-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
iPhone kill-switch
,----[ Quote ]
| Last weekend, Steve Jobs revealed that Apple has built a “kill-switch” into
| every iPhone to terminate any “malicious or inappropriate” programs that
| somehow got through their application screening process. Of course, nobody
| but Steve Jobs knows what “malicious or inappropriate” means, or who decides
| what qualifies, but this is just another way that Apple is showing the
| possible downside of a highly centralized and proprietary platform.
`----
http://freeculture.org/blog/2008/08/15/iphone-kill-switch/
Recent:
Another reason to love FOSS - Software Kill Switches
,----[ Quote ]
| One thing I hate above almost anything else is when a vendor tells you what
| you can and can't do with your software. That drives me bonkers. Sure, they
| wrote it and it's theirs to do with as they wish, but once they sell/give it
| to me, it's mine to do with as I see fit - within the confines of the
| software itself. Unceremoniously switching me off or making me pay more,
| forcing me to upgrade, stopping me from using the software, or making me bow
| to other ludicrous demands is just blatant power mongering and extortion. If
| they want me to do something, they had better have a really good reason why I
| should do it, and it had better not be "just because we want more money."
|
| So what brought on this little bout of ranting and bitterness? Well, several
| things really, but the biggest is the ever infamous software kill switch.
| It's been around for years, but really didn't start coming into its own until
| Windows Genuine Advantage (WGA) came onto the scene. Since then, proprietary
| vendors have looked at Microsoft's success with the Software Kill Switch and
| realized the money making potential of it. They also have seen the power it
| can give them and it's become an intoxicating drug to them.
`----
http://www.raiden.net/?cat=2&aid=438
Cryptome: NSA has access to Windows Mobile smartphones
,----[ Quote ]
| First time in history Cryptome.org has released information about the
| characteristics of NSA’s network surveillance.
`----
http://blogs.securiteam.com/index.php/archives/1028
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iEYEARECAAYFAkinedYACgkQU4xAY3RXLo4vUwCggwXuAT+W3Z2UdO1sJu9hk8MU
nekAoJ+U03sFUvWCvFdRqO2Z5gFFwPVj
=mhuV
-----END PGP SIGNATURE-----
|
|