View Single Post
Old 20-08-2010, 19:53   #1493
Cobbydaler
Inactive
 
Cobbydaler's Avatar
 
Join Date: Apr 2006
Location: Manchester, UK
Services: ClearFibre Internet, Vodafone mobile Google Pixel 4
Posts: 9,699
Cobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered stars
Cobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered starsCobbydaler is seeing silvered stars
Re: The iPhone thread

Quote:
Originally Posted by Matt D View Post
The article sounds a little scaremongery to me.

Apple has patented methods to differentiate between authorised and unauthorised users, and enable unauthorised users to be locked out. One of the things which can be looked for is whether the device has been Jailbroken, but it's not a case of "Apple are going to remotely disable Jailbroken iPhones!" as some on the 'net seem to think.

Calmer article: http://arstechnica.com/apple/news/20...-ios-users.ars

Jailbreaking your iPhone or other device is 100% legal now in the US, no more grey area. There's no way that Apple could get away with locking people out of their own legally owned & legally Jailbroken phones.
Doesn't sound that different in matters of fact to me:
Quote:
Originally Posted by arstechnica
The patent, titled "Systems and Methods for Identifying Unauthorized Users of an Electronic Device," describes several ways a device could sense who is using an iPhone or iPad. Among the methods considered are voice print analysis, photo analysis, heartbeat analysis (!), hacking attempts, or even "noting particular activities that can indicate suspicious behavior."
If the various analyses detect someone who is not authorized to use the device, it could set off a number of automated features designed to protect the device's data, suss out the offending party, and alert the device owner. Sensitive data could be backed up to a remote server and the device could be wiped. The device could automatically snap pictures of the unauthorized user and record the GPS coordinates of the device, as well as log keystrokes, phone calls, or other activity. That information could be sent along with an alert to any useful service, such as e-mail, voicemail, Twitter, Facebook, or a "cloud service" like MobileMe.
My bold...
Cobbydaler is offline   Reply With Quote