Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Monopolistic practice bites hard in the ass, right Crapple?

Said by one who clearly has no clue what "monopolistic" means outside of a certain board game.

The Apple haters really need to polish up their logic. Apple can't use "monopolistic" practices if Android is selling more units in the aggregate & starting to kick's Apple's proverbial arse. So you guys need to get your story straight. Either there is a competitive market and Android is doing well, or Apple is the king of telephony and Android is unloved by consumers.
 
I am not surprised. The FBI and the other federal spooks (CIA,TSA,ICE, etc) do whatever they please, totally ignoring any law or Constitutional rule that they feel like. Considering how careless they are with their info, it's a wonder they are able to do anything at all. Spying and collecting data on anyone is considered perfectly legal these days.
 
Hopefully some severe punishment will be coming down for these "hackers", too.

There's been way too much of this garbage going around these days - why is it allowed to continue and how is this NOT cyber terrorism?
 
Double standard

I am a physician. If I "lose" medical information, as simple as patient name and my name, I am subject to a fine of $10,000 per name. There was a USA hospital where an administrator took 2,000 names home to do some work, left the folder on the subway, generated a $20,000,000 fine.
FBI loses a few million names, no problem!
 
The FBI has your social security numbers, fingerprints, and a ton of other sensitive information - UDIDs are the least of our worries.

I'm not American, has it been established that the UDIDs are only from Americans? I doubt that the FBI, the CIA, or the NSA has a lot of info on me.

4. The FBI retrieved evidence of a crime, then the laptop got nicked.

Sounds like incompetence not a crime.

If it's evidence from a crime, then it should have been locked up in evidence and not in some FBI agent's computer, or are you saying that somehow on it's way to being stored as evidence, the only laptop with this data was hacked? That hacker really should have bought a couple of lottery tickets, because he's a lucky guy (or girl).
Also, the evidence would have been on the original computer that would have been shut down, thus non accessible.

The response to 4 would be the response to 2a+b:
Should Apple be blamed for allowing devs collect and store this kind of information and/or sending the information so that it can be collected by a third party?
 
Good grief! Do they just collect stuff like this "just for the hell of it"?
Im guessing they consider iphone users to be some kind of threat! Lol

could they have been using smartphones as remote surveillance devices? isn't that possible?

I mean, it has a camera and mic. Pretty much all you need - and if you somehow gain control of it, you'd have eyes and ears EVERYWHERE.
 
someone send the story to this guy

rXRgz.jpg
 
WTF is the FBI doing with any of that info and why the hell are they not ENCRYPTING THEIR ****! Jesus. Have they not learned anything yet? JFC! ENCRYPT YOUR **** ALREADY!
 
What?! They don't use Macs??:eek:

In this particular case, it is irrelevant whether they were using a Windows PC or a Mac PC. The vulnerability was with Java which as of lately, affects both platforms. Had he been on a Mac with an un-patched and active Java environment, he would have been just as susceptible as on the Windows PC.
 
Yes Folks, Conspiracies Do Exist

Even more scary than the loss of the data is the fact that the Russian, er I mean U.S., government is spying on us.

Our taxpayer dollars at work, funding our so-called "government of the people for the people"....
 
In this particular case, it is irrelevant whether they were using a Windows PC or a Mac PC. The vulnerability was with Java which as of lately, affects both platforms. Had he been on a Mac with an un-patched and active Java environment, he would have been just as susceptible as on the Windows PC.

This just comes down to the fact that in modern days, it's not the platform thats the problem, it's the user and the precautions taken.

There's no reason for this to have been leaked. Even on windows. Documents like this should be on encrypted bitlocked drives at all times expect when in use.

They should also have their own form of encryption and the computer operator should not have ad this file so easily accessible on his machine.

he's in the FBI. he should know better.
 
What?! They don't use Macs??:eek:

Can you buy an Apple laptop without a built in microphone and camera?

How easy is it to buy an Apple laptop and then remove the built in microphone and camera yourself?

I'm unsure about buying practices when it comes to the FBI, but the DOD isn't buying Apple laptops for those reasons.

Any built in microphone or camera should be considered hot and a security threat.
 
I am not surprised. The FBI and the other federal spooks (CIA,TSA,ICE, etc) do whatever they please, totally ignoring any law or Constitutional rule that they feel like. Considering how careless they are with their info, it's a wonder they are able to do anything at all. Spying and collecting data on anyone is considered perfectly legal these days.

What bothers me is they use their illegal sovereign (we are the sovereigns not them BTW) and military power to gain access to this information, then through incompetence and ignorance and laziness (because they are above the law) put the information into a position of exploitation by parties who are otherwise barred from access by good security procedures of the original information holders.

This picking out certain skills for targeting for turning or criminalizing (extortion), is not limited to programmers. I have seen it in the chemistry, pyro, ballistics and ammunition fields and it probably happens in many others. The practice they report is real and is prevalent.

This isn't tin foil hat stuff, this is daily "work" stuff.

Rocketman
 
And yet (afawk), The RIMpire is still secure ;)

Tell that to people living in India and the UEA. And in London after the riots. RIM has a strong safe but they're still willing to give away the keys.

More importantly, Facebook, no matter what platform you're on, have a tool which allows staff to read anyone's private messages and grab their personal information.

If you want a secure way to communicate without any monitoring, hook up to a VPN and use Cryptocat.
 
This just comes down to the fact that in modern days, it's not the platform thats the problem, it's the user and the precautions taken.

There's no reason for this to have been leaked. Even on windows. Documents like this should be on encrypted bitlocked drives at all times expect when in use.

They should also have their own form of encryption and the computer operator should not have ad this file so easily accessible on his machine.

he's in the FBI. he should know better.

I agree with you, however except with the last statement. Just because he works for the FBI, doesn't make him tech savvy. Nonetheless, this should have been prevented. The agent in question may or may not be tech savvy, but should have had training and SOP to follow regarding data protection. Either he didn't have that, have enough of it or ignored it and subsequently the information was stolen.

I think there are too many unknown (to us) technical variables on this case to conclude precisely what went wrong that led to this leak.
 
Checking to see if you are on the list is pointless. It is a list of 1m items out of 12m collected in a single file associated with a single device. That means the FBI has similar files for other devices that were simply not on this laptop that was compromised.

The purpose for publishing the list was stated as causing people to ask questions of the FBI and other government agencies and POLITICIANS as to why this information was collected and distributed in the first place.

I can count on folks to entirely miss the point and get bogged down in side-bar issues, dribble, mocking, whining, and general internet tagging. I am a bit surprised we have not yet seen reference to Hitler, PowerBook G5 and snappier Safari. But then I just did. :D

Their published list of casualties of "war" reminded me of the one used by the propoganda machine licensed by the state:

images


Rocketman
 
Last edited:
Well, don't blame Apple for this, blame the one carrying those UDIDs unsecured and unprotected.

People flame Apple for the use of UDIDs while ignoring that every networkable device in existence has at least one unique MAC address that identifies it.

UDIDs have a purpose to exist, it's not Apple's fault that some give them a bad use.

----------

Mine isn't in the list. Guess I'm boring.

Use Ad Hoc Helper to look up your UDID if you don't have access to iTunes at the moment.

Sometimes is good to be boring. I'm boring too. :D
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.