thejapantimes, to business
@thejapantimes@mastodon.social avatar

Apple has renewed discussions with OpenAI about using the startup’s technology to power some new features coming to the iPhone later this year, sources have said. https://www.japantimes.co.jp/business/2024/04/27/tech/iphone-openai-ai-features/

cs, to China
@cs@mastodon.sdf.org avatar

bans government officials from using for work, Wall Street Journal reports | Reuters

https://www.reuters.com/world/china/china-bans-govt-officials-using-iphone-work-wsj-2023-09-06/

Nonilex, to apple
@Nonilex@masto.ai avatar

sues , saying it keeps users locked into its

One of the world's richest companies is now under fire from the govt. & 16 states filed a against the Silicon Valley giant on Thurs, accusing the company of abusing its as a to edge out rivals & ensure customers keep using its products.


https://www.npr.org/2024/03/21/1239802162/apple-iphone-doj-monopoly-antitrust-lawsuit

Nonilex,
@Nonilex@masto.ai avatar

The lawsuit centers around claims that #Apple stopped smaller companies from accessing the #hardware & #software in its #iPhones, which led to fewer options for #consumers.

Apple is worth ~$3T, making it one of the highest valued cos in the world. & its iPhone is one of the most popular phones on earth, dominating the global #market, acc/to market analyst firm IDC. The #DOJ alleges it's by no coincidence that Apple was able to ensure its place at the top.

#law #antitrust #monopoly #ios #tech

governa, to apple
@governa@fosstodon.org avatar
itnewsbot, to keyboards
@itnewsbot@schleuss.online avatar

Clicks is a $139 iPhone case for people who hate touchscreen typing - There's an app for the keyboard promising new features, but it's not ma... - https://arstechnica.com/?p=1993862

redezem, to apple
@redezem@aus.social avatar

Listening to the most recent #SecurityNow podcast, and aw jees #Apple, why are you implementing super secret hardware backdoors in #iPhones? Why have you been doing it for like 5 years now?

Seriously though if you’re even vaguely security interested, go listen to the podcast. It’s mind boggling, and smacks of S tier state actor interference at a manufacturing level. I’ve attached a link to the notes for those who don’t have time.

https://www.grc.com/sn/SN-955-Notes.pdf

Mer__edith, to random
@Mer__edith@mastodon.world avatar

This paper is really important, presenting empirical evidence of the imbrication bet. AI & the surveillance biz model. This is notable particularly given that most production surveillance tech is proprietary, its existence and use hidden from the public.

https://arxiv.org/abs/2309.15084?ref=404media.co

kkarhan,
@kkarhan@mstdn.social avatar

@Mikal @Mer__edith OFC not.

Vote for people who are against and if they don't exist, candidate!

Refuse to participate in to the maximum extent possible!!

Noone forces you to use (i.e. ) or buy or devices...

And if you need help finding , sites like @alternativeto / https://alternativeto.net exist that allow you to filter for what you want...

thenewoil, to apple
mattotcha, to random
@mattotcha@mastodon.social avatar
remixtures, to Cybersecurity Portuguese
@remixtures@tldr.nettime.org avatar

: "Today, on December 27, 2023, we (Boris Larin, Leonid Bezvershenko, and Georgy Kucherin) delivered a presentation, titled, “Operation Triangulation: What You Get When Attack iPhones of Researchers”, at the 37th Chaos Communication Congress (37C3), held at Congress Center Hamburg. The presentation summarized the results of our long-term research into Operation Triangulation, conducted with our colleagues, Igor Kuznetsov, Valentin Pashkov, and Mikhail Vinogradov.

This presentation was also the first time we had publicly disclosed the details of all exploits and vulnerabilities that were used in the attack. We discover and analyze new exploits and attacks using these on a daily basis, and we have discovered and reported more than thirty in-the-wild zero-days in Adobe, Apple, Google, and Microsoft products, but this is definitely the most sophisticated attack chain we have ever seen."

https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/

governa, to random
@governa@fosstodon.org avatar
itnewsbot, to security
@itnewsbot@schleuss.online avatar

4-year campaign backdoored iPhones using possibly the most advanced exploit ever - Enlarge (credit: Tero Vesalainen)

Researchers on Wednesday pre... - https://arstechnica.com/?p=1992873 #operationtriangulation #security #iphones #malware #spyware #biz#apple #0day

governa, to apple
@governa@fosstodon.org avatar
drfyzziks, to android
@drfyzziks@makervine.net avatar

If you want secure messaging between and phones, don’t use . Seriously, don’t do it. There are other, better and more reliable options out there (cough Signal cough).

I've used Beeper (w/a test Apple account) & liked it. However after the recent kerfuffle around Beeper Mini, I deleted the app b/c I didn't like how Beeper handled things (adding devices to my iCloud account & unregistering a phone number, both w/o my permission)

Glad it was a test account / number.

governa, to apple
@governa@fosstodon.org avatar

: Hackers Might Be Exploiting This WebKit Flaw to Attack :apple_inc:

Apple releases a patch to fix two actively exploited bugs in WebKit, the browser engine for .

https://www.pcmag.com/news/apple-hackers-might-be-exploiting-this-webkit-flaw-to-attack-iphones

TransportOnline, to iPhone Dutch
@TransportOnline@mastodon.nl avatar
SharonCummingsArt, to iPhone
@SharonCummingsArt@mastodon.social avatar
SharonCummingsArt, to iPhone
@SharonCummingsArt@socel.net avatar
governa, to iOS
@governa@fosstodon.org avatar
Verfassungklage, to ios17 German

Per :

kann in der Nähe abstürzen lassen.

Bisher beschränkt sich der Angriff auf . Dass sich bald auch andere Geräte zum Absturz bringen lassen, ist aber nicht auszuschließen. ...

https://www.golem.de/news/per-bluetooth-flipper-zero-kann-iphones-in-der-naehe-abstuerzen-lassen-2311-179071.html

remixtures, to Cybersecurity Portuguese
@remixtures@tldr.nettime.org avatar

: "Three years ago, Apple introduced a privacy-enhancing feature that hid the Wi-Fi address of iPhones and iPads when they joined a network. On Wednesday, the world learned that the feature has never worked as advertised. Despite promises that this never-changing address would be hidden and replaced with a private one that was unique to each SSID, Apple devices have continued to display the real one, which in turn got broadcast to every other connected device on the network.

The problem is that a Wi-Fi media access control address—typically called a media access control address or simply a MAC—can be used to track individuals from network to network, in much the way a license plate number can be used to track a vehicle as it moves around a city. Case in point: In 2013, a researcher unveiled a proof-of-concept device that logged the MAC of all devices it came into contact with. The idea was to distribute lots of them throughout a neighborhood or city and build a profile of iPhone users, including the social media sites they visited and the many locations they visited each day."

https://arstechnica.com/security/2023/10/iphone-privacy-feature-hiding-wi-fi-macs-has-failed-to-work-for-3-years/

BenjaminHCCarr, to Russia
@BenjaminHCCarr@hachyderm.io avatar
cjgyt, to australia
@cjgyt@mastodon.xyz avatar

The idea of #YouTubers flying to #Australia to unbox #iPhones a day or two earlier seems utterly insane to me, especially when a lot of these same reviewers will just complain that the phones are minor incremental updates. Is chasing views and the #emissions associated with global travel just for this actually worth it?

og, to random

Well looks like all are all on backorder November delivery

Looks like I'll hop onto my my wife's phone while I need to trade in my

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • hgfsjryuu7
  • everett
  • ethstaker
  • magazineikmin
  • Durango
  • DreamBathrooms
  • Youngstown
  • slotface
  • InstantRegret
  • PowerRangers
  • mdbf
  • kavyap
  • rosin
  • normalnudes
  • ngwrru68w68
  • vwfavf
  • GTA5RPClips
  • modclub
  • thenastyranch
  • tacticalgear
  • cisconetworking
  • khanakhh
  • osvaldo12
  • tester
  • cubers
  • Leos
  • provamag3
  • All magazines