Post

Replies

Boosts

Views

Activity

Reply to QuickLookAR shares the actual USDZ model instead of the original website URL — critical copyright and data leak issue on iOS 26
Yes, users can ultimately obtain the file in both cases. The difference lies in how this happens. Prior to iOS 26, obtaining the USDZ required user workarounds or third-party tools, while Quick Look itself shared the canonical web URL. Starting with iOS 26, the OS-level Share action in Quick Look directly exports and distributes the USDZ asset, ignoring canonicalWebPageURL. This turns asset distribution into a first-class, system-supported behavior and breaks the previously supported web-based access and licensing flow. At this stage, it would be sufficient for us if the behavior reverted to how it worked on iOS 18 and earlier. We would greatly appreciate any guidance or assistance in resolving this issue.
Topic: Privacy & Security SubTopic: General Tags:
3w
Reply to QuickLookAR shares the actual USDZ model instead of the original website URL — critical copyright and data leak issue on iOS 26
Thank you, Quinn. I actually filed a report for this issue back on October 20, 2025. Feedback ID: FB20753534 We are asking for your assistance because this is a critical blocker for our business. The bug forces the distribution of copyright-protected source files, which we are legally not allowed to share. This violates security and privacy standards, meaning we cannot support any users on iOS 26 or later. This situation is severely impacting our reputation and operations. We would be incredibly grateful for any help in escalating this issue to find a solution.
Topic: Privacy & Security SubTopic: General Tags:
3w