Chance Miller reports: Earlier this year, Apple was forced to remove several VPN apps from the App Store in China due to regulatory reasons. At the time, Tim Cook explained that he would rather not remove them, but was forced to comply.
Now, United States Senators Ted Cruz and Patrick Leahy are pressing Apple for more information…
In a letter sent to Tim Cook, Cruz and Leahy say Apple may be “enabling the Chinese government’s censorship and surveillance of the Internet,” noting that China has an “abysmal human rights record.”
Specifically, Cruz and Leahy pointed to Cook’s acceptance of the Newseum’s 2017 Free Expression Award. While receiving the award, Cook remarked that Apple “enables people around the world to speak up.” The senators, however, argue that Apple’s removal of VPN apps in China do the exact opposite of that:
While Apple’s many contributions to the global exchange of information are admirable, removing VPN apps that allow individuals in China to evade the Great Firewall and access the Internet privately does not enable people in China to “speak up.” To the contrary, if Apple complies with such demands from the Chinese governments, it inhibits free expression for users across China, particularly in light of the Cyberspace Administration of China’s new regulations targeting online anonymity.
Cook and Leahy outline a list of questions they want Cook to answer. Read the rest of this entry »
As Jeff detailed in his massive how-to earlier this week, the biggest changes in iOS 10 came with the all-new Messages app. One of the most highly-anticipated features was support for built-in GIF search, which pulls in GIFs from a variety of outside sources. As with any instance of pulling images in from third-party sources…(read more)
Republican presidential candidate Jeb Bush was doing an interview with The Des Moines Register when his Apple Watch started going crazy. USA Today caught a video of Jeb’s reaction. “My watch can’t be talking,” he said incredulously….(read more)
“The man allegedly went back to screaming and waving around his samurai sword…According to eyewitnesses, right before the man was taken into custody by the NYPD officers, he looked as if he was preparing to harm himself with the sword.”
He was then escorted out of the building, with Apple Store employees building a wall between him and the customers as a layer of protection. When he was outside in front of the store, the man allegedly went back to screaming and waving around his samurai sword.
[You can view a video of the suspect waving the sword around inside the Apple Store by heading to ABC NY’s report.]
He was taken into custody by two New York Police Department officers. According to eyewitnesses, right before the man was taken into custody by the NYPD officers, he looked as if he was preparing to harm himself with the sword. The suspect was then taken to a New York City hospital….(read more)
[VIDEO] Violet vs Siri: Watch a Frustrated Four-Year-Old Have an Argument with Siri About Nothing for Three MinutesPosted: June 30, 2015
— The Hill (@thehill) April 19, 2015
Apple has come a long way since the dark days of the mid-’90s, when it very nearly went bankrupt. And if you want to see just how far Apple has come, then you need look no further than this awesome GIF posted on OpenUniversity.edu that has preserved Apple’s website exactly as it looked in 1997. As you’ll see below, the company’s main page has undergone a pretty drastic overhaul in the past 18 years, and it’s all been for the better.
View original post 145 more words
Apple and Google have taken steps recently to let users protect information stored on smartphones – even from law enforcement. It turns out there may be a fingerprint-sized gap in that plan.
A Virginia Circuit Court judge ruled Tuesday that police officers cannot force criminal suspects to divulge cellphone passwords, but they can force them to unlock the phone with a fingerprint scanner.
If applied by other courts, the ruling could become important as more device makers incorporate fingerprint readers that can be used as alternatives to passwords. Apple introduced the technology last year in its iPhone 5S and Samsung included it in its Galaxy S5.
When those phones arrived, lawyers said users might be required to unlock the phones with their fingerprints. More recently, Apple and Google said they had changed the encryption scheme on the newest phones using their operating systems so that law enforcement can’t retrieve the data. FBI Director James Comey criticized the companies, saying were allowing users to “place themselves above the law.”
First Apple and then Google announced that they would use encryption on new phones that wouldn’t permit them to help police execute warrants to examine data on a cell phone or other device.
For City Journal, Judith Miller writes: Law enforcement officials in New York and Washington criticized technology superpowers Google and Apple this week for selling cell phones and other devices that cannot be accessed by the government, warning that such technology jeopardizes public safety.
In his first major policy address, FBI director James B. Comey called on Congress and the Obama administration to counter the expanding use of such devices, which he and other law enforcement officials assert endanger efforts to prevent terrorism and fight crime. Without lawful government access to cell phones and Internet devices, Comey warned, “homicide cases could be stalled, suspects could walk free, and child exploitation victims might not be identified or recovered.”
“Law enforcement officials many legitimate ways to obtain the data stored on our devices. Weakening the security of smartphones and trusted communications infrastructure should not be one of them.”
— Nuala O’Connor, president of the Center for Democracy and Technology
Comey, who became FBI director last year, said that he understood Americans’ “justifiable surprise” at former National Security Agency contractor Edward Snowden’s revelations about U.S. government surveillance practices. Read the rest of this entry »
After last week’s auction of an Apple I motherboard for hundreds of thousands of dollars, we wondered: Just how much could you wind up paying for a technology relic?
For PopMech, Jared Newman writes: The Kenbak-1 doesn’t bear the mark of any industry heavyweights. You might not even have heard of it. But the machine, which debuted in 1971 for a reasonable $750, is widely considered to be the first “personal computer.”
To keep costs down, the Kenbak’s program-running capabilities were limited to a handful of standardized input switches and output lights. Nevertheless, it was a hard sell to non-professionals, and creator John Blankenbaker only produced 40 machines, mostly for schools, before folding his company a couple years later. Read the rest of this entry »
Macs and iPhones finally speak the same language.
I can begin replying to an email on my phone, then walk over to my laptop and finish it off there. While my phone charges on my nightstand, I can pick up calls from my mom with a mouse click at my desk. And when someone texts me a photo, it’s already on my laptop, where I can quickly jazz it up in Photoshop then tweet it.
With the Thursday release of the Mac’s free OS X Yosemite update, Apple is finally getting its devices to behave like a real, happy family—a family that not only talks to each other but even looks very much alike. The Mac operating system has acquired apps and features from iOS—and vice versa—over the past few years, but this is the biggest leap toward each other yet.
The advantage is so big that if you are an iPhone or iPad owner but don’t have a Mac, Yosemite might get you to consider buying one. It makes living in Apple’s ecosystem harder to resist. But before you fall into the Apple trap, keep in mind that there are still plenty of reasons to play with Google (and even Microsoft ) on a Mac or iPhone.
An iOS-Inspired Face-Lift
Late one night, Jony Ive, Apple’s design chief, threw on the “White Album,” took out a bucket of translucent primer, mixed it together with some of his rainbow-colored iOS paint and tossed it at the computer screen. At least, that’s how I imagine the Mac operating system got its new look.
There are traces of iPhone and iPad design everywhere you look. Icons have been revamped to look flatter and more modern. The edges of windows are translucent so you can see what’s behind them. The red, yellow and green window-position buttons look like a futuristic traffic light. Even the notification pane now has a “Today” view that is identical to the iPhone’s. Read the rest of this entry »
A man from Detroit has offered to sell his house for an iPhone 6
The unnamed individual originally listed his three-bedroom property for $5,000 (£3,100) in June, but has now slashed the price to either $3,000, or the latest version of Apple’s iconic smartphone. He would also accept a 32GB iPad, and is willing to negotiate, according to his estate agent, Larry Else.
“Detroit’s not a monster. It’s just ahead of the curve”
— Kevin D. Williamson
The 2,400-square foot house is in poor condition, with broken windows and peeling paint, in one of Detroit’s poorest districts. Even so, the trade has highlighted the contrast between America’s thriving technology industry in Silicon Valley and the economic blight still affecting other parts of the country. Read the rest of this entry »
Security experts say China is a leading source of hacking attacks aimed at foreign governments and companies to computers in China
HONG KONG (AP) — The Chinese government might be using smartphone apps to spy on pro-democracy protesters in Hong Kong, a U.S. security firm said.
“The Xsser mRAT represents a fundamental shift by nation-state cybercriminals from compromising traditional PC systems to targeting mobile devices.”
The applications are disguised as tools created by activists, said the firm, Lacoon Mobile Security. It said that once downloaded, they give an outsider access to the phone’s address book, call logs and other information.
The identities of victims and details of the servers used “lead us to believe that the Chinese government are behind the attack,” said a Lacoon statement.
China is, along with the United States and Russia, regarded as a leader in cyber warfare research. Security experts say China is a leading source of hacking attacks aimed at foreign governments and companies to computers in China. Read the rest of this entry »
A reminder to iPhone owners cheering Apple’s latest privacy win: Just because Apple will no longer help police to turn your smartphone inside out doesn’t mean it can prevent the cops from vivisecting the device on their own.
“I am quite impressed, Mr. Cook! That took courage. But it does not mean that your data is beyond law enforcement’s reach.”
— iOS forensics expert Jonathan Zdziarski
On Wednesday evening Apple made news with a strongly-worded statement about how it protects users’ data from government requests. And the page noted at least one serious change in that privacy stance: No longer will Apple aid law enforcement or intelligence agencies in cracking its users’ passcodes to access their email, photos, or other mobile data. That’s a 180-degree flip from its previous offer to cops, which demanded only that they provide the device to Apple with a warrantto have its secrets extracted.
In fact, Apple claims that the new scheme now makes Apple not only unwilling, but unable to open users’ locked phones for law enforcement. “Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access [your personal] data,” reads the new policy. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”
“I can do it. I’m sure the guys in suits in the governments can do it. And I’m sure that there are at least three or four commercial tools that can still do this, too.”
But as the media and privacy activists congratulated Apple on that new resistance to government snooping, iOS forensics expert Jonathan Zdziarski offered a word of caution for the millions of users clamoring to pre-order the iPhone 6 and upgrade to iOS 8. In many cases, he points out, the cops can still grab and offload sensitive data from your locked iPhone without Apple’s help, even in iOS 8. All they need, he says, is your powered-on phone and access to a computer you’ve previously used to move data onto and off of it. Read the rest of this entry »
The Washington Post reports: Apple said Wednesday night that it is making it impossible for the company to turn over data from most iPhones or iPads to police — even when they have a search warrant — taking a hard new line as tech companies attempt to blunt allegations that they have too readily participated in government efforts to collect user information.
“Unlike our competitors, Apple cannot bypass your passcode and therefore cannot access this data,” Apple said on its Web site. “So it’s not technically feasible for us to respond to government warrants for the extraction of this data from devices in their possession running iOS 8.”
As the new operating system becomes widely deployed over the next several weeks, the number of iPhones and iPads that Apple is capable of breaking into for police will steadily dwindle to the point where only devices several years old — and incapable of running iOS 8 — can be unlocked by Apple.
Apple will still have the ability — and the legal responsibility — to turn over user data stored elsewhere, such as in its iCloud service, which typically includes backups of photos, videos, e-mail communications, music collections and more. Users who want to prevent all forms of police access to their information will have to adjust settings in a way that blocks data from flowing to iCloud. Read the rest of this entry »
— Joanna Stern (@JoannaStern) September 9, 2014
I have to admit, the new iPhone is beautiful. pic.twitter.com/AZq3U74Zec
— Saladin Ahmed (@saladinahmed) September 9, 2014
From Mail Online: Kirsten Dunst has become the first celebrity to publicly criticize Apple after it emerged that a flaw in the ‘Find My iPhone‘ function of its iCloud service may have helped an unknown hacker steal nude photos of her and ‘100 other celebrities’.
The Spiderman star tweeted ‘Thank you iCloud’ along with icons representing a slice of pizza and a pile of poo on Monday afternoon, the day after naked photos of her were published online.
The supposed hacker behind the scandal has claimed that they broke into stars’ iCloud accounts, including those of Dunst, Hunger Games actress Jennifer Lawrence, Kate Upton and Rihanna, before publishing them on 4chan, the image-sharing forum.
A list of the alleged victims of the hack – a staggering 101 in total – has also been posted online; most of whom have not seen any photographs leaked by the hacker.
Yesterday, British actress Emma Watson, a friend of Lawrence, condemned the ‘lack of empathy’ shown by social media users towards victims of the hack.
She tweeted: ‘Even worse than seeing women’s privacy violated on social media is reading the accompanying comments that show such a lack of empathy.’ Read the rest of this entry »
…We’re told the phone was smuggled out of a Foxconn factory in China … where the majority of iPhone models are manufactured. The owner of the phone says the smuggler is his friend — an ex-employee — who worked in Foxconn’s hardware department designing the outer casing for the new model…(read more)