Last Active
  • Android executive offers to help Apple deploy RCS messaging

    Isn’t one HUGE difference between iMessage and SMS, or RCS, that iMessage communications are end-to-end encrypted, between iOS/MacOS devices, where the carrier is only involved in providing Data Transport?  Whereas SMS, or RCS, is a messaging system that involves mobile carriers.  I would be concerned that the carriers can build backdoors into their RCS deployments, so your ‘encrypted’ communications would still be vulnerable to interception and decryption.  To my knowledge, iMessage doesn’t have that potential vulnerability.
  • Microsoft to hike 'Microsoft 365' pricing in 2022 citing 'increased value'

    I switched from the Apple Mail client to Microsoft’s Outlook client on my iOS devices. It’s a better email client than Apple’s Mail is. 

    Regarding M365 products, my employer is heading down that path, so there will be challenges during the migration process. And in most enterprise environments, where the bulk of computers run Windows, there is no possible way that they would ever consider switching to a non-Microsoft product for office suite apps. Sure, Open Office exists, as do things like Google Docs, but the familiarity with Microsoft products makes it very hard to an enterprise to make the change. 

    I seriously doubt that the majority of Excel users do anything with Excel that any Apple, Google, or Open Office spreadsheet cannot accommodate, but Excel still dominates in the enterprise space, and it works, so the “don’t fix what isn’t broken” mindset applies. 

    Same things can be said for Word, Powerpoint, Outlook (client or OWA).  Beyond those (and maybe One Note), the rest of the MS Office suite is not as widely used, which Microsoft knows, so they are essentially ‘included’ in the suite, and there’s no incentive to replace those lesser-used apps with a non-MS app. 
  • T-Mobile says 5.3M more customers affected by breach, IMEI data stolen

    Two-factor, or multi-factor authentication that relies on SMS messages for the second factor has already been deemed unsafe, and companies should move away from it. Having a hardware or software device that generates time limited tokens is a better and safer approach. Or, Microsoft’s fairly recent use of passwordless authentication seems to be relatively safe. 
  • San Francisco doctor charged with possessing child pornography in iCloud

    chadbag said:
    AI said: “ The system does not scan actual images on a user's iCloud account”

    pray tell, how do they get a hash for the image without scanning (reading) it?

    This article explains what a hash is, in a relatively non-technical way. 

    So, the sequence of ‘ones and zeros’ that make up any file, but in this case, image files, are run through a standard hashing algorithm that produces a unique code, or fingerprint, for that file. Change one bit in the file, and the fingerprint will change. 

    So, the organizations that monitor child pornography images have a growing collection of hashes, or fingerprints, for these images.  So, when files are uploaded to iCloud, Apple can generate hashes for files, and then compare the hashes to the known list of child porn images, to look for matches. 

    Hope this helps. 
  • Mobeewave domain now owned by Apple one year after acquisition

    That’s a different application. The funds transfer happens between financial institutions, even for transfers like Venmo. 

    For this application, the purchaser is merely giving the payment card info to the seller wirelessly (rather than via a chip or card swipe reader), and then the seller processes the transaction.