(Sorry for the long post again, but) I think there are two points to consider here:
- OCSP is simply a standardized means for checking certificate validity - it does not yet mandate doing anything about it. The issues with OCSP and enforcing the usage of signed apps are sort of separate, and the latter part can turn draconian fast if the company so wants. But as Ben says above, revoking a certificate could as well mean (and apparently means in practise, I haven’t tried it myself) that if you’re sure you want to run an app with a revoked certificate, you can still do it - you’ll just have to jump through hoops / look at a big red warning sign and click “I understand the consequences” before doing that. Based on jesselucas’ point, this might change with the new ARM CPUs they use, that remains to be seen.
- Apple have promised both secure transport and opt-out mechanisms for this. It remains to be seen how and when that will happen and whether it will be satisfactory to everyone or not. Until then, it’s just good that there’s been a lot of noise, feedback and discussion about it, otherwise they might haven’t changed anything regarding this.
As an additional point (also regarding the later points from others in the discussion), now that everything basically has a web app for it, trust or control issues with content delivery networks and HTTPS certificates are IME pretty much as bad, or even worse, than issues with apps installed on your computer. Even though this particular thing touches the “this is personal, this is taking the control and ownership from me, I have the bytes of these apps physically on my computer, and nobody should be able to take them off from me” side of things, which does rub me the wrong way as well.
Eg. my day-to-day work is using an online cloud app suite for e-mail, calendar, “office” type use and file storage, another online browser-based app for UI design, two online browser-based apps for keeping track and planning stuff, various IM services, one or two unnamed large cloud providers that run everything we develop except for the emergency backup production systems for the cases of armageddon, and a huge number of development tools and libraries that require to be regularly downloaded and updated online. I could do the same work with pretty much any other computer with any half-decent code editor, any relatively standards-compliant browser and terminal installed if this one failed - but I couldn’t do pretty much anything if access to those services was suddenly cut. Or if one of those had their certificate revoked for any reason whatsoever, there’s no way I’d use that service for sensitive personal or work stuff before the matter was settled and a proper TLS certificate was in place. (And let’s not talk about the whole “do I trust big cloud company x with my data” issue, because that would open an entirely other can of worms, and at least in the case above, I’m mostly at the mercy of my employer’s choices…)
This is just to say that a lot of us do put a boatload of trust to everyone from big certificate issuers to major browser developers, companies offering popular cloud-based tools, companies offering infrastructure and package repositories, et cetera. Not that it means one should trust or like eg. Apple any more than they do now, but because of these things I kind of feel the “from here starts the end of freedom of owning your computer” type claims are yet a bit too strong - or alternatively, the change has already happened with other, much less sensational structural and habitual changes.
However, I also have two thoughts in strong agreement with your fears:
- What is designed as a security tool is also, de facto, a contract enforcing tool - the technical interpretation “does Apple still trust this developer?” holds pretty well here. Apple has already blocked one or more apps from App Store specifically for not following the contract, and not for security issues. Developer accounts have a different contract and are not expected to follow the strict App Store publishing rules of course, but malware or an application with dangerous bugs are still not the only conceivable reasons a certificate could get revoked “with a good reason”. Whether doing something Apple doesn’t allow (see the Apple vs Epic case which is controversial and still specifically about App Store distribution but still kind of interesting) would mean small warning signs, big warning signs or apps ceasing to work, it’s still a method of control with somewhat wider actual use than plain ol’ infosec.
- Apple’s trend does seem to be towards iOS type model, where you can only install properly signed apps from their own application store - which is easy for less computer savvy users but a nuisance to most power users, and does not fit well to actual personal computers in my mind. I do just about trust them as eesn says above, but the direction seems so uncomfortable for the type of computer user I am that I’ve been using another OS on another computer at home since this Spring.
Edit: so, TL;DR: not trying to be an apologist for Apple or any other company, I just don’t see this in quite as dramatic way as eg. Jeffrey Paul does.