Hackers Chomp Apple, but Who's the Bad Guy?
Hackers have already found a way into the newest iPhone software, just three months before it's officially launched to the public.
The new edition of the software is officially titled version 1.2, though will get the snazzier sounding '2.0' tag on its formal launch. Hackers got hold of the software because it's included in Apple's new Software Development Kit (SDK).
The main gripe between Apple and the hackers is that, while the firm encourages independent development of features to run on the phone, it wants tight control over how this is done. Apple is demanding they become the exclusive distributors of any new add-on features and will take a 30% cut of any sales.
Originally, Apple had wanted all developers to use the phone's built-in Safari web browser software to create new features. Developers said this wasn't enough to create impressive and useful applications and demanded access to the same software Apple's own staff use (included in the SDK). (Source: informationweek.com)
More than 100,000 people downloaded the SDK in the four days after its release, among them a hacking group calling themselves the iPhone Dev Team. They've already published pictures and video of their programs running on an iPhone with the 1.2 software. To do so theoretically requires a software license from Apple, but none have been released yet.
At the moment the hacked features only work on phones which have already been 'unlocked' to run on any phone network. But the hackers say they should soon be able to repeat the trick on an official AT&T-subscribed iPhone. (Source: modmyifone.com)
The case is a good example of how the traditional view of 'hacking' is outdated. The people behind this 'hack' aren't necessarily out to make a profit or cause any damage; instead they are trying to create useful features. The problem is that software firms like Apple argue that they need to control and restrict how independent developers use their technology: partly as a form of quality control for ordinary consumers, and partly to protect their own licensing deals.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.