As a long time Mac Rumors lurker, I do have to thank all of you for making these discussions so entertaining. I read through all the comments (unfiltered even for the posters I loathe), because amid all the hyperbole, fanboism, and pretzelled logic, a real sense of the issue emerges. It's almost like truth by gladiatorial combat.
I do have to say that some of the lengths people here go to try and prove their point! Why, it's like some of you think that if you just keep arguing the other person is going to give in and say you are right (hint: That never works and if you want proof read the forums). I'm not even going to get into Apple as a lifestyle choice; 'Freedom' vs 'Walled garden' and what control can be exercised over 'Open souce' (which is really a study in what the definition of 'open' means [much like 'is' is]). Use what works for you, bam.
So, thanks for posting. It's illuminating (and I love the chance to eat popcorn).
Details as I get them so far:
1 The Carrier IQ software is found on RIM, Symbian, Android, and iOS phones. Windows Phones are an unknown.
2 The CIQ software appears to be found only on phones with a Verizon and Sprint Pedegree.
3 The Android CIQ seems to be very poorly integrated and is logging every 'key' press (virtual or physical), but is not logging every screen motion.
4 The iOS implementation seems to be limited to simple usage pattern data and is not capable of recording keystrokes or other user input.
5 There is no 'opt-out' on Android
7 Custom Android ROMs do not contain the Carrier IQ software, and it is unclear if the same Android phone on a different carrier contain the software.
8 It is unclear what data is actually being sent to Carrier IQ's servers, despite what is being logged. On iOS the potential information is limited by what the program is logging in the first place. On Android, since the logged data pool is so much larger, the potential for compromised data is larger.
9 Even if the large amount of data that is logged on Android is not transmitted, there are security concerns about what can be recovered from the phone with physical access, and how much a security threat this poses to Android users. iOS appears to be immune from this as the gathering of this information can be turned off (usage and diagnostics).
10 There may be legal implications (HIPPA, wiretapping, UK consumer protection and privacy, etc...) regarding the gathering of user data without consent of the user, even if that data is not transmitted.