI scrapers.&amp;lt;ref name=&amp;quot;geraspora&amp;quot;&amp;gt;https://pod.geraspora.de/posts/17342163&amp;lt;/ref&amp;gt; Particularly, the project noted that bots had followed links to crawl every individual edit in their [[#MediaWiki|MediaWiki]] instance, causing an exponential increase in the number of unique requests being made.&lt;br /&gt;
&lt;br /&gt;
====LVFS====&lt;br /&gt;
The [https://fwupd.org/ Linux Vendor Firmware Service] (LVFS) provides a free central store of firmware updates, such as for UEFI motherboards and SSD controllers. This feature is integrated with many Linux distributions through the &amp;lt;code&amp;gt;fwupd&amp;lt;/code&amp;gt; daemon. For situations where internet access is not permitted, the service allows users to make a local mirror of the entire 100+ GB store.&lt;br /&gt;
&lt;br /&gt;
On 9 January 2025, the project announced that it would introduce a login wall around its mirror feature, citing unnecessary use of its bandwidth.&amp;lt;ref&amp;gt;https://lore.kernel.org/lvfs-announce/zDlhotSvKqnMDfkCKaE_u4-8uvWsgkuj18ifLBwrLN9vWWrIJjrYQ-QfhpY3xuwIXuZgzOVajW99ymoWmijTdngeFRVjM0BxhPZquUzbDfM=@hughsie.com/T/&amp;lt;/ref&amp;gt; Up to 1,000 files may be downloaded per day without logging in. The author later mentioned on Mastodon that the problem appears to be caused by AI scraping.&amp;lt;ref&amp;gt;https://mastodon.social/@hughsie/113871373001227969&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====LWN.net====&lt;br /&gt;
On 21 January 2025, Jonathan Corbet, maintainer of the Linux news website [[wikipedia:LWN.net|LWN.net]], made the following [https://social.kernel.org/notice/AqJkUigsjad3gQc664 post] to social.kernel.org:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Should you be wondering why @LWN #LWN is occasionally sluggish... since the new year, the DDOS onslaughts from AI-scraper bots has picked up considerably. Only a small fraction of our traffic is serving actual human readers at this point. At times, some bot decides to hit us from hundreds of IP addresses at once, clogging the works. They don&#039;t identify themselves as bots, and robots.txt is the only thing they *don&#039;t* read off the site.&lt;br /&gt;
&lt;br /&gt;
This is beyond unsustainable. We are going to have to put time into deploying some sort of active defenses just to keep the site online. I think I&#039;d even rather be writing about accounting systems than dealing with this cr*p. And it&#039;s not just us, of course; this behavior is going to wreck the net even more than it&#039;s already wrecked.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He later commented:&amp;lt;ref&amp;gt;https://www.heise.de/en/news/AI-bots-paralyze-Linux-news-site-and-others-10252162.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
We do indeed see a kind of pattern. Every IP stays below the threshold for our fuses, but the overload is overwhelming. Any form of active defense will probably have to figure out to block entire subnets instead of individual addresses, and even that might not be enough.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====MediaWiki====&lt;br /&gt;
[[wikipedia:MediaWiki|MediaWiki]] is of particular interest to LLM training due to the vast amount of factual, plain-text content wikis tend to hold. While [[wikipedia:Wikipedia|Wikipedia]] and the [[wikipedia:Wikimedia Foundation|Wikimedia Foundation]] host the most well-known wikis, numerous smaller wikis exist thanks to the work of many independent editors. The strength of wiki architecture is its ability for every edit to be audited by anyone, at any time - you can still view [https://en.wikipedia.org/w/index.php?oldid=1 the first edit to Wikipedia] from 2002. This makes wikis a hybrid of a static website and a dynamic web app, which becomes problematic when poorly-designed bots attempt to scrape them.&amp;lt;ref name=&amp;quot;geraspora&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- COI alert: I, [[User:kirb]], am an admin for The Apple Wiki. Hopefully this is neutral enough?&lt;br /&gt;
--&amp;gt;The Apple Wiki, which documents internal details of Apple&#039;s hardware and software, holds more than 50,000 articles. On 2 August 2024, with a repeat occurrence on 5 January 2025, the service was disrupted by scraping efforts.&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/The_Apple_Wiki:Community_portal#Bot_traffic_abuse&amp;lt;/ref&amp;gt; The wiki contains a considerable amount of information that is scraped by legitimate security research tools, making it difficult for the website to block non-legitimate requests. Efforts to block unethical scraping and protect the wiki have disrupted these legitimate tools. The large article count, combined with more than 280,000 total edits over the wiki&#039;s lifetime, create an untenable situation where it is simply not possible to scrape the website without causing significant service disruption.&lt;br /&gt;
&lt;br /&gt;
====Perplexity AI and news outlets====&lt;br /&gt;
[[Perplexity AI]], founded in August 2022, is a large language model that aims to be viewed as a general search engine. It encourages users to consume news through its summaries of stories.&lt;br /&gt;
&lt;br /&gt;
On 15 June 2024, an investigation by Apple blog MacStories found that Perplexity does not follow its own documented policies when accessing content the user requests from the web. In their testing, the scraper pretended to be Chrome 111 running on Windows 10, connecting from an IP address not found in Perplexity&#039;s publicly-listed IP address ranges.&amp;lt;ref&amp;gt;https://rknight.me/blog/perplexity-ai-is-lying-about-its-user-agent/&amp;lt;/ref&amp;gt; MacStories&#039; findings were confirmed by a WIRED investigation.&amp;lt;ref&amp;gt;https://www.wired.com/story/perplexity-is-a-bullshit-machine/&amp;lt;/ref&amp;gt; Perplexity responded by removing its list of IP addresses.&lt;br /&gt;
&lt;br /&gt;
On 27 June 2024, [[Amazon]] announced an investigation into Perplexity AI, suggesting the behavior may be considered abusive under Amazon Web Services terms of service:&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot;&amp;gt;https://www.wired.com/story/aws-perplexity-bot-scraping-investigation/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
&amp;quot;AWS&#039;s terms of service prohibit abusive and illegal activities and our customers are responsible for complying with those terms,&amp;quot; [AWS spokesperson Patrick] Neighorn said in a statement. &amp;quot;We routinely receive reports of alleged abuse from a variety of sources and engage our customers to understand those reports.&amp;quot;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Privacy concerns of online AI models==&lt;br /&gt;
There are several concerns with using online AI models like [[ChatGPT]] ([[OpenAI]]), not only because they are proprietary, but also because there is no guarantee to where your data ends up being stored or used for. Recent developments in local AI models are an alternative to these online AI models, as they work offline once they are downloaded from platforms like HuggingFace.&amp;lt;ref&amp;gt;https://huggingface.co/&amp;lt;/ref&amp;gt; Common models to run are like Llama ([[Meta]]), DeepSeek ([[DeepSeek]]), Phi ([[Microsoft]]), Mistral ([[Mistral AI]]), Gemma ([[Google]]).&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Artificial intelligence]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Motorola&amp;diff=7761</id>
		<title>Category:Motorola</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Motorola&amp;diff=7761"/>
		<updated>2025-02-03T05:35:08Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Mobile phone companies&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Mobile phone companies]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Nike&amp;diff=7760</id>
		<title>Category:Nike</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Nike&amp;diff=7760"/>
		<updated>2025-02-03T05:33:25Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Clothing companies&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Clothing companies]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:NanoGUARD&amp;diff=7759</id>
		<title>Category:NanoGUARD</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:NanoGUARD&amp;diff=7759"/>
		<updated>2025-02-03T05:33:09Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Actnano&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Actnano]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Muzio_Player&amp;diff=7758</id>
		<title>Category:Muzio Player</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Muzio_Player&amp;diff=7758"/>
		<updated>2025-02-03T05:33:01Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Red Sky Labs&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Red Sky Labs]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:EduVULCAN&amp;diff=7757</id>
		<title>Category:EduVULCAN</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:EduVULCAN&amp;diff=7757"/>
		<updated>2025-02-03T05:32:50Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Educational technology companies&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Educational technology companies]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Disney&amp;diff=7756</id>
		<title>Category:Disney</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Disney&amp;diff=7756"/>
		<updated>2025-02-03T05:32:40Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Entertainment companies&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Entertainment companies]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Ally_Invest_Securities&amp;diff=7755</id>
		<title>Category:Ally Invest Securities</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Ally_Invest_Securities&amp;diff=7755"/>
		<updated>2025-02-03T05:32:32Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Financial services companies&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Financial services companies]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:BMW&amp;diff=7754</id>
		<title>Category:BMW</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:BMW&amp;diff=7754"/>
		<updated>2025-02-03T05:32:23Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Automotive companies&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Automotive companies]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=FUTO&amp;diff=7752</id>
		<title>FUTO</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=FUTO&amp;diff=7752"/>
		<updated>2025-02-03T05:27:51Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Fix category&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{InfoboxCompany&lt;br /&gt;
| Name = FUTO&lt;br /&gt;
| Type = Private&lt;br /&gt;
| Founded = 2021&lt;br /&gt;
| Industry = Technology&lt;br /&gt;
| Official Website = https://www.futo.org/&lt;br /&gt;
| Logo = Futo header logo.svg&lt;br /&gt;
}}&lt;br /&gt;
[https://futo.org/ FUTO] , founded in 2021 by [[Eron Wolf]] ( a software developer, and noteworthy investor in [[What&#039;s app]] {{Citation needed}}), is an organization that develops applications and sponsors [[FOSS]] ([[wikipedia:Free_and_open-source_software|free and open source]]) software projects as well as other independent software projects that align with their principles.&amp;lt;ref&amp;gt;https://futo.org/about/what-is-futo/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://futo.org/grants/&amp;lt;/ref&amp;gt; FUTO has enabled the development of notable apps, such as [[Immich]], FUTO Keyboard, and [[GrayJay]].  &lt;br /&gt;
&lt;br /&gt;
Eron Wolf Hired [[Louis Rossmann - Video Directory|Louis Rossmann]]&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/Louis_Rossmann&amp;lt;/ref&amp;gt; in 2022 as Director of Community Outreach.&amp;lt;ref&amp;gt;https://www.linkedin.com/in/louis-rossmann-3a5396292&amp;lt;/ref&amp;gt;     &lt;br /&gt;
&lt;br /&gt;
[https://keyboard.futo.org/ FUTO Keyboard] is a keyboard app for [[Android]]-based operating systems which offers many modern typing features like localized voice input, swipe typing, and autocorrect, while respecting the purchaser&#039;s rights.&lt;br /&gt;
&lt;br /&gt;
FUTO has been criticized for using their own definition of the term &amp;quot;open source&amp;quot;&amp;lt;ref&amp;gt;https://danb.me/blog/futo-open-source-definition/&amp;lt;/ref&amp;gt; and claiming their applications are &amp;quot;open source&amp;quot;, when their license does not meet the [https://opensource.org/osd OSI&#039;s definition of the term]. FUTO has since changed their wording.&amp;lt;ref&amp;gt;https://www.futo.org/about/futo-statement-on-opensource/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Organization&#039;s objectives &amp;amp; principles==&lt;br /&gt;
&lt;br /&gt;
===Three pledges===&lt;br /&gt;
&lt;br /&gt;
*FUTO&#039;s first pledge is to &amp;quot;never sell out. All FUTO companies and FUTO-funded projects are expected to remain fiercely independent.&amp;quot; &amp;lt;ref&amp;gt;https://futo.org/about/what-is-futo/&amp;lt;/ref&amp;gt;&lt;br /&gt;
*FUTO&#039;s second pledge is to never abuse it&#039;s customers.&lt;br /&gt;
*FUTO&#039;s third pledge is to all be devoted to transparency and to making High Quality Open-source software.&lt;br /&gt;
&lt;br /&gt;
===Ethical Capitalism===&lt;br /&gt;
FUTO while a legally a C-Corporation for profit company&amp;lt;ref&amp;gt;https://futo.org/about/futo-faq/&amp;lt;/ref&amp;gt; but as of 2025, according to Louis Rossmann, Director of Community Outreach at FUTO{{Citation needed}} is in no way profitable to it&#039;s sole owner &amp;amp; investor [[Eron Wolf]],  and their stated financial goal is to operate fiercely independently and &amp;quot;never sell out.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
===The Five Pillars of FUTO-ey Software===&lt;br /&gt;
&amp;quot; 1. Source First /Open Source If people are to have control over the computers in their lives, they must have the capability to inspect and modify the software running on them.&lt;br /&gt;
&lt;br /&gt;
2. Self Manageable Servers (if applicable) Servers should be Source First too. It should be relatively easy for a user to run their own server for whatever service their client software needs.&lt;br /&gt;
&lt;br /&gt;
3. Sovereign Identity (if applicable) Servers must allow the user to authenticate with a private/public key pair. Email and phone number authentication is sensible for normies, but it must always be possible for a user to transition to using a sovereign mechanism.&lt;br /&gt;
&lt;br /&gt;
4. Open Databases (if applicable) Crowdsourced content should never be kept hidden in a silo by the crowdsourcer. The creator of the content most likely intended for their work to be distributed as widely as possible. The crowdsourcer must provide reasonable mechanisms for the content to be distributed by others.&lt;br /&gt;
&lt;br /&gt;
5. End-to-end Encryption (if possible) Servers should never be able to leverage their man in the middle status to discern the content of communications between their users.&lt;br /&gt;
&lt;br /&gt;
0. Don’t Suck This applies to all software, FUTO-ey or not. We have accomplished nothing if our software is sluggish, unreliable, or lacks key features. Our clients need to be delightful. Our servers need to help our clients be delightful. &amp;quot; &amp;lt;ref&amp;gt;https://futo.org/about/what-is-futo/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Software companies]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Sony_X900H&amp;diff=7751</id>
		<title>Category:Sony X900H</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Sony_X900H&amp;diff=7751"/>
		<updated>2025-02-03T05:26:11Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Sony&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Sony]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Sony_WF-1000XM4&amp;diff=7750</id>
		<title>Category:Sony WF-1000XM4</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Sony_WF-1000XM4&amp;diff=7750"/>
		<updated>2025-02-03T05:26:04Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Sony&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Sony]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Logitech_G_HUB&amp;diff=7748</id>
		<title>Category:Logitech G HUB</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Logitech_G_HUB&amp;diff=7748"/>
		<updated>2025-02-03T05:24:43Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Logitech&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Logitech]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:IKEA_%C3%85SKV%C3%84DER&amp;diff=7747</id>
		<title>Category:IKEA ÅSKVÄDER</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:IKEA_%C3%85SKV%C3%84DER&amp;diff=7747"/>
		<updated>2025-02-03T05:24:36Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:IKEA&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:IKEA]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Hisense_H9G_Smart_TV&amp;diff=7746</id>
		<title>Category:Hisense H9G Smart TV</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Hisense_H9G_Smart_TV&amp;diff=7746"/>
		<updated>2025-02-03T05:24:25Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Hisense&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Hisense]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Canon_Camera_Connect&amp;diff=7745</id>
		<title>Category:Canon Camera Connect</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Canon_Camera_Connect&amp;diff=7745"/>
		<updated>2025-02-03T05:24:15Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Canon&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Canon]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Apple_App_Store&amp;diff=7743</id>
		<title>Category:Apple App Store</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Apple_App_Store&amp;diff=7743"/>
		<updated>2025-02-03T05:21:16Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;Category:Apple&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Apple]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=6177</id>
		<title>Artificial intelligence</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=6177"/>
		<updated>2025-01-28T07:48:30Z</updated>

		<summary type="html">&lt;p&gt;Kirb: /* Case studies */ Trying to make wiki section even more neutral&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Artificial intelligence&#039;&#039;&#039; (AI) is a field of computer science producing software that aims to ultimately replace all manual labor. AI is not a new concept - it has been of interest as early as the 1950s. Since the November 2022 launch of [[ChatGPT]], [[wikipedia:Large language model|large language model]] (LLM) chatbots have been a main focus of the industry, with billions of dollars in funding allocated to producing more &amp;quot;intelligent&amp;quot; LLMs. Also a significant focus are [[wikipedia:Text-to-image model|text-to-image models]], which &amp;quot;draw&amp;quot; an image using written instructions, and [[wikipedia:Text-to-video model|text-to-video models]], which extend the text-to-image concept across several smooth video frames.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Generative artificial intelligence|Generative artificial intelligence]] models are trained through vast amounts of existing human-generated content. Using the example of an LLM, by learning about common trends in sentence structure, the model is able to form complete sentences and show artificial &amp;quot;knowledge&amp;quot; of a topic. The artificial nature may cause [[wikipedia:Hallucination (artificial intelligence)|hallucination]] through confidently-written, but mostly or entirely incorrect, output.&lt;br /&gt;
&lt;br /&gt;
The current well-funded, lucrative industry of artificial intelligence tools has resulted in rampant unethical use of content. Startups intending to produce AI services have been scraping the internet for content to train future models at a concerning pace, with no regard for copyright law, as members of the field are concerned that they are approaching the limit of publicly-available content to train from.&amp;lt;ref&amp;gt;https://observer.com/2024/12/openai-cofounder-ilya-sutskever-ai-data-peak/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Unethical website scraping ==&lt;br /&gt;
While &amp;quot;mainstream&amp;quot; companies such as [[OpenAI]], [[Anthropic]], and [[Meta]] appear to correctly follow industry-standard practice for web crawlers, others ignore them, causing [[wikipedia:Denial-of-service attack|distributed denial of service attacks]] which damage access to freely-accessible websites. This is particularly an issue for websites that are large or contain many dynamic links.&lt;br /&gt;
&lt;br /&gt;
Ethical website scrapers, known as &amp;quot;spiders&amp;quot; that crawl the web, follow a certain set of minimum guidelines. Specifically, they follow [[wikipedia:robots.txt|robots.txt]], a text file found at the root of a domain that indicates:&lt;br /&gt;
&lt;br /&gt;
* Paths bots are allowed to index&lt;br /&gt;
* Paths bots should not index&lt;br /&gt;
* How long the bot should wait in between requests to the server, to reduce load&lt;br /&gt;
* The [[wikipedia:Sitemaps|sitemap]] of the website&#039;s content&lt;br /&gt;
&lt;br /&gt;
These rules are typically configured for all bots, with minor adjustments made to individual bots as needed. Additionally, specific web pages may use the [[wikipedia:noindex|robots meta tag]] to control use of their output.&lt;br /&gt;
&lt;br /&gt;
While it is good practice for a bot to respect robots.txt, there is no requirement for it, and there is no punishment for not following a website&#039;s wishes. It is additionally standard practice, but in no way enforced, that bots use a [[wikipedia:User-Agent header|User-Agent header]] to uniquely identify itself. This allows a website operator to observe a bot&#039;s traffic patterns, potentially blocking the bot outright if its scraping is not desirable. The header also typically contains a URL or email address that can be used to contact the operator in case of anomalies observed in its traffic.&lt;br /&gt;
&lt;br /&gt;
Unethical AI scraper bots do not follow robots.txt - in fact, they may not even request this file at all. They typically completely ignore it, instead opting to start from an entry point such as the root home page (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;), working its way through an exponentially growing list of links as it finds them, with little to no delay between requests. The bots use false User-Agent header strings that would correspond to real web browsers on desktop or mobile operating systems - blocking them would also block legitimate users, or at least legitimate users on VPNs.&lt;br /&gt;
&lt;br /&gt;
Some AI services opt to use separate User-Agent strings, potentially also ignoring robots.txt, when a request is made through user command rather than as part of model training. For example, ChatGPT identifies itself as &amp;lt;code&amp;gt;ChatGPT-User&amp;lt;/code&amp;gt; rather than its standard &amp;lt;code&amp;gt;OpenAI&amp;lt;/code&amp;gt; when it uses the &amp;quot;search the web&amp;quot; command - even if searching the web was an automatic decision. In a less favorable example, Perplexity AI in this same situation falsely identifies as a standard Chrome web browser running on Windows. AI companies defend this under the belief that they are not a &amp;quot;spider&amp;quot;, but rather a &amp;quot;user agent&amp;quot; (like a web browser), when called upon by a user&#039;s request.&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Less legitimate bots use a wide distribution of IP addresses, further reducing options for the website to protect itself. This is in a clear attempt to bypass IP-based request throttling and rate limiting the website may implement. They are also known to ignore HTTP response status codes that indicate a server error ([[wikipedia:HTTP status code#5xx server errors|5xx]]), or warnings that the client needs to slow down ([[wikipedia:HTTP status code#429|429 Too Many Requests]]) or has been entirely blocked ([[wikipedia:HTTP status code#403|403 Forbidden]]).&lt;br /&gt;
&lt;br /&gt;
=== Effect on users ===&lt;br /&gt;
To protect against unethical crawlers, due to concerns of both intellectual property and service disruption, websites adopt practices that affect the experience of real users:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Bot check walls&#039;&#039;&#039;: The user may be required to pass a security check &amp;quot;wall&amp;quot;. While usually automatic for the user, this can affect legitimate bots. When a website protection service such as [[Cloudflare]] is not confident as to whether the visitor is legitimate, it may present a CAPTCHA to be manually filled out. An example is &amp;quot;Google Sorry&amp;quot;, a CAPTCHA wall frequently seen when using Google Search via a VPN.&lt;br /&gt;
* &#039;&#039;&#039;Login walls&#039;&#039;&#039;: Should bots be found to pass CAPTCHA walls, the website may advance to requiring logging in to view content. A major recent example of this is [[YouTube]]&#039;s &amp;quot;Sign in to confirm you&#039;re not a bot&amp;quot; messages.&lt;br /&gt;
* &#039;&#039;&#039;JavaScript requirement&#039;&#039;&#039;: Most websites do not need JavaScript to deliver their content. However, as many scrapers expect content to be found directly in the HTML, it is often an easy workaround to use JavaScript to &amp;quot;insert&amp;quot; the content after the page has loaded. This may reduce the responsiveness of the website, increasing points of failure, and preventing security-conscious users who disable JavaScript from viewing the website.&lt;br /&gt;
* &#039;&#039;&#039;IP address blocking&#039;&#039;&#039;: Blocking IP addresses, especially by blocking entire providers via their [[wikipedia:Autonomous system (Internet)|autonomous system number]], always comes with some risk of blocking legitimate users. Particularly, this may restrict access to users making use of a VPN.&lt;br /&gt;
* &#039;&#039;&#039;Heuristic blocking&#039;&#039;&#039;: Patterns in request headers may give away that the request is being made by an unethical bot, despite attempts to act as a legitimate visitor. Heuristics are imperfect and may block legitimate users, especially those that may use less common browsers.&lt;br /&gt;
&lt;br /&gt;
In rare situations, a website operator may redirect detected bot traffic, such as to download speed test files hosted by ISPs containing multiple gigabytes of random garbage data. This may have the effect of disrupting the bot, but its effectiveness is unknown.&lt;br /&gt;
&lt;br /&gt;
The need to respond to unethical scraping also further consolidates the web into the control of a few large [[wikipedia:Web application firewall|web application firewall]] (WAF) services, most notably [[Cloudflare]], as website owners find themselves otherwise unable to protect their service from being disrupted by such traffic.&lt;br /&gt;
&lt;br /&gt;
=== Case studies ===&lt;br /&gt;
==== Diaspora ====&lt;br /&gt;
On 27 December 2024, the open-source social network project Diaspora noted that 70% of traffic across its infrastructure was in service of AI scrapers.&amp;lt;ref name=&amp;quot;geraspora&amp;quot;&amp;gt;https://pod.geraspora.de/posts/17342163&amp;lt;/ref&amp;gt; Particularly, the project noted that bots had followed links to crawl every individual edit in their [[#MediaWiki|MediaWiki]] instance, causing an exponential increase in the number of unique requests being made.&lt;br /&gt;
&lt;br /&gt;
==== LVFS ====&lt;br /&gt;
The [https://fwupd.org/ Linux Vendor Firmware Service] (LVFS) provides a free central store of firmware updates, such as for UEFI motherboards and SSD controllers. This feature is integrated with many Linux distributions through the &amp;lt;code&amp;gt;fwupd&amp;lt;/code&amp;gt; daemon. For situations where internet access is not permitted, the service allows users to make a local mirror of the entire 100+ GB store.&lt;br /&gt;
&lt;br /&gt;
On 9 January 2025, the project announced that it would introduce a login wall around its mirror feature, citing unnecessary use of its bandwidth.&amp;lt;ref&amp;gt;https://lore.kernel.org/lvfs-announce/zDlhotSvKqnMDfkCKaE_u4-8uvWsgkuj18ifLBwrLN9vWWrIJjrYQ-QfhpY3xuwIXuZgzOVajW99ymoWmijTdngeFRVjM0BxhPZquUzbDfM=@hughsie.com/T/&amp;lt;/ref&amp;gt; Up to 1,000 files may be downloaded per day without logging in. The author later mentioned on Mastodon that the problem appears to be caused by AI scraping.&amp;lt;ref&amp;gt;https://mastodon.social/@hughsie/113871373001227969&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== LWN.net ====&lt;br /&gt;
On 21 January 2025, Jonathan Corbet, maintainer of the Linux news website [[wikipedia:LWN.net|LWN.net]], made the following [https://social.kernel.org/notice/AqJkUigsjad3gQc664 post] to social.kernel.org:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Should you be wondering why @LWN #LWN is occasionally sluggish... since the new year, the DDOS onslaughts from AI-scraper bots has picked up considerably. Only a small fraction of our traffic is serving actual human readers at this point. At times, some bot decides to hit us from hundreds of IP addresses at once, clogging the works. They don&#039;t identify themselves as bots, and robots.txt is the only thing they *don&#039;t* read off the site.&lt;br /&gt;
&lt;br /&gt;
This is beyond unsustainable. We are going to have to put time into deploying some sort of active defenses just to keep the site online. I think I&#039;d even rather be writing about accounting systems than dealing with this cr*p. And it&#039;s not just us, of course; this behavior is going to wreck the net even more than it&#039;s already wrecked.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He later commented:&amp;lt;ref&amp;gt;https://www.heise.de/en/news/AI-bots-paralyze-Linux-news-site-and-others-10252162.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
We do indeed see a kind of pattern. Every IP stays below the threshold for our fuses, but the overload is overwhelming. Any form of active defense will probably have to figure out to block entire subnets instead of individual addresses, and even that might not be enough.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== MediaWiki ====&lt;br /&gt;
[[wikipedia:MediaWiki|MediaWiki]] is of particular interest to LLM training due to the vast amount of factual, plain-text content wikis tend to hold. While [[wikipedia:Wikipedia|Wikipedia]] and the [[wikipedia:Wikimedia Foundation|Wikimedia Foundation]] host the most well-known wikis, numerous smaller wikis exist thanks to the work of many independent editors. The strength of wiki architecture is its ability for every edit to be audited by anyone, at any time - you can still view [https://en.wikipedia.org/w/index.php?oldid=1 the first edit to Wikipedia] from 2002. This makes wikis a hybrid of a static website and a dynamic web app, which becomes problematic when poorly-designed bots attempt to scrape them.&amp;lt;ref name=&amp;quot;geraspora&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- COI alert: I, [[User:kirb]], am an admin for The Apple Wiki. Hopefully this is neutral enough?&lt;br /&gt;
--&amp;gt;The Apple Wiki, which documents internal details of Apple&#039;s hardware and software, holds more than 50,000 articles. On 2 August 2024, with a repeat occurrence on 5 January 2025, the service was disrupted by scraping efforts.&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/The_Apple_Wiki:Community_portal#Bot_traffic_abuse&amp;lt;/ref&amp;gt; The wiki contains a considerable amount of information that is scraped by legitimate security research tools, making it difficult for the website to block non-legitimate requests. Efforts to block unethical scraping and protect the wiki have disrupted these legitimate tools. The large article count, combined with more than 280,000 total edits over the wiki&#039;s lifetime, create an untenable situation where it is simply not possible to scrape the website without causing significant service disruption.&lt;br /&gt;
&lt;br /&gt;
==== Perplexity AI and news outlets ====&lt;br /&gt;
[[Perplexity AI]], founded in August 2022, is a large language model that aims to be viewed as a general search engine. It encourages users to consume news through its summaries of stories.&lt;br /&gt;
&lt;br /&gt;
On 15 June 2024, Apple blog MacStories found that Perplexity does not follow its own documented policies when accessing content the user requests from the web. In their testing, the scraper pretended to be Chrome 111 running on Windows 10, connecting from an IP address not found in Perplexity&#039;s posted IP address ranges.&amp;lt;ref&amp;gt;https://rknight.me/blog/perplexity-ai-is-lying-about-its-user-agent/&amp;lt;/ref&amp;gt; Two days later, this was corroborated by WIRED.&amp;lt;ref&amp;gt;https://www.wired.com/story/perplexity-is-a-bullshit-machine/&amp;lt;/ref&amp;gt; Perplexity responded by removing its list of IP addresses.&lt;br /&gt;
&lt;br /&gt;
On 27 June 2024, [[Amazon]] announced an investigation into Perplexity AI, citing a terms of service clause requiring bots hosted on Amazon Web Services to honor robots.txt:&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot;&amp;gt;https://www.wired.com/story/aws-perplexity-bot-scraping-investigation/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
&amp;quot;AWS&#039;s terms of service prohibit abusive and illegal activities and our customers are responsible for complying with those terms,&amp;quot; [AWS spokesperson Patrick] Neighorn said in a statement. &amp;quot;We routinely receive reports of alleged abuse from a variety of sources and engage our customers to understand those reports.&amp;quot;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Artificial intelligence]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=6174</id>
		<title>Artificial intelligence</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=6174"/>
		<updated>2025-01-28T07:28:14Z</updated>

		<summary type="html">&lt;p&gt;Kirb: +AI cat&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Artificial intelligence&#039;&#039;&#039; (AI) is a field of computer science producing software that aims to ultimately replace all manual labor. AI is not a new concept - it has been of interest as early as the 1950s. Since the November 2022 launch of [[ChatGPT]], [[wikipedia:Large language model|large language model]] (LLM) chatbots have been a main focus of the industry, with billions of dollars in funding allocated to producing more &amp;quot;intelligent&amp;quot; LLMs. Also a significant focus are [[wikipedia:Text-to-image model|text-to-image models]], which &amp;quot;draw&amp;quot; an image using written instructions, and [[wikipedia:Text-to-video model|text-to-video models]], which extend the text-to-image concept across several smooth video frames.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Generative artificial intelligence|Generative artificial intelligence]] models are trained through vast amounts of existing human-generated content. Using the example of an LLM, by learning about common trends in sentence structure, the model is able to form complete sentences and show artificial &amp;quot;knowledge&amp;quot; of a topic. The artificial nature may cause [[wikipedia:Hallucination (artificial intelligence)|hallucination]] through confidently-written, but mostly or entirely incorrect, output.&lt;br /&gt;
&lt;br /&gt;
The current well-funded, lucrative industry of artificial intelligence tools has resulted in rampant unethical use of content. Startups intending to produce AI services have been scraping the internet for content to train future models at a concerning pace, with no regard for copyright law, as members of the field are concerned that they are approaching the limit of publicly-available content to train from.&amp;lt;ref&amp;gt;https://observer.com/2024/12/openai-cofounder-ilya-sutskever-ai-data-peak/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Unethical website scraping ==&lt;br /&gt;
While &amp;quot;mainstream&amp;quot; companies such as [[OpenAI]], [[Anthropic]], and [[Meta]] appear to correctly follow industry-standard practice for web crawlers, others ignore them, causing [[wikipedia:Denial-of-service attack|distributed denial of service attacks]] which damage access to freely-accessible websites. This is particularly an issue for websites that are large or contain many dynamic links.&lt;br /&gt;
&lt;br /&gt;
Ethical website scrapers, known as &amp;quot;spiders&amp;quot; that crawl the web, follow a certain set of minimum guidelines. Specifically, they follow [[wikipedia:robots.txt|robots.txt]], a text file found at the root of a domain that indicates:&lt;br /&gt;
&lt;br /&gt;
* Paths bots are allowed to index&lt;br /&gt;
* Paths bots should not index&lt;br /&gt;
* How long the bot should wait in between requests to the server, to reduce load&lt;br /&gt;
* The [[wikipedia:Sitemaps|sitemap]] of the website&#039;s content&lt;br /&gt;
&lt;br /&gt;
These rules are typically configured for all bots, with minor adjustments made to individual bots as needed. Additionally, specific web pages may use the [[wikipedia:noindex|robots meta tag]] to control use of their output.&lt;br /&gt;
&lt;br /&gt;
While it is good practice for a bot to respect robots.txt, there is no requirement for it, and there is no punishment for not following a website&#039;s wishes. It is additionally standard practice, but in no way enforced, that bots use a [[wikipedia:User-Agent header|User-Agent header]] to uniquely identify itself. This allows a website operator to observe a bot&#039;s traffic patterns, potentially blocking the bot outright if its scraping is not desirable. The header also typically contains a URL or email address that can be used to contact the operator in case of anomalies observed in its traffic.&lt;br /&gt;
&lt;br /&gt;
Unethical AI scraper bots do not follow robots.txt - in fact, they may not even request this file at all. They typically completely ignore it, instead opting to start from an entry point such as the root home page (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;), working its way through an exponentially growing list of links as it finds them, with little to no delay between requests. The bots use false User-Agent header strings that would correspond to real web browsers on desktop or mobile operating systems - blocking them would also block legitimate users, or at least legitimate users on VPNs.&lt;br /&gt;
&lt;br /&gt;
Some AI services opt to use separate User-Agent strings, potentially also ignoring robots.txt, when a request is made through user command rather than as part of model training. For example, ChatGPT identifies itself as &amp;lt;code&amp;gt;ChatGPT-User&amp;lt;/code&amp;gt; rather than its standard &amp;lt;code&amp;gt;OpenAI&amp;lt;/code&amp;gt; when it uses the &amp;quot;search the web&amp;quot; command - even if searching the web was an automatic decision. In a less favorable example, Perplexity AI in this same situation falsely identifies as a standard Chrome web browser running on Windows. AI companies defend this under the belief that they are not a &amp;quot;spider&amp;quot;, but rather a &amp;quot;user agent&amp;quot; (like a web browser), when called upon by a user&#039;s request.&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Less legitimate bots use a wide distribution of IP addresses, further reducing options for the website to protect itself. This is in a clear attempt to bypass IP-based request throttling and rate limiting the website may implement. They are also known to ignore HTTP response status codes that indicate a server error ([[wikipedia:HTTP status code#5xx server errors|5xx]]), or warnings that the client needs to slow down ([[wikipedia:HTTP status code#429|429 Too Many Requests]]) or has been entirely blocked ([[wikipedia:HTTP status code#403|403 Forbidden]]).&lt;br /&gt;
&lt;br /&gt;
=== Effect on users ===&lt;br /&gt;
To protect against unethical crawlers, due to concerns of both intellectual property and service disruption, websites adopt practices that affect the experience of real users:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Bot check walls&#039;&#039;&#039;: The user may be required to pass a security check &amp;quot;wall&amp;quot;. While usually automatic for the user, this can affect legitimate bots. When a website protection service such as [[Cloudflare]] is not confident as to whether the visitor is legitimate, it may present a CAPTCHA to be manually filled out. An example is &amp;quot;Google Sorry&amp;quot;, a CAPTCHA wall frequently seen when using Google Search via a VPN.&lt;br /&gt;
* &#039;&#039;&#039;Login walls&#039;&#039;&#039;: Should bots be found to pass CAPTCHA walls, the website may advance to requiring logging in to view content. A major recent example of this is [[YouTube]]&#039;s &amp;quot;Sign in to confirm you&#039;re not a bot&amp;quot; messages.&lt;br /&gt;
* &#039;&#039;&#039;JavaScript requirement&#039;&#039;&#039;: Most websites do not need JavaScript to deliver their content. However, as many scrapers expect content to be found directly in the HTML, it is often an easy workaround to use JavaScript to &amp;quot;insert&amp;quot; the content after the page has loaded. This may reduce the responsiveness of the website, increasing points of failure, and preventing security-conscious users who disable JavaScript from viewing the website.&lt;br /&gt;
* &#039;&#039;&#039;IP address blocking&#039;&#039;&#039;: Blocking IP addresses, especially by blocking entire providers via their [[wikipedia:Autonomous system (Internet)|autonomous system number]], always comes with some risk of blocking legitimate users. Particularly, this may restrict access to users making use of a VPN.&lt;br /&gt;
* &#039;&#039;&#039;Heuristic blocking&#039;&#039;&#039;: Patterns in request headers may give away that the request is being made by an unethical bot, despite attempts to act as a legitimate visitor. Heuristics are imperfect and may block legitimate users, especially those that may use less common browsers.&lt;br /&gt;
&lt;br /&gt;
In rare situations, a website operator may redirect detected bot traffic, such as to download speed test files hosted by ISPs containing multiple gigabytes of random garbage data. This may have the effect of disrupting the bot, but its effectiveness is unknown.&lt;br /&gt;
&lt;br /&gt;
The need to respond to unethical scraping also further consolidates the web into the control of a few large [[wikipedia:Web application firewall|web application firewall]] (WAF) services, most notably [[Cloudflare]], as website owners find themselves otherwise unable to protect their service from being disrupted by such traffic.&lt;br /&gt;
&lt;br /&gt;
=== Case studies ===&lt;br /&gt;
==== Diaspora ====&lt;br /&gt;
On 27 December 2024, the open-source social network project Diaspora noted that 70% of traffic across its infrastructure was in service of AI scrapers.&amp;lt;ref&amp;gt;https://pod.geraspora.de/posts/17342163&amp;lt;/ref&amp;gt; Particularly, the project noted that bots had followed links to crawl every individual edit in their [[wikipedia:MediaWiki|MediaWiki]] instance, causing an exponential increase in the number of unique requests being made.&lt;br /&gt;
&lt;br /&gt;
==== LVFS ====&lt;br /&gt;
The [https://fwupd.org/ Linux Vendor Firmware Service] (LVFS) provides a free central store of firmware updates, such as for UEFI motherboards and SSD controllers. This feature is integrated with many Linux distributions through the &amp;lt;code&amp;gt;fwupd&amp;lt;/code&amp;gt; daemon. For situations where internet access is not permitted, the service allows users to make a local mirror of the entire 100+ GB store.&lt;br /&gt;
&lt;br /&gt;
On 9 January 2025, the project announced that it would introduce a login wall around its mirror feature, citing unnecessary use of its bandwidth.&amp;lt;ref&amp;gt;https://lore.kernel.org/lvfs-announce/zDlhotSvKqnMDfkCKaE_u4-8uvWsgkuj18ifLBwrLN9vWWrIJjrYQ-QfhpY3xuwIXuZgzOVajW99ymoWmijTdngeFRVjM0BxhPZquUzbDfM=@hughsie.com/T/&amp;lt;/ref&amp;gt; Up to 1,000 files may be downloaded per day without logging in. The author later mentioned on Mastodon that the problem appears to be caused by AI scraping.&amp;lt;ref&amp;gt;https://mastodon.social/@hughsie/113871373001227969&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== LWN.net ====&lt;br /&gt;
On 21 January 2025, Jonathan Corbet, maintainer of the Linux news website [[wikipedia:LWN.net|LWN.net]], made the following [https://social.kernel.org/notice/AqJkUigsjad3gQc664 post] to social.kernel.org:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Should you be wondering why @LWN #LWN is occasionally sluggish... since the new year, the DDOS onslaughts from AI-scraper bots has picked up considerably. Only a small fraction of our traffic is serving actual human readers at this point. At times, some bot decides to hit us from hundreds of IP addresses at once, clogging the works. They don&#039;t identify themselves as bots, and robots.txt is the only thing they *don&#039;t* read off the site.&lt;br /&gt;
&lt;br /&gt;
This is beyond unsustainable. We are going to have to put time into deploying some sort of active defenses just to keep the site online. I think I&#039;d even rather be writing about accounting systems than dealing with this cr*p. And it&#039;s not just us, of course; this behavior is going to wreck the net even more than it&#039;s already wrecked.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He later commented:&amp;lt;ref&amp;gt;https://www.heise.de/en/news/AI-bots-paralyze-Linux-news-site-and-others-10252162.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
We do indeed see a kind of pattern. Every IP stays below the threshold for our fuses, but the overload is overwhelming. Any form of active defense will probably have to figure out to block entire subnets instead of individual addresses, and even that might not be enough.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Perplexity AI and news outlets ====&lt;br /&gt;
[[Perplexity AI]], founded in August 2022, is a large language model that aims to be viewed as a general search engine. It encourages users to consume news through its summaries of stories.&lt;br /&gt;
&lt;br /&gt;
On 15 June 2024, Apple blog MacStories found that Perplexity does not follow its own documented policies when accessing content the user requests from the web. In their testing, the scraper pretended to be Chrome 111 running on Windows 10, connecting from an IP address not found in Perplexity&#039;s posted IP address ranges.&amp;lt;ref&amp;gt;https://rknight.me/blog/perplexity-ai-is-lying-about-its-user-agent/&amp;lt;/ref&amp;gt; Two days later, this was corroborated by WIRED.&amp;lt;ref&amp;gt;https://www.wired.com/story/perplexity-is-a-bullshit-machine/&amp;lt;/ref&amp;gt; Perplexity responded by removing its list of IP addresses.&lt;br /&gt;
&lt;br /&gt;
On 27 June 2024, [[Amazon]] announced an investigation into Perplexity AI, citing a terms of service clause requiring bots hosted on Amazon Web Services to honor robots.txt:&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot;&amp;gt;https://www.wired.com/story/aws-perplexity-bot-scraping-investigation/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
&amp;quot;AWS&#039;s terms of service prohibit abusive and illegal activities and our customers are responsible for complying with those terms,&amp;quot; [AWS spokesperson Patrick] Neighorn said in a statement. &amp;quot;We routinely receive reports of alleged abuse from a variety of sources and engage our customers to understand those reports.&amp;quot;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The Apple Wiki ====&lt;br /&gt;
&amp;lt;!-- COI alert: I, [[User:kirb]], am an admin for The Apple Wiki. Hopefully this is neutral enough? --&amp;gt;&lt;br /&gt;
The Apple Wiki, a MediaWiki instance that documents internal details of Apple&#039;s hardware and software, holds more than 50,000 articles. On 2 August 2024, with a repeat occurrence on 5 January 2025, the service was disrupted by scraping efforts.&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/The_Apple_Wiki:Community_portal#Bot_traffic_abuse&amp;lt;/ref&amp;gt; The wiki contains a considerable amount of information that is scraped by legitimate security research tools, making it difficult for the website to block abusive requests. Efforts to block unethical scraping and protect the wiki have disrupted these legitimate tools. The large article count, combined with the more than 280,000 total edits, create an untenable situation where it is simply not possible to scrape the website without causing significant service disruption.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Artificial intelligence]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Artificial_intelligence_companies&amp;diff=6173</id>
		<title>Category:Artificial intelligence companies</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Artificial_intelligence_companies&amp;diff=6173"/>
		<updated>2025-01-28T07:27:21Z</updated>

		<summary type="html">&lt;p&gt;Kirb: +AI cat&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Software companies]]&lt;br /&gt;
[[Category:Artificial intelligence]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Category:Artificial_intelligence&amp;diff=6172</id>
		<title>Category:Artificial intelligence</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Category:Artificial_intelligence&amp;diff=6172"/>
		<updated>2025-01-28T07:26:05Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created blank page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=6121</id>
		<title>Artificial intelligence</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=6121"/>
		<updated>2025-01-28T03:49:24Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Can I add this link?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Artificial intelligence&#039;&#039;&#039; (AI) is a field of computer science producing software that aims to ultimately replace all manual labor. AI is not a new concept - it has been of interest as early as the 1950s. Since the November 2022 launch of [[ChatGPT]], [[wikipedia:Large language model|large language model]] (LLM) chatbots have been a main focus of the industry, with billions of dollars in funding allocated to producing more &amp;quot;intelligent&amp;quot; LLMs. Also a significant focus are [[wikipedia:Text-to-image model|text-to-image models]], which &amp;quot;draw&amp;quot; an image using written instructions, and [[wikipedia:Text-to-video model|text-to-video models]], which extend the text-to-image concept across several smooth video frames.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Generative artificial intelligence|Generative artificial intelligence]] models are trained through vast amounts of existing human-generated content. Using the example of an LLM, by learning about common trends in sentence structure, the model is able to form complete sentences and show artificial &amp;quot;knowledge&amp;quot; of a topic. The artificial nature may cause [[wikipedia:Hallucination (artificial intelligence)|hallucination]] through confidently-written, but mostly or entirely incorrect, output.&lt;br /&gt;
&lt;br /&gt;
The current well-funded, lucrative industry of artificial intelligence tools has resulted in rampant unethical use of content. Startups intending to produce AI services have been scraping the internet for content to train future models at a concerning pace, with no regard for copyright law, as members of the field are concerned that they are approaching the limit of publicly-available content to train from.&amp;lt;ref&amp;gt;https://observer.com/2024/12/openai-cofounder-ilya-sutskever-ai-data-peak/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Unethical website scraping ==&lt;br /&gt;
While &amp;quot;mainstream&amp;quot; companies such as [[OpenAI]], [[Anthropic]], and [[Meta]] appear to correctly follow industry-standard practice for web crawlers, others ignore them, causing [[wikipedia:Denial-of-service attack|distributed denial of service attacks]] which damage access to freely-accessible websites. This is particularly an issue for websites that are large or contain many dynamic links.&lt;br /&gt;
&lt;br /&gt;
Ethical website scrapers, known as &amp;quot;spiders&amp;quot; that crawl the web, follow a certain set of minimum guidelines. Specifically, they follow [[wikipedia:robots.txt|robots.txt]], a text file found at the root of a domain that indicates:&lt;br /&gt;
&lt;br /&gt;
* Paths bots are allowed to index&lt;br /&gt;
* Paths bots should not index&lt;br /&gt;
* How long the bot should wait in between requests to the server, to reduce load&lt;br /&gt;
* The [[wikipedia:Sitemaps|sitemap]] of the website&#039;s content&lt;br /&gt;
&lt;br /&gt;
These rules are typically configured for all bots, with minor adjustments made to individual bots as needed. Additionally, specific web pages may use the [[wikipedia:noindex|robots meta tag]] to control use of their output.&lt;br /&gt;
&lt;br /&gt;
While it is good practice for a bot to respect robots.txt, there is no requirement for it, and there is no punishment for not following a website&#039;s wishes. It is additionally standard practice, but in no way enforced, that bots use a [[wikipedia:User-Agent header|User-Agent header]] to uniquely identify itself. This allows a website operator to observe a bot&#039;s traffic patterns, potentially blocking the bot outright if its scraping is not desirable. The header also typically contains a URL or email address that can be used to contact the operator in case of anomalies observed in its traffic.&lt;br /&gt;
&lt;br /&gt;
Unethical AI scraper bots do not follow robots.txt - in fact, they may not even request this file at all. They typically completely ignore it, instead opting to start from an entry point such as the root home page (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;), working its way through an exponentially growing list of links as it finds them, with little to no delay between requests. The bots use false User-Agent header strings that would correspond to real web browsers on desktop or mobile operating systems - blocking them would also block legitimate users, or at least legitimate users on VPNs.&lt;br /&gt;
&lt;br /&gt;
Some AI services opt to use separate User-Agent strings, potentially also ignoring robots.txt, when a request is made through user command rather than as part of model training. For example, ChatGPT identifies itself as &amp;lt;code&amp;gt;ChatGPT-User&amp;lt;/code&amp;gt; rather than its standard &amp;lt;code&amp;gt;OpenAI&amp;lt;/code&amp;gt; when it uses the &amp;quot;search the web&amp;quot; command - even if searching the web was an automatic decision. In a less favorable example, Perplexity AI in this same situation falsely identifies as a standard Chrome web browser running on Windows. AI companies defend this under the belief that they are not a &amp;quot;spider&amp;quot;, but rather a &amp;quot;user agent&amp;quot; (like a web browser), when called upon by a user&#039;s request.&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Less legitimate bots use a wide distribution of IP addresses, further reducing options for the website to protect itself. This is in a clear attempt to bypass IP-based request throttling and rate limiting the website may implement. They are also known to ignore HTTP response status codes that indicate a server error ([[wikipedia:HTTP status code#5xx server errors|5xx]]), or warnings that the client needs to slow down ([[wikipedia:HTTP status code#429|429 Too Many Requests]]) or has been entirely blocked ([[wikipedia:HTTP status code#403|403 Forbidden]]).&lt;br /&gt;
&lt;br /&gt;
=== Effect on users ===&lt;br /&gt;
To protect against unethical crawlers, due to concerns of both intellectual property and service disruption, websites adopt practices that affect the experience of real users:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Bot check walls&#039;&#039;&#039;: The user may be required to pass a security check &amp;quot;wall&amp;quot;. While usually automatic for the user, this can affect legitimate bots. When a website protection service such as [[Cloudflare]] is not confident as to whether the visitor is legitimate, it may present a CAPTCHA to be manually filled out. An example is &amp;quot;Google Sorry&amp;quot;, a CAPTCHA wall frequently seen when using Google Search via a VPN.&lt;br /&gt;
* &#039;&#039;&#039;Login walls&#039;&#039;&#039;: Should bots be found to pass CAPTCHA walls, the website may advance to requiring logging in to view content. A major recent example of this is [[YouTube]]&#039;s &amp;quot;Sign in to confirm you&#039;re not a bot&amp;quot; messages.&lt;br /&gt;
* &#039;&#039;&#039;JavaScript requirement&#039;&#039;&#039;: Most websites do not need JavaScript to deliver their content. However, as many scrapers expect content to be found directly in the HTML, it is often an easy workaround to use JavaScript to &amp;quot;insert&amp;quot; the content after the page has loaded. This may reduce the responsiveness of the website, increasing points of failure, and preventing security-conscious users who disable JavaScript from viewing the website.&lt;br /&gt;
* &#039;&#039;&#039;IP address blocking&#039;&#039;&#039;: Blocking IP addresses, especially by blocking entire providers via their [[wikipedia:Autonomous system (Internet)|autonomous system number]], always comes with some risk of blocking legitimate users. Particularly, this may restrict access to users making use of a VPN.&lt;br /&gt;
* &#039;&#039;&#039;Heuristic blocking&#039;&#039;&#039;: Patterns in request headers may give away that the request is being made by an unethical bot, despite attempts to act as a legitimate visitor. Heuristics are imperfect and may block legitimate users, especially those that may use less common browsers.&lt;br /&gt;
&lt;br /&gt;
In rare situations, a website operator may redirect detected bot traffic, such as to download speed test files hosted by ISPs containing multiple gigabytes of random garbage data. This may have the effect of disrupting the bot, but its effectiveness is unknown.&lt;br /&gt;
&lt;br /&gt;
The need to respond to unethical scraping also further consolidates the web into the control of a few large [[wikipedia:Web application firewall|web application firewall]] (WAF) services, most notably [[Cloudflare]], as website owners find themselves otherwise unable to protect their service from being disrupted by such traffic.&lt;br /&gt;
&lt;br /&gt;
=== Case studies ===&lt;br /&gt;
==== Diaspora ====&lt;br /&gt;
On 27 December 2024, the open-source social network project Diaspora noted that 70% of traffic across its infrastructure was in service of AI scrapers.&amp;lt;ref&amp;gt;https://pod.geraspora.de/posts/17342163&amp;lt;/ref&amp;gt; Particularly, the project noted that bots had followed links to crawl every individual edit in their [[wikipedia:MediaWiki|MediaWiki]] instance, causing an exponential increase in the number of unique requests being made.&lt;br /&gt;
&lt;br /&gt;
==== LVFS ====&lt;br /&gt;
The [https://fwupd.org/ Linux Vendor Firmware Service] (LVFS) provides a free central store of firmware updates, such as for UEFI motherboards and SSD controllers. This feature is integrated with many Linux distributions through the &amp;lt;code&amp;gt;fwupd&amp;lt;/code&amp;gt; daemon. For situations where internet access is not permitted, the service allows users to make a local mirror of the entire 100+ GB store.&lt;br /&gt;
&lt;br /&gt;
On 9 January 2025, the project announced that it would introduce a login wall around its mirror feature, citing unnecessary use of its bandwidth.&amp;lt;ref&amp;gt;https://lore.kernel.org/lvfs-announce/zDlhotSvKqnMDfkCKaE_u4-8uvWsgkuj18ifLBwrLN9vWWrIJjrYQ-QfhpY3xuwIXuZgzOVajW99ymoWmijTdngeFRVjM0BxhPZquUzbDfM=@hughsie.com/T/&amp;lt;/ref&amp;gt; Up to 1,000 files may be downloaded per day without logging in. The author later mentioned on Mastodon that the problem appears to be caused by AI scraping.&amp;lt;ref&amp;gt;https://mastodon.social/@hughsie/113871373001227969&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== LWN.net ====&lt;br /&gt;
On 21 January 2025, Jonathan Corbet, maintainer of the Linux news website [[wikipedia:LWN.net|LWN.net]], made the following [https://social.kernel.org/notice/AqJkUigsjad3gQc664 post] to social.kernel.org:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Should you be wondering why @LWN #LWN is occasionally sluggish... since the new year, the DDOS onslaughts from AI-scraper bots has picked up considerably. Only a small fraction of our traffic is serving actual human readers at this point. At times, some bot decides to hit us from hundreds of IP addresses at once, clogging the works. They don&#039;t identify themselves as bots, and robots.txt is the only thing they *don&#039;t* read off the site.&lt;br /&gt;
&lt;br /&gt;
This is beyond unsustainable. We are going to have to put time into deploying some sort of active defenses just to keep the site online. I think I&#039;d even rather be writing about accounting systems than dealing with this cr*p. And it&#039;s not just us, of course; this behavior is going to wreck the net even more than it&#039;s already wrecked.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He later commented:&amp;lt;ref&amp;gt;https://www.heise.de/en/news/AI-bots-paralyze-Linux-news-site-and-others-10252162.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
We do indeed see a kind of pattern. Every IP stays below the threshold for our fuses, but the overload is overwhelming. Any form of active defense will probably have to figure out to block entire subnets instead of individual addresses, and even that might not be enough.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Perplexity AI and news outlets ====&lt;br /&gt;
[[Perplexity AI]], founded in August 2022, is a large language model that aims to be viewed as a general search engine. It encourages users to consume news through its summaries of stories.&lt;br /&gt;
&lt;br /&gt;
On 15 June 2024, Apple blog MacStories found that Perplexity does not follow its own documented policies when accessing content the user requests from the web. In their testing, the scraper pretended to be Chrome 111 running on Windows 10, connecting from an IP address not found in Perplexity&#039;s posted IP address ranges.&amp;lt;ref&amp;gt;https://rknight.me/blog/perplexity-ai-is-lying-about-its-user-agent/&amp;lt;/ref&amp;gt; Two days later, this was corroborated by WIRED.&amp;lt;ref&amp;gt;https://www.wired.com/story/perplexity-is-a-bullshit-machine/&amp;lt;/ref&amp;gt; Perplexity responded by removing its list of IP addresses.&lt;br /&gt;
&lt;br /&gt;
On 27 June 2024, [[Amazon]] announced an investigation into Perplexity AI, citing a terms of service clause requiring bots hosted on Amazon Web Services to honor robots.txt:&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot;&amp;gt;https://www.wired.com/story/aws-perplexity-bot-scraping-investigation/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
&amp;quot;AWS&#039;s terms of service prohibit abusive and illegal activities and our customers are responsible for complying with those terms,&amp;quot; [AWS spokesperson Patrick] Neighorn said in a statement. &amp;quot;We routinely receive reports of alleged abuse from a variety of sources and engage our customers to understand those reports.&amp;quot;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The Apple Wiki ====&lt;br /&gt;
&amp;lt;!-- COI alert: I, [[User:kirb]], am an admin for The Apple Wiki. Hopefully this is neutral enough? --&amp;gt;&lt;br /&gt;
The Apple Wiki, a MediaWiki instance that documents internal details of Apple&#039;s hardware and software, holds more than 50,000 articles. On 2 August 2024, with a repeat occurrence on 5 January 2025, the service was disrupted by scraping efforts.&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/The_Apple_Wiki:Community_portal#Bot_traffic_abuse&amp;lt;/ref&amp;gt; The wiki contains a considerable amount of information that is scraped by legitimate security research tools, making it difficult for the website to block abusive requests. Efforts to block unethical scraping and protect the wiki have disrupted these legitimate tools. The large article count, combined with the more than 280,000 total edits, create an untenable situation where it is simply not possible to scrape the website without causing significant service disruption.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=6119</id>
		<title>Artificial intelligence</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=6119"/>
		<updated>2025-01-28T03:47:52Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Adding rest of the article&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Artificial intelligence&#039;&#039;&#039; (AI) is a field of computer science producing software that aims to ultimately replace all manual labor. AI is not a new concept - it has been of interest as early as the 1950s. Since the November 2022 launch of [[ChatGPT]], [[wikipedia:Large language model|large language model]] (LLM) chatbots have been a main focus of the industry, with billions of dollars in funding allocated to producing more &amp;quot;intelligent&amp;quot; LLMs. Also a significant focus are [[wikipedia:Text-to-image model|text-to-image models]], which &amp;quot;draw&amp;quot; an image using written instructions, and [[wikipedia:Text-to-video model|text-to-video models]], which extend the text-to-image concept across several smooth video frames.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Generative artificial intelligence|Generative artificial intelligence]] models are trained through vast amounts of existing human-generated content. Using the example of an LLM, by learning about common trends in sentence structure, the model is able to form complete sentences and show artificial &amp;quot;knowledge&amp;quot; of a topic. The artificial nature may cause [[wikipedia:Hallucination (artificial intelligence)|hallucination]] through confidently-written, but mostly or entirely incorrect, output.&lt;br /&gt;
&lt;br /&gt;
The current well-funded, lucrative industry of artificial intelligence tools has resulted in rampant unethical use of content. Startups intending to produce AI services have been scraping the internet for content to train future models at a concerning pace, with no regard for copyright law, as members of the field are concerned that they are approaching the limit of publicly-available content to train from.&amp;lt;ref&amp;gt;https://observer.com/2024/12/openai-cofounder-ilya-sutskever-ai-data-peak/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Unethical website scraping ==&lt;br /&gt;
While &amp;quot;mainstream&amp;quot; companies such as [[OpenAI]], [[Anthropic]], and [[Meta]] appear to correctly follow industry-standard practice for web crawlers, others ignore them, causing [[wikipedia:Denial-of-service attack|distributed denial of service attacks]] which damage access to freely-accessible websites. This is particularly an issue for websites that are large or contain many dynamic links.&lt;br /&gt;
&lt;br /&gt;
Ethical website scrapers, known as &amp;quot;spiders&amp;quot; that crawl the web, follow a certain set of minimum guidelines. Specifically, they follow [[wikipedia:robots.txt|robots.txt]], a text file found at the root of a domain that indicates:&lt;br /&gt;
&lt;br /&gt;
* Paths bots are allowed to index&lt;br /&gt;
* Paths bots should not index&lt;br /&gt;
* How long the bot should wait in between requests to the server, to reduce load&lt;br /&gt;
* The [[wikipedia:Sitemaps|sitemap]] of the website&#039;s content&lt;br /&gt;
&lt;br /&gt;
These rules are typically configured for all bots, with minor adjustments made to individual bots as needed. Additionally, specific web pages may use the [[wikipedia:noindex|robots meta tag]] to control use of their output.&lt;br /&gt;
&lt;br /&gt;
While it is good practice for a bot to respect robots.txt, there is no requirement for it, and there is no punishment for not following a website&#039;s wishes. It is additionally standard practice, but in no way enforced, that bots use a [[wikipedia:User-Agent header|User-Agent header]] to uniquely identify itself. This allows a website operator to observe a bot&#039;s traffic patterns, potentially blocking the bot outright if its scraping is not desirable. The header also typically contains a URL or email address that can be used to contact the operator in case of anomalies observed in its traffic.&lt;br /&gt;
&lt;br /&gt;
Unethical AI scraper bots do not follow robots.txt - in fact, they may not even request this file at all. They typically completely ignore it, instead opting to start from an entry point such as the root home page (&amp;lt;code&amp;gt;/&amp;lt;/code&amp;gt;), working its way through an exponentially growing list of links as it finds them, with little to no delay between requests. The bots use false User-Agent header strings that would correspond to real web browsers on desktop or mobile operating systems - blocking them would also block legitimate users, or at least legitimate users on VPNs.&lt;br /&gt;
&lt;br /&gt;
Some AI services opt to use separate User-Agent strings, potentially also ignoring robots.txt, when a request is made through user command rather than as part of model training. For example, ChatGPT identifies itself as &amp;lt;code&amp;gt;ChatGPT-User&amp;lt;/code&amp;gt; rather than its standard &amp;lt;code&amp;gt;OpenAI&amp;lt;/code&amp;gt; when it uses the &amp;quot;search the web&amp;quot; command - even if searching the web was an automatic decision. In a less favorable example, Perplexity AI in this same situation falsely identifies as a standard Chrome web browser running on Windows. AI companies defend this under the belief that they are not a &amp;quot;spider&amp;quot;, but rather a &amp;quot;user agent&amp;quot; (like a web browser), when called upon by a user&#039;s request.&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Less legitimate bots use a wide distribution of IP addresses, further reducing options for the website to protect itself. This is in a clear attempt to bypass IP-based request throttling and rate limiting the website may implement. They are also known to ignore HTTP response status codes that indicate a server error ([[wikipedia:HTTP status code#5xx server errors|5xx]]), or warnings that the client needs to slow down ([[wikipedia:HTTP status code#429|429 Too Many Requests]]) or has been entirely blocked ([[wikipedia:HTTP status code#403|403 Forbidden]]).&lt;br /&gt;
&lt;br /&gt;
=== Effect on users ===&lt;br /&gt;
To protect against unethical crawlers, due to concerns of both intellectual property and service disruption, websites adopt practices that affect the experience of real users:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Bot check walls&#039;&#039;&#039;: The user may be required to pass a security check &amp;quot;wall&amp;quot;. While usually automatic for the user, this can affect legitimate bots. When a website protection service such as [[Cloudflare]] is not confident as to whether the visitor is legitimate, it may present a CAPTCHA to be manually filled out. An example is &amp;quot;Google Sorry&amp;quot;, a CAPTCHA wall frequently seen when using Google Search via a VPN.&lt;br /&gt;
* &#039;&#039;&#039;Login walls&#039;&#039;&#039;: Should bots be found to pass CAPTCHA walls, the website may advance to requiring logging in to view content. A major recent example of this is [[YouTube]]&#039;s &amp;quot;Sign in to confirm you&#039;re not a bot&amp;quot; messages.&lt;br /&gt;
* &#039;&#039;&#039;JavaScript requirement&#039;&#039;&#039;: Most websites do not need JavaScript to deliver their content. However, as many scrapers expect content to be found directly in the HTML, it is often an easy workaround to use JavaScript to &amp;quot;insert&amp;quot; the content after the page has loaded. This may reduce the responsiveness of the website, increasing points of failure, and preventing security-conscious users who disable JavaScript from viewing the website.&lt;br /&gt;
* &#039;&#039;&#039;IP address blocking&#039;&#039;&#039;: Blocking IP addresses, especially by blocking entire providers via their [[wikipedia:Autonomous system (Internet)|autonomous system number]], always comes with some risk of blocking legitimate users. Particularly, this may restrict access to users making use of a VPN.&lt;br /&gt;
* &#039;&#039;&#039;Heuristic blocking&#039;&#039;&#039;: Patterns in request headers may give away that the request is being made by an unethical bot, despite attempts to act as a legitimate visitor. Heuristics are imperfect and may block legitimate users, especially those that may use less common browsers.&lt;br /&gt;
&lt;br /&gt;
In rare situations, a website operator may redirect detected bot traffic, such as to download speed test files hosted by ISPs containing multiple gigabytes of random garbage data. This may have the effect of disrupting the bot, but its effectiveness is unknown.&lt;br /&gt;
&lt;br /&gt;
The need to respond to unethical scraping also further consolidates the web into the control of a few large [[wikipedia:Web application firewall|web application firewall]] (WAF) services, most notably [[Cloudflare]], as website owners find themselves otherwise unable to protect their service from being disrupted by such traffic.&lt;br /&gt;
&lt;br /&gt;
=== Case studies ===&lt;br /&gt;
==== Diaspora ====&lt;br /&gt;
On 27 December 2024, the open-source social network project Diaspora noted that 70% of traffic across its infrastructure was in service of AI scrapers.&amp;lt;ref&amp;gt;https://pod.geraspora.de/posts/17342163&amp;lt;/ref&amp;gt; Particularly, the project noted that bots had followed links to crawl every individual edit in their [[wikipedia:MediaWiki|MediaWiki]] instance, causing an exponential increase in the number of unique requests being made.&lt;br /&gt;
&lt;br /&gt;
==== LVFS ====&lt;br /&gt;
The [https://fwupd.org/ Linux Vendor Firmware Service] (LVFS) provides a free central store of firmware updates, such as for UEFI motherboards and SSD controllers. This feature is integrated with many Linux distributions through the &amp;lt;code&amp;gt;fwupd&amp;lt;/code&amp;gt; daemon. For situations where internet access is not permitted, the service allows users to make a local mirror of the entire 100+ GB store.&lt;br /&gt;
&lt;br /&gt;
On 9 January 2025, the project announced that it would introduce a login wall around its mirror feature, citing unnecessary use of its bandwidth.&amp;lt;ref&amp;gt;https://lore.kernel.org/lvfs-announce/zDlhotSvKqnMDfkCKaE_u4-8uvWsgkuj18ifLBwrLN9vWWrIJjrYQ-QfhpY3xuwIXuZgzOVajW99ymoWmijTdngeFRVjM0BxhPZquUzbDfM=@hughsie.com/T/&amp;lt;/ref&amp;gt; Up to 1,000 files may be downloaded per day without logging in. The author later mentioned on Mastodon that the problem appears to be caused by AI scraping.&amp;lt;ref&amp;gt;https://mastodon.social/@hughsie/113871373001227969&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== LWN.net ====&lt;br /&gt;
On 21 January 2025, Jonathan Corbet, maintainer of the Linux news website [[wikipedia:LWN.net|LWN.net]], made the following [https://social.kernel.org/notice/AqJkUigsjad3gQc664 post] to social.kernel.org:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Should you be wondering why @LWN #LWN is occasionally sluggish... since the new year, the DDOS onslaughts from AI-scraper bots has picked up considerably. Only a small fraction of our traffic is serving actual human readers at this point. At times, some bot decides to hit us from hundreds of IP addresses at once, clogging the works. They don&#039;t identify themselves as bots, and robots.txt is the only thing they *don&#039;t* read off the site.&lt;br /&gt;
&lt;br /&gt;
This is beyond unsustainable. We are going to have to put time into deploying some sort of active defenses just to keep the site online. I think I&#039;d even rather be writing about accounting systems than dealing with this cr*p. And it&#039;s not just us, of course; this behavior is going to wreck the net even more than it&#039;s already wrecked.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He later commented:&amp;lt;ref&amp;gt;https://www.heise.de/en/news/AI-bots-paralyze-Linux-news-site-and-others-10252162.html&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
We do indeed see a kind of pattern. Every IP stays below the threshold for our fuses, but the overload is overwhelming. Any form of active defense will probably have to figure out to block entire subnets instead of individual addresses, and even that might not be enough.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Perplexity AI and news outlets ====&lt;br /&gt;
[[Perplexity AI]], founded in August 2022, is a large language model that aims to be viewed as a general search engine. It encourages users to consume news through its summaries of stories.&lt;br /&gt;
&lt;br /&gt;
On 15 June 2024, Apple blog MacStories found that Perplexity does not follow its own documented policies when accessing content the user requests from the web. In their testing, the scraper pretended to be Chrome 111 running on Windows 10, connecting from an IP address not found in Perplexity&#039;s posted IP address ranges.&amp;lt;ref&amp;gt;https://rknight.me/blog/perplexity-ai-is-lying-about-its-user-agent/&amp;lt;/ref&amp;gt; Two days later, this was corroborated by WIRED.&amp;lt;ref&amp;gt;&amp;lt;!-- Can&#039;t link the article directly because the URL has a word that trips the swearing filter 😉 --&amp;gt;&amp;lt;/ref&amp;gt; Perplexity responded by removing its list of IP addresses.&lt;br /&gt;
&lt;br /&gt;
On 27 June 2024, [[Amazon]] announced an investigation into Perplexity AI, citing a terms of service clause requiring bots hosted on Amazon Web Services to honor robots.txt:&amp;lt;ref name=&amp;quot;perplexity-aws&amp;quot;&amp;gt;https://www.wired.com/story/aws-perplexity-bot-scraping-investigation/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
&amp;quot;AWS&#039;s terms of service prohibit abusive and illegal activities and our customers are responsible for complying with those terms,&amp;quot; [AWS spokesperson Patrick] Neighorn said in a statement. &amp;quot;We routinely receive reports of alleged abuse from a variety of sources and engage our customers to understand those reports.&amp;quot;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== The Apple Wiki ====&lt;br /&gt;
&amp;lt;!-- COI alert: I, [[User:kirb]], am an admin for The Apple Wiki. Hopefully this is neutral enough? --&amp;gt;&lt;br /&gt;
The Apple Wiki, a MediaWiki instance that documents internal details of Apple&#039;s hardware and software, holds more than 50,000 articles. On 2 August 2024, with a repeat occurrence on 5 January 2025, the service was disrupted by scraping efforts.&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/The_Apple_Wiki:Community_portal#Bot_traffic_abuse&amp;lt;/ref&amp;gt; The wiki contains a considerable amount of information that is scraped by legitimate security research tools, making it difficult for the website to block abusive requests. Efforts to block unethical scraping and protect the wiki have disrupted these legitimate tools. The large article count, combined with the more than 280,000 total edits, create an untenable situation where it is simply not possible to scrape the website without causing significant service disruption.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=6117</id>
		<title>Artificial intelligence</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Artificial_intelligence&amp;diff=6117"/>
		<updated>2025-01-28T03:46:35Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;&amp;#039;&amp;#039;&amp;#039;Artificial intelligence&amp;#039;&amp;#039;&amp;#039; (AI) is a field of computer science producing software that aims to ultimately replace all manual labor. AI is not a new concept - it has been of interest as early as the 1950s. Since the November 2022 launch of ChatGPT, large language model (LLM) chatbots have been a main focus of the industry, with billions of dollars in funding allocated to producing more &amp;quot;intelligent&amp;quot; LLMs. Also a significant focus...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Artificial intelligence&#039;&#039;&#039; (AI) is a field of computer science producing software that aims to ultimately replace all manual labor. AI is not a new concept - it has been of interest as early as the 1950s. Since the November 2022 launch of [[ChatGPT]], [[wikipedia:Large language model|large language model]] (LLM) chatbots have been a main focus of the industry, with billions of dollars in funding allocated to producing more &amp;quot;intelligent&amp;quot; LLMs. Also a significant focus are [[wikipedia:Text-to-image model|text-to-image models]], which &amp;quot;draw&amp;quot; an image using written instructions, and [[wikipedia:Text-to-video model|text-to-video models]], which extend the text-to-image concept across several smooth video frames.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Generative artificial intelligence|Generative artificial intelligence]] models are trained through vast amounts of existing human-generated content. Using the example of an LLM, by learning about common trends in sentence structure, the model is able to form complete sentences and show artificial &amp;quot;knowledge&amp;quot; of a topic. The artificial nature may cause [[wikipedia:Hallucination (artificial intelligence)|hallucination]] through confidently-written, but mostly or entirely incorrect, output.&lt;br /&gt;
&lt;br /&gt;
The current well-funded, lucrative industry of artificial intelligence tools has resulted in rampant unethical use of content. Startups intending to produce AI services have been scraping the internet for content to train future models at a concerning pace, with no regard for copyright law, as members of the field are concerned that they are approaching the limit of publicly-available content to train from.&amp;lt;ref&amp;gt;https://observer.com/2024/12/openai-cofounder-ilya-sutskever-ai-data-peak/&amp;lt;/ref&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=5365</id>
		<title>Apple App Store</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=5365"/>
		<updated>2025-01-25T07:27:05Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Clearer wording about Hey, fix an oopsie sentence&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:App Store (iOS).svg|thumb|150px]]&lt;br /&gt;
&lt;br /&gt;
Apple uses several technical measures to protect their App Store ecosystem and prevent consumer choice. They are good at obscuring their intentions with technical roadblocks, while typically citing security reasons for them - assuming the public even recognizes what is going on. This actively hurts the ability for lawmakers to have an accurate understanding, so they can consider applying legislative pressure.&lt;br /&gt;
&lt;br /&gt;
A never-ending demand for a cut of every sale of a digital product, ranging from game currency, to supporting content creators,&amp;lt;ref name=&amp;quot;patreon&amp;quot;&amp;gt;https://www.theverge.com/2024/8/12/24218629/patreon-membership-ios-30-percent-apple-tax&amp;lt;/ref&amp;gt; to booking a Zoom call with a local business,&amp;lt;ref name=&amp;quot;facebook&amp;quot;&amp;gt;https://www.reuters.com/article/us-facebook-apple-exclusive/exclusive-facebook-says-apple-rejected-its-attempt-to-tell-users-about-app-store-fees-idUSKBN25O042/&amp;lt;/ref&amp;gt; hurts the ability for app developers to innovate. These developers, working hard and pulling countless hours to build a quality app, always need to take Apple&#039;s (and [[Google]]&#039;s) demands into account - specifically, between 15% and 30% of their revenue. This is revenue that can be reinvested into the app, but instead must be earmarked for the platform they are &#039;&#039;&#039;required&#039;&#039;&#039; to use to reach their customers.&lt;br /&gt;
&lt;br /&gt;
Because this is a clear problem, several governments, including South Korea,&amp;lt;ref&amp;gt;https://www.reuters.com/technology/skorea-approves-rules-app-store-law-targeting-apple-google-2022-03-08/&amp;lt;/ref&amp;gt; Japan,&amp;lt;ref&amp;gt;https://www.theregister.com/2024/06/13/japan_smartphone_software_law/&amp;lt;/ref&amp;gt; the European Union,&amp;lt;ref&amp;gt;[[wikipedia:Digital Markets Act|Digital Markets Act]]&amp;lt;/ref&amp;gt; the United Kingdom,&amp;lt;ref&amp;gt;https://www.gov.uk/cma-cases/investigation-into-apple-appstore&amp;lt;/ref&amp;gt; Australia,&amp;lt;ref&amp;gt;https://www.accc.gov.au/media-release/dominance-of-apple-and-googles-app-stores-impacting-competition-and-consumers&amp;lt;/ref&amp;gt; as well as the US and a handful of states,&amp;lt;ref&amp;gt;[[wikipedia:Open App Markets Act|Open App Markets Act]]&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://www.congress.gov/bill/118th-congress/senate-bill/5364/text/is&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;doj&amp;quot;&amp;gt;https://apnews.com/article/apple-antitrust-monopoly-app-store-justice-department-822d7e8f5cf53a2636795fcc33ee1fc3&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://azcapitoltimes.com/news/2021/02/19/its-time-to-free-ourselves-from-big-tech-monopoly/&amp;lt;/ref&amp;gt; have opened investigations into anti-competitive practices, or considered or already passed legislation to force &amp;quot;gatekeeper platforms&amp;quot; such as Apple to be more reasonable with third-party developers.&lt;br /&gt;
&lt;br /&gt;
This being a major threat to Apple&#039;s revenue stream (interestingly, one they claim to be unsure is profitable&amp;lt;ref&amp;gt;https://9to5mac.com/2024/04/17/app-store-is-profitable-apple-notes/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://9to5mac.com/2025/01/17/apple-denies-app-store-profit-margin-is-75-claims-to-have-no-clue/&amp;lt;/ref&amp;gt;), they have responded with practices such as geoblocking certain operating system functionality based on physical location,&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/Eligibility&amp;lt;/ref&amp;gt; misrepresenting/overstating risks, and using existing, trusted terms to describe unreasonably difficult to use systems.&lt;br /&gt;
&lt;br /&gt;
==Background info==&lt;br /&gt;
Important terms you&#039;ll run into in this article:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;[[wikipedia:Sandbox (computer security)|Sandbox]]&#039;&#039;&#039;: Reduces exposure of the user&#039;s device/data to security risks, by reducing what an app is allowed to do.&lt;br /&gt;
*&#039;&#039;&#039;[https://theapplewiki.com/wiki/Entitlements Entitlements]&#039;&#039;&#039;: Apple&#039;s method of &amp;quot;poking holes&amp;quot; in the sandbox, to give the app more permissions. Some are available to developers, while many are only available to Apple.&lt;br /&gt;
*&#039;&#039;&#039;[[wikipedia:Digital Markets Act|Digital Markets Act]]&#039;&#039;&#039;: The European Union&#039;s fairly sweeping recent regulations against forcing companies they classify as &amp;quot;gatekeepers&amp;quot; to play nice, giving smaller businesses access to software/hardware features they&#039;ve historically reserved for their own use.&lt;br /&gt;
&lt;br /&gt;
==In-app purchases==&lt;br /&gt;
Apple has been collecting users&#039; credit card numbers since opening the iTunes Store in 2004. The opening of the App Store in 2008, followed by the introduction of in-app purchases (IAPs) in 2009, gave iPhone app developers the opportunity to sell app features to users. The IAP system is provided as a developer framework named [https://developer.apple.com/storekit/ StoreKit]. Apps and their in-app purchases are managed through a dashboard named [https://developer.apple.com/app-store-connect/ App Store Connect]. App sales have eclipsed iTunes Store sales, and are now a primary focus of Apple&#039;s Media Services division.&lt;br /&gt;
&lt;br /&gt;
Apple requires every purchase of a digital good or service in an app to use their in-app purchase system. This may seem reasonable, because the customer may inevitably call Apple support, demanding a refund for an app they have issues with. Apple would rather give that refund and leave the customer with a positive support experience, than to provide a messy process involving contacting a third-party, whose customer service is likely nowhere near the same experience.&lt;br /&gt;
&lt;br /&gt;
App Store purchase fees are between 15% and 30%. In September 2016, Apple expanded subscriptions to be available to any type of app, also introducing a 15% discount incentive when the user has already subscribed for a year.&amp;lt;ref&amp;gt;https://www.theverge.com/2016/9/2/12774758/apple-developers-app-store-new-subscription-rules&amp;lt;/ref&amp;gt; In November 2020, Apple introduced a reduced 15% fee for app developers with revenue below $1 million per year, with exceptions such as for games.&amp;lt;ref&amp;gt;https://tidbits.com/2020/11/18/apple-drops-app-store-commission-to-15-for-small-developers/&amp;lt;/ref&amp;gt; Otherwise, the fee is 30%. In the 2008 announcement of the App Store, Apple considered this a reasonable, industry-standard fee. However, the way we use apps has significantly evolved since 2009 - the world has shifted to heavily rely on mobile apps, which have also evolved into more complex and sustainable business models than a simple one-time purchase.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Stripe, Inc.|Stripe]], a very popular platform used for payments on the web, uses a base fee of 2.9% plus a fixed $0.30 in the United States.&amp;lt;ref&amp;gt;https://stripe.com/pricing&amp;lt;/ref&amp;gt; With add-on services, before considering volume discounts, a Stripe transaction may rather have a cost of 6.4% + $1.10.&amp;lt;ref&amp;gt;Calculated from base fee (2.9% + $0.30) + international card (1.5%) + adaptive pricing (2%) + international payment methods ($0.80), as of January 2025&amp;lt;/ref&amp;gt; Competing payments services have fees close or identical to this. &#039;&#039;&#039;The in-app purchase system does not provide sufficient value to justify considerably higher fees than alternative payment platforms.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The App Store system poorly handles secondary marketplaces of digital services that exist within the primary App Store marketplace, such as Patreon. Apple, however, still requires companies in the business of selling digital services to use this inadequate system. This requires the app to account for Apple&#039;s fee, which is significant enough to often warrant increasing prices, and to follow rules even if they do not make sense for the nature of service they are providing. Apple has frequently been found in disputes with such apps. This injects extra complication at no benefit to the marketplace, the creator, or the customer - only to Apple, who has little to no involvement after delivering the initial app download to the user&#039;s phone. The significant fee also often drives app developers to consider building their app around an advertising model instead, creating privacy concerns.&lt;br /&gt;
&lt;br /&gt;
Additionally, the 15% small businesses fee discount is judged based on the app&#039;s overall turnover, and is not based on individual creators in the app&#039;s marketplace. An app that turns over $1 million per year by providing services to creators that individually make less than $1 million per year does not have the opportunity to use the discount.&lt;br /&gt;
&lt;br /&gt;
Apple, often together with Google, use lobbying efforts in the United States and other countries in an attempt to minimize the issues. &amp;quot;ACT | The App Association&amp;quot;, pitched as an association of independent small business app developers, is at least 50% funded by Apple, and does not list its claimed 2,000 members.&amp;lt;ref&amp;gt;http://www.fosspatents.com/2021/10/not-class-act-so-called-app-association.html&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://www.fosspatents.com/2022/09/vast-majority-of-act-app-associations.html&amp;lt;/ref&amp;gt; In March 2024, the United States Department of Justice along with 16 state attorneys-general filed a lawsuit against Apple, including an accusation that the company &amp;quot;extracts more money from consumers, developers, content creators, artists, publishers, small businesses, and merchants, among others&amp;quot;.&amp;lt;ref name=&amp;quot;doj&amp;quot; /&amp;gt; The future of this lawsuit is unclear as of January 2025.&lt;br /&gt;
&lt;br /&gt;
Despite criticism of Apple forcing their fee into transactions with small businesses and creators on [[#Patreon|Patreon]], [[#Facebook online events|Facebook]], and similar platforms, on 23 January 2025, Apple announced the Advanced Commerce API. It &amp;quot;support[s] developers&#039; evolving business models - such as exceptionally large content catalogs, creator experiences, and subscriptions with optional add-ons&amp;quot;.&amp;lt;ref&amp;gt;https://developer.apple.com/news/?id=yxy958ya&amp;lt;/ref&amp;gt; While positioned as a way for such businesses to save development time and avoid ongoing costs by building on top of Apple&#039;s mature payments platform, its use is in fact necessary for these businesses to work within the App Store guidelines, as seen in cases outlined below. The feature requires submitting the app&#039;s business model to Apple for approval. This continues a trend of requiring Apple&#039;s consent to conduct business in a place users have been trained to expect it.&lt;br /&gt;
&lt;br /&gt;
Given Apple&#039;s strong incentives, and a ticking clock as legal pressure builds, it is not hard to find stories from app developers regarding poor experiences with Apple&#039;s app review process.&lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;This list is extremely incomplete. Please add examples if you know of any.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Facebook online events===&lt;br /&gt;
In August 2020, in response to the COVID-19 pandemic, Facebook introduced the ability for small businesses to accept an entrance fee for events. Previously, Facebook would only act as a way to RSVP for the event - the organizer must use a third-party event ticketing system to collect fees. The company pledged to not collect any fee on event sales &amp;quot;until 2023&amp;quot;.&amp;lt;ref&amp;gt;https://about.fb.com/news/2020/08/paid-online-events/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Apple disagreed, requiring the feature to use the in-app purchases system. This introduced Apple&#039;s 30% fee. As this increases the price the user pays, with no benefit to the small business the user intended to support, the fee was displayed as a line item in checkout. Apple did not accept this disclosure of the fee, referring to it as &amp;quot;irrelevant&amp;quot;.&amp;lt;ref name=&amp;quot;facebook&amp;quot; /&amp;gt; Facebook was allowed to compromise on displaying the fee, but &#039;&#039;without&#039;&#039; indicating that it is specifically an App Store fee.&lt;br /&gt;
&lt;br /&gt;
===HEY===&lt;br /&gt;
HEY.com is a paid webmail provider launched in June 2020 by long-time software company [[wikipedia:37signals|37signals]], specializing in inbox organization tools.&lt;br /&gt;
&lt;br /&gt;
After successfully launching the initial version of the app on the App Store, the company announced that an update was rejected due to a complaint about the business model. The app did not intend to support in-app purchases - instead, the user is expected to already have an account with the service. Apple did not like this arrangement, and demanded the company build an in-app subscription option. The company argued that they are being held to a different set of rules than apps such as [[Netflix]], whose app does not provide any way to purchase a subscription.&amp;lt;ref&amp;gt;https://www.theverge.com/2020/6/16/21293419/hey-apple-rejection-ios-app-store-dhh-gangsters-antitrust&amp;lt;/ref&amp;gt; After a suggestion from Apple executive Phil Schiller in the media, HEY introduced a 14 day free trial mode, which was approved.&amp;lt;ref&amp;gt;https://www.hey.com/apple/path/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://techcrunch.com/2020/06/18/interview-apples-schiller-says-position-on-hey-app-is-unchanged-and-no-rules-changes-are-imminent/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Patreon===&lt;br /&gt;
In August 2024, [[Patreon]] announced a change in arrangement with Apple for its App Store app. From November 2024, subscriptions started from the iOS app would be required to use the in-app purchase system, bypassing Patreon&#039;s own long-standing payments practices.&amp;lt;ref&amp;gt;https://news.patreon.com/articles/understanding-apple-requirements-for-patreon&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;patreon&amp;quot; /&amp;gt; This change does not affect the Android app.&lt;br /&gt;
&lt;br /&gt;
By forcing Patreon out of the payments pipeline, certain payment models are no longer available to users of Patreon&#039;s iOS app. Creators who rely on the &amp;quot;per-creation&amp;quot; payment model, as opposed to the standard &amp;quot;per-month&amp;quot;, can no longer be subscribed to from the app. The app is also not able to support the &amp;quot;first-of-the-month&amp;quot; model, where payments from all subscribers are collected on the first day of the month, rather than every 30 days since each member&#039;s day of subscription. The price must also be rounded to a price tier supported by Apple.&lt;br /&gt;
&lt;br /&gt;
Patreon provides creators with the choice to increase their prices by 30% in the iOS app, or to keep the same prices but forfeit 30% to Apple. Creators frequently remind potential supporters to not use the Patreon iOS app, adding extra inconvenience to those wanting to support the work of small creators.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed&amp;quot; heights=&amp;quot;500px&amp;quot;&amp;gt;&lt;br /&gt;
File:Patreon iOS app pricing options - fee on top.png|&amp;quot;Maintain earnings and cover Apple&#039;s fee by increasing prices in iOS app&amp;quot; (Recommended)&lt;br /&gt;
File:Patreon iOS app pricing options - absorb fee.png|&amp;quot;Keep prices in the iOS app the same and cover Apple&#039;s fee yourself&amp;quot;&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A similar case occurred with the app Fanhouse in 2021.&amp;lt;ref&amp;gt;https://twitter.com/jasminericegirl/status/1402691047940100100&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Twitter===&lt;br /&gt;
In August 2021, [[Twitter]] introduced a feature named Super Follows (now Subscriptions), in which a user can pay a subscription fee to access more of a creator&#039;s content. For each user who enables Subscriptions, Twitter must submit a new in-app purchase SKU to the App Store, which will become available with the next update to the app.&amp;lt;ref&amp;gt;https://twitter.com/wongmjane/status/1433372120080261120&amp;lt;/ref&amp;gt; This, of course, is subject to the 30% fee. At the time of writing in January 2025, viewing the App Store listing reveals Elon Musk&#039;s $4.00 subscription as the fourth most popular IAP item.&lt;br /&gt;
&lt;br /&gt;
==Notarization==&lt;br /&gt;
Since 2015, Apple expects all Mac apps to be &amp;quot;notarized&amp;quot;. This is a preliminary, automated malware check, which upon passing, provides a notary certificate that gets &amp;quot;stapled&amp;quot; to the app. Apple&#039;s explanation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Notarization of macOS software is not App Review. The Apple notary service is an automated system that scans your software for malicious content, checks for code-signing issues, and returns the results to you quickly. If there are no issues, the notary service generates a ticket for you to staple to your software; the notary service also publishes that ticket online where Gatekeeper can find it.&amp;lt;ref&amp;gt;https://developer.apple.com/documentation/security/notarizing-macos-software-before-distribution&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whether this is actually a better approach than used by Windows antivirus, where they find out about new malware samples only when they end up on a user&#039;s computer, is a separate topic.&lt;br /&gt;
&lt;br /&gt;
To comply with the DMA&#039;s regulations on app marketplaces, Apple created a new channel of releasing apps outside of the iOS App Store. Apps go through a notarization process. But the process is definitely &#039;&#039;not&#039;&#039; notarization. The name is intentionally being abused, by contrast to notarization on macOS, to make you believe it is something other than the existing App Review system. Despite the pain some developers and users have with it, notarization on macOS has always been considered a net positive. It made sense to take advantage of its reputation for the entirely different &amp;quot;notarization&amp;quot; on iOS.&lt;br /&gt;
&lt;br /&gt;
See for yourself - view the [https://developer.apple.com/app-store/review/guidelines/ App Review Guidelines] and tick &amp;quot;Show Notarization Review Guidelines Only&amp;quot;. While most rules are knocked out by this, a good number of them are still in place. These apps are still reviewed and tested by the App Review team, must have a full product listing in App Store Connect, and can be outright rejected - all in the same way as an App Store app.&lt;br /&gt;
&lt;br /&gt;
By contrast, all that is required for notarization on macOS is for your app to not be malware. You submit it to an automated system that approves it within minutes. &#039;&#039;&#039;You don&#039;t need to convince Apple your app is worthy of existing on their platform.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The point of macOS notarization is that Apple has a record of all binaries that are intended for wide distribution on macOS, and can review them both in advance and on a regular basis for known malware/common malware patterns. Say a malware app manages to initially get through, when Apple finds out, they can go back in the notary records and find every sample of that malware to analyze and block. This is purely a technical process, managed by skilled security researchers, while iOS app review and &amp;quot;notarization&amp;quot; is a business process, managed by workers who have been given a checklist of violations to look for.&lt;br /&gt;
&lt;br /&gt;
Apple is retaining complete control over what&#039;s allowed to run on iOS. On macOS, you can choose to run apps that have not been notarized (even though the process to bypass the warning is intentionally difficult). On iOS, you never get even that option. What Apple created is the App Store but with more steps. It still goes on the App Store, just hidden so it can only be installed by the third-party store it&#039;s tied to.&lt;br /&gt;
&lt;br /&gt;
*Mysk: &amp;quot;iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens.&amp;quot;&amp;lt;ref&amp;gt;https://twitter.com/mysk_co/status/1806638308455256242&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==JIT==&lt;br /&gt;
Safari is allowed to [[wikipedia:Just-in-time compilation|just-in-time]] compile code worldwide. The super short version of what that means: it can run JavaScript code &#039;&#039;really fast&#039;&#039;. All browsers, and other runtimes like Microsoft .NET, Java, Lua use this. Ok, fine, it&#039;s the system web browser, it&#039;s very carefully written to be secure, and it&#039;s important to the platform to be doing well in performance benchmarks and all that.&lt;br /&gt;
&lt;br /&gt;
Apple&#039;s [https://apps.apple.com/app/swift-playgrounds/id908519492 Playgrounds] app on iPad is also allowed to JIT. It bundles Apple&#039;s [[wikipedia:Swift (programming language)|Swift]] compiler, and shares backend code with the version of Playgrounds found in [[wikipedia:Xcode|Xcode]].&lt;br /&gt;
&lt;br /&gt;
Competing apps like Pythonista (a Python IDE), emulators like Delta and UTM, and terminal environments like iSH, are not allowed to JIT. As such, they need to rely on inferior performance, potentially from an entirely separate implementation of their compiler/interpreter that may be less proven, because the JIT-less implementation doesn&#039;t need to exist on any other platform.&lt;br /&gt;
&lt;br /&gt;
Likely the most clear example is UTM SE. UTM is a port of the [[wikipedia:QEMU|QEMU]] emulator to iOS, allowing you to run desktop OSes (Linux, Windows 98, XP, classic Mac OS, etc). iPhone hardware is very capable these days and it runs impressively well, &#039;&#039;if&#039;&#039; you use a hack to enable JIT (which Apple has now patched). &amp;quot;SE&amp;quot; stands for &amp;quot;slow edition&amp;quot; - yes, really. If you compare the true version of UTM to the App Store UTM SE app, you &#039;&#039;will&#039;&#039; feel the loss in performance. It&#039;s impressive UTM even got to be on the App Store at all, and the DMA is to thank for it. But Apple is still holding the line on allowing JIT to apps that require that performance.&lt;br /&gt;
&lt;br /&gt;
While UTM SE releasing at all might seem like a pathway to getting Firefox and Chrome &amp;quot;slow editions&amp;quot; on the App Store, browser engines other than the built-in Apple WebKit/JavaScriptCore are still outlawed.&amp;lt;ref&amp;gt;https://developer.apple.com/app-store/review/guidelines/#2.5.6&amp;lt;/ref&amp;gt; In the EU, Apple has blessed web browser JavaScript engines with the option to use JIT. The app must be approved for an entitlement, and then must work within APIs provided by Apple for it. As of January 2025, no browsers have been released using this. We were all anticipating proper competition around web browsers on iOS, but almost a year later, we have nothing. Mozilla has [https://www.theverge.com/2024/1/26/24052067/mozilla-apple-ios-browser-rules-firefox discussed] why.&lt;br /&gt;
&lt;br /&gt;
==Sandbox==&lt;br /&gt;
You might not like app sandboxing, but it&#039;s a powerful security feature used on all modern platforms. The reality is very few apps need more than a few basic permissions. [[wikipedia:Flatpak|Flatpak]] on Linux also sandboxes apps, and it seems to work great! Still, it&#039;s completely fair that there should be processes for doing things beyond what the sandbox allows. You see some of this with permission prompts - does a flashlight app &#039;&#039;really&#039;&#039; need access to your contacts? (Apple has been burned by apps abusing user data before the current permission system was built out.&amp;lt;ref&amp;gt;https://www.theverge.com/2012/2/14/2798008/ios-apps-and-the-address-book-what-you-need-to-know&amp;lt;/ref&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
It can go further than this. As we established in previous sections, an app can be given more access to features of the system using entitlements. These come in a few flavors:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Completely safe&#039;&#039;&#039;: Entitlements any developer can opt into, with little to no risk.&lt;br /&gt;
*&#039;&#039;&#039;Approval required&#039;&#039;&#039;: Entitlements that might be more of a security risk to allow, e.g. giving considerably wider access to the system, or that Apple simply doesn&#039;t want to hand out to just &#039;&#039;anyone&#039;&#039; for competitive reasons. The developer must submit a request to Apple with evidence of why they need the entitlement.&lt;br /&gt;
*&#039;&#039;&#039;Private&#039;&#039;&#039;: Entitlements that are never allowed for any app developer to use. Many of these are reasonably fenced off because they handle user data that is very risky, or bypasses permission prompts, etc, but can just as well also be guarding features Apple wants to keep to itself.&lt;br /&gt;
&lt;br /&gt;
There have been [https://gizmodo.com/researchers-uber-s-ios-app-had-secret-permissions-that-1819177235 exceptions] where Apple quietly gave a company access to private entitlements anyway, raising eyebrows.&lt;br /&gt;
&lt;br /&gt;
On iOS, you also can&#039;t be &#039;&#039;more&#039;&#039; secure than the default sandbox. That might seem crazy if you&#039;re not a developer, but it&#039;s pretty important for security in a variety of situations. On macOS, there are several entitlements you must declare to decide whether you&#039;re allowed to access certain types of user data at all. Android used this design from the very start - you can&#039;t even do fundamental things like access the internet without declaring it in your manifest. It makes it very explicit what the app&#039;s intentions are.&lt;br /&gt;
&lt;br /&gt;
iOS has one sandbox used by all App Store apps. System apps, and App Store apps developed by Apple, are allowed to expand or reduce their sandbox permissions as needed. Third-party apps do not get the right to expand or reduce their sandbox permissions at all. This is clearly less secure. To take the example of Playgrounds again, while it&#039;s allowed to run your code from a separate process executing in an ultra locked down sandbox with very few permissions, competing apps such as Pythonista must run your code in the same sandbox and address space as the main app process. The Python interpreter crashing would therefore crash the entire app, possibly losing work. In the worst case, a vulnerability in third-party code could give access to all data stored by/accessible to the app. For example, it would be a nightmare if you can tap the wrong link in Safari and have a hacker easily steal your cookies from other websites. If that third-party code could run in its own limited sandbox, the risk is significantly reduced.&lt;br /&gt;
&lt;br /&gt;
The only known workaround is to execute the code via JavaScript, as Apple&#039;s JavaScriptCore engine runs in a heavily sandboxed process. This requires you to port the code to JS, which may be a lot of work, or just not viable. You wouldn&#039;t want to run the Python interpreter inside JavaScript - the performance would be terrible!&lt;br /&gt;
&lt;br /&gt;
==In-app browsers==&lt;br /&gt;
Safari&#039;s in-app browser, that is the minimal version you get when tapping a link from social media, uses an entirely separate data store for each app. The in-app browser isn&#039;t aware of cookies in the &amp;quot;full&amp;quot; Safari app, or any other app, and doesn&#039;t support Safari extensions. Apple claimed this was to protect malicious apps from stealing or setting cookies in Safari without your knowledge, which is a fair argument, but it&#039;s hard to not notice that it makes web browsing inconvenient, encouraging users to install native apps, where they can make transactions through Apple.&amp;lt;ref&amp;gt;https://github.com/openid/AppAuth-iOS/issues/120&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This also means your browsing in the in-app browser is just forgotten - there&#039;s no history menu, and it doesn&#039;t get logged to the history in the full Safari app either. Good luck recalling that article you read a few weeks ago.&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
*[https://theapplewiki.com/wiki/Eligibility Eligibility]&lt;br /&gt;
*Posts written by an author of this article:&lt;br /&gt;
**[https://adamdemasi.com/2024/04/19/app-marketplace-experience.html The iOS 17.4 app marketplace flow is a disaster]&lt;br /&gt;
**[https://adamdemasi.com/2024/04/20/ios-eligibility.html How I tricked iOS into giving me EU DMA features]&lt;br /&gt;
**[https://adamdemasi.com/2024/04/23/ios-eligibility-features.html Features controlled by iOS 17.4&#039;s eligibility system]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Apple]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=5364</id>
		<title>Apple App Store</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=5364"/>
		<updated>2025-01-25T07:01:39Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Add new Advanced Commerce API, other tweaks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:App Store (iOS).svg|thumb|150px]]&lt;br /&gt;
&lt;br /&gt;
Apple uses several technical measures to protect their App Store ecosystem and prevent consumer choice. They are good at obscuring their intentions with technical roadblocks, while typically citing security reasons for them - assuming the public even recognizes what is going on. This actively hurts the ability for lawmakers to have an accurate understanding, so they can consider applying legislative pressure.&lt;br /&gt;
&lt;br /&gt;
A never-ending demand for a cut of every sale of a digital product, ranging from game currency, to supporting content creators,&amp;lt;ref name=&amp;quot;patreon&amp;quot;&amp;gt;https://www.theverge.com/2024/8/12/24218629/patreon-membership-ios-30-percent-apple-tax&amp;lt;/ref&amp;gt; to booking a Zoom call with a local business,&amp;lt;ref name=&amp;quot;facebook&amp;quot;&amp;gt;https://www.reuters.com/article/us-facebook-apple-exclusive/exclusive-facebook-says-apple-rejected-its-attempt-to-tell-users-about-app-store-fees-idUSKBN25O042/&amp;lt;/ref&amp;gt; hurts the ability for app developers to innovate. These developers, working hard and pulling countless hours to build a quality app, always need to take Apple&#039;s (and [[Google]]&#039;s) demands into account - specifically, between 15% and 30% of their revenue. This is revenue that can be reinvested into the app, but instead must be earmarked for the platform they are &#039;&#039;&#039;required&#039;&#039;&#039; to use to reach their customers.&lt;br /&gt;
&lt;br /&gt;
Because this is a clear problem, several governments, including South Korea,&amp;lt;ref&amp;gt;https://www.reuters.com/technology/skorea-approves-rules-app-store-law-targeting-apple-google-2022-03-08/&amp;lt;/ref&amp;gt; Japan,&amp;lt;ref&amp;gt;https://www.theregister.com/2024/06/13/japan_smartphone_software_law/&amp;lt;/ref&amp;gt; the European Union,&amp;lt;ref&amp;gt;[[wikipedia:Digital Markets Act|Digital Markets Act]]&amp;lt;/ref&amp;gt; the United Kingdom,&amp;lt;ref&amp;gt;https://www.gov.uk/cma-cases/investigation-into-apple-appstore&amp;lt;/ref&amp;gt; Australia,&amp;lt;ref&amp;gt;https://www.accc.gov.au/media-release/dominance-of-apple-and-googles-app-stores-impacting-competition-and-consumers&amp;lt;/ref&amp;gt; as well as the US and a handful of states,&amp;lt;ref&amp;gt;[[wikipedia:Open App Markets Act|Open App Markets Act]]&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://www.congress.gov/bill/118th-congress/senate-bill/5364/text/is&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;doj&amp;quot;&amp;gt;https://apnews.com/article/apple-antitrust-monopoly-app-store-justice-department-822d7e8f5cf53a2636795fcc33ee1fc3&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://azcapitoltimes.com/news/2021/02/19/its-time-to-free-ourselves-from-big-tech-monopoly/&amp;lt;/ref&amp;gt; have opened investigations into anti-competitive practices, or considered or already passed legislation to force &amp;quot;gatekeeper platforms&amp;quot; such as Apple to be more reasonable with third-party developers.&lt;br /&gt;
&lt;br /&gt;
This being a major threat to Apple&#039;s revenue stream (interestingly, one they claim to be unsure is profitable&amp;lt;ref&amp;gt;https://9to5mac.com/2024/04/17/app-store-is-profitable-apple-notes/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://9to5mac.com/2025/01/17/apple-denies-app-store-profit-margin-is-75-claims-to-have-no-clue/&amp;lt;/ref&amp;gt;), they have responded with practices such as geoblocking certain operating system functionality based on physical location,&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/Eligibility&amp;lt;/ref&amp;gt; misrepresenting/overstating risks, and using existing, trusted terms to describe unreasonably difficult to use systems.&lt;br /&gt;
&lt;br /&gt;
==Background info==&lt;br /&gt;
Important terms you&#039;ll run into in this article:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;[[wikipedia:Sandbox (computer security)|Sandbox]]&#039;&#039;&#039;: Reduces exposure of the user&#039;s device/data to security risks, by reducing what an app is allowed to do.&lt;br /&gt;
*&#039;&#039;&#039;[https://theapplewiki.com/wiki/Entitlements Entitlements]&#039;&#039;&#039;: Apple&#039;s method of &amp;quot;poking holes&amp;quot; in the sandbox, to give the app more permissions. Some are available to developers, while many are only available to Apple.&lt;br /&gt;
*&#039;&#039;&#039;[[wikipedia:Digital Markets Act|Digital Markets Act]]&#039;&#039;&#039;: The European Union&#039;s fairly sweeping recent regulations against forcing companies they classify as &amp;quot;gatekeepers&amp;quot; to play nice, giving smaller businesses access to software/hardware features they&#039;ve historically reserved for their own use.&lt;br /&gt;
&lt;br /&gt;
==In-app purchases==&lt;br /&gt;
Apple has been collecting users&#039; credit card numbers since opening the iTunes Store in 2004. The opening of the App Store in 2008, followed by the introduction of in-app purchases (IAPs) in 2009, gave iPhone app developers the opportunity to sell app features to users. The IAP system is provided as a developer framework named [https://developer.apple.com/storekit/ StoreKit]. Apps and their in-app purchases are managed through a dashboard named [https://developer.apple.com/app-store-connect/ App Store Connect]. App sales have eclipsed iTunes Store sales, and are now a primary focus of Apple&#039;s Media Services division.&lt;br /&gt;
&lt;br /&gt;
Apple requires every purchase of a digital good or service in an app to use their in-app purchase system. This may seem reasonable, because the customer may inevitably call Apple support, demanding a refund for an app they have issues with. Apple would rather give that refund and leave the customer with a positive support experience, than to provide a messy process involving contacting a third-party, whose customer service is likely nowhere near the same experience.&lt;br /&gt;
&lt;br /&gt;
App Store purchase fees are between 15% and 30%. In September 2016, Apple expanded subscriptions to be available to any type of app, also introducing a 15% discount incentive when the user has already subscribed for a year.&amp;lt;ref&amp;gt;https://www.theverge.com/2016/9/2/12774758/apple-developers-app-store-new-subscription-rules&amp;lt;/ref&amp;gt; In November 2020, Apple introduced a reduced 15% fee for app developers with revenue below $1 million per year, with exceptions such as for games.&amp;lt;ref&amp;gt;https://tidbits.com/2020/11/18/apple-drops-app-store-commission-to-15-for-small-developers/&amp;lt;/ref&amp;gt; Otherwise, the fee is 30%. In the 2008 announcement of the App Store, Apple considered this a reasonable, industry-standard fee. However, the way we use apps has significantly evolved since 2009 - the world has shifted to heavily rely on mobile apps, which have also evolved into more complex and sustainable business models than a simple one-time purchase.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Stripe, Inc.|Stripe]], a very popular platform used for payments on the web, uses a base fee of 2.9% plus a fixed $0.30 in the United States.&amp;lt;ref&amp;gt;https://stripe.com/pricing&amp;lt;/ref&amp;gt; With add-on services, before considering volume discounts, a Stripe transaction may rather have a cost of 6.4% + $1.10.&amp;lt;ref&amp;gt;Calculated from base fee (2.9% + $0.30) + international card (1.5%) + adaptive pricing (2%) + international payment methods ($0.80), as of January 2025&amp;lt;/ref&amp;gt; Competing payments services have fees close or identical to this. &#039;&#039;&#039;The in-app purchase system does not provide sufficient value to justify considerably higher fees than alternative payment platforms.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The App Store system poorly handles secondary marketplaces of digital services that exist within the primary App Store marketplace, such as Patreon. Apple, however, still requires companies in the business of selling digital services to use this inadequate system. This requires the app to account for Apple&#039;s fee, which is significant enough to often warrant increasing prices, and to follow rules even if they do not make sense for the nature of service they are providing. Apple has frequently been found in disputes with such apps. This injects extra complication at no benefit to the marketplace, the creator, or the customer - only to Apple, who has little to no involvement after delivering the initial app download to the user&#039;s phone. The significant fee also often drives app developers to consider building their app around an advertising model instead, creating privacy concerns.&lt;br /&gt;
&lt;br /&gt;
Additionally, the 15% small businesses fee discount is judged based on the app&#039;s overall turnover, and is not based on individual creators in the app&#039;s marketplace. An app that turns over $1 million per year by providing services to creators that individually make less than $1 million per year does not have the opportunity to use the discount.&lt;br /&gt;
&lt;br /&gt;
Apple, often together with Google, use lobbying efforts in the United States and other countries in an attempt to minimize the issues. &amp;quot;ACT | The App Association&amp;quot;, pitched as an association of independent small business app developers, is at least 50% funded by Apple, and does not list its claimed 2,000 members.&amp;lt;ref&amp;gt;http://www.fosspatents.com/2021/10/not-class-act-so-called-app-association.html&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://www.fosspatents.com/2022/09/vast-majority-of-act-app-associations.html&amp;lt;/ref&amp;gt; In March 2024, the United States Department of Justice along with 16 state attorneys-general filed a lawsuit against Apple, including an accusation that the company &amp;quot;extracts more money from consumers, developers, content creators, artists, publishers, small businesses, and merchants, among others&amp;quot;.&amp;lt;ref name=&amp;quot;doj&amp;quot; /&amp;gt; The future of this lawsuit is unclear as of January 2025.&lt;br /&gt;
&lt;br /&gt;
Despite criticism of Apple forcing their fee into transactions with small businesses and creators on [[#Patreon|Patreon]], [[#Facebook online events|Facebook]], and similar platforms, on 23 January 2025, Apple announced the Advanced Commerce API. It &amp;quot;support[s] developers&#039; evolving business models - such as exceptionally large content catalogs, creator experiences, and subscriptions with optional add-ons&amp;quot;.&amp;lt;ref&amp;gt;https://developer.apple.com/news/?id=yxy958ya&amp;lt;/ref&amp;gt; While positioned as a way for such businesses to save development time and avoid ongoing costs by building on top of Apple&#039;s mature payments platform, its use is in fact necessary for these businesses to work within the App Store guidelines, as seen in cases outlined below. The feature requires submitting the app&#039;s business model to Apple for approval. This continues a trend of requiring Apple&#039;s consent to conduct business in a place users have been trained to expect it.&lt;br /&gt;
&lt;br /&gt;
Given Apple&#039;s strong incentives, and a ticking clock as legal pressure builds, it is not hard to find stories from app developers regarding poor experiences with Apple&#039;s app review process.&lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;This list is extremely incomplete. Please add examples if you know of any.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Facebook online events===&lt;br /&gt;
In August 2020, in response to the COVID-19 pandemic, Facebook introduced the ability for small businesses to accept an entrance fee for events. Previously, Facebook would only act as a way to RSVP for the event - the organizer must use a third-party event ticketing system to collect fees. The company pledged to not collect any fee on event sales &amp;quot;until 2023&amp;quot;.&amp;lt;ref&amp;gt;https://about.fb.com/news/2020/08/paid-online-events/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Apple disagreed, requiring the feature to use the in-app purchases system. This introduced Apple&#039;s 30% fee. As this increases the price the user pays, with no benefit to the small business the user intended to support, the fee was displayed as a line item in checkout. Apple did not accept this disclosure of the fee, referring to it as &amp;quot;irrelevant&amp;quot;.&amp;lt;ref name=&amp;quot;facebook&amp;quot; /&amp;gt; Facebook was allowed to compromise on displaying the fee, but &#039;&#039;without&#039;&#039; indicating that it is specifically an App Store fee.&lt;br /&gt;
&lt;br /&gt;
===HEY===&lt;br /&gt;
HEY.com is a paid webmail provider launched in June 2020 by long-time software company [[wikipedia:37signals|37signals]], specializing in inbox organization tools.&lt;br /&gt;
&lt;br /&gt;
After successfully launching the initial version of their app on the App Store, the company announced that an update was rejected. The app did not intend to support in-app purchases. Instead, the user is expected to already have an account with the service. Apple did not like this arrangement, and demanded the company build an in-app subscription option. The company argued that they are being held to a different set of rules than apps such as [[Netflix]], whose app does not provide any way to purchase.&amp;lt;ref&amp;gt;https://www.theverge.com/2020/6/16/21293419/hey-apple-rejection-ios-app-store-dhh-gangsters-antitrust&amp;lt;/ref&amp;gt; After a suggestion from Apple executive Phil Schiller in the media, HEY introduced a 14 day free trial mode, which was approved.&amp;lt;ref&amp;gt;https://www.hey.com/apple/path/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://techcrunch.com/2020/06/18/interview-apples-schiller-says-position-on-hey-app-is-unchanged-and-no-rules-changes-are-imminent/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Patreon===&lt;br /&gt;
In August 2024, [[Patreon]] announced a change in arrangement with Apple for its App Store app. From November 2024, subscriptions started from the iOS app would be required to use the in-app purchase system, bypassing Patreon&#039;s own long-standing payments practices.&amp;lt;ref&amp;gt;https://news.patreon.com/articles/understanding-apple-requirements-for-patreon&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;patreon&amp;quot; /&amp;gt; This change does not affect the Android app.&lt;br /&gt;
&lt;br /&gt;
By forcing Patreon out of the payments pipeline, certain payment models are no longer available to users of Patreon&#039;s iOS app. Creators who rely on the &amp;quot;per-creation&amp;quot; payment model, as opposed to the standard &amp;quot;per-month&amp;quot;, can no longer be subscribed to from the app. The app is also not able to support the &amp;quot;first-of-the-month&amp;quot; model, where payments from all subscribers are collected on the first day of the month, rather than every 30 days since each member&#039;s day of subscription. The price must also be rounded to a price tier supported by Apple.&lt;br /&gt;
&lt;br /&gt;
Patreon provides creators with the choice to increase their prices by 30% in the iOS app, or to keep the same prices but forfeit 30% to Apple. Creators frequently remind potential supporters to not use the Patreon iOS app, adding extra inconvenience to those wanting to support the work of small creators.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed&amp;quot; heights=&amp;quot;500px&amp;quot;&amp;gt;&lt;br /&gt;
File:Patreon iOS app pricing options - fee on top.png|&amp;quot;Maintain earnings and cover Apple&#039;s fee by increasing prices in iOS app&amp;quot; (Recommended)&lt;br /&gt;
File:Patreon iOS app pricing options - absorb fee.png|&amp;quot;Keep prices in the iOS app the same and cover Apple&#039;s fee yourself&amp;quot;&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A similar case occurred with the app Fanhouse in 2021.&amp;lt;ref&amp;gt;https://twitter.com/jasminericegirl/status/1402691047940100100&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Twitter===&lt;br /&gt;
In August 2021, [[Twitter]] introduced a feature named Super Follows (now Subscriptions), in which a user can pay a subscription fee to access more of a creator&#039;s content. For each user who enables Subscriptions, Twitter must submit a new in-app purchase SKU to the App Store, which will become available with the next update to the app.&amp;lt;ref&amp;gt;https://twitter.com/wongmjane/status/1433372120080261120&amp;lt;/ref&amp;gt; This, of course, is subject to the 30% fee. At the time of writing in January 2025, viewing the App Store listing reveals Elon Musk&#039;s $4.00 subscription as the fourth most popular IAP item.&lt;br /&gt;
&lt;br /&gt;
==Notarization==&lt;br /&gt;
Since 2015, Apple expects all Mac apps to be &amp;quot;notarized&amp;quot;. This is a preliminary, automated malware check, which upon passing, provides a notary certificate that gets &amp;quot;stapled&amp;quot; to the app. Apple&#039;s explanation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Notarization of macOS software is not App Review. The Apple notary service is an automated system that scans your software for malicious content, checks for code-signing issues, and returns the results to you quickly. If there are no issues, the notary service generates a ticket for you to staple to your software; the notary service also publishes that ticket online where Gatekeeper can find it.&amp;lt;ref&amp;gt;https://developer.apple.com/documentation/security/notarizing-macos-software-before-distribution&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whether this is actually a better approach than used by Windows antivirus, where they find out about new malware samples only when they end up on a user&#039;s computer, is a separate topic.&lt;br /&gt;
&lt;br /&gt;
To comply with the DMA&#039;s regulations on app marketplaces, Apple created a new channel of releasing apps outside of the iOS App Store. Apps go through a notarization process. But the process is definitely &#039;&#039;not&#039;&#039; notarization. The name is intentionally being abused, by contrast to notarization on macOS, to make you believe it is something other than the existing App Review system. Despite the pain some developers and users have with it, notarization on macOS has always been considered a net positive. It made sense to take advantage of its reputation for the entirely different &amp;quot;notarization&amp;quot; on iOS.&lt;br /&gt;
&lt;br /&gt;
See for yourself - view the [https://developer.apple.com/app-store/review/guidelines/ App Review Guidelines] and tick &amp;quot;Show Notarization Review Guidelines Only&amp;quot;. While most rules are knocked out by this, a good number of them are still in place. These apps are still reviewed and tested by the App Review team, must have a full product listing in App Store Connect, and can be outright rejected - all in the same way as an App Store app.&lt;br /&gt;
&lt;br /&gt;
By contrast, all that is required for notarization on macOS is for your app to not be malware. You submit it to an automated system that approves it within minutes. &#039;&#039;&#039;You don&#039;t need to convince Apple your app is worthy of existing on their platform.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The point of macOS notarization is that Apple has a record of all binaries that are intended for wide distribution on macOS, and can review them both in advance and on a regular basis for known malware/common malware patterns. Say a malware app manages to initially get through, when Apple finds out, they can go back in the notary records and find every sample of that malware to analyze and block. This is purely a technical process, managed by skilled security researchers, while iOS app review and &amp;quot;notarization&amp;quot; is a business process, managed by workers who have been given a checklist of violations to look for.&lt;br /&gt;
&lt;br /&gt;
Apple is retaining complete control over what&#039;s allowed to run on iOS. On macOS, you can choose to run apps that have not been notarized (even though the process to bypass the warning is intentionally difficult). On iOS, you never get even that option. What Apple created is the App Store but with more steps. It still goes on the App Store, just hidden so it can only be installed by the third-party store it&#039;s tied to.&lt;br /&gt;
&lt;br /&gt;
*Mysk: &amp;quot;iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens.&amp;quot;&amp;lt;ref&amp;gt;https://twitter.com/mysk_co/status/1806638308455256242&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==JIT==&lt;br /&gt;
Safari is allowed to [[wikipedia:Just-in-time compilation|just-in-time]] compile code worldwide. The super short version of what that means: it can run JavaScript code &#039;&#039;really fast&#039;&#039;. All browsers, and other runtimes like Microsoft .NET, Java, Lua use this. Ok, fine, it&#039;s the system web browser, it&#039;s very carefully written to be secure, and it&#039;s important to the platform to be doing well in performance benchmarks and all that.&lt;br /&gt;
&lt;br /&gt;
Apple&#039;s [https://apps.apple.com/app/swift-playgrounds/id908519492 Playgrounds] app on iPad is also allowed to JIT. It bundles Apple&#039;s [[wikipedia:Swift (programming language)|Swift]] compiler, and shares backend code with the version of Playgrounds found in [[wikipedia:Xcode|Xcode]].&lt;br /&gt;
&lt;br /&gt;
Competing apps like Pythonista (a Python IDE), emulators like Delta and UTM, and terminal environments like iSH, are not allowed to JIT. As such, they need to rely on inferior performance, potentially from an entirely separate implementation of their compiler/interpreter that may be less proven, because the JIT-less implementation doesn&#039;t need to exist on any other platform.&lt;br /&gt;
&lt;br /&gt;
Likely the most clear example is UTM SE. UTM is a port of the [[wikipedia:QEMU|QEMU]] emulator to iOS, allowing you to run desktop OSes (Linux, Windows 98, XP, classic Mac OS, etc). iPhone hardware is very capable these days and it runs impressively well, &#039;&#039;if&#039;&#039; you use a hack to enable JIT (which Apple has now patched). &amp;quot;SE&amp;quot; stands for &amp;quot;slow edition&amp;quot; - yes, really. If you compare the true version of UTM to the App Store UTM SE app, you &#039;&#039;will&#039;&#039; feel the loss in performance. It&#039;s impressive UTM even got to be on the App Store at all, and the DMA is to thank for it. But Apple is still holding the line on allowing JIT to apps that require that performance.&lt;br /&gt;
&lt;br /&gt;
While UTM SE releasing at all might seem like a pathway to getting Firefox and Chrome &amp;quot;slow editions&amp;quot; on the App Store, browser engines other than the built-in Apple WebKit/JavaScriptCore are still outlawed.&amp;lt;ref&amp;gt;https://developer.apple.com/app-store/review/guidelines/#2.5.6&amp;lt;/ref&amp;gt; In the EU, Apple has blessed web browser JavaScript engines with the option to use JIT. The app must be approved for an entitlement, and then must work within APIs provided by Apple for it. As of January 2025, no browsers have been released using this. We were all anticipating proper competition around web browsers on iOS, but almost a year later, we have nothing. Mozilla has [https://www.theverge.com/2024/1/26/24052067/mozilla-apple-ios-browser-rules-firefox discussed] why.&lt;br /&gt;
&lt;br /&gt;
==Sandbox==&lt;br /&gt;
You might not like app sandboxing, but it&#039;s a powerful security feature used on all modern platforms. The reality is very few apps need more than a few basic permissions. [[wikipedia:Flatpak|Flatpak]] on Linux also sandboxes apps, and it seems to work great! Still, it&#039;s completely fair that there should be processes for doing things beyond what the sandbox allows. You see some of this with permission prompts - does a flashlight app &#039;&#039;really&#039;&#039; need access to your contacts? (Apple has been burned by apps abusing user data before the current permission system was built out.&amp;lt;ref&amp;gt;https://www.theverge.com/2012/2/14/2798008/ios-apps-and-the-address-book-what-you-need-to-know&amp;lt;/ref&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
It can go further than this. As we established in previous sections, an app can be given more access to features of the system using entitlements. These come in a few flavors:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Completely safe&#039;&#039;&#039;: Entitlements any developer can opt into, with little to no risk.&lt;br /&gt;
*&#039;&#039;&#039;Approval required&#039;&#039;&#039;: Entitlements that might be more of a security risk to allow, e.g. giving considerably wider access to the system, or that Apple simply doesn&#039;t want to hand out to just &#039;&#039;anyone&#039;&#039; for competitive reasons. The developer must submit a request to Apple with evidence of why they need the entitlement.&lt;br /&gt;
*&#039;&#039;&#039;Private&#039;&#039;&#039;: Entitlements that are never allowed for any app developer to use. Many of these are reasonably fenced off because they handle user data that is very risky, or bypasses permission prompts, etc, but can just as well also be guarding features Apple wants to keep to itself.&lt;br /&gt;
&lt;br /&gt;
There have been [https://gizmodo.com/researchers-uber-s-ios-app-had-secret-permissions-that-1819177235 exceptions] where Apple quietly gave a company access to private entitlements anyway, raising eyebrows.&lt;br /&gt;
&lt;br /&gt;
On iOS, you also can&#039;t be &#039;&#039;more&#039;&#039; secure than the default sandbox. That might seem crazy if you&#039;re not a developer, but it&#039;s pretty important for security in a variety of situations. On macOS, there are several entitlements you must declare to decide whether you&#039;re allowed to access certain types of user data at all. Android used this design from the very start - you can&#039;t even do fundamental things like access the internet without declaring it in your manifest. It makes it very explicit what the app&#039;s intentions are.&lt;br /&gt;
&lt;br /&gt;
iOS has one sandbox used by all App Store apps. System apps, and App Store apps developed by Apple, are allowed to expand or reduce their sandbox permissions as needed. Third-party apps do not get the right to expand or reduce their sandbox permissions at all. This is clearly less secure. To take the example of Playgrounds again, while it&#039;s allowed to run your code from a separate process executing in an ultra locked down sandbox with very few permissions, competing apps such as Pythonista must run your code in the same sandbox and address space as the main app process. The Python interpreter crashing would therefore crash the entire app, possibly losing work. In the worst case, a vulnerability in third-party code could give access to all data stored by/accessible to the app. For example, it would be a nightmare if you can tap the wrong link in Safari and have a hacker easily steal your cookies from other websites. If that third-party code could run in its own limited sandbox, the risk is significantly reduced.&lt;br /&gt;
&lt;br /&gt;
The only known workaround is to execute the code via JavaScript, as Apple&#039;s JavaScriptCore engine runs in a heavily sandboxed process. This requires you to port the code to JS, which may be a lot of work, or just not viable. You wouldn&#039;t want to run the Python interpreter inside JavaScript - the performance would be terrible!&lt;br /&gt;
&lt;br /&gt;
==In-app browsers==&lt;br /&gt;
Safari&#039;s in-app browser, that is the minimal version you get when tapping a link from social media, uses an entirely separate data store for each app. The in-app browser isn&#039;t aware of cookies in the &amp;quot;full&amp;quot; Safari app, or any other app, and doesn&#039;t support Safari extensions. Any websites you&#039;re logged into. Apple claimed this was to protect malicious apps from stealing or setting cookies in Safari without your knowledge, which is a fair argument, but it&#039;s hard to not notice that it makes web browsing inconvenient, encouraging users to install native apps, where they can make transactions through Apple.&amp;lt;ref&amp;gt;https://github.com/openid/AppAuth-iOS/issues/120&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This also means your browsing in the in-app browser is just forgotten - there&#039;s no history menu, and it doesn&#039;t get logged to the history in the full Safari app either. Good luck recalling that article you read a few weeks ago.&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
*[https://theapplewiki.com/wiki/Eligibility Eligibility]&lt;br /&gt;
*Posts written by an author of this article:&lt;br /&gt;
**[https://adamdemasi.com/2024/04/19/app-marketplace-experience.html The iOS 17.4 app marketplace flow is a disaster]&lt;br /&gt;
**[https://adamdemasi.com/2024/04/20/ios-eligibility.html How I tricked iOS into giving me EU DMA features]&lt;br /&gt;
**[https://adamdemasi.com/2024/04/23/ios-eligibility-features.html Features controlled by iOS 17.4&#039;s eligibility system]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Apple]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=4819</id>
		<title>Apple App Store</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=4819"/>
		<updated>2025-01-23T11:25:27Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Links to refs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:App Store (iOS).svg|thumb|150px]]&lt;br /&gt;
&lt;br /&gt;
Apple uses several technical measures to protect their App Store ecosystem and prevent consumer choice. They are good at obscuring their intentions with technical roadblocks, while typically citing security reasons for them - assuming the public even recognizes what is going on. This actively hurts the ability for lawmakers to have an accurate understanding, so they can consider applying legislative pressure.&lt;br /&gt;
&lt;br /&gt;
A never-ending demand for a cut of every sale of a digital product, ranging from game currency, to supporting content creators,&amp;lt;ref name=&amp;quot;patreon&amp;quot;&amp;gt;https://www.theverge.com/2024/8/12/24218629/patreon-membership-ios-30-percent-apple-tax&amp;lt;/ref&amp;gt; to booking a Zoom call with a local business,&amp;lt;ref name=&amp;quot;facebook&amp;quot;&amp;gt;https://www.reuters.com/article/us-facebook-apple-exclusive/exclusive-facebook-says-apple-rejected-its-attempt-to-tell-users-about-app-store-fees-idUSKBN25O042/&amp;lt;/ref&amp;gt; hurts the ability for app developers to innovate. These developers, working hard and pulling countless hours to build a quality app, always need to take Apple&#039;s (and [[Google]]&#039;s) demands into account - specifically, between 15% and 30% of their revenue. This is revenue that can be reinvested into the app, but instead must be earmarked for the platform they are &#039;&#039;&#039;required&#039;&#039;&#039; to use to reach their customers.&lt;br /&gt;
&lt;br /&gt;
Because this is a clear problem, several governments, including South Korea,&amp;lt;ref&amp;gt;https://www.reuters.com/technology/skorea-approves-rules-app-store-law-targeting-apple-google-2022-03-08/&amp;lt;/ref&amp;gt; Japan,&amp;lt;ref&amp;gt;https://www.theregister.com/2024/06/13/japan_smartphone_software_law/&amp;lt;/ref&amp;gt; the European Union,&amp;lt;ref&amp;gt;[[wikipedia:Digital Markets Act|Digital Markets Act]]&amp;lt;/ref&amp;gt; the United Kingdom,&amp;lt;ref&amp;gt;https://www.gov.uk/cma-cases/investigation-into-apple-appstore&amp;lt;/ref&amp;gt; Australia,&amp;lt;ref&amp;gt;https://www.accc.gov.au/media-release/dominance-of-apple-and-googles-app-stores-impacting-competition-and-consumers&amp;lt;/ref&amp;gt; as well as the US and a handful of states,&amp;lt;ref&amp;gt;[[wikipedia:Open App Markets Act|Open App Markets Act]]&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://www.congress.gov/bill/118th-congress/senate-bill/5364/text/is&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;doj&amp;quot;&amp;gt;https://apnews.com/article/apple-antitrust-monopoly-app-store-justice-department-822d7e8f5cf53a2636795fcc33ee1fc3&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://azcapitoltimes.com/news/2021/02/19/its-time-to-free-ourselves-from-big-tech-monopoly/&amp;lt;/ref&amp;gt; have opened investigations into anti-competitive practices, or considered or already passed legislation to force &amp;quot;gatekeeper platforms&amp;quot; such as Apple to be more reasonable with third-party developers.&lt;br /&gt;
&lt;br /&gt;
This being a major threat to Apple&#039;s revenue stream (interestingly, one they claim to be unsure is profitable&amp;lt;ref&amp;gt;https://9to5mac.com/2024/04/17/app-store-is-profitable-apple-notes/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://9to5mac.com/2025/01/17/apple-denies-app-store-profit-margin-is-75-claims-to-have-no-clue/&amp;lt;/ref&amp;gt;), they have responded with practices such as geoblocking certain operating system functionality based on physical location,&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/Eligibility&amp;lt;/ref&amp;gt; misrepresenting/overstating risks, and using existing, trusted terms to describe unreasonably difficult to use systems.&lt;br /&gt;
&lt;br /&gt;
==Background info==&lt;br /&gt;
Important terms you&#039;ll run into in this article:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;[[wikipedia:Sandbox (computer security)|Sandbox]]&#039;&#039;&#039;: Reduces exposure of the user&#039;s device/data to security risks, by reducing what an app is allowed to do.&lt;br /&gt;
*&#039;&#039;&#039;[https://theapplewiki.com/wiki/Entitlements Entitlements]&#039;&#039;&#039;: Apple&#039;s method of &amp;quot;poking holes&amp;quot; in the sandbox, to give the app more permissions. Some are available to developers, while many are only available to Apple.&lt;br /&gt;
*&#039;&#039;&#039;[[wikipedia:Digital Markets Act|Digital Markets Act]]&#039;&#039;&#039;: The European Union&#039;s fairly sweeping recent regulations against forcing companies they classify as &amp;quot;gatekeepers&amp;quot; to play nice, giving smaller businesses access to software/hardware features they&#039;ve historically reserved for their own use.&lt;br /&gt;
&lt;br /&gt;
==In-app purchases==&lt;br /&gt;
Apple has been collecting users&#039; credit card numbers since opening the iTunes Store in 2004. The opening of the App Store in 2008, followed by the introduction of in-app purchases (IAPs) in 2009, gave iPhone app developers the opportunity to sell app features to users. The IAP system is provided as a developer framework named [https://developer.apple.com/storekit/ StoreKit]. Apps and their in-app purchases are managed through a dashboard named [https://developer.apple.com/app-store-connect/ App Store Connect]. App sales have eclipsed iTunes Store sales, and are now a primary focus of Apple&#039;s Media Services division.&lt;br /&gt;
&lt;br /&gt;
Apple requires every purchase of a digital good or service in an app to use their in-app purchase system. This may seem reasonable, because the customer may inevitably call Apple support, demanding a refund for an app they have issues with. Apple would rather give that refund and leave the customer with a positive support experience, than to provide a messy process involving contacting a third-party, whose customer service is likely nowhere near the same experience.&lt;br /&gt;
&lt;br /&gt;
App Store purchase fees are between 15% and 30%. In September 2016, Apple expanded subscriptions to be available to any type of app, also introducing a 15% discount incentive when the user has already subscribed for a year.&amp;lt;ref&amp;gt;https://www.theverge.com/2016/9/2/12774758/apple-developers-app-store-new-subscription-rules&amp;lt;/ref&amp;gt; In November 2020, Apple introduced a reduced 15% fee for app developers with revenue below $1 million per year, with exceptions such as for games.&amp;lt;ref&amp;gt;https://tidbits.com/2020/11/18/apple-drops-app-store-commission-to-15-for-small-developers/&amp;lt;/ref&amp;gt; Otherwise, the fee is 30%. In the 2008 announcement of the App Store, Apple considered this a reasonable, industry-standard fee. However, the way we use apps has significantly evolved since 2009 - the world has shifted to heavily rely on mobile apps, which have also evolved into more complex and sustainable business models than a simple one-time purchase.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Stripe, Inc.|Stripe]], a very popular platform used for payments on the web, uses a base fee of 2.9% plus a fixed $0.30 in the United States.&amp;lt;ref&amp;gt;https://stripe.com/pricing&amp;lt;/ref&amp;gt; With add-on services, before considering volume discounts, a Stripe transaction may rather have a cost of 6.4% + $1.10.&amp;lt;ref&amp;gt;Calculated from base fee (2.9% + $0.30) + international card (1.5%) + adaptive pricing (2%) + international payment methods ($0.80), as of January 2025&amp;lt;/ref&amp;gt; Competing payments services have fees close or identical to this. &#039;&#039;&#039;The in-app purchase system does not provide sufficient value to justify considerably higher fees than alternative payment platforms.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The App Store system poorly handles secondary marketplaces of digital services that exist within the primary App Store marketplace, such as Patreon. Apple, however, still requires companies in the business of selling digital services to use this inadequate system. This requires the app to account for Apple&#039;s fee, which is significant enough to often warrant increasing prices, and to follow rules even if they do not make sense for the nature of service they are providing. Apple has frequently been found in disputes with such apps. This injects extra complication at no benefit to the marketplace, the creator, or the customer - only to Apple, who has little to no involvement after delivering the initial app download to the user&#039;s phone. The significant fee also often drives app developers to consider building their app around an advertising model instead, creating privacy concerns.&lt;br /&gt;
&lt;br /&gt;
Additionally, the 15% small businesses fee discount is judged based on the app&#039;s overall turnover, and is not based on individual creators in the app&#039;s marketplace. An app that turns over $1 million per year by providing services to creators that individually make less than $1 million per year does not have the opportunity to use the discount.&lt;br /&gt;
&lt;br /&gt;
Apple, often together with Google, use lobbying efforts in the United States and other countries in an attempt to minimize the issues. &amp;quot;ACT | The App Association&amp;quot;, pitched as an association of independent small business app developers, is at least 50% funded by Apple, and does not list its claimed 2,000 members.&amp;lt;ref&amp;gt;http://www.fosspatents.com/2021/10/not-class-act-so-called-app-association.html&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://www.fosspatents.com/2022/09/vast-majority-of-act-app-associations.html&amp;lt;/ref&amp;gt; In March 2024, the United States Department of Justice along with 16 state attorneys-general filed a lawsuit against Apple, including an accusation that the company &amp;quot;extracts more money from consumers, developers, content creators, artists, publishers, small businesses, and merchants, among others&amp;quot;.&amp;lt;ref name=&amp;quot;doj&amp;quot; /&amp;gt; The future of this lawsuit is unclear as of January 2025.&lt;br /&gt;
&lt;br /&gt;
Given Apple&#039;s strong incentives, and a ticking clock as legal pressure builds, it is not hard to find stories from app developers regarding poor experiences with Apple&#039;s app review process.&lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;This list is extremely incomplete. Please add examples if you know of any.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
===Facebook online events===&lt;br /&gt;
In August 2020, in response to the COVID-19 pandemic, Facebook introduced the ability for small businesses to accept an entrance fee for events. Previously, Facebook would only act as a way to RSVP for the event - the organizer must use a third-party event ticketing system to collect fees. The company pledged to not collect any fee on event sales &amp;quot;until 2023&amp;quot;.&amp;lt;ref&amp;gt;https://about.fb.com/news/2020/08/paid-online-events/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Apple disagreed, requiring the feature to use the in-app purchases system. This introduced Apple&#039;s 30% fee. As this increases the price the user pays, with no benefit to the small business the user intended to support, the fee was displayed as a line item in checkout. Apple did not accept this disclosure of the fee, referring to it as &amp;quot;irrelevant&amp;quot;.&amp;lt;ref name=&amp;quot;facebook&amp;quot; /&amp;gt; Facebook was allowed to compromise on displaying the fee, but &#039;&#039;without&#039;&#039; indicating that it is specifically an App Store fee.&lt;br /&gt;
&lt;br /&gt;
===HEY===&lt;br /&gt;
HEY.com is a paid webmail provider launched in June 2020 by long-time software company [[wikipedia:37signals|37signals]], specializing in inbox organization tools.&lt;br /&gt;
&lt;br /&gt;
After successfully launching the initial version of their app on the App Store, the company announced that an update was rejected. The app did not intend to support in-app purchases. Instead, the user is expected to already have an account with the service. Apple did not like this arrangement, and demanded the company build an in-app subscription option. The company argued that they are being held to a different set of rules than apps such as [[Netflix]], whose app does not provide any way to purchase.&amp;lt;ref&amp;gt;https://www.theverge.com/2020/6/16/21293419/hey-apple-rejection-ios-app-store-dhh-gangsters-antitrust&amp;lt;/ref&amp;gt; After a suggestion from Apple executive Phil Schiller in the media, HEY introduced a 14 day free trial mode, which was approved.&amp;lt;ref&amp;gt;https://www.hey.com/apple/path/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://techcrunch.com/2020/06/18/interview-apples-schiller-says-position-on-hey-app-is-unchanged-and-no-rules-changes-are-imminent/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Patreon===&lt;br /&gt;
In August 2024, [[Patreon]] announced a change in arrangement with Apple for its App Store app. From November 2024, subscriptions started from the iOS app would be required to use the in-app purchase system, bypassing Patreon&#039;s own long-standing payments practices.&amp;lt;ref&amp;gt;https://news.patreon.com/articles/understanding-apple-requirements-for-patreon&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;patreon&amp;quot; /&amp;gt; This change does not affect the Android app.&lt;br /&gt;
&lt;br /&gt;
By forcing Patreon out of the payments pipeline, certain payment models are no longer available to users of Patreon&#039;s iOS app. Creators who rely on the &amp;quot;per-creation&amp;quot; payment model, as opposed to the standard &amp;quot;per-month&amp;quot;, can no longer be subscribed to from the app. The app is also not able to support the &amp;quot;first-of-the-month&amp;quot; model, where payments from all subscribers are collected on the first day of the month, rather than every 30 days since each member&#039;s day of subscription. The price must also be rounded to a price tier supported by Apple.&lt;br /&gt;
&lt;br /&gt;
Patreon provides creators with the choice to increase their prices by 30% in the iOS app, or to keep the same prices but forfeit 30% to Apple. Creators frequently remind potential supporters to not use the Patreon iOS app, adding extra inconvenience to those wanting to support the work of small creators.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed&amp;quot; heights=&amp;quot;500px&amp;quot;&amp;gt;&lt;br /&gt;
File:Patreon iOS app pricing options - fee on top.png|&amp;quot;Maintain earnings and cover Apple&#039;s fee by increasing prices in iOS app&amp;quot; (Recommended)&lt;br /&gt;
File:Patreon iOS app pricing options - absorb fee.png|&amp;quot;Keep prices in the iOS app the same and cover Apple&#039;s fee yourself&amp;quot;&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A similar case occurred with the app Fanhouse in 2021.&amp;lt;ref&amp;gt;https://twitter.com/jasminericegirl/status/1402691047940100100&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Twitter===&lt;br /&gt;
In August 2021, [[Twitter]] introduced a feature named Super Follows (now Subscriptions), in which a user can pay a subscription fee to access more of a creator&#039;s content. For each user who enables Subscriptions, Twitter must submit a new in-app purchase SKU to the App Store, which will become available with the next update to the app.&amp;lt;ref&amp;gt;https://twitter.com/wongmjane/status/1433372120080261120&amp;lt;/ref&amp;gt; This, of course, is subject to the 30% fee. At the time of writing in January 2025, viewing the App Store listing reveals Elon Musk&#039;s $4.00 subscription as the fourth most popular IAP item.&lt;br /&gt;
&lt;br /&gt;
==Notarization==&lt;br /&gt;
Since 2015, Apple expects all Mac apps to be &amp;quot;notarized&amp;quot;. This is a preliminary, automated malware check, which upon passing, provides a notary certificate that gets &amp;quot;stapled&amp;quot; to the app. Apple&#039;s explanation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Notarization of macOS software is not App Review. The Apple notary service is an automated system that scans your software for malicious content, checks for code-signing issues, and returns the results to you quickly. If there are no issues, the notary service generates a ticket for you to staple to your software; the notary service also publishes that ticket online where Gatekeeper can find it.&amp;lt;ref&amp;gt;https://developer.apple.com/documentation/security/notarizing-macos-software-before-distribution&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whether this is actually a better approach than used by Windows antivirus, where they find out about new malware samples only when they end up on a user&#039;s computer, is a separate topic.&lt;br /&gt;
&lt;br /&gt;
To comply with the DMA&#039;s regulations on app marketplaces, Apple created a new channel of releasing apps outside of the iOS App Store. Apps go through a notarization process. But the process is definitely &#039;&#039;not&#039;&#039; notarization. The name is intentionally being abused, by contrast to notarization on macOS, to make you believe it is something other than the existing App Review system. Despite the pain some developers and users have with it, notarization on macOS has always been considered a net positive. It made sense to take advantage of its reputation for the entirely different &amp;quot;notarization&amp;quot; on iOS.&lt;br /&gt;
&lt;br /&gt;
See for yourself - view the [https://developer.apple.com/app-store/review/guidelines/ App Review Guidelines] and tick &amp;quot;Show Notarization Review Guidelines Only&amp;quot;. While most rules are knocked out by this, a good number of them are still in place. These apps are still reviewed and tested by the App Review team, must have a full product listing in App Store Connect, and can be outright rejected - all in the same way as an App Store app.&lt;br /&gt;
&lt;br /&gt;
By contrast, all that is required for notarization on macOS is for your app to not be malware. You submit it to an automated system that approves it within minutes. &#039;&#039;&#039;You don&#039;t need to convince Apple your app is worthy of existing on their platform.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The point of macOS notarization is that Apple has a record of all binaries that are intended for wide distribution on macOS, and can review them both in advance and on a regular basis for known malware/common malware patterns. Say a malware app manages to initially get through, when Apple finds out, they can go back in the notary records and find every sample of that malware to analyze and block. This is purely a technical process, managed by skilled security researchers, while iOS app review and &amp;quot;notarization&amp;quot; is a business process, managed by workers who have been given a checklist of violations to look for.&lt;br /&gt;
&lt;br /&gt;
Apple is retaining complete control over what&#039;s allowed to run on iOS. On macOS, you can choose to run apps that have not been notarized (even though the process to bypass the warning is intentionally difficult). On iOS, you never get even that option. What Apple created is the App Store but with more steps. It still goes on the App Store, just hidden so it can only be installed by the third-party store it&#039;s tied to.&lt;br /&gt;
&lt;br /&gt;
*Mysk: &amp;quot;iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens.&amp;quot;&amp;lt;ref&amp;gt;https://twitter.com/mysk_co/status/1806638308455256242&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==JIT==&lt;br /&gt;
Safari is allowed to [[wikipedia:Just-in-time compilation|just-in-time]] compile code worldwide. The super short version of what that means: it can run JavaScript code &#039;&#039;really fast&#039;&#039;. All browsers, and other runtimes like Microsoft .NET, Java, Lua use this. Ok, fine, it&#039;s the system web browser, it&#039;s very carefully written to be secure, and it&#039;s important to the platform to be doing well in performance benchmarks and all that.&lt;br /&gt;
&lt;br /&gt;
Apple&#039;s [https://apps.apple.com/app/swift-playgrounds/id908519492 Playgrounds] app on iPad is also allowed to JIT. It bundles Apple&#039;s [[wikipedia:Swift (programming language)|Swift]] compiler, and shares backend code with the version of Playgrounds found in [[wikipedia:Xcode|Xcode]].&lt;br /&gt;
&lt;br /&gt;
Competing apps like Pythonista (a Python IDE), emulators like Delta and UTM, and terminal environments like iSH, are not allowed to JIT. As such, they need to rely on inferior performance, potentially from an entirely separate implementation of their compiler/interpreter that may be less proven, because the JIT-less implementation doesn&#039;t need to exist on any other platform.&lt;br /&gt;
&lt;br /&gt;
Likely the most clear example is UTM SE. UTM is a port of the [[wikipedia:QEMU|QEMU]] emulator to iOS, allowing you to run desktop OSes (Linux, Windows 98, XP, classic Mac OS, etc). iPhone hardware is very capable these days and it runs impressively well, &#039;&#039;if&#039;&#039; you use a hack to enable JIT (which Apple has now patched). &amp;quot;SE&amp;quot; stands for &amp;quot;slow edition&amp;quot; - yes, really. If you compare the true version of UTM to the App Store UTM SE app, you &#039;&#039;will&#039;&#039; feel the loss in performance. It&#039;s impressive UTM even got to be on the App Store at all, and the DMA is to thank for it. But Apple is still holding the line on allowing JIT to apps that require that performance.&lt;br /&gt;
&lt;br /&gt;
While UTM SE releasing at all might seem like a pathway to getting Firefox and Chrome &amp;quot;slow editions&amp;quot; on the App Store, browser engines other than the built-in Apple WebKit/JavaScriptCore are still outlawed.&amp;lt;ref&amp;gt;https://developer.apple.com/app-store/review/guidelines/#2.5.6&amp;lt;/ref&amp;gt; In the EU, Apple has blessed web browser JavaScript engines with the option to use JIT. The app must be approved for an entitlement, and then must work within APIs provided by Apple for it. As of January 2025, no browsers have been released using this. We were all anticipating proper competition around web browsers on iOS, but almost a year later, we have nothing. Mozilla has [https://www.theverge.com/2024/1/26/24052067/mozilla-apple-ios-browser-rules-firefox discussed] why.&lt;br /&gt;
&lt;br /&gt;
==Sandbox==&lt;br /&gt;
You might not like app sandboxing, but it&#039;s a powerful security feature used on all modern platforms. The reality is very few apps need more than a few basic permissions. [[wikipedia:Flatpak|Flatpak]] on Linux also sandboxes apps, and it seems to work great! Still, it&#039;s completely fair that there should be processes for doing things beyond what the sandbox allows. You see some of this with permission prompts - does a flashlight app &#039;&#039;really&#039;&#039; need access to your contacts? (Apple has been burned by apps abusing user data before the current permission system was built out.&amp;lt;ref&amp;gt;https://www.theverge.com/2012/2/14/2798008/ios-apps-and-the-address-book-what-you-need-to-know&amp;lt;/ref&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
It can go further than this. As we established in previous sections, an app can be given more access to features of the system using entitlements. These come in a few flavors:&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Completely safe&#039;&#039;&#039;: Entitlements any developer can opt into, with little to no risk.&lt;br /&gt;
*&#039;&#039;&#039;Approval required&#039;&#039;&#039;: Entitlements that might be more of a security risk to allow, e.g. giving considerably wider access to the system, or that Apple simply doesn&#039;t want to hand out to just &#039;&#039;anyone&#039;&#039; for competitive reasons. The developer must submit a request to Apple with evidence of why they need the entitlement.&lt;br /&gt;
*&#039;&#039;&#039;Private&#039;&#039;&#039;: Entitlements that are never allowed for any app developer to use. Many of these are reasonably fenced off because they handle user data that is very risky, or bypasses permission prompts, etc, but can just as well also be guarding features Apple wants to keep to itself.&lt;br /&gt;
&lt;br /&gt;
There have been [https://gizmodo.com/researchers-uber-s-ios-app-had-secret-permissions-that-1819177235 exceptions] where Apple quietly gave a company access to private entitlements anyway, raising eyebrows.&lt;br /&gt;
&lt;br /&gt;
On iOS, you also can&#039;t be &#039;&#039;more&#039;&#039; secure than the default sandbox. That might seem crazy if you&#039;re not a developer, but it&#039;s pretty important for security in a variety of situations. On macOS, there are several entitlements you must declare to decide whether you&#039;re allowed to access certain types of user data at all. Android used this design from the very start - you can&#039;t even do fundamental things like access the internet without declaring it in your manifest. It makes it very explicit what the app&#039;s intentions are.&lt;br /&gt;
&lt;br /&gt;
iOS has one sandbox used by all App Store apps. System apps, and App Store apps developed by Apple, are allowed to expand or reduce their sandbox permissions as needed. Third-party apps do not get the right to expand or reduce their sandbox permissions at all. This is clearly less secure. To take the example of Playgrounds again, while it&#039;s allowed to run your code from a separate process executing in an ultra locked down sandbox with very few permissions, competing apps such as Pythonista must run your code in the same sandbox and address space as the main app process. The Python interpreter crashing would therefore crash the entire app, possibly losing work. In the worst case, a vulnerability in third-party code could give access to all data stored by/accessible to the app. For example, it would be a nightmare if you can tap the wrong link in Safari and have a hacker easily steal your cookies from other websites. If that third-party code could run in its own limited sandbox, the risk is significantly reduced.&lt;br /&gt;
&lt;br /&gt;
The only known workaround is to execute the code via JavaScript, as Apple&#039;s JavaScriptCore engine runs in a heavily sandboxed process. This requires you to port the code to JS, which may be a lot of work, or just not viable. You wouldn&#039;t want to run the Python interpreter inside JavaScript - the performance would be terrible!&lt;br /&gt;
&lt;br /&gt;
==In-app browsers==&lt;br /&gt;
Safari&#039;s in-app browser, that is the minimal version you get when tapping a link from social media, uses an entirely separate data store for each app. The in-app browser isn&#039;t aware of cookies in the &amp;quot;full&amp;quot; Safari app, or any other app, and doesn&#039;t support Safari extensions. Any websites you&#039;re logged into. Apple claimed this was to protect malicious apps from stealing or setting cookies in Safari without your knowledge, which is a fair argument, but it&#039;s hard to not notice that it makes web browsing inconvenient, encouraging users to install native apps, where they can make transactions through Apple.&amp;lt;ref&amp;gt;https://github.com/openid/AppAuth-iOS/issues/120&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This also means your browsing in the in-app browser is just forgotten - there&#039;s no history menu, and it doesn&#039;t get logged to the history in the full Safari app either. Good luck recalling that article you read a few weeks ago.&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
*[https://theapplewiki.com/wiki/Eligibility Eligibility]&lt;br /&gt;
*[https://adamdemasi.com/2024/04/19/app-marketplace-experience.html The iOS 17.4 app marketplace flow is a disaster]&lt;br /&gt;
*[https://adamdemasi.com/2024/04/23/ios-eligibility-features.html Features controlled by iOS 17.4’s eligibility system]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Apple]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=4236</id>
		<title>Apple App Store</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=4236"/>
		<updated>2025-01-22T10:05:50Z</updated>

		<summary type="html">&lt;p&gt;Kirb: /* In-app purchases */ New section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:App Store (iOS).svg|thumb|150px]]&lt;br /&gt;
&lt;br /&gt;
Apple uses several technical measures to protect their App Store ecosystem and prevent consumer choice. They are good at obscuring their intentions with technical roadblocks, while typically citing security reasons for them - assuming the public even recognizes what is going on. This actively hurts the ability for lawmakers to have an accurate understanding, so they can consider applying legislative pressure.&lt;br /&gt;
&lt;br /&gt;
A never-ending demand for a cut of every sale of a digital product, ranging from game currency, to supporting content creators,&amp;lt;ref name=&amp;quot;patreon&amp;quot;&amp;gt;https://www.theverge.com/2024/8/12/24218629/patreon-membership-ios-30-percent-apple-tax&amp;lt;/ref&amp;gt; to booking a Zoom call with a local business,&amp;lt;ref name=&amp;quot;facebook&amp;quot;&amp;gt;https://www.reuters.com/article/us-facebook-apple-exclusive/exclusive-facebook-says-apple-rejected-its-attempt-to-tell-users-about-app-store-fees-idUSKBN25O042/&amp;lt;/ref&amp;gt;&amp;lt;/ref&amp;gt;, hurts the ability for app developers to innovate. These developers, working hard and pulling countless hours to build a quality app, always need to take Apple&#039;s (and [[Google]]&#039;s) demands into account - specifically, between 15% and 30% of their revenue. This is revenue that can be reinvested into the app, but instead must be earmarked for the platform they are &#039;&#039;&#039;required&#039;&#039;&#039; to use to reach their customers.&lt;br /&gt;
&lt;br /&gt;
Because this is a clear problem, several governments, including South Korea,&amp;lt;ref&amp;gt;https://www.reuters.com/technology/skorea-approves-rules-app-store-law-targeting-apple-google-2022-03-08/&amp;lt;/ref&amp;gt; Japan,&amp;lt;ref&amp;gt;https://www.theregister.com/2024/06/13/japan_smartphone_software_law/&amp;lt;/ref&amp;gt; the European Union,&amp;lt;ref&amp;gt;[[wikipedia:Digital Markets Act|Digital Markets Act]]&amp;lt;/ref&amp;gt; the United Kingdom,&amp;lt;ref&amp;gt;https://www.gov.uk/cma-cases/investigation-into-apple-appstore&amp;lt;/ref&amp;gt; Australia,&amp;lt;ref&amp;gt;https://www.accc.gov.au/media-release/dominance-of-apple-and-googles-app-stores-impacting-competition-and-consumers&amp;lt;/ref&amp;gt; as well as the US and a handful of states,&amp;lt;ref&amp;gt;[[wikipedia:Open App Markets Act|Open App Markets Act]]&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://www.congress.gov/bill/118th-congress/senate-bill/5364/text/is&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;doj&amp;quot;&amp;gt;https://apnews.com/article/apple-antitrust-monopoly-app-store-justice-department-822d7e8f5cf53a2636795fcc33ee1fc3&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://azcapitoltimes.com/news/2021/02/19/its-time-to-free-ourselves-from-big-tech-monopoly/&amp;lt;/ref&amp;gt; have opened investigations into anti-competitive practices, or considered or already passed legislation to force &amp;quot;gatekeeper platforms&amp;quot; such as Apple to be more reasonable with third-party developers.&lt;br /&gt;
&lt;br /&gt;
This being a major threat to Apple&#039;s revenue stream (interestingly, one they claim to be unsure is profitable&amp;lt;ref&amp;gt;https://9to5mac.com/2024/04/17/app-store-is-profitable-apple-notes/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://9to5mac.com/2025/01/17/apple-denies-app-store-profit-margin-is-75-claims-to-have-no-clue/&amp;lt;/ref&amp;gt;), they have responded with practices such as geoblocking certain operating system functionality based on physical location,&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/Eligibility&amp;lt;/ref&amp;gt; misrepresenting/overstating risks, and using existing, trusted terms to describe unreasonably difficult to use systems.&lt;br /&gt;
&lt;br /&gt;
== Background info ==&lt;br /&gt;
Important terms you&#039;ll run into in this article:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;[[wikipedia:Sandbox (computer security)|Sandbox]]&#039;&#039;&#039;: Reduces exposure of the user&#039;s device/data to security risks, by reducing what an app is allowed to do.&lt;br /&gt;
* &#039;&#039;&#039;[https://theapplewiki.com/wiki/Entitlements Entitlements]&#039;&#039;&#039;: Apple&#039;s method of &amp;quot;poking holes&amp;quot; in the sandbox, to give the app more permissions. Some are available to developers, while many are only available to Apple.&lt;br /&gt;
* &#039;&#039;&#039;[[wikipedia:Digital Markets Act|Digital Markets Act]]&#039;&#039;&#039;: The European Union&#039;s fairly sweeping recent regulations against forcing companies they classify as &amp;quot;gatekeepers&amp;quot; to play nice, giving smaller businesses access to software/hardware features they&#039;ve historically reserved for their own use.&lt;br /&gt;
&lt;br /&gt;
== In-app purchases ==&lt;br /&gt;
Apple has been collecting users&#039; credit card numbers since opening the iTunes Store in 2004. The opening of the App Store in 2008, followed by the introduction of in-app purchases (IAPs) in 2009, gave iPhone app developers the opportunity to sell app features to users. The IAP system is provided as a developer framework named [https://developer.apple.com/storekit/ StoreKit]. Apps and their in-app purchases are managed through a dashboard named [https://developer.apple.com/app-store-connect/ App Store Connect]. App sales have eclipsed iTunes Store sales, and are now a primary focus of Apple&#039;s Media Services division.&lt;br /&gt;
&lt;br /&gt;
Apple requires every purchase of a digital good or service in an app to use their in-app purchase system. This may seem reasonable, because the customer may inevitably call Apple support, demanding a refund for an app they have issues with. Apple would rather give that refund and leave the customer with a positive support experience, than to provide a messy process involving contacting a third-party, whose customer service is likely nowhere near the same experience.&lt;br /&gt;
&lt;br /&gt;
App Store purchase fees are between 15% and 30%. In September 2016, Apple expanded subscriptions to be available to any type of app, also introducing a 15% discount incentive when the user has already subscribed for a year.&amp;lt;ref&amp;gt;https://www.theverge.com/2016/9/2/12774758/apple-developers-app-store-new-subscription-rules&amp;lt;/ref&amp;gt; In November 2020, Apple introduced a reduced 15% fee for app developers with revenue below $1 million per year, with exceptions such as for games.&amp;lt;ref&amp;gt;https://tidbits.com/2020/11/18/apple-drops-app-store-commission-to-15-for-small-developers/&amp;lt;/ref&amp;gt; Otherwise, the fee is 30%. In the 2008 announcement of the App Store, Apple considered this a reasonable, industry-standard fee. However, the way we use apps has significantly evolved since 2009 - the world has shifted to heavily rely on mobile apps, which have also evolved into more complex and sustainable business models than a simple one-time purchase.&lt;br /&gt;
&lt;br /&gt;
[[wikipedia:Stripe, Inc.|Stripe]], a very popular platform used for payments on the web, uses a base fee of 2.9% plus a fixed $0.30 in the United States.&amp;lt;ref&amp;gt;https://stripe.com/pricing&amp;lt;/ref&amp;gt; With add-on services, before considering volume discounts, a Stripe transaction may rather have a cost of 6.4% + $1.10.&amp;lt;ref&amp;gt;Calculated from base fee (2.9% + $0.30) + international card (1.5%) + adaptive pricing (2%) + international payment methods ($0.80), as of January 2025&amp;lt;/ref&amp;gt; Competing payments services have fees close or identical to this. &#039;&#039;&#039;The in-app purchase system does not provide sufficient value to justify considerably higher fees than alternative payment platforms.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The App Store system poorly handles secondary marketplaces of digital services that exist within the primary App Store marketplace, such as Patreon. Apple, however, still requires companies in the business of selling digital services to use this inadequate system. This requires the app to account for Apple&#039;s fee, which is significant enough to often warrant increasing prices, and to follow rules even if they do not make sense for the nature of service they are providing. Apple has frequently been found in disputes with such apps. This injects extra complication at no benefit to the marketplace, the creator, or the customer - only to Apple, who has little to no involvement after delivering the initial app download to the user&#039;s phone. The significant fee also often drives app developers to consider building their app around an advertising model instead, creating privacy concerns.&lt;br /&gt;
&lt;br /&gt;
Additionally, the 15% small businesses fee discount is judged based on the app&#039;s overall turnover, and is not based on individual creators in the app&#039;s marketplace. An app that turns over $1 million per year by providing services to creators that individually make less than $1 million per year does not have the opportunity to use the discount.&lt;br /&gt;
&lt;br /&gt;
Apple, often together with Google, use lobbying efforts in the United States and other countries in an attempt to minimize the issues. &amp;quot;ACT | The App Association&amp;quot;, pitched as an association of independent small business app developers, is at least 50% funded by Apple, and does not list its claimed 2,000 members.&amp;lt;ref&amp;gt;http://www.fosspatents.com/2021/10/not-class-act-so-called-app-association.html&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;http://www.fosspatents.com/2022/09/vast-majority-of-act-app-associations.html&amp;lt;/ref&amp;gt; In March 2024, the United States Department of Justice along with 16 state attorneys-general filed a lawsuit against Apple, including an accusation that the company &amp;quot;extracts more money from consumers, developers, content creators, artists, publishers, small businesses, and merchants, among others&amp;quot;.&amp;lt;ref name=&amp;quot;doj&amp;quot;/&amp;gt; The future of this lawsuit is unclear as of January 2025.&lt;br /&gt;
&lt;br /&gt;
Given Apple&#039;s strong incentives, and a ticking clock as legal pressure builds, it is not hard to find stories from app developers regarding poor experiences with Apple&#039;s app review process.&lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;This list is extremely incomplete. Please add examples if you know of any.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== Facebook Online Events ===&lt;br /&gt;
In August 2020, in response to the COVID-19 pandemic, Facebook introduced the ability for small businesses to accept an entrance fee for events. Previously, Facebook would only act as a way to RSVP for the event - the organizer must use a third-party event ticketing system to collect fees. The company pledged to not collect any fee on event sales &amp;quot;until 2023&amp;quot;.&amp;lt;ref&amp;gt;https://about.fb.com/news/2020/08/paid-online-events/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Apple disagreed, requiring the feature to use the in-app purchases system. This introduced Apple&#039;s 30% fee. As this increases the price the user pays, with no benefit to the small business the user intended to support, the fee was displayed as a line item in checkout. Apple did not accept this disclosure of the fee, referring to it as &amp;quot;irrelevant&amp;quot;.&amp;lt;ref name=&amp;quot;facebook&amp;quot;/&amp;gt; Facebook was allowed to compromise on displaying the fee, but &#039;&#039;without&#039;&#039; indicating that it is specifically an App Store fee.&lt;br /&gt;
&lt;br /&gt;
=== HEY ===&lt;br /&gt;
HEY.com is a paid webmail provider launched in June 2020 by long-time software company [[wikipedia:37signals|37signals]], specializing in providing tools that help organize the inbox.&lt;br /&gt;
&lt;br /&gt;
After successfully launching the initial version of their app on the App Store, the company announced that an update was rejected. The app did not intend to support in-app purchases. Instead, the user is expected to already have an account with the service. Apple did not like this arrangement, and demanded the company build an in-app subscription option. The company argued that they are being held to a different set of rules than apps such as [[Netflix]], whose app does not provide any way to purchase.&amp;lt;ref&amp;gt;https://www.theverge.com/2020/6/16/21293419/hey-apple-rejection-ios-app-store-dhh-gangsters-antitrust&amp;lt;/ref&amp;gt; After a suggestion from Apple executive Phil Schiller in the media, HEY introduced a 14 day free trial mode, which was approved.&amp;lt;ref&amp;gt;https://www.hey.com/apple/path/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://techcrunch.com/2020/06/18/interview-apples-schiller-says-position-on-hey-app-is-unchanged-and-no-rules-changes-are-imminent/&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Patreon ===&lt;br /&gt;
In August 2024, [[Patreon]] announced a change in arrangement with Apple for its App Store app. From November 2024, subscriptions started from the iOS app would be required to use the in-app purchase system, bypassing Patreon&#039;s own long-standing payments practices.&amp;lt;ref&amp;gt;https://news.patreon.com/articles/understanding-apple-requirements-for-patreon&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;patreon&amp;quot; /&amp;gt; This change does not affect the Android app.&lt;br /&gt;
&lt;br /&gt;
By forcing Patreon out of the payments pipeline, certain payment models are no longer available to users of Patreon&#039;s iOS app. Creators who rely on the &amp;quot;per-creation&amp;quot; payment model, as opposed to the standard &amp;quot;per-month&amp;quot;, can no longer be subscribed to from the app. The app is also not able to support the &amp;quot;first-of-the-month&amp;quot; model, where payments from all subscribers are collected on the first day of the month, rather than every 30 days since each member&#039;s day of subscription. The price must also be rounded to a price tier supported by Apple.&lt;br /&gt;
&lt;br /&gt;
Patreon provides creators with the choice to increase their prices by 30% in the iOS app, or to keep the same prices but forfeit 30% to Apple. Creators frequently remind potential supporters to not use the Patreon iOS app, adding extra inconvenience to those wanting to support the work of small creators.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;gallery mode=&amp;quot;packed&amp;quot; heights=&amp;quot;500px&amp;quot;&amp;gt;&lt;br /&gt;
File:Patreon iOS app pricing options - fee on top.png|&amp;quot;Maintain earnings and cover Apple&#039;s fee by increasing prices in iOS app&amp;quot; (Recommended)&lt;br /&gt;
File:Patreon iOS app pricing options - absorb fee.png|&amp;quot;Keep prices in the iOS app the same and cover Apple&#039;s fee yourself&amp;quot;&lt;br /&gt;
&amp;lt;/gallery&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A similar case occurred with the app Fanhouse in 2021.&amp;lt;ref&amp;gt;https://twitter.com/jasminericegirl/status/1402691047940100100&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Twitter ===&lt;br /&gt;
In August 2021, [[Twitter]] introduced a feature named Super Follows (now Subscriptions), in which a user can pay a subscription fee to access more of a creator&#039;s content. For each user who enables Subscriptions, Twitter must submit a new in-app purchase SKU to the App Store, which will become available with the next update to the app.&amp;lt;ref&amp;gt;https://twitter.com/wongmjane/status/1433372120080261120&amp;lt;/ref&amp;gt; This, of course, is subject to the 30% fee. At the time of writing in January 2025, viewing the App Store listing reveals Elon Musk&#039;s $4.00 subscription as the fourth most popular IAP item.&lt;br /&gt;
&lt;br /&gt;
== Notarization ==&lt;br /&gt;
Since 2015, Apple expects all Mac apps to be &amp;quot;notarized&amp;quot;. This is a preliminary, automated malware check, which upon passing, provides a notary certificate that gets &amp;quot;stapled&amp;quot; to the app. Apple&#039;s explanation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Notarization of macOS software is not App Review. The Apple notary service is an automated system that scans your software for malicious content, checks for code-signing issues, and returns the results to you quickly. If there are no issues, the notary service generates a ticket for you to staple to your software; the notary service also publishes that ticket online where Gatekeeper can find it.&amp;lt;ref&amp;gt;https://developer.apple.com/documentation/security/notarizing-macos-software-before-distribution&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whether this is actually a better approach than used by Windows antivirus, where they find out about new malware samples only when they end up on a user&#039;s computer, is a separate topic.&lt;br /&gt;
&lt;br /&gt;
To comply with the DMA&#039;s regulations on app marketplaces, Apple created a new channel of releasing apps outside of the iOS App Store. Apps go through a notarization process. But the process is definitely &#039;&#039;not&#039;&#039; notarization. The name is intentionally being abused, by contrast to notarization on macOS, to make you believe it is something other than the existing App Review system. Despite the pain some developers and users have with it, notarization on macOS has always been considered a net positive. It made sense to take advantage of its reputation for the entirely different &amp;quot;notarization&amp;quot; on iOS.&lt;br /&gt;
&lt;br /&gt;
See for yourself - view the [https://developer.apple.com/app-store/review/guidelines/ App Review Guidelines] and tick &amp;quot;Show Notarization Review Guidelines Only&amp;quot;. While most rules are knocked out by this, a good number of them are still in place. These apps are still reviewed and tested by the App Review team, must have a full product listing in App Store Connect, and can be outright rejected - all in the same way as an App Store app.&lt;br /&gt;
&lt;br /&gt;
By contrast, all that is required for notarization on macOS is for your app to not be malware. You submit it to an automated system that approves it within minutes. &#039;&#039;&#039;You don&#039;t need to convince Apple your app is worthy of existing on their platform.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The point of macOS notarization is that Apple has a record of all binaries that are intended for wide distribution on macOS, and can review them both in advance and on a regular basis for known malware/common malware patterns. Say a malware app manages to initially get through, when Apple finds out, they can go back in the notary records and find every sample of that malware to analyze and block. This is purely a technical process, managed by skilled security researchers, while iOS app review and &amp;quot;notarization&amp;quot; is a business process, managed by workers who have been given a checklist of violations to look for.&lt;br /&gt;
&lt;br /&gt;
Apple is retaining complete control over what&#039;s allowed to run on iOS. On macOS, you can choose to run apps that have not been notarized (even though the process to bypass the warning is intentionally difficult). On iOS, you never get even that option. What Apple created is the App Store but with more steps. It still goes on the App Store, just hidden so it can only be installed by the third-party store it&#039;s tied to.&lt;br /&gt;
&lt;br /&gt;
* Mysk: &amp;quot;iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens.&amp;quot;&amp;lt;ref&amp;gt;https://twitter.com/mysk_co/status/1806638308455256242&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== JIT ==&lt;br /&gt;
Safari is allowed to [[wikipedia:Just-in-time compilation|just-in-time]] compile code worldwide. The super short version of what that means: it can run JavaScript code &#039;&#039;really fast&#039;&#039;. All browsers, and other runtimes like Microsoft .NET, Java, Lua use this. Ok, fine, it&#039;s the system web browser, it&#039;s very carefully written to be secure, and it&#039;s important to the platform to be doing well in performance benchmarks and all that.&lt;br /&gt;
&lt;br /&gt;
Apple&#039;s [https://apps.apple.com/app/swift-playgrounds/id908519492 Playgrounds] app on iPad is also allowed to JIT. It bundles Apple&#039;s [[wikipedia:Swift (programming language)|Swift]] compiler, and shares backend code with the version of Playgrounds found in [[wikipedia:Xcode|Xcode]].&lt;br /&gt;
&lt;br /&gt;
Competing apps like Pythonista (a Python IDE), emulators like Delta and UTM, and terminal environments like iSH, are not allowed to JIT. As such, they need to rely on inferior performance, potentially from an entirely separate implementation of their compiler/interpreter that may be less proven, because the JIT-less implementation doesn&#039;t need to exist on any other platform.&lt;br /&gt;
&lt;br /&gt;
Likely the most clear example is UTM SE. UTM is a port of the [[wikipedia:QEMU|QEMU]] emulator to iOS, allowing you to run desktop OSes (Linux, Windows 98, XP, classic Mac OS, etc). iPhone hardware is very capable these days and it runs impressively well, &#039;&#039;if&#039;&#039; you use a hack to enable JIT (which Apple has now patched). &amp;quot;SE&amp;quot; stands for &amp;quot;slow edition&amp;quot; - yes, really. If you compare the true version of UTM to the App Store UTM SE app, you &#039;&#039;will&#039;&#039; feel the loss in performance. It&#039;s impressive UTM even got to be on the App Store at all, and the DMA is to thank for it. But Apple is still holding the line on allowing JIT to apps that require that performance.&lt;br /&gt;
&lt;br /&gt;
While UTM SE releasing at all might seem like a pathway to getting Firefox and Chrome &amp;quot;slow editions&amp;quot; on the App Store, browser engines other than the built-in Apple WebKit/JavaScriptCore are [https://developer.apple.com/app-store/review/guidelines/#2.5.6 still outlawed]. In the EU, Apple has blessed web browser JavaScript engines with the option to use JIT. The app must be approved for an entitlement, and then must work within APIs provided by Apple for it. As of January 2025, no browsers have been released using this. We were all anticipating proper competition around web browsers on iOS, but almost a year later, we have nothing. Mozilla has [https://www.theverge.com/2024/1/26/24052067/mozilla-apple-ios-browser-rules-firefox discussed] why.&lt;br /&gt;
&lt;br /&gt;
== Sandbox ==&lt;br /&gt;
You might not like app sandboxing, but it&#039;s a powerful security feature used on all modern platforms. The reality is very few apps need more than a few basic permissions. [[wikipedia:Flatpak|Flatpak]] on Linux also sandboxes apps, and it seems to work great! Still, it&#039;s completely fair that there should be processes for doing things beyond what the sandbox allows. You see some of this with permission prompts - does a flashlight app &#039;&#039;really&#039;&#039; need access to your contacts? (Apple has been burned by [https://www.theverge.com/2012/2/14/2798008/ios-apps-and-the-address-book-what-you-need-to-know apps abusing user data] before the current permission system was built out.)&lt;br /&gt;
&lt;br /&gt;
It can go further than this. As we established in previous sections, an app can be given more access to features of the system using entitlements. These come in a few flavors:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Completely safe&#039;&#039;&#039;: Entitlements any developer can opt into, with little to no risk.&lt;br /&gt;
* &#039;&#039;&#039;Approval required&#039;&#039;&#039;: Entitlements that might be more of a security risk to allow, e.g. giving considerably wider access to the system, or that Apple simply doesn&#039;t want to hand out to just &#039;&#039;anyone&#039;&#039; for competitive reasons. The developer must submit a request to Apple with evidence of why they need the entitlement.&lt;br /&gt;
* &#039;&#039;&#039;Private&#039;&#039;&#039;: Entitlements that are never allowed for any app developer to use. Many of these are reasonably fenced off because they handle user data that is very risky, or bypasses permission prompts, etc, but can just as well also be guarding features Apple wants to keep to itself.&lt;br /&gt;
&lt;br /&gt;
There have been [https://gizmodo.com/researchers-uber-s-ios-app-had-secret-permissions-that-1819177235 exceptions] where Apple quietly gave a company access to private entitlements anyway, raising eyebrows.&lt;br /&gt;
&lt;br /&gt;
On iOS, you also can&#039;t be &#039;&#039;more&#039;&#039; secure than the default sandbox. That might seem crazy if you&#039;re not a developer, but it&#039;s pretty important for security in a variety of situations. On macOS, there are several entitlements you must declare to decide whether you&#039;re allowed to access certain types of user data at all. Android used this design from the very start - you can&#039;t even do fundamental things like access the internet without declaring it in your manifest. It makes it very explicit what the app&#039;s intentions are.&lt;br /&gt;
&lt;br /&gt;
iOS has one sandbox used by all App Store apps. System apps, and App Store apps developed by Apple, are allowed to expand or reduce their sandbox permissions as needed. Third-party apps do not get the right to expand or reduce their sandbox permissions at all. This is clearly less secure. To take the example of Playgrounds again, while it&#039;s allowed to run your code from a separate process executing in an ultra locked down sandbox with very few permissions, competing apps such as Pythonista must run your code in the same sandbox and address space as the main app process. The Python interpreter crashing would therefore crash the entire app, possibly losing work. In the worst case, a vulnerability in third-party code could give access to all data stored by/accessible to the app. For example, it would be a nightmare if you can tap the wrong link in Safari and have a hacker easily steal your cookies from other websites. If that third-party code could run in its own limited sandbox, the risk is significantly reduced.&lt;br /&gt;
&lt;br /&gt;
The only known workaround is to execute the code via JavaScript, as Apple&#039;s JavaScriptCore engine runs in a heavily sandboxed process. This requires you to port the code to JS, which may be a lot of work, or just not viable. You wouldn&#039;t want to run the Python interpreter inside JavaScript - the performance would be terrible!&lt;br /&gt;
&lt;br /&gt;
== In-app browsers ==&lt;br /&gt;
Safari&#039;s in-app browser, that is the minimal version you get when tapping a link from social media, uses an entirely separate data store for each app. The in-app browser isn&#039;t aware of cookies in the &amp;quot;full&amp;quot; Safari app, or any other app, and doesn&#039;t support Safari extensions. Any websites you&#039;re logged into. Apple [https://github.com/openid/AppAuth-iOS/issues/120 claimed] this was to protect malicious apps from stealing or setting cookies in Safari without your knowledge, which is a fair argument, but it&#039;s hard to not notice that it makes web browsing inconvenient, encouraging users to install native apps, where they can make transactions through Apple.&lt;br /&gt;
&lt;br /&gt;
This also means your browsing in the in-app browser is just forgotten - there&#039;s no history menu, and it doesn&#039;t get logged to the history in the full Safari app either. Good luck recalling that article you read a few weeks ago.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [https://theapplewiki.com/wiki/Eligibility Eligibility]&lt;br /&gt;
* [https://adamdemasi.com/2024/04/19/app-marketplace-experience.html The iOS 17.4 app marketplace flow is a disaster]&lt;br /&gt;
* [https://adamdemasi.com/2024/04/23/ios-eligibility-features.html Features controlled by iOS 17.4’s eligibility system]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Apple]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=File:App_Store_(iOS).svg&amp;diff=4189</id>
		<title>File:App Store (iOS).svg</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=File:App_Store_(iOS).svg&amp;diff=4189"/>
		<updated>2025-01-22T08:11:47Z</updated>

		<summary type="html">&lt;p&gt;Kirb: App Store logo, from [https://commons.wikimedia.org/wiki/File:App_Store_(iOS).svg], released as public domain&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
App Store logo, from [https://commons.wikimedia.org/wiki/File:App_Store_(iOS).svg], released as public domain&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=File:Patreon_iOS_app_pricing_options_-_fee_on_top.png&amp;diff=4185</id>
		<title>File:Patreon iOS app pricing options - fee on top.png</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=File:Patreon_iOS_app_pricing_options_-_fee_on_top.png&amp;diff=4185"/>
		<updated>2025-01-22T07:16:00Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Screenshot of Patreon dashboard for Apple App Store&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Screenshot of Patreon dashboard for [[Apple App Store]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=File:Patreon_iOS_app_pricing_options_-_absorb_fee.png&amp;diff=4184</id>
		<title>File:Patreon iOS app pricing options - absorb fee.png</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=File:Patreon_iOS_app_pricing_options_-_absorb_fee.png&amp;diff=4184"/>
		<updated>2025-01-22T07:15:52Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Screenshot of Patreon dashboard for Apple App Store&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Summary ==&lt;br /&gt;
Screenshot of Patreon dashboard for [[Apple App Store]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=2384</id>
		<title>Apple App Store</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=2384"/>
		<updated>2025-01-18T17:26:41Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Write an intro&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Apple uses several technical measures to protect their App Store ecosystem and prevent consumer choice. They are good at obscuring their intentions with technical roadblocks, while typically citing security reasons for them - assuming the public even recognizes what is going on. This actively hurts the ability for lawmakers to have an accurate understanding, so they can consider applying legislative pressure.&lt;br /&gt;
&lt;br /&gt;
A never-ending demand for a cut of every sale of a digital product, ranging from game currency, to supporting content creators,&amp;lt;ref&amp;gt; https://www.theverge.com/2024/8/12/24218629/patreon-membership-ios-30-percent-apple-tax&amp;lt;/ref&amp;gt; to booking a Zoom call with a local business&amp;lt;ref&amp;gt; https://www.theverge.com/2020/8/14/21369169/facebook-paid-live-events-ios-android-apple-app-store-fees-fortnite-epic&amp;lt;/ref&amp;gt;, hurts the ability for app developers to innovate. These developers, working hard and pulling countless hours to build a quality app, always need to take Apple&#039;s (and [[Google]]&#039;s) demands into account - specifically, between 15% and 30% of their revenue. This is revenue that can be reinvested into the app, but instead must be earmarked for the platform they are &#039;&#039;&#039;required&#039;&#039;&#039; to use to reach their customers.&lt;br /&gt;
&lt;br /&gt;
Because this is a clear problem, several countries, including South Korea, Japan, the European Union, the United Kingdom, Australia, as well as a handful of US states,&amp;lt;!-- TODO: Receipts for each country + states --&amp;gt; have considered or have already passed legislation to force &amp;quot;gatekeeper platforms&amp;quot; such as Apple to be more reasonable with third-party developers.&lt;br /&gt;
&lt;br /&gt;
This being a major threat to Apple&#039;s revenue stream (interestingly, one they claim to be unsure is profitable&amp;lt;ref&amp;gt;https://9to5mac.com/2024/04/17/app-store-is-profitable-apple-notes/&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://9to5mac.com/2025/01/17/apple-denies-app-store-profit-margin-is-75-claims-to-have-no-clue/&amp;lt;/ref&amp;gt;), they have responded with practices such as geoblocking certain operating system functionality based on physical location,&amp;lt;ref&amp;gt;https://theapplewiki.com/wiki/Eligibility&amp;lt;/ref&amp;gt; misrepresenting/overstating risks, and using existing, trusted terms to describe unreasonably difficult to use systems.&lt;br /&gt;
&lt;br /&gt;
== Background info ==&lt;br /&gt;
Important terms you&#039;ll run into in this article:&lt;br /&gt;
&lt;br /&gt;
* [[wikipedia:Sandbox (computer security)|Sandbox]]: Reduces exposure of the user&#039;s device/data to security risks, by reducing what an app is allowed to do.&lt;br /&gt;
* [https://theapplewiki.com/wiki/Entitlements Entitlements]: Apple&#039;s method of &amp;quot;poking holes&amp;quot; in the sandbox, to give the app more permissions. Some are available to developers, while many are only available to Apple.&lt;br /&gt;
* [[wikipedia:Digital Markets Act|Digital Markets Act]]: The European Union&#039;s fairly sweeping recent regulations against forcing companies they classify as &amp;quot;gatekeepers&amp;quot; to play nice, giving smaller businesses access to software/hardware features they&#039;ve historically reserved for their own use.&lt;br /&gt;
&lt;br /&gt;
== Notarization ==&lt;br /&gt;
Since 2015, Apple expects all Mac apps to be &amp;quot;notarized&amp;quot;. This is a preliminary, automated malware check, which upon passing, provides a notary certificate that gets &amp;quot;stapled&amp;quot; to the app. Apple&#039;s explanation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Notarization of macOS software is not App Review. The Apple notary service is an automated system that scans your software for malicious content, checks for code-signing issues, and returns the results to you quickly. If there are no issues, the notary service generates a ticket for you to staple to your software; the notary service also publishes that ticket online where Gatekeeper can find it.&amp;lt;ref&amp;gt;https://developer.apple.com/documentation/security/notarizing-macos-software-before-distribution&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whether this is actually a better approach than used by Windows antivirus, where they find out about new malware samples only when they end up on a user&#039;s computer, is a separate topic.&lt;br /&gt;
&lt;br /&gt;
To comply with the DMA&#039;s regulations on app marketplaces, Apple created a new channel of releasing apps outside of the iOS App Store. Apps go through a notarization process. But the process is definitely &#039;&#039;not&#039;&#039; notarization. The name is intentionally being abused, by contrast to notarization on macOS, to make you believe it is something other than the existing App Review system. Despite the pain some developers and users have with it, notarization on macOS has always been considered a net positive. It made sense to take advantage of its reputation for the entirely different &amp;quot;notarization&amp;quot; on iOS.&lt;br /&gt;
&lt;br /&gt;
See for yourself - view the [https://developer.apple.com/app-store/review/guidelines/ App Review Guidelines] and tick &amp;quot;Show Notarization Review Guidelines Only&amp;quot;. While most rules are knocked out by this, a good number of them are still in place. These apps are still reviewed and tested by the App Review team, must have a full product listing in App Store Connect, and can be outright rejected - all in the same way as an App Store app.&lt;br /&gt;
&lt;br /&gt;
By contrast, all that is required for notarization on macOS is for your app to not be malware. You submit it to an automated system that approves it within minutes. &#039;&#039;&#039;You don&#039;t need to convince Apple your app is worthy of existing on their platform.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The point of macOS notarization is that Apple has a record of all binaries that are intended for wide distribution on macOS, and can review them both in advance and on a regular basis for known malware/common malware patterns. Say a malware app manages to initially get through, when Apple finds out, they can go back in the notary records and find every sample of that malware to analyze and block. This is purely a technical process, managed by skilled security researchers, while iOS app review and &amp;quot;notarization&amp;quot; is a business process, managed by workers who have been given a checklist of violations to look for.&lt;br /&gt;
&lt;br /&gt;
Apple is retaining complete control over what&#039;s allowed to run on iOS. On macOS, you can choose to run apps that have not been notarized (even though the process to bypass the warning is intentionally difficult). On iOS, you never get even that option. What Apple created is the App Store but with more steps. It still goes on the App Store, just hidden so it can only be installed by the third-party store it&#039;s tied to.&lt;br /&gt;
&lt;br /&gt;
* [https://twitter.com/mysk_co/status/1806638308455256242 Mysk: iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens.]&lt;br /&gt;
&lt;br /&gt;
== JIT ==&lt;br /&gt;
Safari is allowed to [[wikipedia:Just-in-time compilation|just-in-time]] compile code worldwide. The super short version of what that means: it can run JavaScript code &#039;&#039;really fast&#039;&#039;. All browsers, and other runtimes like Microsoft .NET, Java, Lua use this. Ok, fine, it&#039;s the system web browser, it&#039;s very carefully written to be secure, and it&#039;s important to the platform to be doing well in performance benchmarks and all that.&lt;br /&gt;
&lt;br /&gt;
Apple&#039;s [https://apps.apple.com/app/swift-playgrounds/id908519492 Playgrounds] app on iPad is also allowed to JIT. It bundles Apple&#039;s [[wikipedia:Swift (programming language)|Swift]] compiler, and shares backend code with the version of Playgrounds found in [[wikipedia:Xcode|Xcode]].&lt;br /&gt;
&lt;br /&gt;
Competing apps like Pythonista (a Python IDE), emulators like Delta and UTM, and terminal environments like iSH, are not allowed to JIT. As such, they need to rely on inferior performance, potentially from an entirely separate implementation of their compiler/interpreter that may be less proven, because the JIT-less implementation doesn&#039;t need to exist on any other platform.&lt;br /&gt;
&lt;br /&gt;
Likely the most clear example is UTM SE. UTM is a port of the [[wikipedia:QEMU|QEMU]] emulator to iOS, allowing you to run desktop OSes (Linux, Windows 98, XP, classic Mac OS, etc). iPhone hardware is very capable these days and it runs impressively well, &#039;&#039;if&#039;&#039; you use a hack to enable JIT (which Apple has now patched). &amp;quot;SE&amp;quot; stands for &amp;quot;slow edition&amp;quot; - yes, really. If you compare the true version of UTM to the App Store UTM SE app, you &#039;&#039;will&#039;&#039; feel the loss in performance. It&#039;s impressive UTM even got to be on the App Store at all, and the DMA is to thank for it. But Apple is still holding the line on allowing JIT to apps that require that performance.&lt;br /&gt;
&lt;br /&gt;
While UTM SE releasing at all might seem like a pathway to getting Firefox and Chrome &amp;quot;slow editions&amp;quot; on the App Store, browser engines other than the built-in Apple WebKit/JavaScriptCore are [https://developer.apple.com/app-store/review/guidelines/#2.5.6 still outlawed]. In the EU, Apple has blessed web browser JavaScript engines with the option to use JIT. The app must be approved for an entitlement, and then must work within APIs provided by Apple for it. As of January 2025, no browsers have been released using this. We were all anticipating proper competition around web browsers on iOS, but almost a year later, we have nothing. Mozilla has [https://www.theverge.com/2024/1/26/24052067/mozilla-apple-ios-browser-rules-firefox discussed] why.&lt;br /&gt;
&lt;br /&gt;
== Sandbox ==&lt;br /&gt;
You might not like app sandboxing, but it&#039;s a powerful security feature used on all modern platforms. The reality is very few apps need more than a few basic permissions. [[wikipedia:Flatpak|Flatpak]] on Linux also sandboxes apps, and it seems to work great! Still, it&#039;s completely fair that there should be processes for doing things beyond what the sandbox allows. You see some of this with permission prompts - does a flashlight app &#039;&#039;really&#039;&#039; need access to your contacts? (Apple has been burned by [https://www.theverge.com/2012/2/14/2798008/ios-apps-and-the-address-book-what-you-need-to-know apps abusing user data] before the current permission system was built out.)&lt;br /&gt;
&lt;br /&gt;
It can go further than this. As we established in previous sections, an app can be given more access to features of the system using entitlements. These come in a few flavors:&lt;br /&gt;
&lt;br /&gt;
* Completely safe: Entitlements any developer can opt into, with little to no risk.&lt;br /&gt;
* Approval required: Entitlements that might be more of a security risk to allow, e.g. giving considerably wider access to the system, or that Apple simply doesn&#039;t want to hand out to just &#039;&#039;anyone&#039;&#039; for competitive reasons. The developer must submit a request to Apple with evidence of why they need the entitlement.&lt;br /&gt;
* Private: Entitlements that are never allowed for any app developer to use. Many of these are reasonably fenced off because they handle user data that is very risky, or bypasses permission prompts, etc, but can just as well also be guarding features Apple wants to keep to itself.&lt;br /&gt;
&lt;br /&gt;
There have been [https://gizmodo.com/researchers-uber-s-ios-app-had-secret-permissions-that-1819177235 exceptions] where Apple quietly gave a company access to private entitlements anyway, raising eyebrows.&lt;br /&gt;
&lt;br /&gt;
On iOS, you also can&#039;t be &#039;&#039;more&#039;&#039; secure than the default sandbox. That might seem crazy if you&#039;re not a developer, but it&#039;s pretty important for security in a variety of situations. On macOS, there are several entitlements you must declare to decide whether you&#039;re allowed to access certain types of user data at all. Android used this design from the very start - you can&#039;t even do fundamental things like access the internet without declaring it in your manifest. It makes it very explicit what the app&#039;s intentions are.&lt;br /&gt;
&lt;br /&gt;
iOS has one sandbox used by all App Store apps. System apps, and App Store apps developed by Apple, are allowed to expand or reduce their sandbox permissions as needed. Third-party apps do not get the right to expand or reduce their sandbox permissions at all. This is clearly less secure. To take the example of Playgrounds again, while it&#039;s allowed to run your code from a separate process executing in an ultra locked down sandbox with very few permissions, competing apps such as Pythonista must run your code in the same sandbox and address space as the main app process. The Python interpreter crashing would therefore crash the entire app, possibly losing work. In the worst case, a vulnerability in third-party code could give access to all data stored by/accessible to the app. If that third-party code could run in its own limited sandbox, the risk is significantly reduced.&lt;br /&gt;
&lt;br /&gt;
The only known workaround is to execute the code via JavaScript, as Apple&#039;s JavaScriptCore engine runs in a heavily sandboxed process. This requires you to port the code to JS, which may be a lot of work, or just not viable. You wouldn&#039;t want to run the Python interpreter inside JavaScript - the performance would be terrible!&lt;br /&gt;
&lt;br /&gt;
== In-app browsers ==&lt;br /&gt;
Safari&#039;s in-app browser, that is the minimal version you get when tapping a link from social media, uses an entirely separate data store for each app. The in-app browser isn&#039;t aware of cookies in the &amp;quot;full&amp;quot; Safari app, or any other app, and doesn&#039;t support Safari extensions. Any websites you&#039;re logged into. Apple [https://github.com/openid/AppAuth-iOS/issues/120 claimed] this was to protect malicious apps from stealing or setting cookies in Safari without your knowledge, which is a fair argument, but it&#039;s hard to not notice that it makes web browsing inconvenient, encouraging users to install native apps, where they can make transactions through Apple.&lt;br /&gt;
&lt;br /&gt;
This also means your browsing in the in-app browser is just forgotten - there&#039;s no history menu, and it doesn&#039;t get logged to the history in the full Safari app either. Good luck recalling that article you read a few weeks ago.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [https://theapplewiki.com/wiki/Eligibility Eligibility]&lt;br /&gt;
* [https://adamdemasi.com/2024/04/19/app-marketplace-experience.html The iOS 17.4 app marketplace flow is a disaster]&lt;br /&gt;
* [https://adamdemasi.com/2024/04/23/ios-eligibility-features.html Features controlled by iOS 17.4’s eligibility system]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Apple]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Template:StubNotice&amp;diff=1543</id>
		<title>Template:StubNotice</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Template:StubNotice&amp;diff=1543"/>
		<updated>2025-01-17T03:08:51Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Make sure template itself doesn&amp;#039;t get categorised&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- Uses style code from https://www.mediawiki.org/wiki/Template:Colored_box --&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;cat-mw-box&amp;quot; style=&amp;quot;border-radius:0.2rem;border:1px solid #a2a9b1;margin-bottom:2rem&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;cat-mw-box-header&amp;quot; style=&amp;quot;background:rgba(0,0,0,0.03);padding:0.2rem 1rem;font-size:1rem;&amp;quot;&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;margin-right:8px;&amp;quot;&amp;gt;❗&amp;lt;/span&amp;gt;&#039;&#039;&#039;Article Status Notice: This Article is a stub &#039;&#039;&#039;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;div class=&amp;quot;cat-mw-box-body&amp;quot; style=&amp;quot;padding:0.2rem 1rem;&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;font-size:1.75em; font-weight: 500;padding-top:0.2em;padding-bottom:0.2em&amp;quot;&amp;gt; Notice: This Article Requires Additional Expansion &amp;lt;/div&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
This article is underdeveloped, and needs additional work to meet the wiki&#039;s [[Moderator Guidelines|Content Guidelines]] and be in line with our [[Mission statement|Mission Statement]] for comprehensive coverage of consumer protection issues. Issues may include:&lt;br /&gt;
&lt;br /&gt;
* This article needs to be expanded to provide meaningful information&lt;br /&gt;
* This article requires additional verifiable evidence to demonstrate systemic impact&lt;br /&gt;
* More documentation is needed to establish how this reflects broader consumer protection concerns&lt;br /&gt;
* The connection between individual incidents and company-wide practices needs to be better established&lt;br /&gt;
* The article is simply too short, and lacks sufficient content&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;How You Can Help:&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* Add documented examples with verifiable sources&lt;br /&gt;
* Provide evidence of similar incidents affecting other consumers&lt;br /&gt;
* Include relevant company policies or communications that demonstrate systemic practices&lt;br /&gt;
* Link to credible reporting that covers these issues&lt;br /&gt;
* Flesh out the article with relevant information&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;This notice will be removed once the article is sufficiently developed. Once you believe the article is ready to have its notice removed, visit the Discord ([https://discord.gg/WUW6GGDMvW join here]) and post to the &amp;lt;code&amp;gt;[https://discord.com/channels/1324835844812443810/1326356503065526303 #appeals]&amp;lt;/code&amp;gt; channel, or mention its status on the article&#039;s talk page.&#039;&#039;&lt;br /&gt;
&amp;lt;includeonly&amp;gt;&lt;br /&gt;
[[Category:Articles in need of additional work]]&lt;br /&gt;
[[Category:Articles requiring expansion]]&lt;br /&gt;
&amp;lt;/includeonly&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apple&amp;diff=935</id>
		<title>Apple</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apple&amp;diff=935"/>
		<updated>2025-01-15T14:42:32Z</updated>

		<summary type="html">&lt;p&gt;Kirb: /* OS downgrades */ New section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Under_Development}}&lt;br /&gt;
Apple are a company founded in 1976 by Steve Jobs and Steve Wozniak. There was always a bit of a head in the clouds approach from Apple to designing things, but it seemed to work well until about the 2000&#039;s. Suddenly, there was an obsession with cutting excess weight, probably sparked about the time of the iPod, at the cost of repairability and upgradeability. Of course, the iPhone&#039;s launch would wind up staging the path of crafting the most popular consumer electronic device in the world, and smartphones now have become one of the most controversial to the right to repair community. That is normally expected to be designed with little regard to ease of independent repair. &amp;lt;sup&amp;gt;Sources?&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== 2010&#039;s ===&lt;br /&gt;
Apple had numerous design failings in the 2010&#039;s, and these were often brushed under the rug, and people experiencing such an issue would be normally charged exorbitant amounts for repair. High-cost GPU failures on early 2010&#039;s MacBooks, the 2016-&#039;17 MacBook Pro&#039;s screen cable skimping scandal, the 2019 16-inch MacBook Pro&#039;s SSD failures and more are design flaws Apple have, as they have often, dodged accountability for and continue to do.&amp;lt;sup&amp;gt;Sources?&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Too little, too late - Attempts, or &amp;quot;Attempts&amp;quot; to do better ====&lt;br /&gt;
Apple have attempted recent changes to their products that have made them better, but still not on par with some other manufacturers for pro-consumer behaviour.&amp;lt;sup&amp;gt;Source?&amp;lt;/sup&amp;gt; Many believe this to be driven by changing legislation.&amp;lt;sup&amp;gt;Who?&amp;lt;/sup&amp;gt; Certain parts of this, certainly are.&amp;lt;sup&amp;gt;Source?&amp;lt;/sup&amp;gt; This includes:&lt;br /&gt;
&lt;br /&gt;
* Opening an online &amp;quot;self service repair&amp;quot; parts store.&amp;lt;sup&amp;gt;Source?&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Making the back glass of iPhones removable.&amp;lt;sup&amp;gt;Source?&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Allowing alternative app stores in an update to iOS 17, in compliance with new EU legislation.&amp;lt;sup&amp;gt;Source?&amp;lt;/sup&amp;gt;&lt;br /&gt;
* Calibration tools for newly installed used parts in iOS 18, which sometimes work.&amp;lt;sup&amp;gt;Source?&amp;lt;/sup&amp;gt;&lt;br /&gt;
* An upgradeable, swappable SSD in the 2024 Mac Mini - albeit you cannot swap these units between M4 and M4 Pro units due to the internal casing&#039;s design being different without much good reason.&amp;lt;sup&amp;gt;Sources?&amp;lt;/sup&amp;gt;&lt;br /&gt;
* A battery removable with just a 9V battery in the 2024 iPhone 16 and 16 Plus.&amp;lt;sup&amp;gt;Source?&amp;lt;/sup&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OS downgrades ====&lt;br /&gt;
It is not possible to upgrade or downgrade an iPhone, iPad, Apple TV, etc. to an OS version other than the absolute latest. On Macs with T2 chip or Apple Silicon, the user can select from three modes of secure boot:&amp;lt;ref&amp;gt;https://support.apple.com/102522&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* No security: Allow any OS to run (same as turning off secure boot on a PC)&lt;br /&gt;
* Medium security: Allow any OS that is signed with a secure boot certificate (default, same as turning on secure boot on a PC)&lt;br /&gt;
* Full security: Only allow the latest version of macOS, do not allow any other OS&lt;br /&gt;
&lt;br /&gt;
iOS devices only support full security mode. The device checks for a cryptographic &amp;quot;[https://theapplewiki.com/wiki/APTicket ticket]&amp;quot;, which are tied to the OS version and CPU serial number. These are provided by a server, which only provides them for the latest version (with very specific exceptions). The device refuses to boot if the ticket does not match. [https://theapplewiki.com/wiki/Firmware_downgrading Workarounds] exist, but with major caveats that are not viable for most users.&amp;lt;ref&amp;gt;https://en.wikipedia.org/wiki/SHSH_blob&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Users often complain of new OS versions slowing down their device. Once a new version is installed, there is no opportunity to go back. This also restricts the user&#039;s choice to jailbreak the device, as the latest version naturally has patches for the latest jailbreak exploits. App developers also require access to earlier iOS versions to test that their app works correctly. The alternative, Xcode&#039;s iOS Simulator, is not a complete replacement for real hardware, as it does not have all features of a physical device.&amp;lt;ref&amp;gt;https://contextqa.com/test-on-ios-emulators-simulators/&amp;lt;/ref&amp;gt; Instead, app developers are forced to purchase several test devices, and remember to &#039;&#039;never&#039;&#039; allow them to update.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:Companies]]&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=User:Kirb&amp;diff=517</id>
		<title>User:Kirb</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=User:Kirb&amp;diff=517"/>
		<updated>2025-01-14T15:03:02Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;{{DISPLAYTITLE: User:kirb}}  iOS jailbreaker, reverse engineer, works on too many side projects. I run Chariz, a jailbreak app store, and The Apple Wiki, which documents inner workings of Apple&amp;#039;s platforms. @hbkirb on Discord.&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{DISPLAYTITLE: User:kirb}}&lt;br /&gt;
&lt;br /&gt;
iOS jailbreaker, reverse engineer, works on too many side projects. I run Chariz, a jailbreak app store, and The Apple Wiki, which documents inner workings of Apple&#039;s platforms. @hbkirb on Discord.&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=516</id>
		<title>Apple App Store</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=516"/>
		<updated>2025-01-14T14:56:35Z</updated>

		<summary type="html">&lt;p&gt;Kirb: /* Sandbox */ Clean up some wording&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;I started writing this 6 months ago and didn&#039;t really finish it. Feel free to use it as a starting point for an article. Hopefully it&#039;s not too technical.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Writing down some anti-consumer standards Apple has, which in my opinion aren&#039;t getting the coverage they deserve from lawmakers. Apple is good at obscuring their intentions with technical roadblocks, typically citing security reasons, or just hoping nobody notices or asks in the first place.&lt;br /&gt;
&lt;br /&gt;
== Background info ==&lt;br /&gt;
Important terms you&#039;ll run into in this article:&lt;br /&gt;
&lt;br /&gt;
* [[wikipedia:Sandbox (computer security)|Sandbox]]: Reduces exposure of the user&#039;s device/data to security risks, by reducing what an app is allowed to do.&lt;br /&gt;
* [https://theapplewiki.com/wiki/Entitlements Entitlements]: Apple&#039;s method of &amp;quot;poking holes&amp;quot; in the sandbox, to give the app more permissions. Some are available to developers, while many are only available to Apple.&lt;br /&gt;
* [[wikipedia:Digital Markets Act|Digital Markets Act]]: The European Union&#039;s fairly sweeping recent regulations against forcing companies they classify as &amp;quot;gatekeepers&amp;quot; to play nice, giving smaller businesses access to software/hardware features they&#039;ve historically reserved for their own use.&lt;br /&gt;
&lt;br /&gt;
== Notarization ==&lt;br /&gt;
Since 2015, Apple expects all Mac apps to be &amp;quot;notarized&amp;quot;. This is a preliminary, automated malware check, which upon passing, provides a notary certificate that gets &amp;quot;stapled&amp;quot; to the app. Apple&#039;s explanation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Notarization of macOS software is not App Review. The Apple notary service is an automated system that scans your software for malicious content, checks for code-signing issues, and returns the results to you quickly. If there are no issues, the notary service generates a ticket for you to staple to your software; the notary service also publishes that ticket online where Gatekeeper can find it.&amp;lt;ref&amp;gt;https://developer.apple.com/documentation/security/notarizing-macos-software-before-distribution&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whether this is actually a better approach than used by Windows antivirus, where they find out about new malware samples only when they end up on a user&#039;s computer, is a separate topic.&lt;br /&gt;
&lt;br /&gt;
To comply with the DMA&#039;s regulations on app marketplaces, Apple created a new channel of releasing apps outside of the iOS App Store. Apps go through a notarization process. But the process is definitely &#039;&#039;not&#039;&#039; notarization. The name is intentionally being abused, by contrast to notarization on macOS, to make you believe it is something other than the existing App Review system. Despite the pain some developers and users have with it, notarization on macOS has always been considered a net positive. It made sense to take advantage of its reputation for the entirely different &amp;quot;notarization&amp;quot; on iOS.&lt;br /&gt;
&lt;br /&gt;
See for yourself - view the [https://developer.apple.com/app-store/review/guidelines/ App Review Guidelines] and tick &amp;quot;Show Notarization Review Guidelines Only&amp;quot;. While most rules are knocked out by this, a good number of them are still in place. These apps are still reviewed and tested by the App Review team, must have a full product listing in App Store Connect, and can be outright rejected - all in the same way as an App Store app.&lt;br /&gt;
&lt;br /&gt;
By contrast, all that is required for notarization on macOS is for your app to not be malware. You submit it to an automated system that approves it within minutes. &#039;&#039;&#039;You don&#039;t need to convince Apple your app is worthy of existing on their platform.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The point of macOS notarization is that Apple has a record of all binaries that are intended for wide distribution on macOS, and can review them both in advance and on a regular basis for known malware/common malware patterns. Say a malware app manages to initially get through, when Apple finds out, they can go back in the notary records and find every sample of that malware to analyze and block. This is purely a technical process, managed by skilled security researchers, while iOS app review and &amp;quot;notarization&amp;quot; is a business process, managed by workers who have been given a checklist of violations to look for.&lt;br /&gt;
&lt;br /&gt;
Apple is retaining complete control over what&#039;s allowed to run on iOS. On macOS, you can choose to run apps that have not been notarized (even though the process to bypass the warning is intentionally difficult). On iOS, you never get even that option. What Apple created is the App Store but with more steps. It still goes on the App Store, just hidden so it can only be installed by the third-party store it&#039;s tied to.&lt;br /&gt;
&lt;br /&gt;
* [https://twitter.com/mysk_co/status/1806638308455256242 Mysk: iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens.]&lt;br /&gt;
&lt;br /&gt;
== JIT ==&lt;br /&gt;
Safari is allowed to [[wikipedia:Just-in-time compilation|just-in-time]] compile code worldwide. The super short version of what that means: it can run JavaScript code &#039;&#039;really fast&#039;&#039;. All browsers, and other runtimes like Microsoft .NET, Java, Lua use this. Ok, fine, it&#039;s the system web browser, it&#039;s very carefully written to be secure, and it&#039;s important to the platform to be doing well in performance benchmarks and all that.&lt;br /&gt;
&lt;br /&gt;
Apple&#039;s [https://apps.apple.com/app/swift-playgrounds/id908519492 Playgrounds] app on iPad is also allowed to JIT. It bundles Apple&#039;s [[wikipedia:Swift (programming language)|Swift]] compiler, and shares backend code with the version of Playgrounds found in [[wikipedia:Xcode|Xcode]].&lt;br /&gt;
&lt;br /&gt;
Competing apps like Pythonista (a Python IDE), emulators like Delta and UTM, and terminal environments like iSH, are not allowed to JIT. As such, they need to rely on inferior performance, potentially from an entirely separate implementation of their compiler/interpreter that may be less proven, because the JIT-less implementation doesn&#039;t need to exist on any other platform.&lt;br /&gt;
&lt;br /&gt;
Likely the most clear example is UTM SE. UTM is a port of the [[wikipedia:QEMU|QEMU]] emulator to iOS, allowing you to run desktop OSes (Linux, Windows 98, XP, classic Mac OS, etc). iPhone hardware is very capable these days and it runs impressively well, &#039;&#039;if&#039;&#039; you use a hack to enable JIT (which Apple has now patched). &amp;quot;SE&amp;quot; stands for &amp;quot;slow edition&amp;quot; - yes, really. If you compare the true version of UTM to the App Store UTM SE app, you &#039;&#039;will&#039;&#039; feel the loss in performance. It&#039;s impressive UTM even got to be on the App Store at all, and the DMA is to thank for it. But Apple is still holding the line on allowing JIT to apps that require that performance.&lt;br /&gt;
&lt;br /&gt;
While UTM SE releasing at all might seem like a pathway to getting Firefox and Chrome &amp;quot;slow editions&amp;quot; on the App Store, browser engines other than the built-in Apple WebKit/JavaScriptCore are [https://developer.apple.com/app-store/review/guidelines/#2.5.6 still outlawed]. In the EU, Apple has blessed web browser JavaScript engines with the option to use JIT. The app must be approved for an entitlement, and then must work within APIs provided by Apple for it. As of January 2025, no browsers have been released using this. We were all anticipating proper competition around web browsers on iOS, but almost a year later, we have nothing. Mozilla has [https://www.theverge.com/2024/1/26/24052067/mozilla-apple-ios-browser-rules-firefox discussed] why.&lt;br /&gt;
&lt;br /&gt;
== Sandbox ==&lt;br /&gt;
You might not like app sandboxing, but it&#039;s a powerful security feature used on all modern platforms. The reality is very few apps need more than a few basic permissions. [[wikipedia:Flatpak|Flatpak]] on Linux also sandboxes apps, and it seems to work great! Still, it&#039;s completely fair that there should be processes for doing things beyond what the sandbox allows. You see some of this with permission prompts - does a flashlight app &#039;&#039;really&#039;&#039; need access to your contacts? (Apple has been burned by [https://www.theverge.com/2012/2/14/2798008/ios-apps-and-the-address-book-what-you-need-to-know apps abusing user data] before the current permission system was built out.)&lt;br /&gt;
&lt;br /&gt;
It can go further than this. As we established in previous sections, an app can be given more access to features of the system using entitlements. These come in a few flavors:&lt;br /&gt;
&lt;br /&gt;
* Completely safe: Entitlements any developer can opt into, with little to no risk.&lt;br /&gt;
* Approval required: Entitlements that might be more of a security risk to allow, e.g. giving considerably wider access to the system, or that Apple simply doesn&#039;t want to hand out to just &#039;&#039;anyone&#039;&#039; for competitive reasons. The developer must submit a request to Apple with evidence of why they need the entitlement.&lt;br /&gt;
* Private: Entitlements that are never allowed for any app developer to use. Many of these are reasonably fenced off because they handle user data that is very risky, or bypasses permission prompts, etc, but can just as well also be guarding features Apple wants to keep to itself.&lt;br /&gt;
&lt;br /&gt;
There have been [https://gizmodo.com/researchers-uber-s-ios-app-had-secret-permissions-that-1819177235 exceptions] where Apple quietly gave a company access to private entitlements anyway, raising eyebrows.&lt;br /&gt;
&lt;br /&gt;
On iOS, you also can&#039;t be &#039;&#039;more&#039;&#039; secure than the default sandbox. That might seem crazy if you&#039;re not a developer, but it&#039;s pretty important for security in a variety of situations. On macOS, there are several entitlements you must declare to decide whether you&#039;re allowed to access certain types of user data at all. Android used this design from the very start - you can&#039;t even do fundamental things like access the internet without declaring it in your manifest. It makes it very explicit what the app&#039;s intentions are.&lt;br /&gt;
&lt;br /&gt;
iOS has one sandbox used by all App Store apps. System apps, and App Store apps developed by Apple, are allowed to expand or reduce their sandbox permissions as needed. Third-party apps do not get the right to expand or reduce their sandbox permissions at all. This is clearly less secure. To take the example of Playgrounds again, while it&#039;s allowed to run your code from a separate process executing in an ultra locked down sandbox with very few permissions, competing apps such as Pythonista must run your code in the same sandbox and address space as the main app process. The Python interpreter crashing would therefore crash the entire app, possibly losing work. In the worst case, a vulnerability in third-party code could give access to all data stored by/accessible to the app. If that third-party code could run in its own limited sandbox, the risk is significantly reduced.&lt;br /&gt;
&lt;br /&gt;
The only known workaround is to execute the code via JavaScript, as Apple&#039;s JavaScriptCore engine runs in a heavily sandboxed process. This requires you to port the code to JS, which may be a lot of work, or just not viable. You wouldn&#039;t want to run the Python interpreter inside JavaScript - the performance would be terrible!&lt;br /&gt;
&lt;br /&gt;
== In-app browsers ==&lt;br /&gt;
Safari&#039;s in-app browser, that is the minimal version you get when tapping a link from social media, uses an entirely separate data store for each app. The in-app browser isn&#039;t aware of cookies in the &amp;quot;full&amp;quot; Safari app, or any other app, and doesn&#039;t support Safari extensions. Any websites you&#039;re logged into. Apple [https://github.com/openid/AppAuth-iOS/issues/120 claimed] this was to protect malicious apps from stealing or setting cookies in Safari without your knowledge, which is a fair argument, but it&#039;s hard to not notice that it makes web browsing inconvenient, encouraging users to install native apps, where they can make transactions through Apple.&lt;br /&gt;
&lt;br /&gt;
This also means your browsing in the in-app browser is just forgotten - there&#039;s no history menu, and it doesn&#039;t get logged to the history in the full Safari app either. Good luck recalling that article you read a few weeks ago.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [https://theapplewiki.com/wiki/Eligibility Eligibility]&lt;br /&gt;
* [https://adamdemasi.com/2024/04/19/app-marketplace-experience.html The iOS 17.4 app marketplace flow is a disaster]&lt;br /&gt;
* [https://adamdemasi.com/2024/04/23/ios-eligibility-features.html Features controlled by iOS 17.4’s eligibility system]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
	<entry>
		<id>https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=515</id>
		<title>Apple App Store</title>
		<link rel="alternate" type="text/html" href="https://mirror.consumerrights.wiki/index.php?title=Apple_App_Store&amp;diff=515"/>
		<updated>2025-01-14T14:38:30Z</updated>

		<summary type="html">&lt;p&gt;Kirb: Created page with &amp;quot;&amp;#039;&amp;#039;I started writing this 6 months ago and didn&amp;#039;t really finish it. Feel free to use it as a starting point for an article. Hopefully it&amp;#039;s not too technical.&amp;#039;&amp;#039;  Writing down some anti-consumer standards Apple has, which in my opinion aren&amp;#039;t getting the coverage they deserve from lawmakers. Apple is good at obscuring their intentions with technical roadblocks, typically citing security reasons, or just hoping nobody notices or asks in the first place.  == Background info =...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;I started writing this 6 months ago and didn&#039;t really finish it. Feel free to use it as a starting point for an article. Hopefully it&#039;s not too technical.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Writing down some anti-consumer standards Apple has, which in my opinion aren&#039;t getting the coverage they deserve from lawmakers. Apple is good at obscuring their intentions with technical roadblocks, typically citing security reasons, or just hoping nobody notices or asks in the first place.&lt;br /&gt;
&lt;br /&gt;
== Background info ==&lt;br /&gt;
Important terms you&#039;ll run into in this article:&lt;br /&gt;
&lt;br /&gt;
* [[wikipedia:Sandbox (computer security)|Sandbox]]: Reduces exposure of the user&#039;s device/data to security risks, by reducing what an app is allowed to do.&lt;br /&gt;
* [https://theapplewiki.com/wiki/Entitlements Entitlements]: Apple&#039;s method of &amp;quot;poking holes&amp;quot; in the sandbox, to give the app more permissions. Some are available to developers, while many are only available to Apple.&lt;br /&gt;
* [[wikipedia:Digital Markets Act|Digital Markets Act]]: The European Union&#039;s fairly sweeping recent regulations against forcing companies they classify as &amp;quot;gatekeepers&amp;quot; to play nice, giving smaller businesses access to software/hardware features they&#039;ve historically reserved for their own use.&lt;br /&gt;
&lt;br /&gt;
== Notarization ==&lt;br /&gt;
Since 2015, Apple expects all Mac apps to be &amp;quot;notarized&amp;quot;. This is a preliminary, automated malware check, which upon passing, provides a notary certificate that gets &amp;quot;stapled&amp;quot; to the app. Apple&#039;s explanation:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
Notarization of macOS software is not App Review. The Apple notary service is an automated system that scans your software for malicious content, checks for code-signing issues, and returns the results to you quickly. If there are no issues, the notary service generates a ticket for you to staple to your software; the notary service also publishes that ticket online where Gatekeeper can find it.&amp;lt;ref&amp;gt;https://developer.apple.com/documentation/security/notarizing-macos-software-before-distribution&amp;lt;/ref&amp;gt;&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whether this is actually a better approach than used by Windows antivirus, where they find out about new malware samples only when they end up on a user&#039;s computer, is a separate topic.&lt;br /&gt;
&lt;br /&gt;
To comply with the DMA&#039;s regulations on app marketplaces, Apple created a new channel of releasing apps outside of the iOS App Store. Apps go through a notarization process. But the process is definitely &#039;&#039;not&#039;&#039; notarization. The name is intentionally being abused, by contrast to notarization on macOS, to make you believe it is something other than the existing App Review system. Despite the pain some developers and users have with it, notarization on macOS has always been considered a net positive. It made sense to take advantage of its reputation for the entirely different &amp;quot;notarization&amp;quot; on iOS.&lt;br /&gt;
&lt;br /&gt;
See for yourself - view the [https://developer.apple.com/app-store/review/guidelines/ App Review Guidelines] and tick &amp;quot;Show Notarization Review Guidelines Only&amp;quot;. While most rules are knocked out by this, a good number of them are still in place. These apps are still reviewed and tested by the App Review team, must have a full product listing in App Store Connect, and can be outright rejected - all in the same way as an App Store app.&lt;br /&gt;
&lt;br /&gt;
By contrast, all that is required for notarization on macOS is for your app to not be malware. You submit it to an automated system that approves it within minutes. &#039;&#039;&#039;You don&#039;t need to convince Apple your app is worthy of existing on their platform.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
The point of macOS notarization is that Apple has a record of all binaries that are intended for wide distribution on macOS, and can review them both in advance and on a regular basis for known malware/common malware patterns. Say a malware app manages to initially get through, when Apple finds out, they can go back in the notary records and find every sample of that malware to analyze and block. This is purely a technical process, managed by skilled security researchers, while iOS app review and &amp;quot;notarization&amp;quot; is a business process, managed by workers who have been given a checklist of violations to look for.&lt;br /&gt;
&lt;br /&gt;
Apple is retaining complete control over what&#039;s allowed to run on iOS. On macOS, you can choose to run apps that have not been notarized (even though the process to bypass the warning is intentionally difficult). On iOS, you never get even that option. What Apple created is the App Store but with more steps. It still goes on the App Store, just hidden so it can only be installed by the third-party store it&#039;s tied to.&lt;br /&gt;
&lt;br /&gt;
* [https://twitter.com/mysk_co/status/1806638308455256242 Mysk: iOS should enable alternative marketplaces to add their own links when users share their apps. Links still point to the App Store and if the app is not available there, this happens.]&lt;br /&gt;
&lt;br /&gt;
== JIT ==&lt;br /&gt;
Safari is allowed to [[wikipedia:Just-in-time compilation|just-in-time]] compile code worldwide. The super short version of what that means: it can run JavaScript code &#039;&#039;really fast&#039;&#039;. All browsers, and other runtimes like Microsoft .NET, Java, Lua use this. Ok, fine, it&#039;s the system web browser, it&#039;s very carefully written to be secure, and it&#039;s important to the platform to be doing well in performance benchmarks and all that.&lt;br /&gt;
&lt;br /&gt;
Apple&#039;s [https://apps.apple.com/app/swift-playgrounds/id908519492 Playgrounds] app on iPad is also allowed to JIT. It bundles Apple&#039;s [[wikipedia:Swift (programming language)|Swift]] compiler, and shares backend code with the version of Playgrounds found in [[wikipedia:Xcode|Xcode]].&lt;br /&gt;
&lt;br /&gt;
Competing apps like Pythonista (a Python IDE), emulators like Delta and UTM, and terminal environments like iSH, are not allowed to JIT. As such, they need to rely on inferior performance, potentially from an entirely separate implementation of their compiler/interpreter that may be less proven, because the JIT-less implementation doesn&#039;t need to exist on any other platform.&lt;br /&gt;
&lt;br /&gt;
Likely the most clear example is UTM SE. UTM is a port of the [[wikipedia:QEMU|QEMU]] emulator to iOS, allowing you to run desktop OSes (Linux, Windows 98, XP, classic Mac OS, etc). iPhone hardware is very capable these days and it runs impressively well, &#039;&#039;if&#039;&#039; you use a hack to enable JIT (which Apple has now patched). &amp;quot;SE&amp;quot; stands for &amp;quot;slow edition&amp;quot; - yes, really. If you compare the true version of UTM to the App Store UTM SE app, you &#039;&#039;will&#039;&#039; feel the loss in performance. It&#039;s impressive UTM even got to be on the App Store at all, and the DMA is to thank for it. But Apple is still holding the line on allowing JIT to apps that require that performance.&lt;br /&gt;
&lt;br /&gt;
While UTM SE releasing at all might seem like a pathway to getting Firefox and Chrome &amp;quot;slow editions&amp;quot; on the App Store, browser engines other than the built-in Apple WebKit/JavaScriptCore are [https://developer.apple.com/app-store/review/guidelines/#2.5.6 still outlawed]. In the EU, Apple has blessed web browser JavaScript engines with the option to use JIT. The app must be approved for an entitlement, and then must work within APIs provided by Apple for it. As of January 2025, no browsers have been released using this. We were all anticipating proper competition around web browsers on iOS, but almost a year later, we have nothing. Mozilla has [https://www.theverge.com/2024/1/26/24052067/mozilla-apple-ios-browser-rules-firefox discussed] why.&lt;br /&gt;
&lt;br /&gt;
== Sandbox ==&lt;br /&gt;
You might not like app sandboxing, but it&#039;s a powerful security feature used on all modern platforms. The reality is very few apps need more than a few basic permissions. [[wikipedia:Flatpak|Flatpak]] on Linux also sandboxes apps, and it seems to work great! Still, it&#039;s completely fair that there should be processes for doing things beyond what the sandbox allows. You see some of this with permission prompts - does a flashlight app &#039;&#039;really&#039;&#039; need access to your contacts? (Apple has been burned by [https://www.theverge.com/2012/2/14/2798008/ios-apps-and-the-address-book-what-you-need-to-know apps abusing their kindness] before.)&lt;br /&gt;
&lt;br /&gt;
It can go further than this. As we established in previous sections, an app can be given more access to features of the system using entitlements. These come in a few flavors:&lt;br /&gt;
&lt;br /&gt;
* Completely safe: Entitlements any developer can opt into, with little to no risk.&lt;br /&gt;
* Approval required: Entitlements that might be more of a security risk to allow, e.g. giving considerably wider access to the system, or that Apple simply doesn&#039;t want to hand out to just &#039;&#039;anyone&#039;&#039; for competitive reasons. The developer must submit a request to Apple with evidence of why they need the entitlement.&lt;br /&gt;
* Private: Entitlements that are never allowed for any app developer to use. Many of these are reasonably fenced off because they handle user data that is very risky, or bypasses permission prompts, etc, but can just as well also be guarding features Apple wants to keep to itself.&lt;br /&gt;
&lt;br /&gt;
There have been [https://gizmodo.com/researchers-uber-s-ios-app-had-secret-permissions-that-1819177235 exceptions] where Apple quietly gave a company access to private entitlements anyway, raising eyebrows.&lt;br /&gt;
&lt;br /&gt;
On iOS, you also can&#039;t be &#039;&#039;more&#039;&#039; secure than the default sandbox. That might seem crazy, but it&#039;s pretty important for security in a variety of situations. On macOS, there are several entitlements you must declare to decide whether you&#039;re allowed to access certain types of user data at all. Android echoed this design from the very start - you can&#039;t even do fairly fundamental things like access the internet without declaring it in your manifest. It makes it very clear what the app intends to do.&lt;br /&gt;
&lt;br /&gt;
iOS has one sandbox used by all App Store apps. System apps, and App Store apps developed by Apple, are allowed to expand or reduce their sandbox permissions as needed. Third-party apps do not get the right to expand or reduce their sandbox permissions at all. This is clearly less secure. To take the example of Playgrounds again, while it&#039;s allowed to run your code from a separate process executing in an ultra locked down sandbox with very few permissions, competing apps such as Pythonista must run your code entirely in the same sandbox and address space as the main app process. The Python interpreter crashing would therefore crash the entire app, possibly losing work. In the worst case, a vulnerability in third-party code could give access to all data stored by/accessible to the app. If that third-party code could run in its own limited sandbox, the risk is significantly reduced.&lt;br /&gt;
&lt;br /&gt;
The only known workaround is to execute the code via JavaScript, as Apple&#039;s JavaScriptCore engine runs in a heavily sandboxed process. This requires you to port the code to JS, which may be a lot of work, or just not viable. You wouldn&#039;t want to run the Python interpreter inside JavaScript - the performance would be terrible!&lt;br /&gt;
&lt;br /&gt;
== In-app browsers ==&lt;br /&gt;
Safari&#039;s in-app browser, that is the minimal version you get when tapping a link from social media, uses an entirely separate data store for each app. The in-app browser isn&#039;t aware of cookies in the &amp;quot;full&amp;quot; Safari app, or any other app, and doesn&#039;t support Safari extensions. Any websites you&#039;re logged into. Apple [https://github.com/openid/AppAuth-iOS/issues/120 claimed] this was to protect malicious apps from stealing or setting cookies in Safari without your knowledge, which is a fair argument, but it&#039;s hard to not notice that it makes web browsing inconvenient, encouraging users to install native apps, where they can make transactions through Apple.&lt;br /&gt;
&lt;br /&gt;
This also means your browsing in the in-app browser is just forgotten - there&#039;s no history menu, and it doesn&#039;t get logged to the history in the full Safari app either. Good luck recalling that article you read a few weeks ago.&lt;br /&gt;
&lt;br /&gt;
== See also ==&lt;br /&gt;
* [https://theapplewiki.com/wiki/Eligibility Eligibility]&lt;br /&gt;
* [https://adamdemasi.com/2024/04/19/app-marketplace-experience.html The iOS 17.4 app marketplace flow is a disaster]&lt;br /&gt;
* [https://adamdemasi.com/2024/04/23/ios-eligibility-features.html Features controlled by iOS 17.4’s eligibility system]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Kirb</name></author>
	</entry>
</feed>