-
All replies
-
Helpful answers
-
Jan 29, 2014 1:06 PM in response to Lawrence Finchby IdrisSeabright,Lawrence Finch wrote:
You do realize that the ONLY way to get points is to have the original poster of a question click a button that says a response helped them, or solved their problem. 10 points for "solved", 5 for "helpful". This means, for example, that between 1,230 and 2,460 people with problems have said that Ralph Landry1 solved their problem or helped them. Which puts him in the "very knowledgeable" category if he helped that many people. And this does not include anyone he helped who posted to an existing thread; those don't count for points.
Or all those times that people don't remember or know to award solved points. Some time ago, someone calculated that points were awarded about 20% of the time (if I recall correctly).
-
Feb 11, 2014 5:42 PM in response to viperman17by waffleme3,every one has their own oppoins on how ios 7 is better or worse ( it is worse in my opinion ) if you dont like it find a new iphone of ebay or whatever with ios 6 or just not get an iphone in general and get an android.
-
Feb 12, 2014 11:20 PM in response to viperman17by peparkakor,I didn't like the iOS7 either but then quickly got used to it. Sorry to say that but it is now iOS6 that looks like a toy.
And yes, there are solutions like changing the looks of iOS7 to iOS6. If that is all you want you might search in another forums..
-
Feb 22, 2014 6:58 PM in response to viperman17by SorryIdidit,I held off upgrading until Apple's big security screw-up. Now that I was forced into it, I am truly sorry that I did it. The new look and screens are absolutely horrible.
-
Feb 22, 2014 10:31 PM in response to SorryIdiditby Chris CA,SorryIdidit wrote:
I held off upgrading until Apple's big security screw-up.
What "big security screw-up"?
-
-
Feb 23, 2014 2:21 AM in response to David Shanahanby SPQR42,Remember it was on all the media about Edward Snowden leaked files and that the NSA was able to tap into every iphone with ease this might have been the way the done it
-
-
Feb 23, 2014 8:56 PM in response to SPQR42by Chris CA,SPQR42 wrote:
Remember it was on all the media about [snip] and that the NSA was able to tap into every iphone with ease
The story was they had a program that they could tap a phone if they had "close access methods" to it and that they were working on ways to access phones remotely.
Nothing was written that they could "tap into every iphone with ease".
-
Feb 24, 2014 2:47 AM in response to David Shanahanby FelipeV,David Shanahan wrote:
Big Security Screwup: http://arstechnica.com/security/2014/02/extremely-critical-crypto-flaw-in-ios-ma y-also-affect-fully-patched-macs/
Which was patched within 24 hours.
-
Feb 24, 2014 4:40 AM in response to FelipeVby David Shanahan,Hardly, the bug's been in iOS since 6.0 (over 18 months), and in OS X since 10.9 was released (5 months, and still not patched there). That's a lot longer than 24 hrs!
Then there is the very real possibility that this is the very bug (or one of them at least) that the NSA have been exploiting to pwn iPhones: http://daringfireball.net/2014/02/apple_prism
There's no sugar coating this, it's a big and very embarrasing security screwup.
But the good news is that Apple have found it and fixed it. I suspect they've been conducting an intesive code audit and penetration testing program ever since the news that the NSA are routinely pwning iPhones was leaked by Edward Snowden and this is one of the results (unlike many of their earlier security bugs this one credits no outsiders for finding/reporting it, it looks like they found this one themselves). I'd love to know how many other companies are trying to solve their "PRISM problem" like this, I suspect the number is not very large.
-
Feb 24, 2014 5:14 AM in response to David Shanahanby Lawrence Finch,It'w worthwhile to take the time to understand the flaw that was patched. It allowed "man in the middle" (MITM) attacks that would permit an eavesdropper to read SSL encrypted communications IF they were over an otherwise unsecured link such as a public WiFi hotspot. The flaw allowed access to communications to secure sites and email. It is NOT a gateway to hack into an iDevice or a Mac. The devices are still secure. And it would not affect anyone on their home or corporate network. There was also no evidence that this flaw was being exploited "in the wild".
-
Feb 24, 2014 5:37 AM in response to Lawrence Finchby IdrisSeabright,Thanks for that clarification, Lawrence.
-
Feb 24, 2014 5:42 AM in response to IdrisSeabrightby Ralph Landry1,Hi Meg,
Larry gives a good summary of what "the sky is falling" really means...there is a lot of misinformation about the purpose of SSL and TLS and what a flaw does. Larry does a good job of pointing out that it does not mean the device is vulnerable but, rather, the communication is not necessarily secure. And, as we all keep saying, you go on an unsecure public wireless you takes your chances.
Ralph
-
Feb 24, 2014 5:59 AM in response to Ralph Landry1by IdrisSeabright,You and Larry are so often the voices of reason. It's all to easy to be sucked into media panic.