Apple's Unlawful Evil
Consumer reactions & limited alternatives
- Several commenters say they’re done buying Apple hardware or will drastically reduce purchases, but note ecosystem lock‑in and lack of viable alternatives.
- Buying refurbished Apple gear is debated: some see it as harm reduction, others say it still props up Apple’s brand, resale value, and social visibility.
- A few are experimenting with alternatives (GrapheneOS, PostmarketOS, Sailfish/Jolla, “FuriPhone”) and even de‑smartphoning, but worry non‑technical users have almost no realistic escape.
App stores, walled gardens, and ownership
- Core complaint: the problem isn’t just Apple pulling an app, it’s that iOS forbids alternative stores and real sideloading, so users can’t install disfavored but legal software.
- Some suggest PWAs as a workaround; others argue that:
- iOS PWA support is incomplete/buggy (push, IndexedDB, icons), and
- crowdsourced tools like ICEBlock die if installation is too frictional.
- Xcode sideloading is acknowledged but seen as too cumbersome and limited to matter at scale.
Google, Android, and open‑source alternatives
- Google’s parallel removal of ICEBlock is noted; disagreement over whether Android’s AOSP and alternate stores meaningfully improve freedom.
- One side: open-source base + alternative ROMs provide a safety valve.
- Other side: AOSP effectively needs proprietary blobs, Google has been tightening control and DRM for a decade, and is moving toward an Apple‑style lock‑in.
Corporations, government power & blame
- Major split on culpability:
- Some emphasize government overreach, saying companies are reacting to existential threats from the state and voters should curb state power.
- Others argue mega‑firms wield enormous leverage, benefit from state protection, and have a responsibility to resist unlawful demands instead of acting as “lapdogs.”
- Debate over whether criticizing Apple implicitly means wanting “more government power,” versus simply enforcing existing limits and civil rights.
- Example comparisons: Apple’s posture in China/Russia vs its aggressive resistance to EU regulation and sideloading.
Tech solutions vs political struggle
- One camp warns against “technical utopianism”: apps, VPNs, duress PINs, etc. are at best temporary workarounds; determined states can block servers, trace users, or kick devices off networks. Real fixes are political and institutional.
- Others counter that secure, user‑controlled tech is a prerequisite for organizing, fundraising, media access, and international contact; dismissing activist tools undermines movements.
- Long subthread contrasts “existential” symbolic challenges (boycotts, sit‑ins, blank paper protests) with “tactical” tech/weapons, and whether logistics or hearts‑and‑minds matter more in successful revolutions.
Web, browsers, and platform power
- Some stress keeping the web open as a hedge against app‑store censorship and a “one-browser + Cloudflare” chokepoint future.
- Apple’s ban on non‑WebKit engines is contested:
- Defenders say it’s a bulwark against a Chrome monoculture.
- Critics call it monopolistic and argue more engines could improve real‑world security by reducing reliance on a single vulnerable stack.
Assessing Apple’s justification & the article itself
- Apple’s “safety risk” rationale is called vague and credulous; suggested counterpoints include demanding actual evidence of harm and acknowledging that many risky apps (rideshare, dating, generative AI) are allowed.
- Some think Apple is simply lying and acting to protect a lucrative, politically mediated relationship with the U.S. administration; others give them partial benefit of the doubt but insist this shows why their gatekeeping power is dangerous.
- Reactions to the article’s tone are mixed: some find it hyperbolic or clickbaity; others say its core critique of feudal, locked‑down computing is accurate and timely.
Workarounds, PWAs, and practical limits
- Suggestions include building fully featured PWAs (via React Native or similar) to escape app‑store vetoes and help open‑source phones become “daily drivers.”
- For ICEBlock‑style apps, commenters highlight hard privacy and scalability constraints:
- Avoiding a central user/location database is difficult outside Apple’s push/iCloud stack, and such a DB would be highly subpoena‑ and attack‑prone.
- Web Push standards exist, but iOS’s weak implementation and Apple’s control over notifications again limit what’s possible.