Last Active
  • How to enable and use Reachability on iPhone X

    sirozha said:
    The human race will greatly benefit because of the increased function of our thumbs thanks to the introduction of smart phones. The range of our thumbs’ reach that we are now capable of far exceeds that of the humans who lived in the pre-smart-phone era.

    The human species will undoubtedly make a historic quantum leap to the next level of our anthropological development. Thanks to the superior function of our collective thumbs facilitated by smart phones, that leap will exceed in its magnitude the quantum leap that we made from apes to humans. 
    Yeah but its a bummer we humans don't have prehensile feet like a chimpanzee. Then I could use two iPhones at the same time. Now that's multitasking!
  • Internet discovers Apple's Photos object detection feature, controversy inevitably ensues

    Wow, some people are just moronic. This is a great feature. If you don't like what its going to find, don't put the pictures on your Apple product in the first place. I have no concerns about privacy protection with Apple, they have proven time and again that privacy is a top priority.
  • Purported 'iPhone 7 Plus' packaging shows Lightning to Headphone Jack Adapter in box, 256GB storage

    lkrupp said:

    My opinion is that an adapter will not be included. Apple has never, to my knowledge, included any adapter when it switches ports. My iMac 14,2 did not include a Thunderbolt-> Firewire adapter when Apple got rid of Firewire. When the iPod went from Firewire to USB there was no adapter. Including a 3.5mm adapter would defeat the entire purpose of moving to a digital port. The idea is to firmly nudge user to the new port, not enable them to stay put. There will indeed be an adapter but it will not be included free. You will have to buy one separately. Only a few days before we find out who’s right. 

    First generation 15" MacBook Pro Retina came with the Thunderbolt to Ethernet adapter in the box. 
  • Unlikely photos of "iPhone 6 SE" packaging appear, contain some questionable details

    Swap Meet Louis
  • Lawfirm considers suit over iPhone's Touch ID-connected 'Error 53'

    Why do people still (incorrectly) say this is a "new" problem with iOS 9? It's not, and has been around since at least iOS 8 (and possibly sooner, though I didn't see any in a quick search).

    This guy went from iOS 8.3 to 8.4 and it happened. Another Apple Support thread has someone with it on 8.2. So clearly this is not new or unique to the latest version of iOS 9.

    As to why it only occurs when updating, a little common sense/logic needs applying. When you repair an iPhone you obviously turn it off. When turned back on, it "knows" the Touch ID sensor is different. At this point is when your authorized repair person would connect your iPhone to their system and perform the pairing procedure.

    If your iPhone bricked immediately upon power up, how could you ever properly repair (and then pair) Touch ID. When you do an update to a newer iOS version is when it bricks. At this point Apple realizes this was an unauthorized repair and no technician is going to do any pairing. The ONLY thing I think Apple could do different is put a warning after power up notifying the user and telling them their iPhone will be disabled after X amount of time. Then the customer would know at the time of repair what happened. 
    This is from the Apple iOS Security White Paper:

    During an iOS upgrade, iTunes (or the device itself, in the case of OTA software updates) connects to the Apple installation authorization server and sends it a list of cryptographic measurements for each part of the installation bundle to be installed (for example, LLB, iBoot, the kernel, and OS image), a random anti-replay value (nonce), and the device’s unique ID (ECID).

    The authorization server checks the presented list of measurements against versions for which installation is permitted and, if it nds a match, adds the ECID to the measurement and signs the result. The server passes a complete set of signed data to the device as part of the upgrade process. Adding the ECID “personalizes” the authorization for the requesting device. By authorizing and signing only for known measurements, the server ensures that the update takes place exactly as provided by Apple.

    The boot-time chain-of-trust evaluation veri es that the signature comes from Apple and that the measurement of the item loaded from disk, combined with the device’s ECID, matches what was covered by the signature.

    These steps ensure that the authorization is for a specific device and that an old iOS version from one device can’t be copied to another. The nonce prevents an attacker from saving the server’s response and using it to tamper with a device or otherwise alter the system software.