One of the Apple users the day before yesterday noticed a strange one: when using iTunes, the Little Snitch firewall asked permission to establish a connection with the nonexistent domain bogusapple.com, port 443.
They began to
discuss the topic
on the forum , and one of the Apple users plucked up courage and registered this domain for themselves.
The new site owner, bogusapple.com, left a message for OS X Mountain Lion users, who will log in to the site out of curiosity.
MessageHi! It is incredibly curious about.
')
- No, I didn't hack your computer.
- If you weren’t
- No, there is no malware on this site, there is not even an image, and I don't set cookies.
- I think Apple "tests the waters" by bogusapple.com to ensure it fails.
- Foolish idea, and now I do :)
- Who am i No one particularly important .
Didn’t me? Get in touch with me!
The owner of the site bogusapple.com
Jason Salaz suggests that the glitch could be due to a typo in the URL (bogusapple.com - bogus.apple.com). There was a thought that iTunes specifically initiates an error for some of its software needs.
For comparison, in Windows 7, the Network Connectivity Status Indicator (NCSI) service checks for network access in
this way by downloading a small text file
www.msftncsi.com/ncsi.txt over HTTP and checking the DNS record msftncsi.com. If the domain is not resolved to the specified IP address, NCSI displays the message “No Internet access”.
Apple, of course, did not comment the situation at all, but soon
corrected the code , replacing bogusapple.com with metrics.mzstatic.com. It turns out that the mention of bogusapple.com was in the
HTML that came to iTunes from the Apple server, so that they could quickly fix everything.
But it turns out that Apple, using a botnet of millions of computers, carried out a DDoS attack on someone else's website for almost a day.
Joke, of course.