Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
I think everyone is struggling with the difference between hardware and software. You know how you could use the side switch on an iPad to lock the screen rotation OR mute the device?

That was a hardware button with software designed around it to perform two different tasks based on your preference. Now... the only true "hardware" airplane mode would be to design a switch that actually cuts power to the various radios in the iPhone. There are many reasons why this would be difficult and problematic.

Now... A software "button" ... Like we have now, currently it is designed to turn off the radios. BUT, a compromised phone could easily tell it to do whatever we like, much like the iPad's old side button. You intercept the press of the button and you make it tweet out for a large pizza at Dominos. You can make it do anything, it's software. The KB articles tell you what an uncompromised phone does... But if your phone is hacked, it's going to do whatever it wants!

This case is separate and external, it's designed to tell you if your phone is still sending data. If it stays "dark" you haven't been compromised. It's the iPhone equivalent of putting a secret piece of tape on your door and checking it when you get home. If it's "broken" you have something to worry about.
 
Eventually one day I can see myself going back to no phone at all. I know it's a thought most can't comprehend. But I'm promising myself, little by little that I don't need a smart phone anymore.

I'm like this, but with pie. I know it's a thought most can't comprehend. But I'm promising myself, little by little, that I don't need pie anymore.
 
Because the case blocks it at a hardware level.
I think part of what he's getting at is. How do you know the case is blocking it. Sure, the manufacturer tells you it does. And? What proof is there? At the low end of the threat scale it could simply be high-priced, ineffective snake oil, but at the paranoid end of the scale, if I were a CIA type, making a case that supposedly blocked transmissions, while actually collecting data from the enclosed phone and passing it on, and then getting all the people most worried about the government listening in, to use said case? That'd be an epic caper.

I don't believe that's what's happening here. I'm not that paranoid. But if you are really worried about security, you have to consider these kinds of things.
 
Just to play devil's advocate: how do I trust this case if I can't trust airplane mode?
Trust is earned, not given.

On one hand, we have governments like those of the US, UK, and others who were shown to be spying on their own citizens.

On the other, we have an individual who exposed the first and fled in recognition of how the government treats those* who present classified information to the public, even if it is to expose wrongdoing by the government.

I know which I'd trust.

*unless you can convince the FBI to point all your violations, but say that you don't deserve even a slap on the wrist
 
  • Like
Reactions: Benjamin Frost
I think part of what he's getting at is. How do you know the case is blocking it. Sure, the manufacturer tells you it does. And? What proof is there? At the low end of the threat scale it could simply be high-priced, ineffective snake oil, but at the paranoid end of the scale, if I were a CIA type, making a case that supposedly blocked transmissions, while actually collecting data from the enclosed phone and passing it on, and then getting all the people most worried about the government listening in, to use said case? That'd be an epic caper.

I don't believe that's what's happening here. I'm not that paranoid. But if you are really worried about security, you have to consider these kinds of things.
The thing is, airplane mode doesn't claim to block GPS. Apple's documentation even says that GPS is on when you're in airplane mode in iOS 8.2 or later. Also what the article says: "Furthermore, airplane mode is a "soft switch" - the graphics on the screen have no essential correlation with the hardware state." It's easier to be sure about a dumb hardware-level block than it is to make sure no software (including malware) activates something.

That's what makes the case more trustworthy. You're only trusting one thing, not an entire OS with all kinds of software made by different people running on it. You're also trusting Snowden instead of Apple. If this case were a trap, anyone could check to see if the case were emitting EMR and call BS on it.
 
Last edited:
so we have a case that beeps at you ?

our phone already does that now.

Wrapping u'r phone in foil could be better, but you'd look silly holding a piece of wrapped foil up to you ear.. (aka use Bluetooth)

Seriously, though why a case to tell people that data is sent in Airplane mode over Wi-Fi?

Save the $$$ and turn off Wi-fi, while u'r in Airplane mode.. Simple solution.. But if u'r on Airline with Wi-fi on, chances are u'r using the phone anyway, so u know data is being sent.
 
Last edited:
The thing is, airplane mode doesn't claim to block GPS. Apple's documentation even says that GPS is on when you're in airplane mode in iOS 8.2 or later. ...

That's what makes the case more trustworthy. You're only trusting one thing, not an entire OS with all kinds of software made by different people running on it. You're also trusting Snowden instead of Apple. If this case were a trap, anyone could check to see if the case were emitting EMR and call BS on it.
So, to the first paragraph, I never said airplane mode does or should block GPS - in fact, I believe I pointed out in another post quite specifically that airplane mode needn't block GPS, because it's receive-only.

And, agreed, the case is only one thing to trust. I'm simply saying, if you're concerned about trust, maybe it's best to not blindly trust the case. Yes, someone could check the case to see if it is emitting EMR. But will they? The NSA got a number of insecurities into security-related code that was open source code, where the expectation is that "the code is secure, because, obviously, bad guys will be spotted, because anyone can look at the code." And yet they managed to weaken the code. "Even though everyone knows that open source is secure because everyone can look at it." Eh, I'm starting to repeat myself. I'll stop now. Just keep in mind, when being scared away from thing A towards thing B, that, once in a while, that's exactly what "they" want you to do. I don't think that's happening here. But if you're especially worried about security, verify everything.
 
I know this is gonna get flamed quick...

But this guy signed up for the job using fake credentials just to steal government information...
How can I trust such a guy for designing anything?
 
I had no idea GPS was on in Airplane Mode!
Logically I assumed that it should be; it's a one-way system and therefore receiving GPS signals shouldn't cause any interference. I actually tested it recently while on a plane and it was useful to see how far we'd travelled (but it only worked near the windows).
 
So, to the first paragraph, I never said airplane mode does or should block GPS - in fact, I believe I pointed out in another post quite specifically that airplane mode needn't block GPS, because it's receive-only.

And, agreed, the case is only one thing to trust. I'm simply saying, if you're concerned about trust, maybe it's best to not blindly trust the case. Yes, someone could check the case to see if it is emitting EMR. But will they? The NSA got a number of insecurities into security-related code that was open source code, where the expectation is that "the code is secure, because, obviously, bad guys will be spotted, because anyone can look at the code." And yet they managed to weaken the code. "Even though everyone knows that open source is secure because everyone can look at it." Eh, I'm starting to repeat myself. I'll stop now. Just keep in mind, when being scared away from thing A towards thing B, that, once in a while, that's exactly what "they" want you to do. I don't think that's happening here. But if you're especially worried about security, verify everything.
But, due to its simplicity, the case is a lot easier to check than some big pile of source code. This thing can't be much more than two wires plus a voltmeter. It's much harder to get away with a device advertised as an EMR detector not detecting EMR.
[doublepost=1469232439][/doublepost]
Logically I assumed that it should be; it's a one-way system and therefore receiving GPS signals shouldn't cause any interference. I actually tested it recently while on a plane and it was useful to see how far we'd travelled (but it only worked near the windows).
Speaking of that, it's funny that they don't allow FM radios on airplanes. Those are also receive-only.
 
so we have a case that beeps at you ?

our phone already does that now.

Wrapping u'r phone in foil could be better, but you'd look silly holding a piece of wrapped foil up to you ear.. (aka use Bluetooth)

Seriously, though why a case to tell people that data is sent in Airplane mode over Wi-Fi?

Save the $$$ and turn off Wi-fi, while u'r in Airplane mode.. Simple solution.. But if u'r on Airline with Wi-fi on, chances are u'r using the phone anyway, so u know data is being sent.

Wifi is also a software button... if your phone is compromised, the hacker just turns it back on (or never turns it off in the first place)
 
The conspiracy wing nuts are going to LOVE this. I hope it comes with a little tin foil hat and spray bottle of vinegar (to protect from "chem trails")

You know, maybe if I was some sort of secret spy or high ranking political figure with valuable info or rouge military traitor looking to sell info to Russia- looking to evade government monitoring, etc it would be great. But as an everyday person I see zero use for this. The government is gonna do their thing. I don't like it at all from a privacy standpoint, but I'm not going to go crazy out of my way when I am a law abiding citizen.

To monitor the phone for a hack/malware installed (presumably by the government?) that first tricks you into thinking you're in airplane mode but not and then sucks info out of your iPhone. I don't think the majority of people regularly use airplane mode unless on an airplane.

Isn't the power button technically a soft button- or at least semi-soft (hold for 10sec to force off). You think you swiped right to turn off your phone? Think again!

Anyways, it's great to see Mr. Snowden is making the best of his time in Russia. He must be desperate to be catering to the untreated paranoid schizoids of the world. If you want to go off the grid, don't use a cell phone.
 
Looks like Snowden is looking for work.

Anyone who "needs" this, doesn't need a phone. If your life depends on not being tracked....don't take electronics with you. There is no reason to trust any phone that you can't take the battery out of. If you have to disable a phone....why take it?

Some simple solutions:
1. Dont carry a phone
2. Remove the battery (use a phone with removable battery
3. RF blocking bag/case

I don't trust Snowden anymore than I trust a guy selling watches on the streets of NYC. Despite how you feel about him and his intentions....he did steal our countries data, gave it to everyone, and then flew to Russia with it.

You need to read (and think) a little bit more. :)

Edit: I see several users approving your comment. It's not difficult to understand why your country is so "messed" up nowadays.
 
News: Snowden attempts to be relevant by telling somebody it'd be cool if a device could detect whether WiFi is turn on when it's actually turned off.

Usefulness... 0.
[doublepost=1469262808][/doublepost]
Looks like Snowden is looking for work.

Anyone who "needs" this, doesn't need a phone. If your life depends on not being tracked....don't take electronics with you. There is no reason to trust any phone that you can't take the battery out of. If you have to disable a phone....why take it?

Some simple solutions:
1. Dont carry a phone
2. Remove the battery (use a phone with removable battery
3. RF blocking bag/case

I don't trust Snowden anymore than I trust a guy selling watches on the streets of NYC. Despite how you feel about him and his intentions....he did steal our countries data, gave it to everyone, and then flew to Russia with it.

Agreed 100%. Useless idea, untrustworthy source.

FWIW (I repeat this every time that Snowden comes up)... legends aside, Snowden was just an IT contractor working as a network admin. He was not some top-ranking spy gone rogue. Somebody (probably Assange) was able to radicalise him and convince him to steal data from him workplace. All he did was steal a backup HD from work... this does not make him an elite security expert.
 
  • Like
Reactions: Cineplex
News: Snowden attempts to be relevant by telling somebody it'd be cool if a device could detect whether WiFi is turn on when it's actually turned off.

Usefulness... 0.
[doublepost=1469262808][/doublepost]

Agreed 100%. Useless idea, untrustworthy source.

FWIW (I repeat this every time that Snowden comes up)... legends aside, Snowden was just an IT contractor working as a network admin. He was not some top-ranking spy gone rogue. Somebody (probably Assange) was able to radicalise him and convince him to steal data from him workplace. All he did was steal a backup HD from work... this does not make him an elite security expert.
His story is either truth, he was a tool in a bigger operation, or he was a spy. Either way....what qualifies him to make security devices? He can install Windows XP and remove spyware?
 
  • Like
Reactions: djgamble
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.