What's new in watchOS 4.0 for coders?

List of new features and changes, that watchOS developers will face while working with version 4.0
28 September 2017   926

watchOS 4.0 was released recently, along with new iPhone, iOS 11 and MacOS High Sierra

Let's figure out, what new features and change are there in new version of watchOS, that are relared to the development itself.

App Services

  • New in watchOS 4.0- Support for machine learning models.
    • Added the Core ML framework for easily integrating machine learning models into apps.
  • New in watchOS 4.0 - SiriKit support for notes and to-do lists.
    • Added the Lists and Notes domain to SiriKit to support using Siri to add notes, interact with to-do lists, and interact with reminders.
  • Added intents to SiriKit domains.
    • Added ride canceling and feedback to the Ride Booking domain.
    • Added transferring money and searching for accounts to the Payments domain.
  • Enhanced triggers for HomeKit.
    • Enhanced time-based conditions for triggers. HMSignificantTimeEvent specifies an offset from sunrise and sunset. HMCalendarEvent specifies a date and time. HMDurationEvent specifies a time interval.
    • Added HMCharacteristicThresholdRangeEvent for representing devices that report their state as a number range, such as blinds that report a position from 0 to 1 (instead of open or closed.)
    • Added HMPresenceEvent for adding a condition based on the presence or absence of users.
    • Updated HMEventTrigger to enable multiple occurrences.
  • Added home:didUpdateHomeHubState: to support receiving updates of the home hub state.
    • Enhanced end user transaction flow in Apple Pay.
    • Added PKPaymentError to PassKit, a structure for detailed reporting of errors in a user's shipping and payment information, and for authorization errors. Developers can use the information to provide a customized error string.
    • Updated the handler methods in PKPaymentAuthorizationControllerDelegate to receive a PKPaymentError.
    • Updated PKPaymentRequest to use PKContactField for contact information.
    • Added supportedCountries to PKPaymentRequest for specifying supported countries for a transaction.
    • Addded support for presenting payment buttons even if there are no supported payment methods in Wallet. Apple Pay now handles payment without leaving your app, and then returns to checkout.
  • Added the authorizationStatus method to the CMAltimiterCMPedometerCMMotionActivityManager, and CMSensorRecorder classes of the Core Motion framework. The method is used to determine if an app is authorized to recieve data from a source.


  • Updated the APIs in the Core Bluetooth framework to match across iOS, tvOS, watchOS, and macOS, and marked the platform availability of each API.
  • APFS is now the default filesystem.
    • Added normalization-insensitive support for a case sensitive filesystem.

See official docs and release notes for more information.

MacOS High Sierra Can be Hacked Thru Wi-Fi

Corporation eliminated it with the release of macOS 10.13.6 in July 2018, but unupdated computers are still vulnerable
13 August 2018   528

The chief security officer at Fleetsmith Jesse Endahl and the Dropbox engineer Max Belanger found a way to compromise Apple's computers with MacOS High Sierra to version 10.13.6 when the device connects to Wi-Fi for a first time. Attackers can hack the device before the first start of the system. This is is reported by Digital Trends.

We found a bug that allows us to compromise the device and install malicious software before the user is ever even logged in for the very first time. By the time they’re logging in, by the time they see the desktop, the computer is already compromised.

Jesse Endahl

CSO, Fleetsmith

According to experts, the errors are in the tools for the remote access called Device Enrolment Program (DEP) and Mobile Device Management (MDM). When you connect to Wi-Fi for the first time, the laptop connects to Apple's servers and, if its serial number coincides with the company's identifiers, it starts downloading corporate programs from the list in the manifest file. MDM does not require a certificate of authenticity, so hackers can replace the original file with an arbitrary file with its own list of software.

The researchers told Apple about the vulnerability, and the corporation eliminated it with the release of macOS 10.13.6 in July 2018. Computers with older versions of the OS remain vulnerable.

In November 2017, experts discovered a vulnerability in the macOS High Sierra, which allowed root privileges to be received in a couple of clicks. Then the corporation released a bug fix the very next day.