Unless you've used the same password for gmail as for whichever site has been hacked, it shouldn't matter. I found my gmail address, but the password had never been used at Google. The problem is if you've reused the password on a bunch of sites where your email address can be used as login.
Same here. My email address, but a password I use for throwaway sites that I don't care about accessing.
The discusses also details a method for spoofing device identification to convince iCloud to restore data to a device mimicking the target's phone. The author concludes, "Apple could go a long way toward protecting customer privacy just by adding a second credential to encrypt stored iCloud data. An encryption password could be used to decrypt the backup when downloaded to iTunes or to the device, or it could be used to decrypt the data as it is read by iCloud to stream down to the device."
Many of them are made of wood, which makes it cheap compared to a "real" house.
What a dumbass. Don't you realize the majority of house in the US are made of wood? Even the ones that look like brick are wood house with a brick facade.
Apple also announced its entry into the payments market with "Apple Pay." They're trying to replace traditional credit card payments with holding an iPhone up to a scanner instead. It uses NFC and the iPhone's TouchID fingerprint scanner. Users can take a picture of their credit cards, and Apple Pay will gather payment information, encrypt it, and store it. (Apple won't have any of the information about users' credit cards or their purchases, and users will be able to disable the payment option through Find My iPhone if they lose the device.) Apple Pay will work with Visa, Mastercard, and American Express cards to start. 220,000 stores that support contactless payment will accept Apple Pay, and many apps are building direct shopping support for it. It will launch in October as an update for iOS 8, and work only on the new phones.
Apple capped off the conference with the announcement of the long-anticipated "Apple Watch." Their approach to UI is different from most smartwatch makers: Apple has preserved the dial often found on the side of analog watches, using it as a button and an input wheel. This "digital crown" enables features like zoom without obscuring the small screen with fingers. The screen is touch-sensitive and pressure sensitive, so software can respond to a light tap differently than a hard tap. The watch runs on a new, custom-designed chip called the S1, it has sensors to detect your pulse, and it has a microphone to receive and respond to voice commands. It's powered by a connector that has no exposed contacts — it magnetically seals to watch and charges inductively. The Apple Watch requires an iPhone of the following models to work: 6, 6Plus, 5s, 5c, 5. It will be available in early 2015, and will cost $349 for a base model.
"For Apple, the use of government forensic tools by criminal hackers raises questions about how cooperative it may be with Elcomsoft. The Russian company’s tool, as Zdziarski describes it, doesn't depend on any 'backdoor' agreement with Apple and instead required Elcomsoft to fully reverse engineer Apple’s protocol for communicating between iCloud and its iOS devices. But Zdziarski argues that Apple could still have done more to make that reverse engineering more difficult or impossible." Meanwhile, Nik Cubrilovic has waded into the data leak subculture that led to this incident and provides insight into the tech and the thinking behind it.