They filed over 4 years ago. If they haven't got a working search engine by now based on this, they never will. 4 years is forever in internet time.
Never mind that any search engine using this is very unlikely to make a dent in google.
I think their strategy is to "shame" google et al into doing more -- "look, see we got a patent on a means of eliminating piracy, proving that it *IS* possible, therefore you have to do more to prevent piracy."
Ignoring the fact that the existence of a patent proves nothing about whether the invention actually *works*. (I say this as someone who holds a number of patents -- all of mine work -- I filed them after I had them coded and working. But it would have been just as easy to make all of it up and code nothing.)
I've got a 3 year old iPhone 4S. Never broken the glass on it, but it does have some minor scratching on the display.
I'm not surprised Apple went with gorilla glass -- sapphire is very hard, but also brittle -- cornings product is a bit softer, but much more resilient.
I'll probably be upgrading to a 6 sometime in the next month or so.
I award you 9.5 out of 10 troll points for that post -- brilliantly subtle, and almost guaranteed to draw people into your semantic argument.
People are going to have to be smart (I know, it'll never happen) and use charge-only cables with the data lines physically disconnected.
Then you'll have to trust whoever makes those.
UFOs sending out distress calls.
(I'll just adjust my tinfoil hat now)
When I read of mergers like this, I imagine two large garbage trucks colliding at speed -- the result is inevitably twisted smoking debris strewn wide, and oh God, the smell.
I find, as a metaphor for large mergers, I have yet to find a more accurate one.
I think any designer of a "secure" phone needs to assume that the baseband is running hostile software.
If the baseband has write access to application cpu ram, you're screwed.
There needs to be uncompromised hardware enforced protection to ensure the baseband cannot write to application ram or to the flash memory of the application processor. I'd be very suspicious of DMA capabilities under control of the baseband unit.
I'm not saying it's impossible to make a secure phone, but you as a creator of such should assume that every byte of code not under your control is out to get you. (including closed source graphics drivers).
I'd also be nervous of the toolchain/compiler. That classic Thompson compiler attack (http://cm.bell-labs.com/who/ken/trust.html) is a worry.
With something like RedPhone is that there are multiple CPUs on the phone -- in particular, the base-band is a full ARM chip with complete access to all ram on the device. And the software running there is almost never under the users control. So it doesn't matter how good red-phone is -- if it ever leaks *any* plaintext or key bits out to ram, or across any wires outside the cpu it's running on, the baseband chip and the software running on it can wiretap you. And even if those things never leak off the main cpu die, the baseband can probably inject processes/instructions into that main chip's address space that would steal those critical key bits.
Unless you have control over *all* the firmware running on *all* the processors in a phone, I wouldn't trust it any farther than I can comfortably spit out a rat.
(and this is not accounting for hardware tricks -- I think you cannot trust your communications are secure unless you trust everyone involved in its design, manufacture and programming (including the compiler and related toolchain, and its compiler and toolchain -- and so on ad-infinitum) -- and that is probably a *very* sizable list indeed -- the odds that some lettered agency (looking at *you* cse/csis, nsa, gchq, fsb, etc) have not corrupted *someone* on that large list are so small that only god/fsm could tell the difference between it and 0.)
Take a shot from each camera, sample each microphone for a few milliseconds, Sample the gyros and accelerometers for a few milliseconds. Sample the current battery voltage/charge state, Salt in the current time/date and last known location, along with the various readable serial numbers, SHA each of these sources and fold them into each other and SHA the result, and you should be good to go.
Once the device is booted, it can do a lengthy and more sophisticated RNG to make a seed that will be folded into the above entropy sources on the next boot.
But it does sound like apple should put in a good hardware entropy source on their A8 (and future) chips. (One with no NSA/CSEC/GCHQ/KGB/FSB backdoors please!)
That can also be folded into the above sources (I think you would never want to rely on only one source of entropy, no matter how good or trusted.)