Does Etrecheck have the blessing/approval of Apple itself?

Hi 😕


Here on ASC there is much discussion about the dangers of using non-approved software.


My understanding is that simply by visiting a URL a computer can be infected with malware and the user remain completely unaware of this fact. There is some discussion about this here:- https://www.quora.com/Can-you-get-a-virus-just-by-visiting-a-website


If the Etrecheck facility has been checked - by Apple itself - to ensure that it is completely safe for Apple customers to use, I'd really welcome that confirmation.


Does any one know or can someone ask Apple on my behalf?


D.

iMac with Retina 5K display, macOS High Sierra (10.13.3), 27 inch - Purchased January 2018

Posted on Mar 25, 2018 5:17 AM

Reply
Question marked as Top-ranking reply

Posted on Mar 26, 2018 12:28 AM

P.S. Regarding Apple verifying the app/program, no they have not. If they had, you would see an official article that would specifically notate it as one optional app a user may consider installing based on the issue or reasoning, or an Apple advisor could directly advise you to download it as part of the troubleshooting process. The only one I'm aware of that tech support can recommend per Apple is Malwarebytes

58 replies

Mar 25, 2018 3:19 PM in response to stedman1

Hmmm. 😟


I'm not sure where you are coming from on this, 'stedman1' 😕


In this thread from 2014 https://discussions.apple.com/thread/6704451


Referring to EtreCheck, 'Linc Davis' said to me .....


"I haven't tested that program and I don't recommend it. In reports on this site, the "failed" warnings appear often. No one, including the developer, seems to know what they mean. I've seen no evidence that they mean anything at all. To do anything at all merely because of those warnings, in the absence of a functional problem, would be a waste of time. As I wrote, the results of posting "etrecheck" output can be very poor."


And ...... "I have no use for "etrecheck" output."


=


How can I be sure that connecting to the EtreCheck server and downloading the software will not, in and of itself, cause 'damage' to my computer or compromise my security?


I don't want to end up being part of one of these! 😮


https://www.secplicity.org/2018/02/20/iot-botnets-evolving-big-can-get/


I would very much like Apple itself to verify that the product is safe to use.


Does THIS help explain matters?


D.

Mar 25, 2018 6:33 PM in response to Kurt Lang

Kurt Lang wrote:


If you want, you can download the entire source code for EtreCheck from GitHub and read through it yourself.

That is not a suggestion that I would have made in this context. 🙂


In any case, that statement is no longer true. When I switched from donation support to a traditional software license, I could no longer publish the entire source code on Github. Otherwise, people could just generate their own licenses. Even without the source, people are actively attempting to reverse-engineer the license code and are posting cracked versions on the Internet. I'm holding my own for now, but I could sure do without distractions like this thread.

Mar 26, 2018 12:11 AM in response to MadMacs0

You said "If you have reason to suspect any 3rd Party software is behaving maliciously, report it to product-security where Apple may have time to look into it. I have done this with mixed results."


=


Thank you for your reply, 'MadMacs0'. I appreciate all your comments. 🙂


I had anticipated that as Apple staff oversee these discussions, someone from Apple might well have picked-up on my suspicions as a matter of course. It appears that I am mistaken in that regard.


Accordingly, will you please tell me HOW I can report my concerns to "product-security"?


D.

Mar 26, 2018 12:27 AM in response to tygb

Wow! 😮


I found this item fascinating! https://www.ncsc.gov.uk/guidance/eud-security-guidance-macos-1012-0


Malicious code detection and prevention

XProtect is built into macOS. It has a limited signature set which is maintained by Apple to detect widespread malware. XProtect will also restrict vulnerable plugin versions (such as Java) to limit exposure. Several third-party anti-malware products also exist which attempt to detect malicious code for this platform. Content-based attacks can be filtered by scanning capabilities in the organisation.

Are you aware of the names of such "third-party anti-malware products" approved for use by Apple?


D.

Mar 26, 2018 4:46 AM in response to LACAllen

Thank you, 'LACAllen'.


Sadly, that link didn't 'work' for me. Has it been 'doctored' in some way? No matter where one goes on the Internet, one can never be certain that it's safe to click on a link! 😉


The similar link posted by 'etresoft' DID work, though .... but with this result:-


User uploaded file



As he is a Developer, I'm rather surprised that 'etresoft' was unaware of this restriction. No matter. 😎


D.

Mar 26, 2018 5:02 AM in response to etresoft

etresoft wrote:


It seems like EtreCheck may be replacing ClamXAV as the object of your unwanted attention. I'm sure that would be good news for Mark Allan, but I would like you to find a different hobby. I made a sincere effort to explain some of the more confusing aspects of security software and to dissuade you from your strange anti-ClamXAV crusade. And the reward for my attempts to be helpful is that you now start an anti-EtreCheck crusade?


There is an old saying that goes something like "be careful what you ask for; you might get it." No one had any idea what your anti-ClamXAV agenda was about. Your anti-EtreCheck agenda seems more transparent. In all honesty, I would prefer that you don't use EtreCheck and avoid discussing it here in the forums, either positively or negatively. Otherwise, you might set something in motion that isn't what you would have wanted.

Almost all contributors to the ASC agree that Apple products do not need external protection from the likes of www.clamXav.com - a product which sounds like it's 'too good to be true'. Perhaps I'm mistaken, but you appeared to be supporting the use of the software.


You final sentence sounds somewhat threatening, but I shall ignore that. 😉


D.

Mar 26, 2018 7:35 AM in response to liv0123

liv0123 wrote:


I work in IT. We are blocked from EtreCheck, but ironically we are blocked from most things.


Do I wish I could use it, feel it's safe, and would I though, if I weren't blocked?


How are you blocked? A number of people have reported problems purchasing a license. I don't know what they are doing with their corporate firewalls that prevents an app from connecting to a standard web server on a standard web port. It is a constant battle against software pirates. I can't risk a public release of a version that can be activated without a secure exchange of tokens with my license server.


But even if you can't purchase a license, you can still use EtreCheck to diagnose problems. It will run 5 times without a license. That should be enough to identify a problem, troubleshoot it, and show that it is resolved. I also plan to reset that 5 run limit periodically so that people who have tried EtreCheck in the past can use it again in the future.

Mar 26, 2018 9:25 AM in response to etresoft

Oh, it's nothing on your end. It's our IT guy but mostly our head of security. I checked my so-called admin settings out of curiosity, bc I still tried knowing how insanely strict they are.

He's got them set up to appear to us as though we are administrators, just like anyone else who has those privileges.

Nope. He actually has us as managed users but has it display to us that we are listed as admin, not just upon login, but t/out settings. I looked around a bit though , thus, how I found out. Sneaky & well, just unnecessary .... just list us as standard users? We know we don't have root access but no admin? Bit ironic....

Worse, I can fix basic computer issues such as how my issue began. That's what I do. But, am I allowed to on my own iMac? Nope. Now, my iMac has gotten to the point where it's shot. I'm agitated bc I know I could've prevented it from becoming unusable. I now have to use someone else's. Grrrr....quite inconvenient & if I dare try to change the security settings whatsoever or any others for that matter to still try to fix it via privileges I need for certain tools, I'd get fired straight away. Soooooo, I have to deal for now & wait on IT to appear which will be??

Regardless, once they get mine back to me, I'm asking about etresoft though. We have tools, but I find your program log more user friendly & easier on the eyes, and I know my associates & clients would find it to be so too. I'd like to use it along with our diagnostic log too as desired for clarification on things or simply to have as an additional form of documentation that I feel is safe and credible.

Anyways.... time will tell

Mar 26, 2018 12:42 PM in response to LACAllen

LACAllen wrote:


I’ll bet he’s fully aware of the need to be a developer for access. I didn’t warn you either.


No admonishment for me?


Curious.


No matter? Does not seem so.


I don't seek to admonish anyone; nobody at all! 😕


What I would like to know, though, is why the link posted by 'etresoft' takes me directly to the appropriate Apple page - whereas the link YOU posted, 'LACAllen', initially shows the correct Apple URL in the address bar but then takes me here:-


Sign In - Apple


If I do try to sign in, an orange-coloured box appears saying "The account does not exist"



User uploaded file

====================================================================


This happens whilst I am already 'Signed in'.


Is there a simple reason? I suspect not. 😢

Mar 26, 2018 1:02 PM in response to etresoft

Nobody, except you, is complaining. If you want to rock the boat, you can do so. If you push hard enough, you can make a change. I'm sure of that. You can make a lot of people less happy. You can make it more difficult for a lot of people to solve their Mac problems. Is that what you want? Is that what will make you happy? Then by all means, continue.



I haven't MADE a complaint about EtreCheck. 😠

Mar 26, 2018 1:23 PM in response to HunterBD

HunterBD wrote:


Is there a simple reason?

Apple uses a single authentication system for any Apple site that requires Apple ID authentication. This authentication system requires you to log in with an Apple ID that has access to the requested resource.


If your Apple ID doesn't have access to the requested site, then you will be taken to a landing page where you may be able to request access. If your Apple ID does have access to the site, you will be immediately redirected into the site.


If you attempt to access a deep link into a site that requires authentication, then you may bypass that landing page and not have an opportunity to request access. That is what happened in this case. About 18 months ago, Apple re-designed the bug reporter to have a more modern web interface circa 2006. As part of that, it now redirects users into the "/web/" subdirectory. If you login to the bug reporter and copy the URL from the address bar, you are going to get the "/web/" subdirectory.


I manually removed the "/web/" subdirectory before I pasted my URL. I manually edit pretty much every Apple URL I post because they all have some funky redirection scheme. So yes, there was most definitely some "doctoring" of URLs. I "doctored" the URL I posted. Sometimes I doctor Apple URLs to ensure that users hit the proper landing page. Other times, I doctor Apple URLs to ensure that the user will be redirected to a version of a page more appropriate for their language and region instead of mine.


Now, is that a "simple" reason? The answer is yes. The simple reason is that you are automatically assuming conspiracy and malicious intent where there is none. Everyone who answers questions in this forum does so because they are trying to help people. As this is the public internet, there are always some scammers or bad actors with malicious intent. But in most cases, those people are spotted and reported right away. Then Apple's moderation team quickly removes their posts. But if a Level 6, like LACAllen with 16,295 points, posts a link, you can safely click on it. That's why we have the points and the levels.


Everybody here is always learning and trying to do their best. In fact, most people are always learning and trying to do their best. Maybe they write an antivirus apps like ClamXAV. Maybe it reports a false positive one day. Someone files a bug report about it and they fix it. They do better next time. Does that mean they deserve to be incessantly hounded across the internet for that one mistake years ago?


Sometimes people make mistakes. But they learn, try to do better, and eventually develop a good reputation. Other people never learn from their mistakes. They repeat them and develop a bad reputation. Which group do you want to be in?

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

Does Etrecheck have the blessing/approval of Apple itself?

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.