Dear Apple Customer:
You've expressed an issue on Apple's Discussions forum with the recent Mac OS X 10.4.9 software update.
Apple would like to investigate the issue by collecting some data from your system.
If this is acceptable to you, please run the attached "Capture Data" application. Then, simply attach the file that's generated into a reply email (to this email) This file will contain logs, configuration information etc.
Thanks for your support in assisting Apple Inc.
It seems that they have noticed my activity on Apple support forums, where I was helping users to resolve the problem with the latest 10.4.9 software update, that I wrote about last week.
The good thing is that Apple is interested in knowing more about this issue - hopefully with the intention to prevent similar problems in the future.
The bad thing is the way they are doing it. How do I know that this email really comes from Apple? How can I be sure that it's not a Trojan horse mass mailed by some malicious person who's trying to misuse my willingness to help?
Attached to this email email is a binary application, that I'm supposed to run. I don't know if it's just me and my strong sense of self-preservation, but isn't it something like rule #1 in all "security for dummies" books not to run applications coming to your email from unauthenticated sources?
I think that Apple should have just send me an email pointing me to an apple.com website where I could download the application from or they should have signed the email and the attachment with a key which certificate was pre-distributed with MacOS X.
Besides, if all that Apple wants to do on my computer is to gather some data, they could have used a script that I could easily review instead of a binary application that can do a lot more than just "capture data".
I'm not pleased that my blog has turned into a Apple complaint site. I really hope that Leopard will bring enough excitement to have me forget about all of this.
UPDATE: I sent an email back to the Apple Tech Support asking them to publish the application on their website.
UPDATE2: An Apple engineer contacted me regarding the email. I ran the application and reviewed the content of generated dmg file. It contained all the system logs present on the computer and some extra files, like output from the
One think I really don't like is that I had to agree to this License Agreement that protects Apple, but I haven't seen a single sentence mentioning how Apple is going to protect my private information contained in the logs. :-/