Feds Want Apple and AT&T to Explain Google Voice Rejection

Found on Wired on Friday, 31 July 2009
Browse Software

According to the letters, the FCC wants to know the who, what, why and when of the rejection of the Google Voice app for the iPhone.

And here the FCC isn't limiting itself to questions about the Google Voice incident. The FCC also wants to know what other apps have been rejected, what the rules are and what role AT&T plays in such decisions.

For instance, AT&T said it expected Apple to reject a Skype application that would let users make internet phone calls using the phones' 3G data connection. Apple also forced Slingbox to cripple its video streaming application so that it would only work over WiFi, and not a mobile carrier's network.

Imagine where we would be today if the same stupidity was applied to computers: you just bought a HP/Lenovo/Dell system and are only allowed to install the software they think is good for you. Want to install that neat freeware that helps you save hours of work? Well too bad if it's not in their store. All that only hurts the consumer. Just let users install everything they want, and if they brick it, they will learn from that and have to reinstall. But then I guess that's not an option since the iPhone is so unbelievable buggy that a hacker can use it to bring down the entire network if it's not controlled by Big Apple.

Amazon sued for sending 1984 down Orwellian memory hole

Found on The Register on Thursday, 30 July 2009
Browse Legal-Issues

A seventeen-year-old high school senior has sued Amazon for vanishing George Orwell's 1984 from his Kindle ebook reader - and removing his personal annotations in the process.

Amazon's terms of service say that books are licensed not sold. But as the suit point out, they also say that users have the right to keep a "permanent copy" of purchased books and to "view, use, and display such Digital Content an unlimited number of times." And the terms fail to explain that Amazon has the technical power or the right to remove content from personal devices.

That's what you get if you try to control your customers in every aspect.

How To Hijack 'Every iPhone In The World'

Found on Forbes on Wednesday, 29 July 2009
Browse Hardware

If you receive a text message on your iPhone any time after Thursday afternoon containing only a single square character, Charlie Miller would suggest you turn the device off.

Using a flaw they've found in the iPhone's handling of text messages, the researchers say they'll demonstrate how to send a series of mostly invisible SMS bursts that can give a hacker complete power over any of the smart phone's functions.

And unlike the earlier exploits, Apple has inexplicably left them unpatched, Miller says. "I've given them more time to patch this than I've ever given a company to patch a bug," he says.

Combine that with Apple's claim that a jailbroken phone can crash mobile towers from two days ago and you have an interesting view of the future. A jailbreaking worm that storms through iPhones and tears down the mobile network. Well, if that claim from Apple wasn't just a try to make jailbreaking look really bad.

iPhone Jailbreaking Could Crash Cellphone Towers, Apple Claims

Found on Wired on Tuesday, 28 July 2009
Browse Various

The nation's cellphone networks could suffer "potentially catastrophic" cyberattacks by iPhone-wielding hackers at home and abroad if iPhone owners are permitted to legally jailbreak their shiny wireless devices - that's what Apple claims.

By tinkering with this code, "a local or international hacker could potentially initiate commands (such as a denial of service attack) that could crash the tower software, rendering the tower entirely inoperable to process calls or transmit data," Apple wrote the government.

So wait, Apple just said that they made it possible for a skilled hacker to bring down the mobile networks by jailbreaking a phone? You know, I always was under the impression that a software running on mission critical systems should be designed to ignore all potentially dangerous (or just undefined) input. That's one of the basics of system security. To think that Apple assumes that everything coming from an iPhone is perfectly fine and can interoperate with the tower software without any security checks is just baffling. I think I should be more careful when tinkering with electrical devices; who knows, I might just shut down the national power grid. But then, it's not run by Apple.

Want Gmail? Best have your mobile handy

Found on The Register on Tuesday, 28 July 2009
Browse Internet

Users signing up for a Gmail account are now being asked to provide a mobile-phone number in the continuing war against spam, though Google will keep it handy just in case anything else turns up.

"Your number will also be associated with your account to avoid unnecessary future verifications for other Google services", though the Do-No-Evil company does clarify: "your number will never be sold or shared for marketing purposes without your permission, nor will we contact you using this number without your express permission".

Guess that means my Gmail account will be killed once they start re-authenticating existing users like that. Not that much would be lost: three mails in five years hardly makes it an important account. At least not important enough to turn over my cellphone number (something I don't have anyway) to Google.

Student files suit after coach distributed private Facebook content

Found on Student Press Law Center on Monday, 27 July 2009
Browse Legal-Issues

A Mississippi high school student is suing her school district after a teacher logged into the student's social networking account and distributed information that embarrassed her and led to her removal from the team.

On Sept. 10, 2007, Pearl High School cheerleading coach Tommie Hill required each member of the cheerleading squad to reveal the passwords to their Facebook accounts, according to the suit.

According to the suit, the officials "reprimanded, punished, and humiliated" Jackson for an exchange of profanity-laced messages between Jackson and the cheerleading captain in which Jackson asked the student to "stop harassing" several of the cheerleaders.

The coach Tommie Hill should be removed immediately. There is simply no reason for him to demand password and snoop through private messages. Looking for drug/smoking photos isn't an excuse at all; the current sitation proves that Hill would have possibly mailed such photos around too. Of course one could assume that he was looking for some more "interesting" photos; after all, it was the cheerleader team he demanded the passwords from.

Western Digital launches 1TB 2.5-inch drive

Found on The Inquirer on Sunday, 26 July 2009
Browse Hardware

Western Digital has unveiled what it claims is the world's first one terabyte 2.5-inch hard disk drive.

However, within the same breath WD announced their own new external portable storage device - My Passport Essential SE portable USB drive - which incorporates the HDD.

Seagate is still playing catch-up in this space, offering currently a 640GB 2.5-inch HDD at 300GB per platter.

That's all nice and sweet, but my 1TB drives are almost full already. Let's see the 2TB version.

Amazon Kindle doomed to repeat Big Brother moment

Found on The Register on Saturday, 25 July 2009
Browse Censorship

Yes, Amazon chief Jeff Bezos has apologized for the Orwellian removal of Orwell from digital book readers tucked inside the pockets of American citizens. And yes, the new-age retailer has promised not to repeat its Big Brother moment. But that's not a promise it can promise to keep.

To his credit, Jeff Bezos acknowledged that Amazon's Big Brother moment was ill-conceived. "Our 'solution' to the problem was stupid, thoughtless, and painfully out of line with our principles," read his online apology.

But that doesn't mean this is the last time Amazon will remove books from citizen Kindles.

I wonder if there's already someone working on a "fix" for that problem, so that Amazon can't randomly delete anymore.

Plug-pulling ISP changes policy

Found on BBC News on Friday, 24 July 2009
Browse Internet

Internet service provider (ISP) Karoo, based in Hull, has changed its policy of suspending the service of users suspected of copyright violations.

"They gave me a form to sign to get reconnected," she told the BBC. "The form basically said 'if I admit my guilt you'll reconnect me'. So I didn't sign it and walked out."

No court order, no verification. Plus, it seems like they are violating wiretapping laws by snooping the traffic of their customers to find out what they are sharing. I'd assume things would look pretty bad for them if a miffed customer drags them into court.

Microsoft: GPL violation didn't drive Linux donation

Found on The Register on Thursday, 23 July 2009
Browse Software

Microsoft is standing by its decision to release thousands of lines of code to the GPL, saying the decision wasn't based on a violation of the popular license.

It was the only reference to any violation of the GPL, meaning Microsoft has not tackled the original question of how it was in violation, why it happened, and what steps it has taken to prevent such an occurrence from happening in the future.

Still I wonder if this would have happened if the GPL violation wasn't involved.