Here's a funny one.

I found the link to the story, but the page won't load. I wonder why...

On Tue, Aug 24, 2010 at 6:50 PM, Mr. Worf <hellomahog...@gmail.com> wrote:

>
>
> Hmm I don't remember that story but that seems to taunt the bear. Apple
> will win the first battle on this but then the hackers will win the war.
>
> On Tue, Aug 24, 2010 at 3:45 AM, Martin Baxter <martinbaxt...@gmail.com>wrote:
>
>>
>>
>> Did I ever mention the story I read in Wired, about the guy who took an
>> iPad into an Apple Store and used it to jailbreak his iPhone, with the
>> store's own Wi-Fi?
>>
>>
>> On Mon, Aug 23, 2010 at 11:04 PM, Mr. Worf <hellomahog...@gmail.com>wrote:
>>
>>>
>>>
>>> Apple applies for patent to kill jailbroken devices
>>> by Steven Musil <http://www.cnet.com/profile/stevenmusil/>
>>>
>>>    - Font size
>>>    - Print
>>>    - E-mail
>>>    - Share
>>>    - 240 
>>> comments<http://news.cnet.com/8301-13579_3-20014356-37.html?tag=TOCmoreStories.0#comments>
>>>
>>> 7
>>>
>>>  [image: A browser-based iPhone 4 jailbreak was released just days after
>>> the U.S. Copyright Office ruled that such bypasses were 
>>> legal.]<http://news.cnet.com/8301-13579_3-20012305-37.html>
>>>
>>> A browser-based iPhone 4 jailbreak was released this summer, just days
>>> after the U.S. Copyright Office ruled that such bypasses were legal.
>>> (Credit: Steven Musil/CNET)
>>>
>>> Apple is apparently ramping up its battle to prevent 
>>> iPhone<http://www.cnet.com/apple-iphone.html>
>>> and iPod <http://www.cnet.com/ipod/> owners from jailbreaking their
>>> devices.
>>>
>>> The company has applied for a 
>>> patent<http://appft1.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&p=1&u=%2Fnetahtml%2FPTO%2Fsearch-bool.html&r=1&f=G&l=50&co1=OR&d=PG01&s1=20100207721.PGNR.&OS=DN/20100207721&RS=DN/20100207721>,
>>> titled "Systems and Methods for Identifying Unauthorized Users of an
>>> Electronic Device," that covers a series of security measures to
>>> automatically protect devices from thieves and other "unauthorized users."
>>> Unauthorized users apparently applies to those who engage in jailbreaking,
>>> which allows devices to run apps not approved by the company producing the
>>> operating system--such as Apple, the main target of such bypasses.
>>>
>>> The application, which was filed in February 2009 and published Thursday,
>>> describes measures to identify "particular activities that may indicate
>>> suspicious behavior," so that "safety measures" can be taken to restrict the
>>> device's functions. Those activities include the "hacking, jailbreaking,
>>> unlocking, or removal of a SIM card," according to the application. Apple
>>> also intends to send warnings to owners via e-mail or text message when such
>>> activity is detected.
>>>
>>> The application also describes a variety of measures that could be used
>>> to help identify the unauthorized user, including the activation of a camera
>>> that could capture and geotag the device's surroundings, and perhaps current
>>> user, and transmit that information to a remote device:
>>>
>>>   In some embodiments, an unauthorized user can be detected by comparing
>>> the identity of the current user to the identities of authorized users of
>>> the electronic device. For example, a photograph of the current user can be
>>> taken, a recording of the current user's voice can be recorded, the
>>> heartbeat of the current user can be recorded, or any combination of the
>>> above. The photograph, recording, or heartbeat can be compared,
>>> respectively, to a photograph, recording, or heartbeat of authorized users
>>> of the electronic device to determine whether they match. If they do not
>>> match, the current user can be detected as an unauthorized user.
>>>
>>>  When unauthorized use has been detected, "access to particular
>>> applications can be restricted, access to sensitive information can be
>>> restricted, sensitive information can be erased from the electronic
>>> device...," the application states, effectively wiping and bricking the
>>> device.
>>>
>>> Apple representatives did not immediately respond to a request for
>>> comment.
>>>
>>> In July, U.S. Copyright Office ruled that bypassing a manufacturer's
>>> protection mechanisms<http://news.cnet.com/8301-13578_3-20011661-38.html> to
>>> allow "handsets to execute software applications" no longer violates federal
>>> copyright law. However, while the U.S. Copyright Office has declared the
>>> software legal, Apple has repeatedly discouraged users from loading such a
>>> bypass, reminding them that doing so will void their device's warranty.
>>>
>>> "As we've said before, the vast majority of customers do not jailbreak
>>> their iPhones as this can violate the warranty and can cause the iPhone to
>>> become unstable and not work reliably," Apple had said in a statement in
>>> response to the ruling.
>>>  Steven Musil is the night news editor at CNET News. Before joining CNET
>>> News in 2000, Steven spent 10 years at various Bay Area newspapers. E-mail
>>> Steven <stev...@cnet.com>.
>>>
>>> --
>>> Celebrating 10 years of bringing diversity to perversity!
>>> Mahogany at:
>>> http://groups.yahoo.com/group/mahogany_pleasures_of_darkness/
>>>
>>>
>>
>>
>> --
>> "If all the world's a stage and we are merely players, who the bloody hell
>> wrote the script?" -- Charles E Grant
>>
>> http://www.youtube.com/watch?v=fQUxw9aUVik
>>
>>
>>
>
>
> --
> Celebrating 10 years of bringing diversity to perversity!
> Mahogany at: http://groups.yahoo.com/group/mahogany_pleasures_of_darkness/
>
>  
>



-- 
"If all the world's a stage and we are merely players, who the bloody hell
wrote the script?" -- Charles E Grant

http://www.youtube.com/watch?v=fQUxw9aUVik

Reply via email to