So in order for this to work, an iOS device must already be compromised with a jailbreak? Why is that news?
This isn't a vulnerability, and to disable it all you have to do is uncheck "Mail & Messages" in the Spotlight preference pane in System Preferences.
If they have micro transactions (in-app purchases), then it's definitely not free. What kind of in-app purchases would products called, Clean Master, Battery Doctor, and Photo Grid have, anyways?
How are they earning a profit? If the apps are free, where do they get the money? If it's from ads, then that doesn't count as free.
I don't know how I feel about this case. I avoided iTunes because I didn't like the two-faced approach of buying a license so you don't own the music, but if the device dies, you bought a file, we aren't obligated to let you retrieve the content that you have a license for.
You can download anything you've purchased again it's been that way for quite a while now.
All of those hoops are removed if the app is signed by an Apple 'enterprise deployment' certificate. Someone anyone can get just by asking.
No, those are all the hoops you have to go through to accept the "enterprise deployment" certificate profile the first time, then accept the app launching the first time. Also, the phone needs to be unlocked to accept any of these dialogs.
But then Apple can just revoke the cert (which it did for WireLurker) and blacklist the malware on the Mac side (which it also did for WireLurker).
The real issue is that you can't opt out of automatically having your phone number become and account/id in iMessage.
I want to use iMessage on my iPhone, but only with regular iCloud accounts, not with the phone number being used to create an account.
Unfortunately, the iOS team doesn't give the user that option.
The option is given when you set up a device for iMessage. It explicitly asks how you want to be contacted. By number, by email(s)/AppleIDs, or all of the above
With an active CPU behind it, certainly this system can be more secure than the current card system. Also means much less chance of leaving the card in the room and less money spent replacing lost cards.
The quote was from the retired Brig. General himself. He got the two cities confused.
And we all know neither Abu Dhabi nor Dubai are in Canada. I don't know why it was necessary to point that out.
The ones that use SMS.
Forgot to mention that enabling 2FA in China may be useless if they can also intercept the messages and do a replay attack.
If you use Firefox, Safari, Chrome, or IE in China, they will all warn you that MiTM attack has occurred (if you trying going to https://icloud.com./ But the most popular browser used in China (according to Qihoo, the claim is dubious), Qihoo’s Chinese 360 "Secure Browser". will allow Man in the middle attacks to occur, by design.
Some are indeed bad, like the streaming of Safari/Spotlight chars to Apple with suggestions turned off.
It does not stream the chars to Apple if the option is off, Landon just forgot to disable the option in Safari and Spotlight.
He said he'll update the TFA tomorrow with the correct information.
TFA is about Yosemite's collection.
And the people that sued Apple tend to just sue companies over the Zip issue hoping for a payout. But previous courts have found that asking for the ZIP code before purchase does not constitute personally identifiable information not associated with the credit card transaction. (It's wrong if they ask for the ZIP after the transaction has been completed, but not before)