Blog Posts

Blog Posts

Apple Stops App Store Updates for Mac App That Substitutes Discontinued Launchpad Function

Apple has recently taken a contentious position by preventing updates to AppGrid, an app intended to replicate the now-obsolete Launchpad feature that was eliminated in macOS Tahoe. This choice has sparked concern among both users and developers, as it underscores the difficulties encountered by third-party developers when their applications bear resemblance to features of Apple’s own software.

### Background on Launchpad and AppGrid

Launchpad was a well-liked feature in previous versions of macOS, enabling users to arrange and launch applications in a grid format. However, with the launch of macOS Tahoe, Apple opted to remove Launchpad, prompting many users to look for substitutes. In reaction, developer Attila Miklosi developed AppGrid, which aims to reinstate the traditional grid layout for browsing and launching applications. The app swiftly gained popularity among users who longed for the functionality of Launchpad.

### Apple’s Decision to Block Updates

Despite its popularity, AppGrid has not been updated in the last four months due to Apple’s interference. The company asserts that AppGrid is too similar to Launchpad, which they have eliminated from their operating system. Miklosi has voiced his frustration regarding this decision, mentioning that Apple has effectively placed the app in a “zombie state.” Although AppGrid is still available for purchase on the App Store, Miklosi cannot implement updates, resolve bugs, or introduce new features, while Apple continues to take a 30% cut on sales.

### The App Store Review Guidelines

Apple’s App Store Review guidelines forbid developers from making apps that are “confusingly similar” to existing Apple products or interfaces. This guideline has been interpreted by Apple to indicate that any app resembling a discontinued feature may face restrictions. Miklosi has sought to appeal Apple’s ruling but has been unsuccessful. He was informed that updates would be granted if he modified the app’s appearance to distinguish it from Launchpad. However, he believed that doing so would betray the expectations of the users who had already bought the app.

### Alternative Distribution

In response to these restrictions, Miklosi has chosen to distribute an alternate version of AppGrid outside the App Store. This version features capabilities that are not allowed in App Store-distributed apps, such as hot corner and pinch gesture activation. Users interested in these extra functionalities can find more details on the AppGrid website.

### Conclusion

The situation surrounding AppGrid highlights the complexities involved in app development within the Apple ecosystem. While Apple seeks to ensure a cohesive user experience, the blocking of updates for apps that resemble discontinued features raises concerns about the balance between safeguarding intellectual property and encouraging innovation. As developers like Miklosi navigate these obstacles, users are left to explore alternative solutions to address the gaps created by Apple’s choices.

iOS 26.4 Security Release Notes: Important Features and Significant Modifications

On Tuesday, Apple launched iOS 26.4, featuring important security updates that tackle over 35 vulnerabilities. This upgrade is vital for users, as it includes solutions for several significant issues that could jeopardize device security.

### Key Vulnerabilities Addressed

1. **Protection Bypass for Stolen Devices (CVE-2026-28895)**: This flaw permitted individuals with physical possession of an iPhone to bypass biometrically secured apps simply by using the device’s passcode, even when Stolen Device Protection was activated. This feature is intended to make a stolen iPhone ineffective, even with the correct passcode. Apple has now introduced enhanced checks to rectify this problem.

2. **Vulnerability in Keychain Access (CVE-2026-28864)**: A local attacker could access Keychain items due to inadequate permissions verification. The Keychain saves sensitive data like passwords and encryption keys, rendering this a significant local privilege escalation threat.

3. **Issue with Mail Privacy Settings (CVE-2026-20692)**: This vulnerability indicated that the “Hide IP Address” and “Block All Remote Content” functionalities in Mail may not have operated properly, potentially putting users’ IP addresses at risk and permitting remote content to load, disregarding user preferences.

4. **Printing-Related Sandbox Escape (CVE-2026-20688)**: This problem enabled an app to escape from its sandbox through a defect in the Printing framework, which is part of AirPrint. Escaping the sandbox is critical, as it can lead to further exploitation.

5. **WebKit Vulnerabilities**: The update resolved seven CVEs connected to WebKit, including a Same Origin Policy bypass and a Content Security Policy bypass. One alarming issue allowed a malicious site to process restricted web content beyond the sandbox.

### Conclusion

Although none of these vulnerabilities were indicated as actively exploited, their seriousness demands prompt action. Users are strongly encouraged to update to iOS 26.4 to safeguard their devices against these potential threats. For a comprehensive list of patches, users can check Apple’s security releases page.