I am a seasoned systems architect and developer, now retired. While I was tempted in the first few weeks of my retirement to just turn the page and let it go, I remembered how much I used to enjoy writing small utilities for my own daily workflows. A year ago, I asked my fellow forum members (a Mac-dedicated one) if they would like to beta test some of my applications (and oh, they did). I got high quality feedback I would not have gotten elsewhere. I kept striving to answer their feature requests and today many of my first beta testers are insisting that my applications have outgrown the private beta.
I was caught completely off guard by FinderFix (https://synappser.github.io/apps/finderfix/), the first application I'm opening to public beta, making the top row on Reddit a couple of weeks ago. This sudden limelight is both an opportunity and a challenge.
I am not complaining. Any publicity is good publicity and I got this kind of genuine enthusiastic feedback: "OH MY GOD! Bro you’re a god sent. Thanks man I love this app. Also that Cmd + X for cut/paste. Oof so good!".
I however cherish anonymity and I laud the Internet for allowing me to enforce it. I am thus publishing my software under a pseudonym (a pen name, if you prefer) with a free Apple Developer Certificate. How long will I be able, with Apple's current Gatekeeper policy, to preserve my anonymity if I were to turn this hobby into a real business, albeit a small one?
For more context, please refer to a couple posts of mine (a manifesto of my core ethos):
http://synappser.github.io/blog/
I guess this is a tough question to answer, unless you're an Apple insider, but I'd really appreciate any guidance you could give me.
Thank you
You can then get a business checking account (Mercury works well) with your newly registered business.
You can then create a business account on Apple and Google (and anywhere else).
All of the public facing information will be your company name. If you want more details or help, just ask here.
I wanted to create a fully digital individual. My goal was to go from end to end. I bought (in cash) a prepaid credit card. I used said prepaid credit card to sign up to the VPN, paying for 3 years - under the assumption the card is burned. With said VPN I created a paid for email account with a trusted service (not gmail or office). I used said email to sign up with a VOIP provider, to receive a telephone number that could receive SMSes.
Then, I signed up for a twitter, and a domain. Use the above to set up a corporation with nominee shareholders in the jurisdiction of your choice, same with bank account. Congratulations - you can now buy your certificate.
Now, using the funds of the corporation do everything above again - such that you're able to tie the corporation's CC to the outcomes.
There's a lot more - but this is a reasonable start.
This may be illegal where you live. At the very least, depending on how you use the above there are tax implications.
The only way you could remain (externally) anonymous and comply with all the AML/KYC and other legal, corporate and service requirements (including taxation, etc) would be to have a company with a nominee director.
Anonymity to the general public is very easy, incorporate a company behind some of the shell corporation mumbo jumbo that any corporate lawyer can prep for you, it will cost $ but it will be easy.
Anonymity from Apple could probably be pulled off by incorporating in a country with fairly weak transparency and having the company owned by an offshore trust.
Anonymity from a state level actor would be pretty hard. You'd have to have a shell corp in a foreign country owned by a shell corp in another foreign country and even that might not be enough.
Then if you would want to accept donations or payments, anonymity is only possible with cryptocurrencies and cash-by-mail. The easiest one (anonymity wise) is Monero and the most popular one is Bitcoin.
It's a common misconception that macOS forces all software to be signed by Apple. It doesn't. ARM Macs require all software to be signed, but crucially, any signature is OK at the kernel level. It's only at the first-run-from-finder level that Gatekeeper gets involved. This has been true from the start and I've seen over the years scattered comments from Apple developers that they view the Mac as a true general purpose computing device, and thus have no plans to change this. The ramped up signing requirements on ARM are more to do with simplifying the core OS by ensuring all code has an identity than stopping non-Apple approved software.
If you think users should trust you despite your anonymity then you can simply point them to Apple's official documentation on how to work around Gatekeeper:
https://support.apple.com/guide/mac-help/open-a-mac-app-from...
The process is straightforward if you know about it:
1. Download a self-signed or unsigned app.
2. Locate it in the finder.
3. Hold down the control key and right click it, then choose open.
4. Click open when the security alert appears.
Most people think you have to use the command line to open non-signed apps on macOS but it's not actually the case.
To self-sign an application you can generate certs using the Certificate Assistant in the Keychain Access app, or use OpenSSL from the command line. Then sign as normal. The fact that the cert doesn't come from Apple means Gatekeeper will ignore it, but, allows the app to run on ARM and ensures the OS has a stable identity it can use for assigning permissions across upgrades.
I launched on HN yesterday and it went #1. You might find that discussion [2] interesting as people were discussing the feasibility of working pseudonymously.
I'd try to take reasonable precautions, maybe cloud things a little.
I used to "post like a Canadian" sometimes -- include little references to Ottawa or poutine or whatever, throw in a few OUs... looks like you could do the opposite and be careful to write more "American" on your next project.
Also if you really want to go insane, start looking into styleometry, then styleometry as applied to code, here's two good starting points:
https://www1.icsi.berkeley.edu/~sadia/papers/anonymouth.pdf
https://oar.princeton.edu/bitstream/88435/pr1q24c/1/Deanonym...
Just small things, like writing a script that swaps tabs for spaces, single quotes for double quotes... anything that automates changing some very human part of your writing style, similar to how a handwritten note often has specific ways people cross a T or dot an i, will get you far, since your adversary will probably not assume you've been clouding your data since the 2000s or whatever.
One omen of advice is that if you are not taking measures preemptively to actively remain anonymous that itself could be a means of exposure and makes this entire exercise futile. For longer-term anonymous identities merely picking a pseudonym and casually using it makes it easy to slip-up and potentially lead to correlation. Slightly dated now but suggest you read-up on 'OPSEC for hackers' and other publications by The Grugq as a starting point.
Opening a small company could probably be ok to preserve some sort of basic anonymity (meaning, it takes a variable but not negligible amount of effort to understand who the owner is).
At least publish the sources, so people can compare it to the dmg contents.