Last Week on My Mac: Tahoe 26.1 disappointments
You may have heard my deep sigh of disappointment last week when I looked through macOS Tahoe 26.1. Despite its bumper crop of 90 fixes for security vulnerabilities, as a scheduled update it has two major flaws. It is at once an opportunity ignored, and a failure to learn from history.
Liquid Glass
Ever since the first beta-release of Tahoe reached developers in June, its human interface has been lambasted like no other. Apple has had a torrent of objections to several of its new features, including the gross rounding of corners of windows and controls, its bland and indistinguishable icons, interference between overlaid content, and its uniform bleached-out tone. In those five months, there has been no shortage of suggestions as to what needs to be improved.
Apple’s response is a Liquid Glass control in Appearance settings that purports to provide a “tinted” variant that “increases opacity and adds more contrast”. As I demonstrated early last week, it does neither, and in Light mode in the great majority of Apple’s own apps, this “tinted” variant doesn’t make a blind difference.
Above is Light mode, Liquid Glass set Clear, without Accessibility. Below is the same, but with Liquid Glass set to Tinted.
After many attempts to find some difference between Clear and Tinted in the bundled apps I use most often, I’ve decided that they are visually identical. And where the Liquid Glass effect results in optical interference between layers, Tinted doesn’t alter opacity to eliminate that interference.
This is illustrated in the defaced search box at the top left of System Settings, where the blurred contents of the navigation sidebar at the left remain visible underneath the window’s search box. I can’t understand how any designer could see that released to the public, and providing the new Liquid Glass setting is farting into a hurricane.
Background Security Improvements
Although Apple went out of its way not to let us know, I’m actually glad to see the return of Rapid Security Responses (RSR), even if they’ve been given this sanitised name. What disappoints me deeply is that the BSI shows no sign that Apple has learned from its past mistakes with RSRs just over two years ago.
RSRs, which have never been officially declared dead, were downloaded through Software Update, and gave the user the choice of installing them automatically, downloading and installing them when they chose to, or ignoring them and waiting for the next macOS update. Not only that, but once installed, they could be removed and macOS reverted to its previous state.

What Apple never did get right is how to number the macOS version once an RSR had been installed. Rather than extend version numbers consistently with a fourth digit, Apple decided to append a letter in parentheses, making 13.4.1 become 13.4.1 (a) when its first RSR had been installed. When the first RSR was released on 1 May 2023, Safari’s build number was changed, but not its version number. But with the second RSR on 10 July, someone mistakenly changed Safari’s version number from 16.5.1 to 16.5.2 (a), and that was therefore given as its User Agent, and promptly broke many major websites including Facebook.
Because that RSR could be removed by the user, there was an immediate solution, and Apple delivered a revised RSR a couple of days later.
From this, we learned that:
- RSRs undergo very little testing before release, as they’re supposed to be issued quickly.
- Because they undergo such little testing, their chances of significant incompatibilities are greater.
- Giving the user the option to delay installing an RSR saves many from being caught out by flawed RSRs.
- Giving the user the option to uninstall an RSR is essential in the event that one proves to be flawed.
- Knowing when an RSR is being installed is essential if users are going to be able to identify the cause of problems arising from them.
- Numbering of macOS versions needs to be restructured to accommodate RSRs.
Now, over two years later, it seems Apple has forgotten those lessons. It won’t even describe these as security updates, but “improvements”, won’t include them in the release notes for 26.1, hides their single control at the very bottom of a long list in Privacy & Security settings, rather than in Software Update, provides no manual option, and no means to uninstall them.
I wonder how long it will be before we all regret those decisions, and have to repeat past mistakes before we can learn from them.


