Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror

Comment Let me get this right... (Score 1) 255

so, before we were upset on behalf of the small developers, the upcoming apps... and now we're complaining on behalf of the big players...
right? ok, got it...

> terms that are bad for developers and consumers alike
see, there are quite a few of us who don't agree with this... (I'm speaking as both a consumer, as well as a developer, small, and have worked on large apps)
sideloading without oversight will ultimately NOT be a good thing for the average consumer

regarding the costs / provisions / Apple tax / their piece of the pie... I mean, it's not like you're not getting anything for it :) they (Apple) have done (and invested) a lot to make the markets (and individual device platforms) what they are, so why would you get to benefit from that for free?

I know... how dare I :)

Comment Re:Bull business model (Score 2) 120

how would you even have discovered Apple computers/phones/etc without advertising? Hell, how would you have heard about PC's without some form of advertising?

How would I have seen said personalised ads without a PC / mac / phone?

Or does advertising not count if it's not targeted?

No, not it the way you seem to want to take this... The "personalised" part is the issue here, exactly, it's the part many people don't want, and Apple is giving us the option to successfully opt out of it...

Comment Re:Not going to stop with Covid (Score 1) 110

there is no data to track, or rather, your phone will be the only device that has the ability to track data...

it generates and transmits random numbers (just that, random numbers, nothing else), and looks for other random numbers that were transmitted.
if you get infected, those random numbers get uploaded to some location, and then other phones can check if they've seen any of the uploaded numbers.
if a match is found, the owner of that device get's a notification to go get tested (or self quarantine, or whatever), data doesn't get exposed even in this case.

there just isn't anything there to track...

of course, this explanation is a gross simplification of the actual protocol, but still, should be accurate enough

your phone already knows more about you than will be collected by this protocol/API, so you loose nothing in terms of privacy / trackability. this protocol/API just enables contact tracing in a responsible way.

Comment Re:Clever design protects privacy (Score 1) 111

Combine it with the time and ISP records on what device on a mobile network got assigned that particular IP, match the device to a person, ... (all data that is available)

But again, that's the world we live, it's nothing new and specific to the current topic; getting all that data together will require involvement of the court, so this is not something that should be taken as an argument against anything, really...
It's just an answer to "how, ... If you figure that out" (and no, I don't want/need a medal)

also, love your explanations of the proposed solution
forwarded it to a number of people, I couldn't explain it as clearly as you did, thanks

Comment Re:Clever design protects privacy (Score 1) 111

Well, you'll have the server logs and IPs of the device doing the uploading, those IPs can be matched to end users by network operators. Which in most parts of the world (as I know it) would require a court order or something similar.

But of course, one will have this "issue" with any kind of access to some server backend, so it's a moot point in the broader discussion. (and I'm all for Apples/Googles proposed implementation; are there potential issues? sure, in theory, but far less than with what France is asking for)

Comment Re:Surprised they wouldn't have considered this (Score 1) 321

actually, it is how public private key cryptography works...
you're talking about signing, sure, but you can also encrypt the whole message

and yes, you can add a symmetric encryption key, but that just adds a layer of encryption... and all of these are known, well documented and widely used protocols, be it "signing", encryption, or adding an encrypted key used to decrypt with another algorithm...
all part of the field we know as PKI

Slashdot Top Deals

"I have just one word for you, my boy...plastics." - from "The Graduate"

Working...