Hidden iOS Services Bypass Security - InformationWeek
IoT
IoT
Comments
Hidden iOS Services Bypass Security
Newest First  |  Oldest First  |  Threaded View
<<   <   Page 2 / 2
gpickles
50%
50%
gpickles,
User Rank: Apprentice
7/21/2014 | 6:49:13 PM
Re: Why is acceptable to betray your customers?
But cars, at least those built in the last 15, years DO carry surveillance technology. It's essentially like an airliner "black box" that records all sorts of information about your car, including: speed, acceleration/deceleration, throttle/brake application, steering wheel angle, and various other telemetry data for the last several minutes of travel (I forget how long). Law enforcement often uses this information when analyzing an accident or performing other forensics. And soon insurance companies will give you a discount for carrying a GPS transponder to monitor your speed and location (or, in other words, those who don't want to be monitored will pay more). People gladly accept these things for the sake of convenience and saving money. George Orwell is shaking his head.
Lorna Garey
100%
0%
Lorna Garey,
User Rank: Author
7/21/2014 | 5:04:51 PM
Re: Why is acceptable to betray your customers?
It's not acceptable, and if Microsoft or Google were the snooper in question, people would screaming a whole lot louder. Can't say I get the appeal of iThings, but you have to hand it to Apple. It's got some strong Kool-Aid.
Thomas Claburn
50%
50%
Thomas Claburn,
User Rank: Author
7/21/2014 | 4:51:24 PM
Why is acceptable to betray your customers?
People would be up in arms if they learned the home they bought or the car they bought carried surveillance technology that authorities could enable at their convenience. Yet somehow it's acceptable in electronic devices?

Apple says it "designed the iOS platform with security at its core." It sounds like what Apple meant is that it designed the iOS platform with security that can be ignored.
<<   <   Page 2 / 2


How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll