We are a technical team of a large enterprise whose main business depends on internally developed iOS applications. Our Apple enterprise developer account expires on February 16th, and we filled in the renewal application form before that, but it was rejected by Apple. We contacted the Apple consultant through Apple's official website, and they said that the enterprise department is a separate department, and they could not solve my problem. Later, after efforts, I directly contacted the email address of the enterprise department, and I explained our situation. After their review, the final plan still could not renew, but only extended the use of our P12 certificate, and the maximum extension was one year in the end, so that we can deal with the application that is being distributed by the enterprise as soon as possible. May I ask if there is any better way to successfully renew my account? Only the extension of the certificate is not what we want, my profile explains the whole process, but this is the only way at present,
Apple Developers
RSS for tagThis is a dedicated space for developers to connect, share ideas, collaborate, and ask questions. Introduce yourself, network with other developers, and foster a supportive community.
Selecting any option will automatically load the page
Post
Replies
Boosts
Views
Activity
Bluetooth is no more working with the upgrade to iOS 18.3.1 I loaded this night !!! (iPhone SE model III).
Please debug it!
Topic:
Community
SubTopic:
Apple Developers
Hi,
I am a new user here, I have created my apple developer account and purchased an apple developer membership for a year. I have received my web order details and also the invoice few days ago but when I try to go to App Store Connect it won't let me in. I have contacted the apple developer support 3 days ago but I did not received any response yet. It's frustrating. I do not know much how to navigate on these apple products and devices so I am kind of lost here. Your help or advice, would be greatly appreciated.
Btw, I believed I have already enrolled in this apple developer membership because every time I tried to click enrol it leads me to another purchase membership page which I have already paid, so I ended up clicking the withdraw membership instead of clicking the purchase tab.
Thank you in advance to those who are able to address this concern.
Topic:
Community
SubTopic:
Apple Developers
This is a warning to anyone who uses the Signal app. There is a chance they are selling transcripts of phone calls and/or messages sent using their app. How do I know? What proof do I have? It's not 100% certainty but it's compelling.
Recently I was on a Signal phone call with a friend and a certain college came up as a very brief topic for discussion. This college had only come up once before a week earlier in a message sent through Signal. Before that, going back about 10 years at least, I hadn't spoken with anyone about that college. Not a single person. I also do not live anywhere near the college in question. (The other person does.) So why does this matter?
Simply that, immediately after that Signal call, I received a spam SMS message (not in Signal) from what I can only call a shadowy startup called ReUp Education, claiming to offer me a free service that is allegedly tied to that same college. The phone number that I received the SMS on was the one I registered with Signal and the SMS referred to me by name. (Note, the other person did not receive an SMS spam even though they live near said college.) There was no reason other than the Signal call and Signal message for me to be on ReUp's radar or for ReUp to associate me with that college.
So I looked into ReUp; their "office" address appears to be a shared mailbox at what appears to be a shared office in Austin Texas. They do not answer phone calls or return messages, they do not answer emails. Their customer service does not respond to inquiries. They appear to be a defunct startup except that there is a ReUp website. This raises the question of whether scammers have taken over their site and are impersonating a defunct startup.
The real question though is, who was it that sold my name, phone number and my "interest" in a particular college to them, and by what means? The ReUp spam SMS arrived right after the Signal phone call, not after the Signal message from a week earlier. Thus it is logical to deduce that the phone call was the trigger leading to the SMS, and that means the phone call audio was being transcribed (presumably on a server somewhere) and the transcript or part of it was sold to ReUp. The instantaneous arrival of the spam SMS after the call suggests it was all automated.
But how can I be sure the Signal app was the culprit? Checking my phone at the time, I found I had two other apps installed with audio recording permission: the NIOSH decibel meter and SoundHound (I used it to identify a single song, then never again used it). NIOSH was likely running in the background. SoundHound probably was not because I hadn't run it in two months and I believe I rebooted the phone in the meantime. If either of these apps was able to record the Signal phone call while in the background, maybe I could consider them as having means and motive to record and sell my phone call. But according to this response to my other question, it seems they can't (unless Apple is hiding something): https://developer.apple.com/forums/thread/770556
Even if the NIOSH app was able to record and upload the Signal phone call, one has to ask about motive. That app is provided by a federal agency of the US government. Would a government agency really sell a phone call transcript to dubious entities? More likely they'd silently send it to the NSA. But that's a tangent.
What about malware, you ask? I had reinstalled iOS 15 on the phone only a couple months earlier. I'm not running sketchy software on the phone. It's just mainstream apps, the most exotic being NIOSH. I don't visit shady websites where I might get hacked through Safari. I don't click on links in SMS spam. I don't open email attachments. The case for malware is weak. My phone is also not jailbroken.
Therefore by process of elimination, only the Signal app is a likely culprit.
But there were two Signal apps in use: The one on my phone and the one on my friend's device. The fact that I received the spam SMS, referring to me by name, in which "ReUp" claimed to offer a free service involving a college that is 1500+ miles away from me, whereas the person I was speaking to did not receive a spam SMS despite their living near that college, suggests it's the Signal app on my phone that uploaded the audio and transcribed it, tagging it with my details in particular.
So I tried to contact Signal. All I wanted was a denial from them that they are not selling transcripts of calls and other user data. It turns out, just like ReUp, Signal does not answer phone calls, they do not return calls, they do not answer emails. Their "customer service" agent responded 1 month after I contacted them and the response was boilerplate from a bot.
My interested being piqued, I looked into Signal's financials. People have always said that Signal is a nonprofit and doesn't seek to make money. People say it's encrypted and safe. Or at least that seems to be the mantra from every tech journalist and every computer security expert. A chorus of people are conditioning us to let our guard down.
But it turns out, Signal is very profitable. They bring in nearly $37 million per year despite their phone and messaging service being completely free to users. Signal's CEO makes roughly $520k per year. The CTO makes $670k. Here are some details: https://www.causeiq.com/organizations/signal-technology-foundation,824506840/
Are they selling user audio transcripts and/or messages in order to bring in that $37 million? If so they wouldn't be any different than other Silicon Valley tech companies.
People have always said, if the product is free, you're the product. That appears to be the case with Signal.
Topic:
Community
SubTopic:
Apple Developers
I am facing an issue in iOS 18 that works fine in iOS 17 and earlier.
This happens when you set the project to use Swift 6, if you set swift 5 this will work ok.
The app has the Privacy - Camera Usage Description key in the Info.plist.
It is a wrapper that implements UIViewControllerRepresentable to create the UIViewController. This wrapper is within a view that gets pushed when the user presses a button (see snippet code below).
Sometimes, I get a popup asking for permission to access the camera, and the app crashes immediately. Other times, I don’t see the popup, and the app crashes right away.
I tried adding Task { @MainActor } within the requestAccess closure, but it did not resolve the issue. It does not matter the code within the closure; it crashes even if the closure is empty.
The crash trace shows _dispatch_assert_queue_fail (see the attached image).
Has anyone else experienced this issue? Any insights would be greatly appreciated.
The following code will crash if run as is.
***** Please add the Privacy - Camera Usage Description key in the Info.plist to prevent this issue.
import SwiftUI
import AVFoundation
struct ContentView: View {
var body: some View {
VStack {
Text("Hello, world!")
ViewControllerWrapper()
}
}
}
struct ViewControllerWrapper: UIViewControllerRepresentable {
func makeUIViewController(context: Context) -> ViewController {
ViewController()
}
func updateUIViewController(_ viewController: ViewController, context: Context) {}
}
class ViewController: UIViewController {
override func viewDidLoad() {
super.viewDidLoad()
AVCaptureDevice.requestAccess(for: .video) { _ in
}
}
}
So I got charged the annual developer fee on December 2024, and then again this February 2025.
Worse, a few days after getting charged twice, I received an email from Apple saying my developer account subscription has been suspended due to failure in paying the annual fee.
I already submitted a support ticket to Apple, but I haven't gotten a response yet.
Is there something else I can do?
Would appreaciate any help.
Thanks!
I would love to see a feature where the iPhone vibrates when a call is answered by the other person. This would be helpful for users who are walking or holding their phone away from their ear while waiting for the call to connect. The vibration would provide a subtle yet effective notification that the call has been picked up, reducing unnecessary screen-checking.
This feature could be optional and toggled in settings under Sounds & Haptics > Call Feedback for users who prefer it.
I’m developing an app that has a Fitbit login page embedded in a WKWebView. On the Fitbit login page, there is a Google login button.
When I try to log in to Fitbit via Google, some devices redirect back to the Fitbit login page even after entering the correct Google credentials. However, it works on the second attempt. I tested the same URL in the default browser, and it works fine when the page is loaded in the browser instead of inside the WebView.
I tried the following workarounds but was unable to fix the issue:
1. Enabled JavaScript in WebView.
2. Tried cookie synchronization between WKWebsiteDataStore and HTTPCookieStorage.
Hello all my app got rejected for this reason:
"The app crashed during review. Apps that crash negatively impact users.
Steps leading to crash:
when tapping "Take Photo" option
Review device details:
Device type: iPad Air (5th generation)
OS version: iPadOS 18.3.1"
In my info.plist I set only iPhone -Portrait. I do not want my app on iPad what can I do? Do I make an iPad version also? Thanks
Topic:
Community
SubTopic:
Apple Developers
Hi Team,
I just want to know the reasoning behind why there are two IPSW with same version and different build IDs.
Example: https://ipsw.me/iPhone12,3
Version: 18.3
BuildIDs: 22D64 and 22D63
Also, in future, on what devices this kind of two buildIDs will be created?
Topic:
Community
SubTopic:
Apple Developers
Hello! I am new here but could really use some support. For the last year or so I have been bugged by the feeling that my devices were not completely managed by myself. After this week I have seen my computer and devices do things on their own without me touching the keyboard. SO I am hoping someone here can help me get rid or at least get to the root of the problem as I do not know what else I can do! SO far I know they are accessing all my devices remotely but am unsure how they do it since someone times there is no wifi around, I'm thiniking bluetooth maybe or perhaps another form of devices talking and sharing info with each other. Any support helps!!!
Topic:
Community
SubTopic:
Apple Developers
Recently, I have decided to delete all my Twitter accounts, but it turns out an Apple ID was used for one of them, I am unable to delete this account due to that fact because I do not have access to the “email” required.
Twitter support says contact email provider, given that I used an Apple ID as the email, am I supposed to contact Apple support instead?
Topic:
Community
SubTopic:
Apple Developers
Hello, why is apple won’t adding Just-In-Time compiler to ”Emulators” in the app store. And/or hypervisor for newer devices.
i feel like UTM (which is a PC Emulator) or other Apps that emulate need JIT to work properly, and will consume significantly less battery to emulate/virtualize, And will have a noticeably better performance than just not enabling JIT, and by the way jit is already being used on iPadOS/iOS 18.3/18.3.1 and newer/older version of that so being enabled by the choice of the developer of the App is more convenient than doing it with tools.
and by the why apple wont let emulators on iPads and newer iPhones do hypervisor, it’s better than JIT but requires a good cpu, like making it available to people with newer/powerful devices, hypervisor is better than JIT by a lot and removing it in iPadOS/iOS 18.4 was an unnecessary choice?, becuase it had a better potential in virtualization instead of emulating, and I feel like enabling it In M1-M2 iPads and A14-18pro and newer devices is just better from having it disabled, to unlock the fullest potential of the iPad it needs to have a app or something to do instead of just running high graphics games/or Apps.
Macos15照片app需要点击一下,不能直接进入,点击一次后,还要再点击一下,才能看到照片,希望能修复一下
I used spotlight search for almost everything I do through cmd+space. However ever since i updated my laptop to MacOS Sequoia 15.3.1, the spotlight search won't give me app results:
for example i type "flux" and will get just web-based results, not the app. I tried going into the spotlight settings and only enabling applications to be searched for results and got nothing. I tried the same with the Notes app, i get the same result, i get some notes i wrote as result but not the actual app.
It doesn't happen on all apps for example Brave or Spotify work.
I'm getting an error when trying to login to iCloud.com. This only happens on my Windows 11 pc and not on my iPhone. I get the 2FA code on my phone, but on my pc it displays only the error. I also have checked the system status page from apple and everything is green there, so i have no idea what is happening.
Hi, I'm struggling to access Keychain Access app on a brand new mac mini m4 pro running Sequoia 15.3.1.
After opening the app, I get a prompt to enter the current password; after I enter the correct password the first time, the prompt opens again.
I enter the correct password again and the app terminates.
I've checked Console and Keychain Access process logged:
Initial auth failed: Error Domain=com.apple.LocalAuthentication Code=-1000 "ACM policy evaluation succeeded, but ACM is still requesting 1:1, 3:1, 15:1 on ACMContext 111 after a retry." UserInfo={NSDebugDescription=ACM policy evaluation succeeded, but ACM is still requesting 1:1, 3:1, 15:1 on ACMContext 111 after a retry., NSLocalizedDescription=Authentication failure., BiometryType=1}
terminate:
void _NSDisableAutomaticTerminationAndLog(NSString *) Terminating
Attempting sudden termination (1st attempt)
...
App termination approved
I've also tried to update the password of my user but Keychain doesn't accept the new password.
Topic:
Community
SubTopic:
Apple Developers
Too many irrelevant posts come up when I attempt to search for something. There should be an easy button or something to earmark posts as something irrelevant- something that shouldn't come up in a search. I'm looking for something in Xcode 15 and frequently the top posts in the search are 10 years old and don't have any relevance whatsoever to the solution to my problem.
Topic:
Community
SubTopic:
Apple Developers
Mac users often ask whether they should install "anti-virus" software. The answer usually given on ASC is "no." The answer is right, but it may give the wrong impression that there is no threat from what are loosely called "viruses." There is a threat, and you need to educate yourself about it.
This is a comment on what you should—and should not—do to protect yourself from malicious software ("malware") that circulates on the Internet and gets onto a computer as an unintended consequence of the user's actions. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the computer, or who has been able to log in to it remotely. That threat is in a different category, and there's no easy way to defend against it.
The comment is long because the issue is complex. The key points are in sections 5, 6, and 10.
OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user. Internally Apple calls it "XProtect."
The malware recognition database used by XProtect is automatically updated; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
The following caveats apply to XProtect:
☞ It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
☞ It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
As new versions of OS X are released, it's not clear whether Apple will indefinitely continue to maintain the XProtect database of older versions such as 10.6. The security of obsolete system versions may eventually be degraded. Security updates to the code of obsolete systems will stop being released at some point, and that may leave them open to other kinds of attack besides malware.
3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
☞ It can easily be disabled or overridden by the user.
☞ A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
☞ An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
Apple has so far failed to revoke the codesigning certificates of some known abusers, thereby diluting the value of Gatekeeper and the Developer ID program. These failures don't involve App Store products, however.
For the reasons given, App Store products, and—to a lesser extent—other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. Sandbox security is based on user input. Never click through any request for authorization without thinking.
4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is effective against known threats, but not against unknown ones. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
5. The built-in security features of OS X reduce the risk of malware attack, but they are not, and never will be, complete protection. Malware is a problem of human behavior, and a technological fix is not going to solve it. Trusting software to protect you will only make you more vulnerable.
The best defense is always going to be your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "****** horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the scam artists. If you're smarter than they think you are, you'll win. That means, in practice, that you always stay within a safe harbor of computing practices.
Malware defence
By Linc Davis - https://discussions.apple.com/thread/6460085
Sometimes, when I close the lid using the MacOs version Sequoia 15.2, with the configuration to require a password for 5 seconds, the system does not ask for the password as expected.
This happens sometimes even though nothing preventing the system from sleeping when you close and open the lid, but it still seems like a security concern.
Is there some known issue related to this problem or a way to avoid it?
Result of command pmset -g:
Configuration: