Linc Davis wrote:
It means that "LittleSnitch" is interfering with the normal operation of your system and wasting your time with useless information.
Speaking of wasting people's time with useless information, what an arrogant and unhelpful response. Why even bother replying at all if you're not even going to address the actual question? Does it make you feel powerful to make someone feel like an idiot for using software you don't happen to like?
Your snarky "advice" is ignorant and dangerous.
I'm a full-time software engineer. I wrote a book about Xcode. I telework for a government job and run my own software shop. Security of my primary development system (and my file server) is absolutely critical. So I use Little Snitch to monitor and control outbound connections. If, in this day and age, you don't see the value in such a software product, the person asking about it isn't the idiot here. Since you clearly need it, let me educate you.
1 - Many apps "phone home" these days. Do you trust them to? Do they need to? What about apps that came from the App Store but don't use any online service, like maybe a random password generator? Sure, these apps need to validate their receipts but that's an Apple / Mac OS process readily identified by Little Snitch. But why would this random password generator app insist on contacting the developer's server (or, even more frightening, some unnamed IP address)? Wouldn't that knowledge be really g*******d salient to any user who doesn't have their head up their ***?
2 - Since it seems every app wants to do something on the Internet these days, the amount of network traffic from just one computer is alarming. Now consider tethering a laptop to your iPhone during a business trip. Consider that, normally, you don't need an unlimited data plan on that iPhone (because you work from home) 350 days out of a given year. What happens when you get to your destination, set up your stuff, connect your laptop via your iPhone to the Internet, and all those apps (including iCloud related stuff) gleefully transfer s***-tons of data the moment they see a route home, whether they need to or not? "Hey, it's just a little data," say the developers. "Sure, it's way more information than I actually need for this request but it's not that much..." Except when they all do that, the result can easily be (and it has been for me) a message from AT&T telling me I just chewed through a GB of data in less than 30 minutes. Whoops. Wouldn't it be great if there were some app that let you set specific rule sets for specific networks? Yeah, you guessed it: Little Snitch. When tethered to my iPhone, Little Snitch automatically switches to my "SHUT THE **** UP" profile, which essentially denies all but (what I deem) the most critical processes any network access. It's also handy for public WiFi. Have an e-mail service that doesn't support secure connections? How about disallowing Mail that particular connection on untrusted networks is pretty useful, don't you think?
Of course you know better, Linc Davis, so please advise. Should I trust every third-party developer? Should I stop paying my mortgage so I can pay my wireless bill instead? Should I let that password generator app connect to hacked-imperialist-swine.data-collector.kimfamilyphotos.kp every time I generate a password because you're sure it's fine?
I have no idea why you're ranked so highly in this forum considering both how almost-purposefully-unhelpful your response was and how uninformed about basic information security you demonstrated yourself to be. I guess anybody can be designated "well informed" if they sound condescending enough. Hey, maybe this post will shoot me up into the ranks!