larryjw

About

Username
larryjw
Joined
Visits
191
Last Active
Roles
member
Points
3,299
Badges
2
Posts
1,031
  • Rollercoaster repeatedly triggers iPhone 14 Crash Detection

    I'm a bit surprised that the iPhone would trigger on, say, a smooth ride. The g-forces are often continuously applied over a prolonged period in a smooth rollercoaster, whereas a crash would see high values of first, second (and third and fourth derivatives) of acceleration (jerk, snap, crackle, pop). Apple might be missing fine-enough time measures to accurately measure the changes in acceleration needed. 
    appleinsiderusergrandact73watto_cobra
  • 'Servant' plagiarism trial against Apple will proceed with a full jury

    The author of this article might be correct as I have no information about the case proceedings to date.

    But, this report explicitly says this court has ruled not to limit discovery as requested by Apple, et al. So, it seems this case is in the discovery phase and the claim that a full jury trial is going to happen is premature. There is a lot yet to do before they get to the point of deciding on going before a jury. 

    The appeals court merely agreed with the plaintiffs that the trial court’s summary judgment with prejudice as a matter of law was incorrect. 

    The plaintiff need for discovery is required to find evidence of plagiarism rather than some overlap of common themes. 

    Some forty years ago I came across a book in the state’s law library which made the claim that there were only 22 (?) different themes in all of literature. An interesting claim. It means if someone thinks they have an original idea — they probably don’t. 

    That’s also the reason why copyright doesn’t require originality of the idea, merely originality of the expression. 
    muthuk_vanalingamCluntBaby92watto_cobra
  • All iOS VPNs are worthless and Apple knows it, claims researcher

    Protocols supported

    These devices work with VPN servers that support the following protocols and authentication methods:

    • IKEv2/IPsec with authentication by shared secret, RSA Certificates, Elliptic Curve Digital Signature Algorithm (ECDSA) Certificates, EAP-MSCHAPv2, or EAP-TLS

    • SSL-VPN using the appropriate client app from the App Store

    • L2TP/IPsec with user authentication by MS-CHAPV2 password and machine authentication by shared secret (iOS, iPadOS, and macOS) and RSA SecurID or CRYPTOCard (macOS only)

    • Cisco IPsec with user authentication by password, RSA SecurID or CRYPTOCard, and machine authentication by shared secret and certificates (macOS only)

    This article mentions VPN generally. The above quote from Apple indicates the VPN protocols supported. I take this to imply there may be certain VPN apps for iOS, iPadOS and MacOS which may not fully protect communications. 
    foregoneconclusionsireofsethdoozydozenrezwitskillroyFileMakerFelleruraharajony0
  • Linus Torvalds uses M2 MacBook Air to release Linux 5.19

    tobian said:
    Why not? Experiencing absolute kickass performance, running on a single solar panel on your roof ;)
    From what I’ve gathered, Apple Silicon has a lot of non-public documented features, if you will, which makes porting OS to it difficult. 
    hackintoisierwilliamlondon
  • Big tech antitrust bill in danger, Chuck Schumer says

    I did a quick read of the House bill, and in my opinion, is quite the abomination. 

    It's way too broad, lacking any language indicating the exact behaviors which the proponents want to prohibit or allow. 

    This bill seems to have the sole purpose of swamping the judicial system with spurious lawsuits and making judges the sole arbiter of technology.  

    It takes little imagination to come up with an argument to sue the tech companies.

    Taking Apple as an example:

    (a)(1) , (2) would disallow Apple from "advantaging" their own OS and Xcode platform for development. How about not allowing Apple to develop their own hardware, like Apple Silicon (M1, M2). 

    Love (b)(3, (4). Use of non-public data. So, this would require my health data that Apple has collected or my financial data from Apple Pay to be given to other companies? Or my the fingerprint and face data Apple has collected? Or the data collected by my incoming and outgoing phone calls? Maybe Apple needs to share my Contacts and Calendar data? 

    I love (b)(8). interfering or restricting business user's pricing of its good and services. That's right out of Epic's playbook. 

    ********

    (a) Violation.—It shall be unlawful for a person operating a covered platform, in or affecting commerce, to engage in any conduct in connection with the operation of the covered platform that—

    (1) advantages the covered platform operator’s own products, services, or lines of business over those of another business user;

    (2) excludes or disadvantages the products, services, or lines of business of another business user relative to the covered platform operator’s own products, services, or lines of business; or

    (3) discriminates among similarly situated business users.

    (b) Other Discriminatory Conduct.—It shall be unlawful for a person operating a covered platform, in or affecting commerce, to—

    (1) restrict or impede the capacity of a business user to access or interoperate with the same platform, operating system, hardware and software features that are available to the covered platform operator’s own products, services, or lines of business;

    (2) condition access to the covered platform or preferred status or placement on the covered platform on the purchase or use of other products or services offered by the covered platform operator;

    (3) use non-public data obtained from or generated on the platform by the activities of a business user or its customers that is generated through an interaction with the business user’s products or services to offer or support the offering of the covered platform operator’s own products or services;

    (4) restrict or impede a business user from accessing data generated on the platform by the activities of the business user or its customers through an interaction with the business user’s products or services, such as contractual or technical restrictions that prevent the portability of such data by the business user to other systems or applications;

    (5) restrict or impede covered platform users from un-installing software applications that have been preinstalled on the covered platform or changing default settings that direct or steer covered platform users to products or services offered by the covered platform operator;

    (6) restrict or impede businesses users from communicating information or providing hyperlinks on the covered platform to covered platform users to facilitate business transactions;

    (7) in connection with any user interfaces, including search or ranking functionality offered by the covered platform, treat the covered platform operator’s own products, services, or lines of business more favorably than those of another business user;

    (8) interfere or restrict a business user’s pricing of its goods or services;

    (9) restrict or impede a business user, or a business user’s customers or users, from interoperating or connecting to any product or service; and

    (10) retaliate against any business user or covered platform user that raises concerns with any law enforcement authority about actual or potential violations of State or Federal law.

    MadbumtdknoxJP234JSR_FDEDkurai_kage