Millions and millions of people use iMessage every day. But how many people know exactly what’s going on behind the scenes, or what happens to a message once you send it?
Maybe a handful. Up until now, the vast majority of what we knew about iMessage’s inner workings came from reverse engineering and best guesses. This week, however, Apple quietly released a document that breaks it all down.
Mr. Cook’s comments came during the question and answer session of Apple’s annual shareholder meeting, which the NCPPR attended as shareholder. The self-described conservative think tank was pushing a shareholder proposal that would have required Apple to disclose the costs of its sustainability programs and to be more transparent about its participation in “certain trade associations and business organizations promoting the amorphous concept of environmental sustainability.”
As I covered in depth yesterday, the proposal was politically-based, and rooted in the premise that humanity plays no role in climate change. Other language in the proposal advanced the idea that profits should be the only thing corporations consider.
That shareholder proposal was rejected by Apple’s shareholders, receiving just 2.95 percent of the vote. During the question and answer session, however, the NCPPR representative asked Mr. Cook two questions, both of which were in line with the principles espoused in the group’s proposal.
The first question challenged an assertion from Mr. Cook that Apple’s sustainability programs and goals—Apple plans on having 100 percent of its power come from green sources—are good for the bottom line. The representative asked Mr. Cook if that was the case only because of government subsidies on green energy.
Mr. Cook didn’t directly answer that question, but instead focused on the second question: the NCPPR representative asked Mr. Cook to commit right then and there to doing only those things that were profitable.
What ensued was the only time I can recall seeing Tim Cook angry, and he categorically rejected the worldview behind the NCPPR’s advocacy. He said that there are many things Apple does because they are right and just, and that a return on investment (ROI) was not the primary consideration on such issues.
“When we work on making our devices accessible by the blind,” he said, “I don’t consider the bloody ROI.” He said that the same thing about environmental issues, worker safety, and other areas where Apple is a leader.
As evidenced by the use of “bloody” in his response—the closest thing to public profanity I’ve ever seen from Mr. Cook–it was clear that he was quite angry. His body language changed, his face contracted, and he spoke in rapid fire sentences compared to the usual metered and controlled way he speaks.
He didn’t stop there, however, as he looked directly at the NCPPR representative and said, “If you want me to do things only for ROI reasons, you should get out of this stock.”
It was a clear rejection of the climate change denial, anything-for-the-sake-of-profits politics espoused by the NCPPR. It was also an unequivocal message that Apple would continue to invest in sustainable energy and related areas.
A total of 99.9% of new mobile threat detections target the Android platform.
At WWDC in 1997, Steve Jobs, having just returned to Apple, held a wide-open Q&A session. There’s video — albeit low-quality VHS transfer? — on YouTube. It’s a remarkable session, showing Jobs at his improvisational best. But more importantly, the philosophies and strategies Jobs expressed correctly forecast everything Apple went on to do under his leadership, and how the company continues to work today. In short, he’s remarkably open and honest — and prescient.
It would appear that if Apple wants to rein in the targeted negativity the tech media loves to dish out, it will need to begin spending billions like Samsung to promote tweets, push favorable reviews, pay spiffs as incentives to retail sale promotion and generously ply journalists with free products.
The US Postal Service hopes Steve Jobs can do for it what he once did for Apple.
The late Apple co-founder will be featured on a commemorative US postage stamp in 2015, according to a US Postal Service list of approved subjects obtained by The Washington Post. Usually kept secret to maximize buzz over stamps’ subjects, the list includes subjects the post office plans to commemorate on stamps for the rest of this year and the next couple of years.
The stamp will be a little bit more expensive than usual and it comes only in 2 colors, it will have rounded corners.
And finally Apple haters can give his backside a lick…
Jeffrey Grossman, on Twitter:
I have confirmed that the SSL vulnerability was introduced in iOS
6.0. It is not present in 5.1.1 and is in 6.0.
According to slide 6 in the leaked PowerPoint deck on NSA’s PRISM program, Apple was “added” in October 2012.
These three facts prove nothing; it’s purely circumstantial. But the shoe fits.
Following Tuesday’s announcement that company vice president Satya Nadella had been named Microsoft’s new chief executive officer, many of the software giant’s older employees reportedly reminisced about an earlier era in the tech industry’s history when CEOs were so large they took up entire rooms. “When you look at our brand-new thin, mobile CEO, it’s hard to even imagine that these guys were once so gigantic that a warehouse-sized space was needed to hold one of them,” Microsoft senior developer Glenn Maloney told reporters, noting that despite Nadella’s impressive memory capabilities and ability to engage in complex operations, there was something “kind of charming” about relying on a bulky old CEO that weighed several tons and required an extended staff of engineers to maintain. “Sure, those giant executives were a little cumbersome and a whole lot slower, but I always liked being able to walk into a climate-controlled vault and see a humming CEO crunching numbers.” Maloney noted, however, that despite their difference in size and ability, tech CEOs of today were still essentially the same calculating, unfeeling machines underneath their exteriors.
PETER MCWILLIAMS: I think they’re hoping people are going to fork out $2,500 for a computer for their home. And I can’t see it.
ADAMS: What do you get for the $2,500 now?
MCWILLIAMS: What you get is a screen, a nine-inch screen. You get a keyboard. You get 128K of RAM, which is internal disk storage. And you get a 3-1/2-inch disk drive.
ADAMS: Let me translate a bit here or try to translate. You’re saying it has a very good memory. It has a 3-1/2-inch disk drive, which is not compatible with other computers. What’s the standard size, then?
MCWILLIAMS: The standard is five-and-a-quarter inch. And they have made a corporate decision that the 3-1/2-inch drive is going to make it. I don’t see it myself. But this whole computer is a calculated risk on Apple’s part. If the world is ready to accept a brand-new standard, this machine will make it. If it’s not, the machine won’t make it.
And it will have certain specialized applications like in architectural firms and so forth. But on the whole, it’s gambling that the world is ready to accept a new standard. My personal point of view is that the world is not.
BLOCK: That’s the late author Peter McWilliams, talking with our former host Noah Adams 30 years ago tomorrow, January 25th, 1984. They were talking about Apple’s Macintosh computer, which had just been introduced.
A first-hand account of this, which was first spotted by OMGChrome, was given by Amit Agarwal, developer of the “Add to Feedly” extension. One morning, Agarwal got an e-mail offering “4 figures” for the sale of his Chrome extension. The extension was only about an hour’s worth of work, so Agarwal agreed to the deal, the money was sent over PayPal, and he transferred ownership of the extension to another Google account. A month later, the new extension owners released their first (and so far only) update, which injected adware on all webpages and started redirecting links. Chrome’s extension auto-update mechanism silently pushed out the update to all 30,000 Add to Feedly users, and the ad revenue likely started rolling in. While Agarwal had no idea what the buyer’s intention was when the deal was made, he later learned that he ended up selling his users to the wolves. The buyer was not after the Chrome extension, they were just looking for an easy attack vector in the extension’s user base.
And although extensions are sand-boxed, they can replace URL’s in a request. They will replace a 70mb download of DELL_AiOXXXX.exe from dell.com with a 1.7mb setup.exe full of real nasty stuff from a less reputable site..
It’s hard to believe that the people who did the recent Apple ad and the people who did the recent Samsung ads live on the same planet.
A certain monk, known for the elegance of his code, had a habit of refactoring the code of his fellows to match. “For inconsistency multiplied becomes chaos,” he would explain, “and chaos breeds complexity, and complexity brings confusion, and confusion is the mother of ten thousand defects.”
Master Suku< — who above all prized the cleanliness of code—heard of this. She approached the monk, saying, “I require your assistance in correcting a problem.”
Suku revealed to the monk a great repository, home to the source code for the Temple’s most ancient application. Over the course of decades an uncounted procession of monks and nuns had passed through its hallowed directories: adding, removing, refactoring, refining, trying a new framework here, a new approach there. Several times the entire code base had been migrated from one language to another, scarring the deeper layers with unfathomably bizarre design patterns. Within one utility class the naming conventions were so wildly inconsistent that the monk grew dizzy and had to lie down on the floor.
“Bring order to chaos,” said Suku, and went out.
The monk proceeded in earnest to rewrite the application in the style he had perfected over so many years. He chose a glittering new framework to replace the many rusty ones, then picked one dusty corner of the repository and worked slowly outwards: adding, removing, refactoring, refining.
The monk had converted the merest fraction of the files when there came a pounding on his door.
“Emergency!” said the breathless abbot outside, grabbing the monk by his robe and pulling him out the door. “Disaster! Disorder! Deadline! Doom! Not enough people and not enough time; you’re needed at once, come on, come on!”
The monk protested, calling for someone to fetch master Suku that she might intervene, but the abbot merely flipped the monk onto his backside and dragged him down the hallway like a noisy sack of rice.
That evening Suku found the monk, tied to his new workstation by many coils of strong rope.
“I have seen your commits in the great repository,” said the master, drawing a long knife which she placed at his throat. “Where once there had been a hundred styles, there now are a hundred and one.”
She made a quick motion. The monk cringed, expecting to feel his life blood spilling inside his robe. Instead the knife only severed one strand of his hempen bonds.
“Not perfect, but better,” said Suku, and went out.
She did likewise for one hundred evenings until the monk was freed.
Afterwards the monk meddled less with the code of his fellows, and instead began to pride himself on his ability to mimic the design patterns of others when modifying their applications.
“It is still a truth of refactoring,” he now said, “that sometimes one must introduce chaos to bring order, just as the road to the sea must sometimes scale a mountain before it turns downward again. Yet order is not a destination: merely a direction from complex to simple, from more to less. The master asked for less but I thought only of one, and chose a path worthy of a hailstone when simple subtraction would have sufficed.”
“Apple kicked everybody in the balls with this. It’s being downplayed, but it set off panic in the industry.”
The key role private companies play in National Security Agency surveillance programs is detailed in a top-secret document provided to the Guardian by whistleblower Edward Snowden and published for the first time on Friday.
One slide in the undated PowerPoint presentation, published as part of the Guardian’s NSA Files: Decoded project, illustrates the number of intelligence reports being generated from data collected from the companies.
In the five weeks from June 5 2010, the period covered by the document, data from Yahoo generated by far the most reports, followed by Microsoft and then Google.
Between them, the three companies accounted for more than 2,000 reports in that period – all but a tiny fraction of the total produced under one of the NSA’s main foreign intelligence authorities, the Fisa Amendents Act (FAA).
It is unclear how the information in the NSA slide relates to the companies’ own transparency reports, which document the number of requests for information received from authorities around the world.
Yahoo, Microsoft and Google deny they co-operate voluntarily with the intelligence agencies, and say they hand over data only after being forced to do so when served with warrants. The NSA told the Guardian that the companies’ co-operation was “legally compelled”.
Canada-based telecom Nortel went bankrupt in 2009 and sold its biggest asset—a portfolio of more than 6,000 patents covering 4G wireless innovations and a range of technologies—at an auction in 2011.
Google bid for the patents, but it didn’t get them. Instead, the patents went to a group of competitors—Microsoft, Apple, RIM, Ericsson, and Sony—operating under the name “Rockstar Bidco.” The companies together bid the shocking sum of $4.5 billion.
Patent insiders knew that the Nortel portfolio was the patent equivalent of a nuclear stockpile: dangerous in the wrong hands, and a bit scary even if held by a “responsible” party.
This afternoon, that stockpile was finally used for what pretty much everyone suspected it would be used for—launching an all-out patent attack on Google and Android. The smartphone patent wars have been underway for a few years now, and the eight lawsuits filed in federal court today by Rockstar Consortium mean that the conflict just hit DEFCON 1.
Google probably knew this was coming. When it lost out in the Nortel auction, the company’s top lawyer, David Drummond, complained that the Microsoft-Apple patent alliance was part of a “hostile, organized campaign against Android.” Google’s failure to get patents in the Nortel auction was seen as one of the driving factors in its $12.5 billion purchase of Motorola in 2011.
Rockstar, meanwhile, was pretty unapologetic about embracing the “patent troll” business model. Most trolls, of course, aren’t holding thousands of patents from a seminal technology company. When the company was profiled by Wired last year, about 25 of its 32 employees were former Nortel employees.
The suits filed today are against Google and seven companies that make Android smartphones: Asustek, HTC, Huawei, LG Electronics, Pantech, Samsung, and ZTE. The case was filed in the Eastern District of Texas, long considered a district friendly to patent plaintiffs.
Several monks of the Laughing Monkey Clan found their brother in a state of great anguish, typing frantically at his workstation.
“What vexes you so?” they asked.
Said the monk: “When new business rules are delivered next year, my code will need to be updated. Today the abbot told me who will be assigned this task, and my heart sank. He is an impatient fool who scorns documentation and breezes by comments, electing instead to guess the purpose of everything by name alone. Thus I must idiot-proof every class and method.”
The monk pointed to his screen. “Here he will be tempted to modify this object’s properties, so I must make it immutable to prevent disaster. Here he will surely mistake the purpose of this parameter, so now I must check for an illegal argument wherever it is used.” The monk collapsed upon his keyboard. “Ten thousand curses upon that imbecile, Taw-Jieh!” he wailed. “That he of all people should be chosen to maintain my code!”
The other monks looked at each other uncomfortably.
“But you are Taw-Jieh,” said one.
One of those analyses showed that when a human was behind the wheel, Google’s cars accelerated and braked significantly more sharply than they did when piloting themselves. Another showed that the cars’ software was much better at maintaining a safe distance from the vehicle ahead than the human drivers were.
“We’re spending less time in near-collision states,” said Urmson. “Our car is driving more smoothly and more safely than our trained professional drivers.”
Abject-oriented programming is a set of practices for encouraging code reuse and making sure programmers are producing code that can be used in production for a long time. The number of lines of code in the application is a common measure of the importance of the application, and the number of lines a programmer can produce in a day, week, or month is a useful metric for project planning and resource allocation. Abject-oriented programming is one of the best ways to get the most lines of code in the shortest time.
The preparations were top-secret. From Thursday through the end of the following week, Apple completely took over Moscone. Backstage, it built an eight-by-eight-foot electronics lab to house and test the iPhones. Next to that it built a greenroom with a sofa for Jobs. Then it posted more than a dozen security guards 24 hours a day in front of those rooms and at doors throughout the building. No one got in without having his or her ID electronically checked and compared with a master list that Jobs had personally approved. The auditorium where Jobs was rehearsing was off limits to all but a small group of executives. Jobs was so obsessed with leaks that he tried to have all the contractors Apple hired — from people manning booths and doing demos to those responsible for lighting and sound — sleep in the building the night before his presentation. Aides talked him out of it.
Who watches the watchers?
It took just a week for nearly 300 students who got iPads from their Los Angeles high school to figure out how to alter the security settings so they could surf the Web and access social media sites.
The breach at Roosevelt High and two other LA schools has prompted Los Angeles Unified School District officials to halt a $1 billion program aimed at putting the devices in the hands of every student in the nation’s second-largest school system, the Los Angeles Times reported. The district also has banned home use of the iPads until further notice as officials look for ways to make sure students use the devices for school work only.
This is indisputably educational. It probably only took one kid and one hour to do the crack, and a week to spread it to the rest of the school population. Why on Earth is anybody surprised about this? And why on Earth stop them? If you give them pen and paper, they quickly learn how to write notes to each other, but you don’t ban pen and paper because of that!
Are you excited about the launch of Apple’s new iPhones? Have you decided to get one? Do you have any idea what you’re buying? If so, you are on your own. When asked where it obtains its minerals, Apple, which has done so much to persuade us that it is deft, cool and responsive, looks arrogant, lumbering and unaccountable.
The question was straightforward: does Apple buy tin from Bangka Island? The wriggling is almost comical.
Nearly half of global tin supplies are used to make solder for electronics. About 30% of the world’s tin comes from Bangka and Belitung islands in Indonesia, where an orgy of unregulated mining is reducing a rich and complex system of rainforests and gardens to a post-holocaust landscape of sand and acid subsoil. Tin dredgers in the coastal waters are also wiping out the coral, the giant clams, the local fisheries, the endangered Napoleon wrasse, the mangrove forests and the beaches used by breeding turtles.
The biometrics hacking team of the Chaos Computer Club (CCC) has successfully bypassed the biometric security of Apple’s TouchID using easy everyday means. A fingerprint of the phone user, photographed from a glass surface, was enough to create a fake finger that could unlock an iPhone 5s secured with TouchID. This demonstrates – again – that fingerprint biometrics is unsuitable as access control method and should be avoided.
Apple had released the new iPhone with a fingerprint sensor that was supposedly much more secure than previous fingerprint technology. A lot of bogus speculation about the marvels of the new technology and how hard to defeat it supposedly is had dominated the international technology press for days.
“In reality, Apple’s sensor has just a higher resolution compared to the sensors so far. So we only needed to ramp up the resolution of our fake”, said the hacker with the nickname Starbug, who performed the critical experiments that led to the successful circumvention of the fingerprint locking. “As we have said now for more than years, fingerprints should not be used to secure anything. You leave them everywhere, and it is far too easy to make fake fingers out of lifted prints.”
Since Sen. Al Franken (D-MN) arrived in the United States Senate, he’s become the chairman of the Senate Judiciary Subcommittee on Privacy, Technology and the Law. He’s made it his mission to raise questions about tech issues that he feels are improper, unjust, or just downright questionable.
The debut of the new iPhones 5S, replete with a fingerprint reader, has now also gotten Franken’s attention. On Thursday, the Minnesota senator published a letter to Apple CEO Tim Cook, raising questions about the logic in making fingerprint readers more mainstream.
He also has specific questions for Cupertino:
(1) Is it possible to convert locally stored fingerprint data into a digital or visual format that can be used by third parties?
(2) Is it possible to extract and obtain fingerprint data from an iPhone? If so, can this be done remotely, or with physical access to the device?…
(10) Under American intelligence law, the Federal Bureau of Investigation can seek an order requiring the production of “any tangible thing (including books, records, papers, documents, and other items)” if they are deemed relevant to certain foreign intelligence investigations. See 50 U.S.C. § 1861. Does Apple consider fingerprint data to be “tangible things” as defined in the USA Patriot Act?
The problem, senator, is that the NSA has been caught lying about this kind of stuff. Why do you think the FBI is any better?
Let’s set up a timeline here. We’re at the first step:
1) Franken: Can the FBI get the fingerprints?
2a) FBI: No.
2b) Apple: No, and how dare you ask me that!
3) Snowden: Yes
4a) FBI: Okay, yes.
4b) Apple: Yes, but they forced us. Not giving it is treason.