Spin Control? Apple Explains Why Jailbreaking Is Bad - InformationWeek
IoT
IoT
Mobile
Commentary
7/30/2009
11:20 AM
Eric Ogren
Eric Ogren
Commentary
50%
50%

Spin Control? Apple Explains Why Jailbreaking Is Bad

This is rich. A day after Apple's claims that jailblreaking iPhones can cause catastrophic harm became public, Apple updated its support page to explain exactly why jailbreaking iPhones a bad thing.

This is rich. A day after Apple's claims that jailblreaking iPhones can cause catastrophic harm became public, Apple updated its support page to explain exactly why jailbreaking iPhones a bad thing.Here's what Apple says, followed by my comments:

As designed by Apple, the iPhone OS ensures that the iPhone and iPod touch operate reliably. Some customers have not understood the risks of installing software that makes unauthorized modifications to the iPhone OS ("jailbreaking") on their iPhone or iPod touch. Customers who have installed software that makes these modifications have encountered numerous problems in the operation of their hacked iPhone or iPod touch. Examples of issues caused by these unauthorized modifications to the iPhone OS have included the following:
  • Device and application instability:Frequent and unexpected crashes of the device, crashes and freezes of built-in apps and third-party apps, and loss of data.
  • Unreliable voice and data: Dropped calls, slow or unreliable data connections, and delayed or inaccurate location data.
  • Disruption of services: Services such as Visual Voicemail, YouTube, Weather, and Stocks have been disrupted or no longer work on the device. Additionally, third-party apps that use the Apple Push Notification Service have had difficulty receiving notifications or received notifications that were intended for a different hacked device. Other push-based services such as MobileMe and Exchange have experienced problems synchronizing data with their respective servers.
  • Compromised security: Security compromises have been introduced by these modifications that could allow hackers to steal personal information, damage the device, attack the wireless network, or introduce malware or viruses.
  • Shortened battery life: The hacked software has caused an accelerated battery drain that shortens the operation of an iPhone or iPod touch on a single battery charge.
  • Inability to apply future software updates: Some unauthorized modifications have caused damage to the iPhone OS that is not repairable. This can result in the hacked iPhone or iPod touch becoming permanently inoperable when a future Apple-supplied iPhone OS update is installed.
Apple strongly cautions against installing any software that hacks the iPhone OS. It is also important to note that unauthorized modification of the iPhone OS is a violation of the iPhone end-user license agreement and because of this, Apple may deny service for an iPhone or iPod touch that has installed any unauthorized software.
Apple is sternly saying, "Don't jailbreak!" Most of what Apple says above is accurate. I jailbroke my original iPhone back in 2007, and experienced a lot of the issues noted above. Instability was perhaps the biggest issue, especially if you install a lot of unapproved applications. I didn't see too much of the dropped calls, but visual voicemail definitely became disabled.

You can't blame Apple for taking this stance, though it is a bit onerous. Situations such as the Great Google Voice Debacle of 2009 are enough to push users over the edge and convince them that jailbreaking is the way to go. Granted, not many other mobile platforms have 50,000 applications available to them at the moment, so I think it is a little weak for iPhone users to claim "lack of choice."

Do these arguments make sense in Apple's case against the Electronic Frontier Foundation? That's for lawyers to decide. In the mean time, remember that Apple is in control. Not you.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll