Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Comment iOS has encryption and management built-in (Score 4, Informative) 138

I'm a former Apple engineer, current independent consultant, so I'm not going to address the Android side. That's a lot more complicated -- I'll stick with talking about the iOS info that I know about.

That said, wow, there's a lot of snarky comments but not a lot of information posted.

iOS has full-device hardware encryption built-in on the iPhone 3GS and later, activated as soon as you set up a passcode. This top-level encryption layer is for quick device wipes, not for data protection. Each user data file is then encrypted on top of that using its own unique key, then set into a protection class by the app developer:

  - Complete Protection - decrypted only when the device is unlocked; file key is removed from memory when the device is locked.

  - Protected Unless Open - decrypted when the device is unlocked; if file is open when the device locks, the file stays open/decrypted.

  - Protected Until First User Authentication - decrypted on first unlock, stays decrypted until reboot

  - No Protection - file system encryption only; no per-file encryption key

Apple has really been on developers cases to tighten down the data protection classes for their apps on iOS.

In addition, iOS has a huge number of remote management options. Apple provides a basic management tool called Profile Manager in Lion Server, and there are third-party Mobile Device Managers (MDMs) that take the basics and go even further. You can force complex passcodes, pre-configure e-mail accounts, restrict usage of features, and so on. The enterpriseios.com site has a pretty complete listing.

One of the cool things about using iOS MDM is that all of the configuration profiles are tied to the management profile that gets installed when the device is first enrolled with the MDM. If you're in a BYOD situation and a user leaves on bad terms, the IT department can retract the management profile, which automatically retracts all of the other configuration profiles. This will delete corporate e-mail accounts, remove in-house apps (and their data!), take away VPN and 802.1X access, and so on, without erasing the person's device entirely. All of the pictures the person took are still there, not blown away as they would be after a complete device wipe.

Anyway, a few links that may help you out:

http://www.apple.com/iphone/business/integration/
http://images.apple.com/ipad/business/docs/iOS_Security_May12.pdf
http://www.enterpriseios.com/
http://consultants.apple.com/index.php - look for consultants with the Mobility specialization
https://help.apple.com/advancedserveradmin/mac/10.7/ - go into "Manage Users" --> "Profile Manager" on the right

Hope this helps.

--Paul

Comment Re:Just buy new hardware! (NOT) (Score 1) 417

The thing I don't really get about this is that AFAIK the retina display Macbook Pros are functionally going to run at 1440 x 900 anyway; other than font rendering and videos it's not even clear to me what the extra pixels are for. Will you even be able to set your machine to let you individually address those pixels? So why not let older machines just run at their native res, and don't tax the GPU?

Comment Re:I Hope Not (Score 1) 329

I really hope that people won't give in without at least expressing their anger to Comcast by finding another ISP if available, when they implement tiered pricing.

"If available" is the catch here. Comcast has a near-monopoly on broadband service in many parts of the country. Some places have the luxury of a second cable provider like RSN, but mostly, the other choice is more expensive and much slower DSL. Some places have Verizon FiOS, but apparently they're pulling back on that as well.

Comment Because these fantasies are based on Britain (Score 4, Insightful) 516

Westeros is transparently (if not particularly faithfully) based on a fantastic reinterpretation of Britain, right down to the the Wall and the . And all the knights and chivalery (and non-chivalery) and so on are clearly Arthurian legend, which is unquestionably British even if it owes a big debt to France — which, speaking of, is of course right across the "narrow sea". Middle Earth is less literal with the geography, but Tolkien has said (were it not already obvious!) that the Shire is rural Britain in spirit, so of course the hobbits speak with the appropriate accent.

Submission + - City of Boston pays $170,000 to settle landmark case involving man arrested for (aclum.org) 1

Ian Lamont writes: "The City of Boston has reached a $170,000 settlement with Simon Glik who was arrested by Boston Police in 2007 after using his mobile phone to record police arresting another man on Boston Common. Police claimed that Glik had violated state wiretapping laws, but later dropped the charges and admitted the officers were wrong to arrest him. Glik had brought a lawsuit against the city (aided by the ACLU) because he claimed his civil rights were violated. According to today's ACLU statement:

As part of the settlement, Glik agreed to withdraw his appeal to the Community Ombudsman Oversight Panel. He had complained about the Internal Affairs Division's investigation of his complaint and the way they treated him. IAD officers made fun of Glik for filing the complaint, telling him his only remedy was filing a civil lawsuit. After the City spent years in court defending the officers' arrest of Glik as constitutional and reasonable, IAD reversed course after the First Circuit ruling and disciplined two of the officers for using "unreasonable judgment" in arresting Glik.

"

Botnet

Submission + - Political Party's Leadership Election Attacked by DDoS (www.cbc.ca)

lyran74 writes: Saturday's electronic leadership vote for Canada's New Democratic Party was plagued by delays caused by a botnet DDoS attack, coming from over 10,000 machines. Details are still scarce, but Scytl, who provided electronic voting services, will have to build more robust systems in the future in anticipation of such attacks. Party and company officials say an audit proved the systems and integrity of the vote were not compromised.

Comment Armchair expert says buy "through my site" (Score 4, Interesting) 324

This is some guy with a website, with a dull and poorly produced video telling you to buy stuff. I stopped when I got to the part where it says that most people buy smaller TVs than they "need". N-E-E-D.

Now, if he said "people buy smaller TVs than would be AWESOME", okay, fine. But this is basically crass consumerism pumped up by guy who isn't an "industry expert" but rather someone who worked for a crappy rah-rah-buy-stuff computer magazine for 20 years and is trying to trade on that to get some money. That's not wrong in itself, but it sure does translate to being a slashvertisement here.

Two thumbs down.

Comment Re:Why does his privacy have not value? (Score 2) 607

RTFA. Chris Brown kept the phone. He grabbed it from someone's hand and drove away.

His privacy doesn't have value because he's a celebrity. That's settled law. The iPhone has value because some lady purchased it. Also settled law.

You can whine about how it's not right all you want, but then I'd counter with whining about how it's not right that a woman-beating piece of garbage like Chris Brown is still a celebrity.

And I'd further argue that only his celebrity kept him out of jail after that incident, so a) maybe he should calm down when someone takes a picture of him and b) maybe the fact that he can't calm down means he belongs somewhere where he can't hurt people.

Slashdot Top Deals

As long as we're going to reinvent the wheel again, we might as well try making it round this time. - Mike Dennison

Working...