Slashdot videos: Now with more Slashdot!
We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).
The problem I have with this type of solution is that we are placing absolute trust in the vendor's promises that it won't snoop on our data. If I personally generated my CSR and kept my keys secure and in a known location then I would have a little more faith, but unless they open source this and allow me to maintain my own back-end infrastructure I would be more concerned about sending my confidential information using this solution than not - as it's effectively a choke-point for all things sinister and you can bet your last $20/month that the authorities have all they need to intercept your data. After all, and I'm assuming the service is hosted in the US, the White House has access to any keys which are transmitted to and from Silent Circle's systems.
There was another app touted as having military-grade privacy recently, the free-to-install Wickr for iOS. I contacted them after downloading the application in June to pose the question of just what level of trust they expected me to place in their application and infrastructure, to which they promptly responded that their code was under review and they would update their FAQ over the subsequent days. I've just checked and can't even see a FAQ on their website.
Get-ChildItem D:\MyData -Recursive | Export-CSV mydata.csv
$objData = Import-CSV mydata.csv
$objData | sort Size | Export-CSV mydata_sorted.csv
$objSortedData = Import-CSV mydata_sorted.csv
$objUniqueSortedData = $objSortedData | sort Size -unique
Then loop through comparing both sets of data, comparing file extension for those files of the same size. Do a few test runs until you're confident and then run with Remove-Item -Confirm:$false.
Any $25 Nokia or LG phone would qualify.
>best way to get one?
By exchanging one for money at a store that sells pre-paid phones.
- Walled gardens, vendor lock in
They are a company who manufactures proprietary products. I can't think of a single proprietary company who does not have an aspect of vendor lock-in. And I'm not even sure what element of Apple's offering would be considered lock-in (unless you're talking about the App Store).
- Taking down applications from the App Store and including versions in iOS
I think you'll find more-often-than-not that Apple takes features from jailbreak apps rather than those sold in the App Store. Fair game.
- Spurious litigation and anti-competitive lawsuits in Germany and Australia
I'll admit this is some pretty poor form. I do, though, think it's fairly obvious if you look at the smartphone industry before the iPhone vs after the iPhone you'll see how many other brands have copied Apple's look and feel. Not that look and feel should be patentable, but the entire industry was sitting on their hands selling mediocre products and then as soon as Apple releases their product they all rush to sell the same thing. Where's the innovation? Things like this are pathetic.
- CarrierIQ, GPS tracking privacy gaffes
At least iOS asked you if you wanted to opt-in for tracking (CarrierIQ). Other OS'es did not. I think you'll also find that Android had a similar 'bug' where a user's GPS location was tracked along with wifi data.
- Planned failure just after warranty period (ever since the original pod)
I own 7 Apple devices with all bar one (iPhone 4S) out of warranty. None of mine have failed, but I suppose YYMV (especially 11 years ago).