Automatic iOS and macOS update notifications that actually work đ¤Ż
The âAutomatic Updatesâ feature in iOS and macOS can be slow and unpredictable.
Now you can quickly get notified whenever Apple releases a new software update or Rapid Security Response.
Supported services: Discord, Email, Signal, Slack, SMS (via SimpleTexting and Twilio), and Telegram.
Follow the self-hosting setup instructions to send custom notifications about new software updates and Rapid Security Responses from your own server.
To make things even easier, the project maintains a couple of free notification options that are powered by the same open source program â no setup necessary!
Join the @SoftwareUpdates channel on Telegram.
Or simply text SUBSCRIBE to +1-833-942-4941 to sign up for the SMS notification list.
âKeeping your software up to date is one of the most important things you can do to maintain your Apple productâs security.â â Apple
Almost every new software update includes critical bug fixes for a variety of security vulnerabilities. Rapid Security Responses include fixes for âissues that might have been exploited or reported to exist âin the wild.ââ
However, iOS and macOS donât immediately tell you when a new update or Rapid Security Response is available.
This projectâs goal is to help close that gap.
Sort of. Slowly. Sometimes.
If Automatic Updates are enabled (Settings > General > Software Update > Automatic Updates
), your device might download and install a new update several days or weeks later â but only if all of the following conditions are true:
There are a lot of ways that three seemingly simple rules can go wrong (just ask Isaac Asimov). These rules are no exception.
Here are a few examples where automatic updates sometimes donât work very well under real-world conditions:
Apple regularly publishes detailed revisions to their Apple Platform Security documentation, but even though the subject of âAutomatic Updatesâ seems highly relevant to this topic, that phrase is only mentioned twice overall â and only once in the context of iOS in Appleâs latest PDF guide that spans more than 210 pages (as of May 2022).
Very few details are provided. Dedicated readers can learn a few fascinating facts about the âEscrow keybagâ where automatic updates are briefly mentioned, but thereâs nothing about when and how update checks are performed, or what protections (if any) are in place to ensure that users will eventually find out about available updates with critical security fixes.
Even with the ideal combination of flawless WiFi, an uninterrupted connection to power, and a stable âovernightâ situation, automatic updates can still take quite a while. A popular thread on Reddit was started after Appleâs Senior Vice President of Software Engineering purportedly responded to an email inquiry that was sent on behalf of Apple users who were confused about how Automatic Updates were supposed to work.
The reply from Craig Federighi (which exists in the form of a screenshot, not in any official documentation) states that iOS updates are rolled out incrementally and that automatic updates begin â1-4 weeks later (after weâve received feedback on the update).â
For users and organizations who care about security, â1-4 weeks laterâ could feel approximately 1-4 weeks late.
Yes! Itâs fantastic that Apple added this functionality and that they are beginning to use it (as of May 2023).
Some organizations and individuals may still prefer to get notified right away when a Rapid Security Response update is available, instead of waiting for it to be automatically applied (maybe) at some point in the future.
Itâs difficult to fix something without also revealing whatâs broken. Within moments of any new software update or Rapid Security Response, people all over the world start closely examining the changes. Some of those people are not good people, and some of them learn about new vulnerabilities that they can start exploiting right away before the update has been widely deployed.
Similarly, any attackers who already knew about the vulnerability previously had a reason to be judicious and careful in how they used it. They wanted the vulnerability to remain secret so that Apple wouldnât fix it. Once it becomes public, they may instead be motivated to race against the update and try to compromise as many devices as possible before the window for exploiting this previously hidden vulnerability has completely closed.
When it comes to installing security-related bug fixes and updates, faster is always better.
Yes.
All trademarks are property of their respective trademark holders. This project is not affiliated with Apple.