×
Cellphones

Carmack & Mustaine Talk Doom Resurrection For the iPhone 57

themacgamer writes "Luis Sosa had a chance to sit down with John Carmack and Tom Mustaine of id Software and discuss Doom Resurrection for the iPhone: 'At the start we thought it was just a touch screen, so you'd tap to shoot the monsters, but it was never fun; it felt too clinical. It didn't feel like you were swinging your heavy gun around to bring down the monster before he chews off your head,' said Carmack. Mustaine added, '[The shooting mechanic] was definitely a trial-and-error thing. You said the word "distilled," and that's definitely a word we've been using. We really wanted to distill the visceral Doom experience into the iPhone.' He also said, '... we have P2P co-op play that's not in the shipping version, but will come later. We didn't expect the 3.0 OS out so quickly! Two players join together, they see each other's cursors, and they either compete or co-op for a score. We're hoping to patch it in down the road. We're also looking at additional levels and potentially some stat-tracking stuff as well.'"
Security

Apple Keyboard Firmware Hack Demonstrated 275

Anonymouse writes with this excerpt from SemiAccurate: "Apple keyboards are vulnerable to a hack that puts keyloggers and malware directly into the device's firmware. This could be a serious problem, and now that the presentation and code (PDF) is out there, the bad guys will surely be exploiting it. The vulnerability was discovered by K. Chen, and he gave a talk on it at Black Hat this year (PDF). The concept is simple: a modern Apple keyboard has about 8K of flash memory, and 256 bytes of working RAM. For the intelligent, this is more than enough space to have a field day. ... The new firmware can do anything you want it to. Chen demonstrated code which, when you put in a password and hit return, starts playing back the last five characters typed in, LIFO. It is a rudimentary keylogger; a proof of concept more than anything else. Since there is about 1K of flash free in the keyboard itself, you can log quite a few keystrokes totally transparently."
Government

FCC Probing Apple, AT&T Rejection of Google Voice 204

suraj.sun writes with an update to the news from a few days ago about Apple pulling Google Voice apps for the iPhone. Their actions have raised the interest of the FCC, which is now beginning an investigation into the matter. "In a letter sent to Apple, the FCC asked the company why it turned down Google Voice for the iPhone and pulled several other Google Voice-related programs from the iPhone's only sanctioned online mart. The FCC also sent similar letters to both AT&T — Apple's exclusive carrier partner in the US — and Google, asking both firms to provide more information on the issue. The FCC's letter asked Apple whether it rejected Google Voice and dumped other applications on its own, or 'in consultation with AT&T,' and if the latter, to describe the conversations the partners had. In other questions, the FCC asked Apple whether AT&T has any role in the approval of iPhone applications, wants the company to explain how Google Voice differs from any other VoIP software that has been approved, and requested a list of all applications that have been rejected and why."
Businesses

Apple and the Scalability of Secrecy 155

RobotsDinner writes "Anil Dash has a thoughtful exploration of Apple's notorious devotion to secrecy, and argues that not only is there a limit to its feasibility, but that recent events show Apple has reached that limit already. 'If the ethical argument is unpersuasive, then focus on the long-term viability of your marketing and branding efforts, and realize that a technology company that is determined to prevent information from being spread is an organization at war with itself. Civil wars are expensive, have no winners, and incur lots of casualties.'"
Cellphones

SMS Hack Could Make iPhones Vulnerable 254

mhx writes "A single character sent by text message could allegedly compromise every iPhone released to date. The technique involves sending only one unusual text character or else a series of 'invisible' messages that confuse the phone and open the door to attack. Apple has not released any updates yet, so little can be done, except to power off your iPhone to avoid being hacked."
Image

iPhone App Tracks Sex Offenders Screenshot-sm 358

The Narrative Fallacy writes "All 50 states in the US require the 50,000 people convicted of sexual offenses to sign a register so that their whereabouts can be tracked and monitored. The Telegraph reports that now users of the iPhone Offender Locator application can search for sex offenders living nearby a friend or colleague whose address is stored in their Apple iPhone address book, or they can type in a street address to generate a list of convicted sex offenders in the local area. 'Offender Locator gives everyone the ability to find out if registered sex offenders live in their area,' says the application developer, ThinAir Wireless, on its iTunes page. 'Knowledge equals safety. They know where you and your family are...now it's time to turn the tables so that you know where they live and can make better decisions about where to allow your kids to play.' Offender Locator uses the iPhone's built-in GPS to pinpoint the user's location, and then provide a map listing sex offenders in the local area. Tapping on one of the 'pins' dropped on to the map brings up a photograph of the offender, as well as their address, date of birth and list of convictions."
Cellphones

Apple Says iPhone Jailbreaking Could Hurt Cell Towers 495

AHuxley writes "Apple suggests that the nation's cellphone networks could be open to 'potentially catastrophic' cyberattacks by iPhone-using hackers at home and abroad if iPhone owners are permitted to legally jailbreak their wireless devices. The Copyright Office is currently considering a request by the Electronic Frontier Foundation to legalize the widespread practice of jailbreaking. Apple has responded to the request by saying that if the 'baseband processor' software — which enables a connection to cell phone towers — is exposed, then a user could crash the tower software, or use the Exclusive Chip Identification number to make calls anonymously. Apple also thinks its closed business model is what made the iPhone a success. The Vodafone scandal from a few years back showed how a network could be compromised, but that was from within. So, what do you think? Is Apple playing the 'evil genius' hacker card or can 'anyone' with a smartphone and a genius friend pop a US cell tower?"
Communications

Apple Kills Google Voice Apps On the iPhone 541

molnarcs writes "Apple pulls Google Voice-enabled applications from its App Store, citing duplication of functionality. The move affects both Google's official Google Voice and third party apps like Voice Central. Sean Kovacs, main developer of GV Mobile, says that he had personal approval for his app from Phil Shiller, Apple's senior vice president of Worldwide Product Marketing, last April. TechCrunch's Jason Kincaid suspects AT&T behind the move."
Google

Google Latitude Arrives For the iPhone — As a Web App 195

An anonymous reader writes "After months of waiting, the Google Latitude social maps service finally arrived for the iPhone ... but thanks to an Apple rejection of the natively developed app, it's a web app. Says Google on their blog, 'We worked closely with Apple to bring Latitude to the iPhone in a way Apple thought would be best for iPhone users. After we developed a Latitude application for the iPhone, Apple requested we release Latitude as a web application in order to avoid confusion with Maps on the iPhone.' But it gets worse for iPhone users: 'Unfortunately, since there is no mechanism for applications to run in the background on iPhone (which applies to browser-based web apps as well), we're not able to provide continuous background location updates in the same way that we can for Latitude users on Android, BlackBerry, Symbian and Windows Mobile.' Latitude has been sprouting new features lately and is an interesting take on social networking, but it looks like Apple is determined to ensure its users only get a seriously crippled implementation compared to the Android and WinMo versions. PC World put it less politely than Google did, saying, 'Google's new Latitude Web app for iPhone is so hamstrung that Apple customers may be wishing they had a BlackBerry or Android handset instead.'"
Security

AVG Update Breaks iTunes 185

nate_in_ME writes "After getting a positive from the AVG virus detector while playing music on iTunes just a few minutes ago, I did a bit of research. It appears that AVG has recently pushed an update to the virus definitions that flags every iPod/iTunes related file as being infected with the 'Small.BOG' trojan. Interestingly enough, AVG does not have any information on this particular virus in their virus encyclopedia. Discussion on the Apple forum is up to 4 pages and climbing. One user there had an interesting thought: 'Maybe Palm has some shares in AVG...MUAHAAAA!!' (on page 3)."
The Almighty Buck

Apple Dominates "Premium PC" Market 475

itwbennett writes "Macs made up a whopping 91 percent of the $1,000-and-up computer market in June. Not so long ago, $1,000 got you an entry-level machine. Today the average computer sells for $701, while the average Windows machine sells for only $515. Still, Macs only make up 8.7% of PC sales. But is that really such a bad position to be in? Consider an Apples to Apples, that is, Macs to iPhones comparison: the iPhone takes only a sliver of the phone market but a much larger share of the profits."
Security

iPhone 3Gs Encryption Cracked In Two Minutes 179

An anonymous reader writes "In a Wired news article, iPhone Forensics expert Jonathan Zdziarski explains how the much-touted hardware encryption of the iPhone 3Gs is but a farce, and demonstrates how both the passcode and backup encryption can be bypassed in about two minutes. Zdziarski also goes on to say that all data on the iPhone — including deleted data — is automatically decrypted by the iPhone when it's copied, allowing hackers and law enforcement agencies alike access the device's raw disk as if no encryption were present. A second demonstration features the recovery of the iPhone's entire disk while the device is still passcode-locked. According to a similar article in Ars Technica, Zdziarski describes the iPhone's hardware encryption by saying it's 'like putting privacy glass on half your shower door.' With the iPhone being sold into 20% of Fortune-100s and into the military, just how worried should we be with such shoddy security?"
Government

Could the Cloud Derail a $300 Million Data Center? 109

1sockchuck writes "The cloud computing debate has come into focus for taxpayers in Washington state, where a proposed $300 million project to build a data center in Olympia for the state's IT operations is coming under scrutiny. Two legislators are urging the state to shift applications to the cloud instead, noting that two of the largest cloud computing providers (Microsoft and Amazon) are based in the state. The critics say the data center project is driven by an interest in local construction and 'fails to seriously explore the larger strategic question facing government technology today.'"
Censorship

Apple Backs Off DMCA Threats Against Wiki 143

netbuzz writes "A wiki operator who was pressured by Apple's legal team into removing anonymous discussions about circumventing the company's music-playback software for iPods and iPhones says he is relieved that Apple has backed off and he'll be able to restore the disputed material. Apple dropped its claims of copyright and DMCA violation against BluWiki only under legal pressure of its own in the form of a lawsuit by the Electronic Frontier Foundation."
Portables (Apple)

FOIA Documents Detail iPods Overheating, Catching Fire 314

suraj.sun passes along a report from a Seattle TV station that has been investigating reports of Apple iPods overheating and bursting into flames. "An exclusive KIRO 7 Investigation reveals an alarming number of Apple brand iPod MP3 players have suddenly burst into flames and smoke, injuring people and damaging property. It's an investigation that Apple has apparently been trying to keep out of the public eye. It took more than 7 months for KIRO 7 Consumer Investigator Amy Clancy to get her hands on documents concerning Apple's iPods from the Consumer Product Safety Commission because Apple's lawyers filed exemption after exemption. In the end, the CPSC released more than 800 pages which reveal, for the very first time, a comprehensive look that shows, on a number of occasions, iPods have suddenly burst into flames, started to smoke, and even burned their owners. ... Apple refused to comment, and refused to answer all of the other questions [the reporter] has been asking of the company since November."
Cellphones

Chinese Employee Loses iPhone Prototype, Kills Self 514

tlhIngan writes "Physical intimidation of a Foxconn employee, 25 year-old Sun Danyong, and a possibly-illegal search of his house may have led to suicide after an iPhone prototype in his possession was lost. Foxconn is Apple's long-time manufacturing partner for the iPhone. Entrusted with 16 iPhone prototypes, Danyong discovered that one was missing and searched the factory for it. When it didn't turn up, he reported the incident to his boss, who ordered his apartment searched. There are reports of physical intimidation by Foxconn security personnel. This ended tragically on Thursday at 3 AM, when Danyong jumped from his apartment building to his death." VentureBeat notes that "Apple exerts immense pressure on its business partners [to] help it maintain secrecy." An Apple spokesperson said this to CNet: "We are saddened by the tragic loss of this young employee, and we are awaiting results of the investigations into his death. We require our suppliers to treat all workers with dignity and respect."
Cellphones

How Apple's App Review Is Sabotaging the iPhone 509

snydeq writes to recommend Peter Wayner's inside look at the frustration iPhone developers face from Apple when attempting to distribute their apps through the iPhone App Store. Wayner's long piece is an extended analogy comparing Apple to the worst of Soviet-era bureaucracy. "Determined simply to dump an HTML version of his book into UIWebView and offer two versions through the App Store, Wayner endures four months of inexplicable silences, mixed messages, and almost whimsical rejections from Apple — the kind of frustration and uncertainty Wayner believes is fast transforming Apple's regulated marketplace into a hotbed of bottom-feeding mediocrity. 'Developers are afraid to risk serious development time on the platform as long as anonymous gatekeepers are able to delay projects by weeks and months with some seemingly random flick of a finger,' Wayner writes of his experience. 'It's one thing to delay a homebrew project like mine, but it's another thing to shut down a team of developers burning real cash. Apple should be worried when real programmers shrug off the rejections by saying, "It's just a hobby."'"
Cellphones

Staying Afloat In a Sea of iPhone Apps 149

Burnsy writes "During all the hype of Apple celebrating its 1.5 billion iPhone App Store downloads, some good advice on how to be successful and stand out in the App Store came out. One story describes how developers are increasingly coming up with various strategies to make a splash, employing everything from temporary discounts to guerilla marketing tactics. On the other hand, some successful developers, such as the creator of the Flight Control app, which has been the number one selling app in 20 countries, talk about the pitfalls of Apple's approval process for the App Store. They say it can take a developer up to three months to get an application approved and distributed on the App Store and that maybe the iPhone bubble is soon to burst." A related story at Wired points out that the games category — already crowded with over 13,000 entries — is getting even more competitive as the major game publishers push into the market.
Cellphones

Tracking a Move Via "Find My iPhone" 216

dmolnar writes "I recently helped my girlfriend move her stuff from Chicago, IL to Oakland, CA. The movers were scheduled to arrive at 8AM on the 5th of July, and we were stressing the day before about all the things that could go wrong with a move. We realized that if we knew where her stuff was, it'd make us feel better. This is a story about using the $99 iPhone to track the move ... and about a somewhat surprising potential use of Find My iPhone to track your friends' iPhones without them noticing."

Slashdot Top Deals