But, this key is the master key, who is Intel to say who can use that key and who can't?
Will Intel sue Sony for use of this key in their BluRay players under the DMCA? (Yes, please?)
It's the correct use of the key, there is nothing being circumvented.
I'm sure they'll tout the list of "approved" hardware manufacturers. But right now that list is made of companies that are willing/stupid enough to pay the extortion money (If you pay us this amount, we won't sue you for use of this key).
The DMCA can only be used when a copyright protection scam^wscheme is cracked... nothing is cracked here, a valid master key is being used in the way it's supposed to work.
If someone enters my house using a copy of my (master) key, I can't legally call it breaking and entering, because nothing is broken. A lock and key is used the way it is intended.
System testers have to know what the corner cases are. They can't guess them all
That's why you need proper documentation, like use cases, technical designs. Often (and preferably) written by analists and not the developers.
Preferably you have a setup like this:
Business analyst writes documentation based on requirements from the business.
Developers build the application, based on the documentation.
Testers write testcases based on the documentation and test the software as soon as it is released to them.
Testing is a profession too.
And there are many tools and methodologies (TMap, ISTQB, Testframe etc) to ensure proper test-coverage and to have anything meaningful to say about the quality of the tested application.
Bad summary? I'd say bogus story perhaps even FUD. Given that they haven't told us the name of the app, and that it has to be installed from a source other than the market (which surprise, surprise, wasn't in ANY of the stories I read about this today)... I'd say this story is bullcrap.
There is something that I miss in all of the reports I've read about this "trojan", they fail to actually name the app that's supposedly causing all this. Seriously, was the application called "fakeplayer" or something?
It's useful information to know what app is malicious, don't you think? So that you can avoid installing it, or to remove it from your phone before it causes more damage.
it's disgusting to see misappropriation on this level and scale by corporations.
It's definitely not an incentive to buy more of their crap.
Funny thing, that EULA, you can only read it after you bought the device... I can only hope that one day shrink wrapped EULA and other such licenses will be banned. But that hope is very slim.
I, as a WII-owner, understand the risk of installing unauthorized applications on my WII. Why not leave me, the rightful owner of the device, the choice to install said third party applications on my device?
You sold it to me, why are you trying to claim ownership over MY devices?
To bad mainstream media is probably not interested in this.
It's not juicy enough.
Well, it takes a lot of grinding to reach management level 6.
Work is the crab grass in the lawn of life. -- Schulz