Your daily dose of technology

iSpy- Apple’s New Technology

Article first published as iSpy- Apple’s latest technology on Technorati.

So, you’re enjoying that shiny new Apple product, eh?
Showing it off to anyone who cares to listen to you, aren’t you?

Well, guess what?
Your sexy new iPad/iPhone is tracking each and every move of yours. Yes, you read that right. Your iDevice is secretly tracking your moves. So, don’t go off to places you aren’t supposed to! 😉

Till now, the only company under the scanner for tracking users, was Google. But now, the ‘oh-so-innovative’ Apple’s receiving the pressure. It now has to explain to its beloved users why their “cool” devices have been storing location data. The Privacy International Association has accused Apple of “astounding arrogance” over its “continued refusal to take part in any dialogue over privacy”.

Eric King of Privacy International said, “Apple thinks it knows better than the rest of the industry when it comes to privacy. Other companies have faced heavy sanctions recently and now the finger is being pointed at Apple. They cannot continually refuse to engage.”

But, what exactly does Apple do with all your data?

It’s building a location database. Apple had earlier said in a 2010 letter that

“These databases must be updated continuously to account for, among other things, the ever-changing physical landscape, more innovative uses of mobile technology, and the increasing number of Apple’s customers. Apple has always taken great care to protect the privacy of its customers.”

So, if you switch off “Location Services” in Settings, Apple will remove personally identifying information and will encrypt the data before transmitting it from your phone to its servers. But, the only problem here is that the data stays on the phone (in form of a file that can’t be viewed by the user) without the user’s consent. Once you connect your iPad/iPhone to your computer, the file is transferred onto the computer automatically.

If a hacker chances upon that file in your computer, he can simply use one of the many freely available software programs on the Internet to decode that weakly encrypted file and see your detailed itinerary.

The file can also be viewed by an application available for the iPhone/iPad.

The icing on the cake is Pete Warden’s (ex-Apple employee. Now, a British researcher) comment,”Apple has made it possible for almost anybody—a jealous spouse, a private detective—with access to your phone or computer to get detailed information about where you’ve been.”

It’s 1984 all over again, Steve!

Steve Jobs

Here‘s a copy of Privacy International’s letter to Steve Jobs.

The following is not related to the topic.. I found a striking similarity between Steve Jobs & ACP Pradyuman (of CID fame).

And the most striking similarity in their professions is also quite impressive! They both track people down! 😀


12 responses

  1. jessefogarty

    God love Blackberrys and their RIM servers 😛 good to know though no iphone for me till that’s no more.

    April 23, 2011 at 8:06 PM

    • Yup! As of now, BBs are the most secure devices! Even RIM doesn’t have access to the e-mail servers. I wonder what they’re going to do about that in the UAE & here, in India. To continue their service, RIM needs to give access to the government..which i hope they don’t. 😛

      April 23, 2011 at 8:11 PM

    ACP Pradyuman! XD

    April 23, 2011 at 8:26 PM

  3. Lolzz…ACP Pradyuman and Steve Jobs…ended the post quite well! They track people down!Sure they do 😛

    April 23, 2011 at 9:29 PM

    • Thanks, Upasana! 🙂

      April 23, 2011 at 10:39 PM

  4. you know who

    Hahahahahaha ACP praduman.. Hahaha
    Its really good 🙂

    April 23, 2011 at 10:22 PM

    • Thanks, Chaddi. 🙂

      April 23, 2011 at 10:31 PM

  5. Yaaash, I love your sense of humor 😀
    I hated tech, but you make it seem interesting. :O

    April 24, 2011 at 4:44 PM

    • Thanks, Deeya. 🙂

      April 25, 2011 at 9:19 AM

  6. Pingback: Apple Tries To Claim Innocence « GizmoGeek

  7. Pingback: Apple Finds Bugs in iOS -The DeviceSourceTheDeviceSource

What are your views on this post?

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s