markbyrn

About

Username
markbyrn
Joined
Visits
74
Last Active
Roles
member
Points
428
Badges
1
Posts
662
  • 'Tim Cook for President' and other tawdry campaigns from Qualcomm's PR bulldog

    Really?  Numerous non-conservative news or non-political tech sources reported that Apple was using 'slower' or 'inferior' Intel modems due to their dispute with Qualcomm.  Apple 'bowing' to China's censorship policies was covered in a wide range of media including the New York Times and The Guardian.  The Slate reported that "Apple and Amazon are helping China censor the Internet"; don't recall them being a bastion of right-wing thought.   As for the draft Tim Cook 2020 propaganda, it's easy to see why people might swallow it because unlike Steve Jobs, Cook is not shy to push his social-political beliefs under the company banner.   Don't doubt that Qualcomm might try to fan anti-Apple flames but fair or not, there's plenty of criticism of Apple, political or not.    
    cgWerkscornchip
  • Safari vulnerability lets hackers swipe recently deleted photos from iPhone X

    svanstrom said:
    markbyrn said:

    According to the article, the victim would need to connect to a “malicious Wi-Fi access point” in order for this rarefied exploit to be worked.   Does that mean that the attacker has to setup a WiFi access point and hope that the victim(s) connects or can an attacker make use of any public WiFi access point to work the attack?  If it’s the former as implied, I don’t we need to get too lathered about it.  The problem with an article like is it fails to provide a clear understanding of the exploit or translate the risk; it's just a headline piece to get people worked up.  

    Generally speaking…

    Unless it says that the attacker only needs to be on the same network, then it’s implied that they must be able to intercept, and manipulate, data.

    In either case you should basically never connect to any WiFi that you don’t trust (and you can’t trust any of them until you actually can; including that you must verify that it isn’t a rogue spot with the same name as a trusted network).
    That's the problem as I mentioned; the article is too vague but connecting to any open WiFi access point is problematic, esp. if it's a rogue spoofing a public hotspot.  Since the article is titled as Safari vulnerability, perhaps one could temporarily use another browser if essential to connect to a public hotspot.  Of course that might not work either but the article isn't helpful other than causing FUD.
    watto_cobra
  • Some iPhone XS & XS Max owners complaining of poor wireless reception

    no problem here with my xs max - must we have reference Antennagate with every bug report?
    zroger73appleismymiddlenameSoundJudgmentGeorgeBMac
  • Google apps continue to track users even if location services are disabled

    wood1208 said:
    You know the drill. Congress needs to open inquiry and ask Google executives to come explain to congressional committee.
    they'll also send an inquiry to Apple since that will give them more publicity.  Presumably if you disable location services in iOS privacy settings for Google Maps, Google won't be able to override it?
    watto_cobra
  • Ralph Nader once again assails Apple's stock buybacks

    Must hurt Tim to see an iconic legend of left-wing ideology blasting him.  Does Mr. Nadar have a podcast that Apple can shut down?
    watto_cobrawilliamlondonairnerdjbdragonrazorpitmhaecki