<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title>Objective Development's Blog</title>
        <description>Objective Development's Blog</description>
        <link>https://obdev.at/blog</link>
        <image>
            <url>https://obdev.at/Images/social-graphs/opengraph-obdev.jpg</url>
            <title>Objective Development&apos;s Blog</title>
            <link>https://obdev.at/blog</link>
        </image>
        <lastBuildDate>Wed, 08 Apr 2026</lastBuildDate>
        <atom:link href="https://obdev.at/blog/rss/" rel="self" type="application/rss+xml" />
        <ttl>60</ttl>
        <item>
            <title>Little Snitch for Linux — Because Nothing Else Came Close</title>
            <description>Recent political events have pushed governments and organizations to seriously question their dependence on foreign-controlled software. The core issue is simple and uncomfortable: through automatic updates, a vendor can run any code, with any…</description>
            <link>https://obdev.at/blog/little-snitch-for-linux/</link>
            <guid isPermaLink="false">efdbe18a7e5b8bbc75e2ee7d</guid>
            <category>Little Snitch</category>
            <dc:creator>Christian</dc:creator>
            <pubDate>Wed, 08 Apr 2026</pubDate>
<content:encoded><![CDATA[<figure class="kg-card kg-image-card">
<img src="https://obdev.at/Images/odblog/79vh-littlesnitch-linux.png" class="kg-image">
</figure>
<p>Recent political events have pushed governments and organizations to seriously question their dependence on foreign-controlled software. The core issue is simple and uncomfortable: through automatic updates, a vendor can run any code, with any privileges, on your machine, at any time. Most people know this, but prefer not to think about it. Linux is the obvious candidate for reducing that dependency: no single company controls it, no single country owns it. So I decided to explore it myself.</p>
<p>I installed it on some older hardware we had around. Then installed apps. It turned out that I don’t need a lot: browser, mailer, text editor, development environment, git client, Signal, Wireshark and a couple of others. I can’t do Mac development on Linux, but that was to be expected.</p>
<p>Very soon after that, I felt kind of naked: being used to Little Snitch, it’s a strange feeling to have no idea what connections your computer is making. I researched a bit, found <a href="https://github.com/evilsocket/opensnitch">OpenSnitch</a>, several command line tools, and various security systems built for servers. None of these gave me what I wanted: see which process is making which connections, and in the best case deny with a single click.</p>
<p>Little Snitch was clearly missing, so I started building it.</p>
<p>To make a long story short: I decided to use eBPF for traffic interception at kernel level. It’s high performance and much more portable than kernel extensions. The main application code is in Rust, a language I’ve wanted to explore for quite a while. And the user interface was built as a web application. That last choice might seem odd for a privacy tool, but it means you can monitor a remote Linux server’s network connections from any device, including your Mac. Want to know what Nextcloud, Home Assistant, or Zammad are actually connecting to? Use Little Snitch on the server.</p>
<h2>Like an Old Friend on New Hardware</h2>
<p>Now, having a variant of Little Snitch on Linux, how does it feel? Is Linux better than a Mac in terms of privacy?</p>
<p>There are two questions to answer: one is about the system itself, the other about the apps you install.</p>
<h3>A Surprisingly Quiet System</h3>
<p>I noticed a difference already during development: when testing on macOS, it takes at most 5 seconds before a process communicates and I see network traffic. When testing on Linux, on the other hand, it often takes a minute or more until I can spot a connection. It all depends on the Linux distribution you install, of course. I used Ubuntu just because it’s so widespread, and as a developer, it’s a good idea to use the same setup as your users.</p>
<p>Ubuntu is relatively calm on the network, but still sends feedback to Canonical via a declared metrics channel (<code>ubuntu-insights</code> connecting to metrics.ubuntu.com) and various software update channels. You can deny the metrics, but you won’t want to disable updates — and there’s the familiar problem again. You have traded dependence on one company for another. The difference with Linux is that you can choose: there are many distros, and you can choose whom you trust. And as a big organization, you could even maintain your own distribution.</p>
<p>But in summary: on Ubuntu, I found 9 system processes making internet connections over the course of one week. On macOS, we counted more than 100.</p>
<h3>Not All Apps Phone Home</h3>
<p>The first app installed on every computer is usually the web browser. Only after installing the web browser can you search for software other than the basics provided with your distribution.</p>
<p>My Ubuntu came with Firefox pre-installed, so I can mainly speak to that one. The first thing I did was to start Firefox, but not use it for browsing. To my surprise it immediately showed me ads, and Little Snitch confirmed that it connected to ads.mozilla.org, incoming.telemetry.mozilla.org and many more. Knowing this, I went into the preferences and disabled most of the ads and tracking. But it still connects to some of these servers.</p>
<p>My recommendation: If you use a browser, start it and let it sit unused for at least a day. Then check the connection history and decide what you can disable in the settings, what you want to keep and what you want to deny in Little Snitch.</p>
<p>The next thing I did was web browsing. Needless to say that news sites live from tracking and ads, otherwise they could not provide their content for free. But did you know that some of these sites use somewhere between 50 and 100 trackers? I don’t want to blame anyone here, so try it yourself.</p>
<p>As far as other apps are concerned: each app behaves more or less the same way on all supported platforms. If you install Thunderbird, Visual Studio Code or any other major player, expect the same kind of metrics you see on other platforms. I found one notable exception, though: LibreOffice. I started LibreOffice Writer just for testing, and it made no network connections at all! Quite unusual these days!</p>
<h2>Free, Functional, and Open Where it Counts</h2>
<p>From a feature perspective, Little Snitch for Linux sits somewhere between Little Snitch Mini and the full Little Snitch: functional and useful, but without all the polish and depth of the macOS version. Think of it as an honest first version. The Mac version remains where our deepest work lives, and that isn’t changing.</p>
<p>The kernel component, written for eBPF, is open source and you can look at how it’s implemented, fix bugs yourself, or adapt it to different kernel versions. The UI is also open source under GPL v2, feel free to make improvements. The backend, which manages rules, block lists, and the hierarchical connection view, is <strong>free to use</strong> but not open source. That part carries more than twenty years of Little Snitch experience, and the algorithms and concepts in it are something we’d like to keep closed for the time being.</p>
<p>One important note: unlike the macOS version, Little Snitch for Linux is not a security tool. eBPF provides limited resources, so it’s always possible to get around the firewall for instance by flooding tables. Its focus is privacy: showing you what’s going on, and where needed, blocking connections from legitimate software that isn’t actively trying to evade it.</p>
<p>And finally a word on compatibility: we developed on Ubuntu 25.10 with a 6.17 kernel, and have confirmed it works on kernel 6.12 and above. On older kernels we currently hit the eBPF verifier’s maximum instruction limit. In theory, compatibility down to kernel 5.17, where <code>bpf_loop()</code> was introduced, should be achievable, which would cover Debian 12 (Bookworm) and Ubuntu 24.04 LTS (Noble). If you have the expertise to help, that’s one of the areas where contributions would make a real difference.</p>
<p>You can find Little Snitch for Linux <a href="https://obdev.at/products/littlesnitch-linux">here</a>. It is free, and it will stay that way.</p>
<p>Enjoy it.</p>]]></content:encoded>
        </item>
        <item>
            <title>“Evanesco Iconia!”</title>
            <description>There’s a lot not to like about the new “every menu item needs an icon” feature in macOS Tahoe. They add visual noise to the menus. They make menus more inefficient to scan. They often result in an inconsistent alignment of menu item titles.…</description>
            <link>https://obdev.at/blog/evanesco-iconia/</link>
            <guid isPermaLink="false">82597dea8b2a75fca98e98ad</guid>
            <category>Mac</category>
            <category>LaunchBar</category>
            <dc:creator>Norbert</dc:creator>
            <pubDate>Tue, 24 Mar 2026</pubDate>
<content:encoded><![CDATA[<figure class="kg-card kg-image-card">
<img src="https://obdev.at/Images/odblog/gll9-toggle-menu-icons.webp" class="kg-image">
</figure>
<p>There’s a lot not to like about the new “every menu item needs an icon” feature in macOS Tahoe.</p>
<ul>
<li>They add visual noise to the menus.</li>
<li>They make menus more inefficient to scan.</li>
<li>They often result in an inconsistent alignment of menu item titles.</li>
<li>They are too small, and often blurry and hard to decipher.</li>
<li>They are often inconsistent (different icons used for the same action).</li>
<li>They are often ambiguous (the same icon used for different actions).</li>
<li>Some menu items still don’t have icons, leaving weird gaps among other items that do have icons.</li>
<li>And finally, nobody asked for them…</li>
</ul>
<h2>The Good News</h2>
<p>There seems to be an undocumented, hidden user default that lets you turn them off:</p>
<pre><code>defaults write -g NSMenuEnableActionImages -bool false</code></pre>
<img src="https://obdev.at/Images/odblog/gll9-finder-before-after.webp"   width="2438" height="1332" border="0" alt="" />
<h2>The Bad News</h2>
<p>This works for many, but not all apps. Especially in many of Apple’s standard apps like Mail, Safari, Messages, Maps or Calendar you still get your menus cluttered with some (or many) of these icons – not all of them disappear.</p>
<img src="https://obdev.at/Images/odblog/gll9-mail-before-after.webp"   width="2438" height="1510" border="0" alt="" />
<p>But it does work in many other apps like Finder, Photos, Numbers, Preview, Xcode and in most third-party apps. So if you don’t like the icons, this is still way better than nothing.</p>
<h1>LaunchBar Action</h1>
<p>If you are using <a href="https://obdev.at/launchbar">LaunchBar</a> and want to experiment with this hidden system setting a little bit, here’s a convenient LaunchBar action for turning it on and off:</p>
<p>→ Download the <a href="https://obdev.at/downloads/launchbar/actions/ToggleMenuIcons.zip">Toggle Menu Icons</a> action</p>]]></content:encoded>
        </item>
        <item>
            <title>Deletion Impossible 2</title>
            <description>Who doesn’t love a sequel to a good story? Hollywood has taught us that every blockbuster deserves at least one follow-up, and macOS won’t disappoint either.  Back in our pilot Deletion Impossible, you learned about a bug in macOS 15.3 where…</description>
            <link>https://obdev.at/blog/deletion-impossible-2/</link>
            <guid isPermaLink="false">8ad825e22a66a36cf0ab06b0</guid>
            <category>Little Snitch</category>
            <dc:creator>Norbert</dc:creator>
            <pubDate>Mon, 29 Sep 2025</pubDate>
<content:encoded><![CDATA[<figure class="kg-card kg-image-card">
<img src="https://obdev.at/Images/odblog/itgl-RemoveSystemExtension.webp" class="kg-image">
</figure>
<p>Who doesn’t love a sequel to a good story? Hollywood has taught us that every blockbuster deserves at least one follow-up, and macOS won’t disappoint either.</p>
<p>Back in our pilot <a href="https://obdev.at/blog/deletion-impossible">Deletion Impossible</a>, you learned about a bug in macOS 15.3 where dragging an app to the Trash did not reliably uninstall its system extension. Despite macOS promising to “remove the associated system extension,” the extension often stayed behind.</p>
<p>With macOS 26 Tahoe, this problem has reappeared. Once again, moving an app to the Trash does not always remove its embedded system extension, even though the system dialog claims it will. The result: a system extension still running on your Mac long after you thought you had uninstalled the app.</p>
<h1>What actually happens</h1>
<ul>
<li>When you delete an app bundle that contains a system extension, macOS shows a dialog saying it will remove the extension.</li>
<li>In many cases, this process fails silently on macOS 26. The extension remains registered in the system.</li>
<li>Users then encounter confusing situations: the app is gone, but its system extension still loads or appears in System Settings.</li>
</ul>
<h1>How to check</h1>
<p>You can confirm whether an extension is still present by opening a Terminal window and running the following command:</p>
<pre><code>systemextensionsctl list</code></pre>
<p>This lists all installed system extensions. If the extension from your deleted app still appears with <code>[activated enabled]</code>, it hasn’t been removed.</p>
<h1>How to remove it manually</h1>
<ol>
<li>Open <strong>System Settings</strong>.</li>
<li>Go to <strong>General &gt; Login Items &amp; Extensions</strong>.</li>
<li>Scroll down to the <strong>Extensions</strong> section.</li>
<li>Switch from “By App” to <strong>“By Category”</strong>.</li>
<li>Click the <strong>i</strong> icon next to <strong>“Network Extensions”</strong>.</li>
<li>Click the action icon (three dots) and choose <strong>“Delete Extension”</strong> from the menu.</li>
</ol>
<h1>Final episode, hopefully</h1>
<p>We’ve already reported this bug to Apple, so there’s a good chance we’ll see a fix soon, in one of the next OS updates. Fingers crossed this stays a short two-episode miniseries with no further sequel…</p>]]></content:encoded>
        </item>
        <item>
            <title>First Contact – New in Little Snitch Mini 1.8</title>
            <description>Little Snitch Mini makes it easy to monitor which apps on your Mac are connecting to the internet. At the heart of the app is a clear, easy-to-understand list of all current and previous network connections from all your apps and system processes –…</description>
            <link>https://obdev.at/blog/first-contact/</link>
            <guid isPermaLink="false">d287357ad768abd69b6dfb5d</guid>
            <category>Little Snitch Mini</category>
            <dc:creator>Norbert</dc:creator>
            <pubDate>Fri, 01 Aug 2025</pubDate>
<content:encoded><![CDATA[<p>Little Snitch Mini makes it easy to monitor which apps on your Mac are connecting to the internet. At the heart of the app is a clear, easy-to-understand list of all current and previous network connections from all your apps and system processes – giving you a complete overview of what’s going on behind the scenes. And with just a single click, you can block any connection you don’t want.</p>
<p>But over time, this list can grow long. And then the question arises: Which of these connections are actually new? These are the ones you haven’t seen before – and therefore haven’t yet had the chance to decide whether you’re okay with them or would rather block them.</p>
<h1>The Solution: “First Contact”</h1>
<p>That’s exactly where the new “First Contact” feature of Little Snitch Mini 1.8 comes in. It helps you spot new connections without having to remember what was already there.</p>
<p>The “First Contact” list only shows you network connections that you haven’t seen before – such as those from newly installed apps, or first-time connections to domains by apps you’ve been using for a while.</p>
<p>Once you’ve reviewed the list, you can mark it as “seen” with a single click. From that point on, Little Snitch Mini will remember which connections you’ve already looked at – and the next time you open the “First Contact” view, you’ll only see those that are truly new since your last review.</p>
<p>This gives you a focused, clutter-free overview of what’s been added recently – and lets you take immediate action to block new, unwanted connections.</p>
<img src="https://obdev.at/Images/odblog/0oc1-FirstContact.webp"   width="2668" height="1258" border="0" alt="" />
<h1>Access via the Time Filter Menu</h1>
<p>You’ll find the new “First Contact” list in the time filter menu, where you can usually choose between time ranges like “Last Hour”, “Last Week”, or “All”. The new “First Contact” option fits right in – and provides a smart way to keep track of fresh, previously unseen activity.</p>
<img src="https://obdev.at/Images/odblog/0oc1-FirstContactMenu.webp"   width="986" height="728" border="0" alt="" />
<h1>A Simple Habit That Pays Off</h1>
<p>If you care about your privacy and want to stay informed about what your apps are doing online, it’s a good idea to check the “First Contact” list from time to time. It shows you what’s new – and gives you the power to take action right from the start.</p>
<p>With this new feature, Little Snitch Mini becomes even more helpful – while remaining just as simple and user-friendly as ever.</p>]]></content:encoded>
        </item>
        <item>
            <title>The Meta Bug</title>
            <description>Well, not that Meta. The other one. This is the story of a bug that affects itself by preventing its own resolution.  As much as we would like all software to be bug-free, it isn’t. But the least we can do as software developers, if we discover a…</description>
            <link>https://obdev.at/blog/the-meta-bug/</link>
            <guid isPermaLink="false">ee6bb29a76a2da0cf96b7c66</guid>
            <category>Little Snitch</category>
            <dc:creator>Norbert</dc:creator>
            <pubDate>Wed, 05 Mar 2025</pubDate>
<content:encoded><![CDATA[<p>Well, not <em>that</em> Meta. The other one. This is the story of a bug that affects itself by preventing its own resolution.</p>
<p>As much as we would like all software to be bug-free, it isn’t. But the least we can do as software developers, if we discover a bug in one of our apps, is to fix it as soon as possible and let users know that a new, fixed version is available.</p>
<p>To make this process work, it has become a de facto standard for software these days to automatically check at regular intervals if a newer version became available. So even if there’s a bug—no big deal, users will learn about the fix in a timely manner as soon as it’s released.</p>
<p>Or will they?</p>
<p>They won’t, if the bug affects that very automatic software update check itself. And that’s exactly what happened to us with our 6.2.1 release of Little Snitch.</p>
<p>Shortly after the release we noticed that a newer internal developer build wasn’t being announced on one of our test machines. After some investigation, we realized that there was indeed a bug that prevented the automatic update check from being performed under certain circumstances. We were able to quickly identify the cause of the problem, fix it, and release a fixed version 6.2.2.</p>
<p>But now we had—and still have—a problem. Exactly those users who are affected by this bug will never know that it has been fixed, nor will they learn about future updates—unless they manually check for updates in the meantime, in the worst case maybe only after a year or later, when they start wondering why there hasn’t been an update for such a long time.</p>
<p>That’s a rather unfortunate situation. For now we can only try to spread the word about this issue, hoping that sooner or later all affected users will somehow become aware that a newer version is available.</p>
<p>But this experience made us realize just how critical this particular component of our software actually is. Like so often in life, where you realize the value and the importance of a thing only when it’s gone.</p>]]></content:encoded>
        </item>
        <item>
            <title>Automatic software update checks may fail in Little Snitch 6.2.1</title>
            <description>A minor, seemingly insignificant change in Little Snitch 6.2.1 resulted in a rather unfortunate bug: If you have that version installed, chances are that automatic checks for new versions of Little Snitch are no longer performed, so you won’t get…</description>
            <link>https://obdev.at/blog/automatic-software-update-checks-may-fail-in-little-snitch-6-2-1/</link>
            <guid isPermaLink="false">dfa826a2ecefcb7ddbc1ab73</guid>
            <category>Little Snitch</category>
            <dc:creator>Norbert</dc:creator>
            <pubDate>Thu, 27 Feb 2025</pubDate>
<content:encoded><![CDATA[<p>A minor, seemingly insignificant change in Little Snitch 6.2.1 resulted in a rather unfortunate bug: If you have that version installed, chances are that automatic checks for new versions of Little Snitch are no longer performed, so <strong>you won’t get notified about future updates and bug fixes</strong>.</p>
<div class="note">
<p>This bug has already been fixed in Little Snitch 6.2.2</p>
<div style="font-size:1.15em;font-weight:700">

If you are still using version 6.2.1, please manually check for updates by selecting “Check for Updates” from the Little Snitch application menu.

</div>
<img src="https://obdev.at/Images/odblog/36gm-Check for Updates.jpg"   width="1284" height="698" border="0" alt="" />
</div>]]></content:encoded>
        </item>
        <item>
            <title>ping. pong. Yet another hole in the wall</title>
            <description>Back in 2020, when Apple introduced the new Network Extension framework as a mandatory replacement for the previous, kernel extension based NKE interface, third-party firewall products were required to use it for being able to monitor and intercept…</description>
            <link>https://obdev.at/blog/ping-pong-yet-another-hole-in-the-wall/</link>
            <guid isPermaLink="false">d74c2abe8a5c9e18f4ce8e3c</guid>
            <category>Little Snitch</category>
            <dc:creator>Norbert</dc:creator>
            <pubDate>Mon, 10 Feb 2025</pubDate>
<content:encoded><![CDATA[<figure class="kg-card kg-image-card">
<img src="https://obdev.at/Images/odblog/10wq-hole-in-the-wall.jpg" class="kg-image">
</figure>
<p>Back in 2020, when Apple introduced the new Network Extension framework as a mandatory replacement for the previous, kernel extension based NKE interface, third-party firewall products were required to use it for being able to monitor and intercept all kinds of network traffic. However, we quickly realized that the new framework only worked for TCP/UDP-based connections, but not for packets transmitted using the ICMP protocol, which is used for example by the <code>ping</code> command line tool.</p>
<p>So we reported our concerns about this to Apple, arguing that a firewall should never have any holes or backdoors, but that it should be expected to reliably cover all types of network traffic.</p>
<p>And thankfully, they agreed and added ICMP support to the Network Extension framework.</p>
<p>Now, five years later, after upgrading our machines to macOS 15.3, we have once again noticed that ICMP traffic no longer reaches our network extension, so we cannot show it in Network Monitor nor can we intercept and block it.</p>
<p>And as always, this bug not only affects Little Snitch but also any other third-party macOS firewall that uses the Network Content Filter API (which is the only way to perform such kind of filtering on macOS).</p>
<p>We very much hope that ICMP support was not intentionally removed by Apple, but that this is merely “just another bug” that will be fixed in a future macOS update.</p>
<p>Of course, we have already reported our findings to Apple (FB16450831). If you agree that this should be fixed, you may also submit a report, referencing our existing feedback.</p>
<p><strong>Update:</strong> This bug has been fixed in macOS 15.4.</p>
<p style="margin-top:10em;font-size:10px;color:#aaa;text-align:center">Credits: Image by clipground.com licensed under <a href="https://creativecommons.org/licenses/by/4.0">CC BY 4.0</a></p>]]></content:encoded>
        </item>
        <item>
            <title>Deletion Impossible</title>
            <description>Good news first: In macOS 15.3, Apple has fixed some bugs introduced in 15.2 that affected Little Snitch users (such as AirPlay not working when used alongside the built-in firewall of macOS)! Or, perhaps more accurately, they’ve replaced them with…</description>
            <link>https://obdev.at/blog/deletion-impossible/</link>
            <guid isPermaLink="false">c73adfbaf72b6a7d7c6b9d5b</guid>
            <category>Little Snitch</category>
            <dc:creator>Norbert</dc:creator>
            <pubDate>Fri, 07 Feb 2025</pubDate>
<content:encoded><![CDATA[<div class="introduction">
<p>Good news first: In macOS 15.3, Apple has fixed some bugs introduced in 15.2 that affected Little Snitch users (such as AirPlay not working when used alongside the built-in firewall of macOS)! Or, perhaps more accurately, they’ve replaced them with new ones…</p>
</div>
<h1>Applications hosting system extensions</h1>
<p>Certain applications that provide functionality at the operating system level (such as Little Snitch) ship with an embedded system extension.</p>
<p>Because these extensions have elevated privileges to perform their tasks, both their installation and removal are subject to special security requirements managed by the operating system.</p>
<p>For example, these extensions are installed in a dedicated area of the file system protected from unauthorized modifications by SIP. Consequently, removing such software is more involved because you must remove not only the app itself but also its associated extensions.</p>
<p>Whenever you attempt to delete such an application by moving it to the Trash, macOS informs you that this action also affects the system extensions included with the app.</p>
<img src="https://obdev.at/Images/odblog/xzrf-move-to-trash.jpg"   width="1020" height="596" border="0" alt="" />
<img src="https://obdev.at/Images/odblog/xzrf-remove-extensions.jpg"   width="1020" height="420" border="0" alt="" />
<p>That’s actually quite nice. You don’t have to worry about removing these extensions yourself—your Mac takes care of it automatically and uninstalls all the extra bits. Or does it?</p>
<p>Starting with macOS 15.3, this automatic removal of embedded system extensions no longer works. Although the system still claims to remove them, they remain installed and active, so they continue to run in the background without users even noticing.</p>
<p>Note that this affects not only Little Snitch but also all third-party Mac apps that include a system extension, such as VPN and network filtering apps, endpoint security tools, and hardware drivers.</p>
<h1>But wait, there’s more</h1>
<p>If the application in question not only includes a system extension but also happens to be protected against unauthorized deletion by root ownership of its application bundle (as is the case with Little Snitch), there’s another problem.</p>
<p>Usually, when you attempt to delete an app that you don’t own, Finder presents a password dialog where you can authenticate as an administrator to authorize the deletion.</p>
<p>However, starting with macOS 15.3, this dialog is no longer shown when this app also hosts a system extension that’s currently installed. Instead, you just get this vague error message:</p>
<img src="https://obdev.at/Images/odblog/xzrf-operation-cant-be-completed.jpg"   width="1020" height="420" border="0" alt="" />
<h1>What to do?</h1>
<p>Well, waiting for Apple to fix these bugs is probably not an option if you want to uninstall the app right away.</p>
<p>However, you can manually delete the installed system extension(s) prior to moving the app to the Trash.</p>
<p>To do this, follow these steps:</p>
<ol>
<li>Open <strong>System Settings</strong>.</li>
<li>Select <strong>General &gt; Login Items &amp; Extensions</strong>.</li>
<li>Scroll down to the <strong>Extensions</strong> section.</li>
<li>Click the <strong>i</strong> icon next to <strong>“Network Extensions”.</strong></li>
<li>Click the action icon (three dots) and choose <strong>“Delete Extension”</strong> from the menu.</li>
</ol>
<img src="https://obdev.at/Images/odblog/xzrf-network-extensions.jpg"   width="1280" height="954" border="0" alt="" />
<img src="https://obdev.at/Images/odblog/xzrf-delete-extension.jpg"   width="1280" height="574" border="0" alt="" />
<p>If you also have the Endpoint Security extension installed, delete this extension as well by clicking the <strong>i</strong> icon next to <strong>“Endpoint Security Extensions”</strong> and deleting the extension there.</p>
<p>Now you should be able to move the app to the Trash, without even being prompted about the embedded extensions anymore.</p>
<h1>Alternatives</h1>
<p>Instead of deleting Little Snitch, you might, of course, also consider keeping it installed and letting it continue to protect your privacy. 😉</p>]]></content:encoded>
        </item>
        <item>
            <title>What happens on your device, stays on your device – until it doesn’t</title>
            <description>Apple has recently shown a noticeable tendency to collect, gather, transmit, and sometimes even store privacy-sensitive data – despite repeatedly emphasizing the importance of protecting such data and ensuring it remains solely on the user’s…</description>
            <link>https://obdev.at/blog/what-happens-on-your-device-stays-on-your-device-until-it-doesnt/</link>
            <guid isPermaLink="false">b3a76fdb7f1dcf16fcc76cb2</guid>
            <dc:creator>Norbert</dc:creator>
            <pubDate>Wed, 08 Jan 2025</pubDate>
<content:encoded><![CDATA[<figure class="kg-card kg-image-card">
<img src="https://obdev.at/Images/odblog/s6dv-Help Improve Apple Search.png" class="kg-image">
</figure>
<p>Apple has recently shown a noticeable tendency to collect, gather, transmit, and sometimes even store privacy-sensitive data – despite repeatedly emphasizing the importance of protecting such data and ensuring it remains solely on the user’s device.</p>
<p>This is, of course, always accompanied by assurances that it is done in an anonymized manner that prevents any connection to an individual. However, this increasingly occurs without users being asked in advance for their consent to this data transmission and storage.</p>
<p>While Apple usually provides the option to disable these features, they are often enabled by default.</p>
<p>Aside from the recently <a href="https://mjtsai.com/blog/2025/01/01/privacy-of-photos-apps-enhanced-visual-search">much-discussed Enhanced Visual Search functionality</a>, which analyzes image content from personal photos and matches it against an Apple database, macOS Sequoia introduces another new feature labelled <em>Help Apple Improve Search</em>, which sends and stores various search queries from Safari, Spotlight, and other sources to improve search results.</p>
<p>This feature, too, is enabled by default and is well hidden at the very bottom of <em>System Settings &gt; Spotlight</em>.</p>
<p>Apple describes it as follows:<br>
<em>“Help improve Search by allowing Apple to store your Safari, Siri, Spotlight, Lookup, and #images search queries. The information collected is stored in a way that does not identify you and is used to improve search results.”</em></p>
<p>For more details, users can click on <em>About Search &amp; Privacy</em>, which makes for an interesting read. It describes in detail what kind of data Apple collects, including:</p>
<ul>
<li>Your location</li>
<li>Your topics of interest (e.g., cooking or basketball)</li>
<li>Your search queries, including visual search queries</li>
<li>Contextual information related to your search queries</li>
<li>Suggestions you have selected</li>
<li>Apps you use</li>
<li>Related device usage data</li>
<li>The names and types of music or video services you subscribe to</li>
</ul>
<p>Apple explains:<br>
<em>“Information sent to Apple related to your searches is used to process your request and to develop and improve search results, such as by using your search queries to fine-tune Search models. It is not linked to your Apple Account or email address.”</em></p>
<p>Even if the data sent is not directly linked to me as a person, the data itself may contain information I might not want to share with third parties. For example, if I intentionally or accidentally type one of my passwords into Spotlight, do I really want Apple to use that to train its search models, potentially spitting out that password in a future suggestion?</p>
<p>And even if the feature can be turned off – if users don’t even know that it exists or where to find it because it was quietly added in a system update, they cannot decide whether to use it or disable it.</p>
<p>It’s worth noting that the new option in System Settings only governs the <strong>storage</strong> of this data, <strong>not its transmission</strong> to Apple. If <em>Include Safari Suggestions</em> is enabled in <em>Safari Settings &gt; Search</em>, inputs into the search field are still sent to Apple for providing suggestions. To prevent this, <em>Include Safari Suggestions</em> must also be disabled.</p>
<p>Additionally, users of Little Snitch can block connections from <code>parsecd</code> and <code>parsec-fbf</code> to <code>apple.com</code>. These daemon processes handle the transmission of search and analytics data for Spotlight Suggestions, Safari Suggestions, Siri Suggestions, and more.</p>]]></content:encoded>
        </item>
        <item>
            <title>A memory leak in Apple’s Network Extension framework</title>
            <description>Is it normal for the Little Snitch Network Extension to consume Gigabytes of memory? No it isn’t.   Unfortunately that’s another new bug in the Network Extension framework of macOS. It’s a memory leak in Apple’s framework, which developers…</description>
            <link>https://obdev.at/blog/a-memory-leak-in-apples-network-extension-framework/</link>
            <guid isPermaLink="false">de3ef6db57396bda2a767a31</guid>
            <category>Little Snitch</category>
            <category>Little Snitch Mini</category>
            <dc:creator>Norbert</dc:creator>
            <pubDate>Thu, 14 Nov 2024</pubDate>
<content:encoded><![CDATA[<div class="introduction">
<p>Is it normal for the Little Snitch Network Extension to consume Gigabytes of memory? No it isn’t.</p>
</div>
<p>Unfortunately that’s <a href="https://obdev.at/blog/apples-built-in-macos-firewall-breaks-third-party-firewalls/">another</a> new bug in the Network Extension framework of macOS. It’s a memory leak in Apple’s framework, which developers must use to create a firewall for the Mac. This bug first occurred in macOS 15.0 Sequoia.</p>
<p>You can easily check if you are affected by this bug by running the <code>leaks</code> command in a Terminal window:</p>
<pre><code class="language-bash">sudo leaks at.obdev.littlesnitch.networkextension | grep "total leaked bytes"</code></pre>
<p>On macOS 14 Sonoma you may get a hand full of leaks with a total of a few Kilobytes. That’s OK (sort of). But on macOS 15 Sequoia this can easily grow to hundreds of Megabytes and more.</p>
<p>Once again, we rely on Apple to fix this issue in a macOS update.</p>
<p>This bug has already been reported to Apple (FB15552991), but if you are affected by this bug, feel free to send another report via Feedback Assistant (mentioning the existing report FB15552991). This might help Apple to find the cause of the issue and it increases the chance that Apple will prioritize the fix.</p>
<p>For the time being, if you encounter an unreasonably huge memory consumption, you may enforce a restart of the Network Extension. To do so, open the <em>Activity Monitor</em> app in <em>Applications &gt; Utilities</em>, search for the <code>at.obdev.littlesnitch.networkextension</code> process (make sure that <em>All Processes</em> is selected in the <em>View</em> menu) and click the Stop button in the toolbar to quit the process. The extension will then restart automatically.</p>]]></content:encoded>
        </item>
        <item>
            <title>Apple’s built-in macOS firewall breaks third-party firewalls</title>
            <description>Starting with macOS 15 Sequoia, Apple’s built-in firewall is causing troubles when used together with third-party firewalls that are based on Apple’s Network Extension framework (which is actually the only way for third-party developers to create…</description>
            <link>https://obdev.at/blog/apples-built-in-macos-firewall-breaks-third-party-firewalls/</link>
            <guid isPermaLink="false">9b1ae5e2672892683de1cefa</guid>
            <category>Little Snitch</category>
            <category>Little Snitch Mini</category>
            <dc:creator>Norbert</dc:creator>
            <pubDate>Wed, 13 Nov 2024</pubDate>
<content:encoded><![CDATA[<p>Starting with macOS 15 Sequoia, Apple’s built-in firewall is causing troubles when used together with third-party firewalls that are based on Apple’s Network Extension framework (which is actually the only way for third-party developers to create such firewall products for the Mac).</p>
<p>While one of the issues related to DNS lookups has been fixed in macOS 15.1, a new, even more serious one was introduced.</p>
<p>As a consequence of this new bug it can happen that Little Snitch doesn’t receive any network traffic information from Apple’s framework, hence no traffic is then shown in Network Monitor, no connection alerts are shown, and firewall rules for blocking connections are not applied.</p>
<p><strong>For the time being, until Apple fixes this serious bug in macOS, we therefore highly recommend to turn off the built-in firewall of macOS when also using Little Snitch or Little Snitch Mini.</strong></p>
<p>It’s worth mentioning that the Little Snitch firewall also works for incoming connections, providing the same functionality as the macOS firewall (except for stealth mode), so it’s usually not necessary to have them both running simultaneously anyway.</p>
<p>This issue has been reported to Apple (FB15699871) and we hope that they will resolve this problem with an update soon.</p>
<p>If you are affected by this bug, feel free to send another report via Feedback Assistant (mentioning the existing report FB15699871). This increases the chance that Apple will prioritize the fix.</p>]]></content:encoded>
        </item>
        <item>
            <title>Manifesto</title>
            <description>We assumed the following points were self-evident and required no further mention. However, after a well-known antivirus provider announced in October 2024 that they monitor their customers for signs of criminal activity, we feel compelled to clarify…</description>
            <link>https://obdev.at/blog/manifesto/</link>
            <guid isPermaLink="false">cb9a717b6d5ba65ee89a2c69</guid>
            <category>Little Snitch</category>
            <category>LaunchBar</category>
            <category>Micro Snitch</category>
            <category>Security</category>
            <dc:creator>Christian</dc:creator>
            <pubDate>Tue, 12 Nov 2024</pubDate>
<content:encoded><![CDATA[<p>We assumed the following points were self-evident and required no further mention. However, after a well-known antivirus provider <a href="https://www.sophos.com/en-us/content/pacific-rim">announced in October 2024</a> that they <a href="https://www.heise.de/en/opinion/Analysis-and-opinion-Sophos-and-the-broken-vow-10013195.html">monitor their customers for signs of criminal activity</a>, we feel compelled to clarify the following:</p>
<ul>
<li>While our apps do process data that could provide insights into user behavior, this data is processed exclusively on-device and is never transmitted over the Internet.</li>
<li>Our apps process data solely for the benefit of the user. No benefit to Objective Development or third parties is ever pursued.</li>
<li>We operate under the assumption that our customers comply with the law and we do not see it as our responsibility to detect or report criminal activity to any authorities.</li>
</ul>
<p>We believe other software vendors should make similar declarations, clearly stating what their apps may do. While the GDPR mandates transparency, it is evidently not sufficient. Even security experts failed to notice that their antivirus software had installed a rootkit to monitor their activity.</p>]]></content:encoded>
        </item>
        <item>
            <title>Should I upgrade to macOS Sequoia? (Part 2)</title>
            <description>This is a follow-up to our previous recommendation advising against upgrading to macOS Sequoia 15.0. Just over two weeks after the public launch of Sequoia, Apple has released its first bugfix update (15.0.1) on October 3rd. So, should you upgrade…</description>
            <link>https://obdev.at/blog/should-i-upgrade-to-macos-sequoia-part-2/</link>
            <guid isPermaLink="false">7e49a2abdbfcd33ea3763938</guid>
            <category>Little Snitch</category>
            <category>Security</category>
            <category>Mac</category>
            <dc:creator>Christian</dc:creator>
            <pubDate>Mon, 07 Oct 2024</pubDate>
<content:encoded><![CDATA[<p>This is a follow-up to our <a href="https://obdev.at/blog/should-i-upgrade-to-macos-sequoia-now/">previous recommendation</a> advising against upgrading to macOS Sequoia 15.0. Just over two weeks after the public launch of Sequoia, Apple has released its first bugfix update (15.0.1) on October 3rd. So, should you upgrade now?</p>
<h2>What was fixed?</h2>
<p>There were two major concerns with the 15.0 version which affected Little Snitch as well as other third-party firewalls:</p>
<ol>
<li><code>ssh</code> connections failing or aborting due to corrupted data in the TCP stream.</li>
<li>Apple’s built-in firewall preventing DNS lookups of computer names.</li>
</ol>
<p>The good news: According to our tests, the issue with the built-in firewall appears to be fixed.</p>
<p>However, the <code>ssh</code> issue was never consistently reproducible. For some users, it happened every time, for others, only sporadically. Most users were not affected at all. Since no one on our team experienced the issue firsthand, we lack direct experience with it. Recent user feedback indicates a shift of the situation: users who consistently encountered the problem no longer report it, while others, who were previously unaffected, are now experiencing <code>ssh</code> connections dropping after some time. We don't yet have sufficient data to determine whether this is coincidence or if the bug persists.</p>
<h2>Are there new bugs?</h2>
<p>We have received several reports from users of Little Snitch and Little Snitch Mini where the network content filter became inactive in the course of installing the macOS update. You’ll notice that you are affected if the Network Monitor stops displaying traffic or if connection blocking no longer works.</p>
<p>Fortunately, there appears to be a simple workaround. Open <em>System Settings</em> &gt; <em>Network</em> &gt; <em>VPN &amp; Filters</em> and check the <em>Filters &amp; Proxies</em> section. Little Snitch should be enabled and marked with a green dot. However, if the content filter is inactive, it will display a yellow or red dot:</p>
<img src="https://obdev.at/Images/odblog/fkmi-FiltersAndProxies.png"   width="960" height="394" border="0" alt="" />
<p>In that case, select the inactive content filter and click the Minus-button at the bottom to remove it. Then open Little Snitch or Little Snitch Mini and re-enable the network filter. It should then be up and running again.</p>
<h2>Conclusion</h2>
<p>In summary: If you have already upgraded to Sequoia, we recommend installing the 15.0.1 bugfix release. If you’re still on Sonoma, it’s a trade-off between accessing new features and maintaining system stability. We don’t have a definitive recommendation — it depends on your personal preferences.</p>
<p>In any event, check the <em>Filters &amp; Proxies</em> section in System Settings after the upgrade to ensure that your network content filters are still active.</p>]]></content:encoded>
        </item>
        <item>
            <title>Should I upgrade to macOS Sequoia now?</title>
            <description>The short answer is: We don’t recommend upgrading now because there are several bugs related to networking and firewalls in the 15.0 release. We expect most of them to be fixed in 15.1.  If you have already upgraded or if you want to upgrade for…</description>
            <link>https://obdev.at/blog/should-i-upgrade-to-macos-sequoia-now/</link>
            <guid isPermaLink="false">ce8db8866a5a822824f5fea3</guid>
            <category>Little Snitch</category>
            <category>Security</category>
            <dc:creator>Christian</dc:creator>
            <pubDate>Fri, 20 Sep 2024</pubDate>
<content:encoded><![CDATA[<p>The short answer is: We don’t recommend upgrading now because there are several bugs related to networking and firewalls in the 15.0 release. We expect most of them to be fixed in 15.1.</p>
<p>If you have already upgraded or if you want to upgrade for other reasons, here is a list of issues related to Little Snitch or networking in general:</p>
<h2>Data corruption in TCP connections</h2>
<p>As far as we can tell, this bug is rare and primarily affects <code>ssh</code> connections. Users report various protocol violation errors from <code>ssh</code> and that they are no longer able to connect to servers when a network extension (any network extension) is active.</p>
<p>The error messages are either “Connection corrupted” or complaints about wrong key size. We experienced that problem only once, but in a more severe way: A file transferred via ssh arrived corrupted.</p>
<p>There are individual reports of websites aborting loading midway. We believe this is a general problem with TCP connections, not only <code>ssh</code>, but <code>ssh</code> seems to trigger it most frequently.</p>
<h2>Apple’s built-in App Firewall blocks DNS lookups and Firefox</h2>
<p>This bug is not related to Little Snitch, but since it’s a firewall topic, we include it here. If you have configured Apple’s firewall to block incoming connections, it blocks <strong>all</strong> incoming UDP packets, even if they are responses to requests, e.g. responses to DNS name lookups.</p>
<p>macOS performs name lookups in different ways, depending on the programming interface used by the process. Safari and Chrome will still work when blocking incoming connections, but Firefox will not.</p>
<p>On Sequoia 15.0, we recommend that you disable Apple’s firewall until the problem is fixed.</p>
<h2>If you still use Little Snitch 5</h2>
<p>Our previous major version, Little Snitch 5, is not yet fully compatible with Sequoia. This is not a bug in Sequoia, but a last-minute change shortly before the final release: Little Snitch up to version 5.7.6 no longer has access to the name of the current Wi-Fi network. This breaks Automatic Profile Switching on network change. We will release version 5.8 soon which fixes the problem. Little Snitch 6.1.1 already contains this fix.</p>
<h2>What was the problem with Little Snitch 6.1?</h2>
<p>Soon after releasing version 6.1 (which brought compatibility with Sequoia), we noticed that DNS name lookups were leaving the machine unencrypted although Little Snitch was configured to encrypt DNS traffic. An analysis showed that some of the lookups were not sent to our DNS proxy network extension, but rather left the machine directly. We therefore suspected another macOS bug.</p>
<p>We were a bit concerned because such a code path existed at all: There are conditions under which the system can bypass a configured DNS proxy.</p>
<p>However, it turned out that this code path is necessary. If the DNS proxy network extension just wants to forward a lookup to a “normal” DNS server, the lookup should not be re-routed back to the DNS proxy again, as that would cause an infinite loop. In fact, we even rely on this behavior for handling configured exceptions from DNS encryption.</p>
<p><strong>But:</strong> Why would that code path be taken for lookups done by Firefox? There was another improvement in version 6.1: Server names provided by Apple are sometimes incorrect, often returning a <a href="https://en.wikipedia.org/wiki/CNAME_record"><code>CNAME</code></a> instead of the actual hostname that was entered by the user. In order to improve this, we used a man-in-the-middle technique between processes and the <code>mDNSResponder</code> daemon, responsible for name lookups. We already used this same technique in previous versions of Little Snitch for many years, before Apple began providing server names via API. Our improvement, however, made <code>mDNSResponder</code> think that all requests originated from our network extension! And therefore it sent them out directly, bypassing the DNS proxy.</p>
<p>In version 6.1.1, we reverted to using the server names provided by Apple's API. Maybe we can come up with an improvement in a future release.</p>]]></content:encoded>
        </item>
        <item>
            <title>Warning: DNS encryption in Little Snitch 6.1 may occasionally fail</title>
            <description>UPDATE: Spoke too soon… The problem discussed here turned out to be specific to Little Snitch 6.1 and not a general issue in macOS. It has already been fixed in Little Snitch 6.1.1.  See the end of the article for details.  DNS Encryption 101 When…</description>
            <link>https://obdev.at/blog/warning-macos-sequoia-15-may-bypass-dns-encryption/</link>
            <guid isPermaLink="false">9e18b9b30ceba24ee6a30b1d</guid>
            <category>Little Snitch</category>
            <category>Security</category>
            <dc:creator>Norbert</dc:creator>
            <pubDate>Tue, 17 Sep 2024</pubDate>
<content:encoded><![CDATA[<figure class="kg-card kg-image-card">
<img src="https://obdev.at/Images/odblog/nhi5-DNS.png" class="kg-image">
</figure>
<h1>UPDATE: Spoke too soon…</h1>
<p><strong>The problem discussed here turned out to be specific to Little Snitch 6.1 and not a general issue in macOS. It has already been fixed in Little Snitch 6.1.1.</strong></p>
<p>See the end of the article for details.</p>
<h1>DNS Encryption 101</h1>
<p>When you enter a hostname in your web browser (e.g., apple.com), that name must first be translated into an IP address so your computer can connect to the server. This lookup is usually performed unencrypted, meaning your Internet provider and other parties monitoring your connection can see which sites you visit. To protect these lookups from prying eyes, Little Snitch 6 offers a new feature: DNS encryption. With DNS encryption enabled, all name lookups are routed through Little Snitch and performed in encrypted form.</p>
<p>For this purpose, Little Snitch registers a DNS proxy. macOS then sends <strong>all</strong> DNS requests to that proxy, which in turn performs the lookup in encrypted form. The key point here is that <strong>all</strong> requests must be routed through the proxy.</p>
<h1>But…</h1>
<p>While investigating a DNS-related issue on macOS 15 Sequoia, we discovered that some DNS requests—particularly those made via certain low-level legacy APIs—were not being received by our proxy!</p>
<p>There appears to be a bug in macOS Sequoia causing <strong>some</strong> requests to bypass the installed DNS proxy and be sent unencrypted to the system’s default name server instead.</p>
<p>Note that this bug likely affects any kind of DNS proxy, not just Little Snitch.</p>
<p>So, if you rely on the new DNS encryption feature of Little Snitch 6, or if you are using another third-party DNS proxy, be aware that some DNS lookups may bypass the proxy until Apple provides a fix in a future macOS update.</p>
<p><strong>Note:</strong> DNS lookups performed via higher-level APIs do not appear to be affected by this bug. For example, your web-browsing in Safari or Chrome still fully benefits from encrypted lookups. Firefox, on the other hand, does seem to be affected.</p>
<h1>How to Reproduce</h1>
<ol>
<li>Enable DNS encryption in Little Snitch &gt; Settings.</li>
<li>Start <a href="https://www.wireshark.org">Wireshark</a> with a capture filter for <code>port 53</code>.</li>
<li>Run the following code in an Xcode playground:</li>
</ol>
<pre><code class="language-swift">import Foundation

let domain = "dnsproxytest.com"
var result: UnsafeMutablePointer&lt;addrinfo&gt;?
let status = getaddrinfo(domain, nil, nil, &amp; result)</code></pre>
<p>You will notice that the lookup for <code>dnsproxytest.com</code> can be seen in Wireshark in unencrypted form on UDP port 53 (the default for unencrypted lookups).</p>
<p>Additionally, you will see that Little Snitch Network Monitor does not display any traffic for the lookup because the lookup completely bypasses the network filter!</p>
<p>We have reported this bug to Apple and hope for a fix soon. Please stay tuned, we will keep you updated here.</p>
<h1>Update 2024-09-17, 19:10</h1>
<p>After further investigation, we found that this bug has already existed at least since macOS 14.5 Sonoma (maybe even earlier, but we currently don’t have access to an older 14.x system for testing).</p>
<h1>Update 2024-09-18, 12:05</h1>
<p>After further investigation, we found that this bug only affects the DNS proxy of Little Snitch 6.1. <strong>It’s not a general problem of DNS proxies in macOS</strong>. We will therefore be able to fix this issue at our end and provide an updated version of Little Snitch 6 later today.</p>
<h1>Update 2024-09-18, 15:52</h1>
<p>The issue has been fixed in Little Snitch 6.1.1.</p>]]></content:encoded>
        </item>
        <item>
            <title>Did it block?</title>
            <description>How effective are blocklists actually? Let’s find out!   Blocklists are a fine thing. With just a few mouse clicks they are set up and immediately they effectively protect against unwanted Internet connections to tracking servers, advertising…</description>
            <link>https://obdev.at/blog/did-it-block/</link>
            <guid isPermaLink="false">8a7ca1cdd8a1bfb99c89a8b1</guid>
            <category>Little Snitch Mini</category>
            <dc:creator>Norbert</dc:creator>
            <pubDate>Tue, 04 Jul 2023</pubDate>
<content:encoded><![CDATA[<div class="introduction">
<p>How effective are blocklists actually? Let’s find out!</p>
</div>
<p>Blocklists are a fine thing. With just a few mouse clicks they are set up and immediately they effectively protect against unwanted Internet connections to tracking servers, advertising servers and malware sites.</p>
<p>From then on, they perform their duties quietly and unnoticed in the background. But sometimes it would be quite exciting to also watch them at work.</p>
<p>This was already possible with Little Snitch Mini. The red flashing in the menu bar icon or in the connection list serves as an indication that one of these unpleasant connection attempts has just been detected and prevented.</p>
<p>With <a href="https://obdev.at/littlesnitch-mini">Little Snitch Mini 1.3</a> there is now another exciting possibility to get a closer look at your blocklists: The blocklist statistics!</p>
<p>A counter is now displayed for each blocklist entry, indicating how often the entry in question has already been effective:</p>
<img src="https://obdev.at/Images/odblog/inyh-Screenshot 1.png"   width="632" height="390" border="0" alt="" />
<p>And a new filter option in the search field allows you to see only those entries that have been effective at least once:</p>
<img src="https://obdev.at/Images/odblog/inyh-Screenshot 2.png"   width="1438" height="992" border="0" alt="" />
<p>The filtered view is sorted by frequency. So you can easily find the most often used entries at the top of the list.</p>
<h1>Does “unused” mean “useless”?</h1>
<p>With some blocklists, it is possible that even after months of use, not a single entry appears as used.</p>
<p>However, this should not lead you to the false assumption that this list is unnecessary and might therefore be removed.</p>
<p>If and how often a list takes effect depends a lot on what that list specializes in. Lists that specialize in tracking servers will potentially hit frequently, because user tracking for advertising purposes is a widespread evil.</p>
<p>On the other hand, lists that protect against malware servers should, in the best case, never take effect. Otherwise, this would be an indication that you were actually affected by a connection attempt to one of these potentially dangerous servers, but fortunately it was successfully detected and prevented by the blocklist.</p>
<p>You can compare this to the lock on your front door. Just because there are no traces of an attempted break-in on the door does not mean that you should remove the lock.</p>
<p>So enjoy using blocklists with Little Snitch Mini and see how often they take action for you!</p>]]></content:encoded>
        </item>
    </channel>
</rss>
