Sokath, his eyes open!
Sokath, his eyes open!
Indeed, so much for researching the article your parroting eh?
I agree, the actual technology does sound like something that would be more interesting to discuss (maybe?) then scrounging for something to make fun of Apple for.
Some of these news outlets are just not even trying anymore.
The 2nd episode felt overly scripted, but the 3rd and 4th felt more like Top Gear was. We were laughing through the entire episodes (though they can probably just get rid of the joke of killing off celebrities every episode).
So, one of these:
3x the price of the Classic and you have to supply the controllers and games.
I'm considering buying both..
I'd be more concerned that 1/2 the US internet is/was solely using Dyn.
"Apple is inexplicably still selling the exact same models for its Mac line that it introduced in 2012...Apple's computing lineup is still shipping with the three-to-four years old processor..."
While I agree that Apple needs to seriously update their line. They last updated the MacBook Pro in mid 2014, with chips released Q3'14 (according to Intel). I7-4578U, i7-4980HQ, etc...
I don't see where in the original story it mentions anything about a gun in the chicken wing case. The source of the story talks about a number of cases where Stingray was used, one of them being a 77-year old woman whose cell phone and other items were stolen at gun point. The part where it talks about the chicken wing theft doesn't say anything about a gun being involved. Unless I missed that part.
Isn't that only for devices where encryption wasn't enabled? In iOS 8 and later encryption is enabled by default, and there's currently no way (at least according to Apple) to retrieve data from it without the passcode (or clearing the passcode via mdm).
Additionally, had the employer installed the MDM software, they paid for, onto his phone, they would have been able to remotely clear the passcode and this wouldn't have been an issue at all.
Actually, the employer reset the password on the guys iCloud account (they claim, in cooperation with the FBI). Apple pointed this out because they believe that had the phone been plugged in on a known wifi network, that it would have attempted a new backup to the account. By changing the password on the iCloud account, the phone can no longer do backups as it would need to be unlocked in order to change it in the settings. Now, whether or not this would have worked only Apple knows, and would have only been known if the account password hadn't been reset. (ie, maybe he removed his home network from the phone and never plugged it in at work, or maybe his account was full, etc.. who knows).
The password that was reset had nothing to do with the phone itself.
The FBI is asking Apple to create a separate version of iOS that allows disabling the failed passcode entry countermeasures (slowing down, permanently locking) and allow passcode attempts via bluetooth or usb (so that they can brute force it rapidly).
One thing is that it would set a dangerous precedent. One thought is that this is why the FBI are trying so hard to get this done. Farook destroyed both his and his wifes personal phones beyond recovery, and hid their computers hard drive (no doubt destroyed that as well). The iPhone in question was his work phone and it's likely that there's nothing of actual use on it (though we'll never know, even if the order goes through).
If the FBI can get Apple to do this, then it will be much easier the next time, and the next, etc.. Eventually it could become such a hassle that they might even ask Apple to create a more generic version of the software. All they need is to get this done one time to get the snowball rolling.
Others will also start making the requests, pointing this one out. The NYC police dept already stated they have some 170 or so phones they need to get into. Other countries (China, etc) will no doubt start making requests as well.
Yep, and the same with OSX. Cloning bootable volumes to other drives is simple and can be done either with included command line tools or free gui apps. Backups bootable from any bus (thunderbolt, firewire, esata, usb2/3) made extremely easy.
And yet after all this time I still can't install/upgrade Windows directly to an external drive. I run it on a 2013 Mac Pro (yeah yeah Apple, trash can, whatever you want to get out of your system) on a ssd via thunderbolt. Every time I try to install or upgrade to the drive the windows installer insists that the volume won't be bootable and thus won't install. You have to perform the upgrade on the internal drive (which means for an upgrade, cloning the ssd back to the internal) then clone it to the external to boot. Which boots fine, by the way. Oh yeah, and if there are any other external drives plugged in, they have to be removed or the installer fails, which is annoying when the external drive is daisy-chained off another.
Linux can directly install/upgrade to any drive on any bus. As can OSX. Why can't Windows do this after all this time?
Whats worse is that it appears they weren't even developing for OpenGL, but rather using Transgaming's (nVidia) cider to translate DX calls to OGL.
"...it works by employing middleware developed by TransGaming (presently NVIDIA) to convert Windows’ DirectX drawing method into OpenGL on Mac systems."
They then go on to compare OGL and DX and claim that if it was developed natively for OGL there would be a 30% performance gap. Excuses for laziness, in my opinion.
We warn the reader in advance that the proof presented here depends on a clever but highly unmotivated trick. -- Howard Anton, "Elementary Linear Algebra"