zundel

Wednesday 108

Apple and the little guy

Filed under: Computers — Tags: — zundel @ pm

Seattle Rex vs. Apple: The Verdict Is In

Friday 139

Screw Apple

Filed under: Computers, Security — Tags: , , — zundel @ am

Apple has instructed employees to neither acknowledge nor fix malware on Macs.

Malware on the Mac: is there cause for concern? Ars investigates

Wednesday 109

iPhone tracking

Filed under: Security — Tags: , , , , — zundel @ am

iPhone keeps record of everywhere you go

Security researchers have discovered that Apple’s iPhone keeps track of where you go – and saves every detail of it to a secret file on the device which is then copied to the owner’s computer when the two are synchronised.

The file contains the latitude and longitude of the phone’s recorded coordinates along with a timestamp, meaning that anyone who stole the phone or the computer could discover details about the owner’s movements using a simple program.

Only the iPhone records the user’s location in this way, say Warden and Alasdair Allan, the data scientists who discovered the file […]. “Alasdair has looked for similar tracking code in [Google’s] Android phones and couldn’t find any,” said Warden. “We haven’t come across any instances of other phone manufacturers doing this.”

iPhone Tracker

Got an iPhone or 3G iPad? Apple is recording your moves

Friday 69

iPhone 3G left insecure

Filed under: Security — Tags: , — zundel @ pm

Apple bans iPhone 3G patch omission talk from forum

An iOS 4.3 update […] includes a number of critical security fixes, is incompatible with both the iPhone 3G and older versions of the iPod Touch.

Dear Apple,

Following the reviews of the new IOS 4.3 release I was absolutely baffled that Apple is leaving a major segment of their customers vulnerable to security issues in the iPhone.

(more…)

Thursday 47

Not on your phone

This is rather sad.

It started with Apple.

Apple’s operating systems are based on open source. Apple uses and contributes to open source. And you can install and use open source software on a Mac.
But not on an iPhone.

Microsoft uses and contributes to open source. You can install and use open source software on Windows.
But not on a Windows Phone.

Microsoft: Absolutely No (GPLv3-Or-Compat-Licensed) Free Software for Windows Phone and Xbox Apps

Microsoft chose to forgo a large base of established high quality software for their new platform.

This is about control.

Who gets to control what’s on your computer and phone? Them or you?

For instance, security:
Need to protect information on your mobile devices?
Want to use strong open source encryption?
Not on an iPhone or Windows Phone.
You’ll have to take the security they offer you. And trust them.
Good luck.

Microsoft had a chance with Windows Phone to create a mobile platform that met business needs with easier administration and more innovation than BlackBerry. They just blew it.

Everyone has seen Apple’s billions from consumer dollars. And now everyone chases those billions.

Balmer understands marketing and chases the money. He does not understand computing.
Microsoft has lost enterprise. They have a large installed base but it dwindles. Years of defective and outdated products lost the market. And Microsoft no longer has any advantage on the desktop. The lock-in they once had with Exchange has gone: open source can connect to and replace Exchange. As businesses further rely on open source for enterprise functions they will choose desktop and mobile products that work best with their open source services.

Perhaps Balmer tacitly concedes the business market and refocuses Microsoft to chase consumer dollars.

It looks like we’ll get a bifurcated computer market. Business will use Linux and any open system that can use the tools. Consumers will get media computers, media boxes, and mobile media devices; all closed and hard to control.

Sad.

Friday 41

Insecure iPhone

Filed under: Computers, Security — Tags: , — zundel @ pm

Lost iPhone? Lost Passwords!
malware hazard

Passwords are not secure on iPhones that are lost. This is the result of tests carried out at Fraunhofer Institute SIT in Darmstadt. Within six minutes the institute’s staff was able to render the iPhone’s encryption void and decipher many passwords stored on it. If the iPhone is used for business purposes then the company’s network security may be at risk as well. The flawed security design affects all iPhone and iPad devices containing the latest firmware.

Security expert: iPhone password hack shows flawed security model

…you would likely want to use Apple’s (now free) remote wipe feature in order to protect your data, but remote wipe is easily thwarted by removing the device’s SIM card. Any attacker sophisticated enough to decrypt the keychain will know this trick.

…hackers can use iOS’s built-in APIs to access and decrypt certain passwords—including those for network access and e-mail accounts…

The only security, on any device, starts with installing and managing your own security systems.

Monday 248

Phone multitasking

Filed under: Android — Tags: — zundel @ am

iPhone iOS 4.0 multitasking is horrible: Apple blew it

Create a free website or blog at WordPress.com.

%d bloggers like this: