Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×

Comment Re:Old. Needs an update. (Score 1) 68

What does the author of TFA want? Double-encryption of message attachments? The storage of the iPhone is always encrypted. In order to access any files, you must supply the encryption key. He supplied the key and could read the files.

Unless he wants attachments double encrypted or encrypted on iCloud itself?

Comment Re:Sales figures (Score 3, Informative) 487

No idea how they make up sales numbers.

Apple's own sales numbers say they sold 74 million iPads in 2014. Not sure how gartner lost 4 million.

Also, Apple's numbers are reported as sales to users, everyone else uses sales to channel (the channel can return unsold stock to the company in the following quarter but can still claim it sold that many)

Comment Re:unpossible! (Score 3, Interesting) 108

To be fair, Apple does a hell of a lot to prevent user stupidity from installing Malware. Such as blacklisting known malware nearly immediately (as soon as Apple reverse engineers it, its signature is pushed out to ever mac user via a list that is updated every 24 hours).

The sad thing is and a major security flaw of Apple's is that they create trust with third parties based on code signing. This allows code signed malware to skip the normal malware checks in Mac OS X. (It's super trivial to get multiple code signing certs from Apple and Apple doesn't verify code certs applications for individuals)

Comment Re:BS (Score 2) 284

Politely, thats crap, ever heard of updates? They, apple/Google/MS all do "updates" that "change"your phone/computer settings without your permission. That activate "features" in your system until you find out about later after some security expert notifies the public about what they did. Even then you have no idea what else has happened, since the companies/the phone/computer/parts/whatever/ even don't know what has been shipped, or refuse to elaborate on what they did, or they have been ordered by the FISA courts to keep quiet about what was added.....

You make a good point. Where are the Android release notes for each release? Where are the security advisories published when they've fixed a vulnerability?

Comment Re:They can't stop unlockers (Score 1) 284

If the attacker has physical access, the crypto key is still based on a PIN and (hopefully) some fixed number related to the hardware. The PIN is easy to guess in an offline attack, and the hardware info is also easily accessible. Therefore, full disk crypto doesn't help here either.

Apple documents how it figures out the encryption keys... you could look that up instead of saying "hopefully". Furthermore, you can't "guess" it in an offline attack easily. Well, if you have six months or so and a robot arm to do it, then maybe. Every time you enter an incorrect PIN, it takes longer and longer before you can attempt a different pin. Going from 0000 to 0010 will take around half a business day. Then it gets worse!

Comment Re:They can't stop unlockers (Score 4, Insightful) 284

Google has removed apps that are banned from the Google Play store from people's devices remotely. Apple has not.

Is an unknown fear in the future somehow better for you to digest than that fear being played out in the past and present? (Apple's "may" versus Google's "has and does and will continue to do")

I still have the "Asian Boobs" apps I downloaded off the App Store on my iPhone even though it has long, long since been removed from App Store. (Yes, it's actually called "Asian Boobs")

Slashdot Top Deals

"Religion is something left over from the infancy of our intelligence, it will fade away as we adopt reason and science as our guidelines." -- Bertrand Russell

Working...