or Connect
New Posts  All Forums:

Posts by rcfa

Who cares if a child will die? This bringing up children is the lowest of the low emotional blackmailing techniques. THOUSANDS of children die each day of hunger, are run over by drunk drivers, shot by guns, etc. We neither force a fairer system of economics, nor do we outlaw cars, alcohol, or guns. So: DOJ shut the **** up, you have any more the right to dig around in my brain extension device than you're allowed to feed me "truth serum" during interrogation. If you want...
This is why root privileges for device owners are key: the ability to monitor a device, install third party anti-malware software (if need be), etc. Right now, an iOS device is only as secure as US laws and Apple engineering allow. It should be as secure as security researchers with full access to their own devices can ascertain and make it independently of Apple and the legal mandates it's subjected to as a U.S. corporation. Competition is good, particularly when it...
People who buy want lossless audio, and the right to transfer ownership. People who want convenience want to budget, and are no audiophiles. iTunes satisfies neither, so the convenience freaks move to streaming, and the rest continues to buy and rip media. Time for Apple to offer lossless audio, or do what Amazon does in Europe: you buy a CD and MP3 versions are automatically included for computer and mobile use, saving people the need to rip the discs.
Nothing new, have the same issue, although less severe, on iPhone 5s and iPad Air (64GB/128GB) with tons of apps installed. Usually a forced reboot, and then letting the loop go on for hours or days will eventually fix it. My guess is that some CPU watchdog timer kicks in, or some resource is exhausted as iOS processes the app icon layout, as this matter is particularly likely to be triggered after installing new apps or updating existing ones. It may seem silly to have...
Not quite: in many/most jurisdictions something sent addressed to you that you didn't order is yours to keep. This is because it used to be a commercial scam to send people stuff and them bill them for not sending things back; so the law was changed to place the burden of responsibility on the sender to stop this fraudulent business practice.
As an engineer you design a product for it's intended use, with certain margins of error. You do NOT design it to be ABUSED, unless you design combat equipment. A phone of the size of the 6plus is supposed to be in the pockets of a sports jacket, briefcase, backpack, purse, portfolio, waist bag, etc. It's not designed to be put in some tight jeans pocket of a super sized American behemoth squatting, sitting down or doing sit-ups. That's outside the design...
Samsung producing chips doesn't mean they know what Apple is up to, for that they would have to reverse engineer a phone and software from a chip. The chip doesn't have that many secrets: RAM, GPU and ARM architecture are all third party contributions. The worst parts about Samsung doing the chips is that they earn money which they can use to subsidize their competing products. That said TSMC likely just doesn't have the capacity to make all the chips for the AppleWatch,...
Prices have to be lower. If you buy a $5k+ watch like a cheap Rolex, you still expect it to last decades, or to turn into an heirloom piece (particularly once you go up the echelon of luxury watches) If Apple doesn't have a modular, upgradable core in mind for its watches, then something they expect users to replace every few years has to be a be in the 3-digit range. Given that Apple needs every bit of volume inside the watch for battery space and strengened the structure...
Badly explained article: for someone to exploit bash, they would have to be able to log in first. If a web server allows accessing bash, then the web server must also have an exploit. So unless one has a guest account with shell login or is worried about illegitimate privilege escalation by legitimate users (e.g. students in a computer lab), or is stupid enough to run random shell scripts, then I don't see how this is a problem, certainly not in the way it's phrased,...
The problem is that law enforcement derived from a technical possibility to tap old analog phones a "right" to monitor all communications, and with future developments even your thoughts. Such a capability didn't historically exist, and law enforcement had to collect evidence the old fashioned way. It is key to put law enforcement back into their historical bounds, or else we'll have truth serum and advanced MRI-based thought reconstruction devices next. Vulnerability...
New Posts  All Forums: