brianjo
About
- Username
- brianjo
- Joined
- Visits
- 35
- Last Active
- Roles
- member
- Points
- 405
- Badges
- 1
- Posts
- 68
Reactions
-
New Apple aluminum Magic Keyboard introduces backlit keys & function bar
-
Apple drops the price of its 10th generation iPad to $349
-
iPad Air gets a faster processor and a supersized 13-inch option
eightzero said:More and more "trickle down" tech. Choices are great, and today's update is very welcome. The lineup is much more clear, and the pricing attractive at each level - and that will get better over the coming months as the sales hit.
Really interested in what WWDC will say about padOS now. While all the glamour is all at the top end, I really do hope they continue to work on making iPad easy to use for basic needs. Please add a "gramma mode" to turn off all the complex gestures. Or hey, if all that is built-in already (and hidden in various places) someone can offer a script for us family members that are the designated IT bitches when the call comes, "this damn thing is broken! I can't print any of my email anymore!" -
New 12.9-inch iPad Air may not be a large-screen bargain
retrogusto said:The current iPad Air is kind of awkward in the lineup, given that the $599 base model only has 64gb of storage (which probably isn’t enough for most people, especially at that price), and the next level up only costs $50 less than an iPad Pro 128gb (which is enough for many people). And that $50 gets you a lot of extra stuff. It’ll be interesting to see the base storage for the new models—it’ll make a bigger difference for most people than a screen upgrade, unless the screen also makes the device significantly sleeker and lighter. -
If you're using a Magic Keyboard, you've opened up an attack vector
AppleZulu said:It's hard to imagine real-world scenarios where this vulnerability is useful enough for a hacker to actually bother with it. The scheme requires the hacker to be very proximate to the victim and very, very patient and/or very, very skilled at directly manipulating the victim. For a hacker to execute some exploit of value, the victim has to already be logged into their device, logged into a target app or website, and then distracted enough to not look at their device for long enough while also not noticing a person looking over their shoulder at their screen while typing furiously. Though not quite to the same extreme, this is almost akin to the warnings that Touch ID was going to result in a rash of victims with stolen devices and severed fingers.
No security is 100%, but vulnerabilities that require elaborate schemes to exploit them are low-probability problems.An easy to think of scenario is if someone had a computer locked in their office. Hacker next door is able to hack the keyboard to wake the machine, run a command to copy a directory on the machine to a network server, then quits terminal. No need to see the machine to pull this task off. This can be done when they know the computer isn't being looked at. The user would likely not have any clue that this happened.That's certainly a vulnerability to be concerned with.