Corellium, a cybersecurity startup that sells phone-virtualization software for catching security bugs, offered or sold its tools to controversial government spyware and hacking-tool makers in Israel, the United Arab Emirates, and Russia, and to a cybersecurity firm with potential ties to the Chinese government, according to a leaked document reviewed by WIRED that contains internal company communications.
The 507-page document, apparently prepared by Apple with the goal of using it in the company’s 2019 copyright lawsuit against Corellium, shows that the security firm, whose software lets users perform security analysis using virtual versions of Apple’s iOS and Google’s Android, has dealt with companies that have a track record of selling their tools to repressive regimes and countries with poor human rights records.
[...]
For years Corellium has painted itself as a crucial defender against software bugs on Android and iOS. But the leaked document shows that Corellium worked with several companies that use bugs and exploits to hack into cell phones, as opposed to helping Google and Apple patch vulnerabilities.
What we’ve seen in recent years are efforts to make the iPad more powerful, more helpful in more usage scenarios. But the expanded utility has come at a price: The iPad has become more complex and, in the latest salvo of hardware and software announcements, more Mac-like.
Given his exhortation to Tim Cook and his team use their own judgment, it might be inappropriate to wonder what Steve Jobs would think of the current iPad line, but one has to wonder about the loss of simplicity that Steve gave the device. The iPad’s recent creeping “Mac envy”, the abandonment of intuitive intelligibility for dubious “productivity” features reminds one of the proverbial Food Fight Product Strategy: Throw everything at the wall and see what sticks.
On Twitter, security researchers Tommy Mysk and Talal Haj Bakry have found that Apple’s device analytics data includes an ID called “dsId,” which stands for Directory Services Identifier. The analysis found that the dsId identifier is unique to every iCloud account and can be linked directly to a specific user, including their name, date of birth, email, and associated information stored on iCloud.
Everyone has their own way of dealing with grief and the mental fog of the past three years. But if, like me, you’ve been scrambling for a way to organize your time, this is a free, widely available tool to try. You don’t have to use the one I do or follow the Pomodoro Technique to the letter. (I definitely don’t.) You could use an actual kitchen timer or an app on your phone. But sometimes, you just need a little push. Tomato timers are great for that.
The Mac App Store is a treasure trove of fun puzzle games if you know which ones to pick. But we did some digging and saved you some time by making a list of our favorite ones.
The chaos tax isn't just coming in with Twitter losing some adveritsers, but also with the company losing some users. The latest seems to be Apple's Phil Schiller, who has deactivated his Twitter account. While this doesn't automatically have to mean that Twitter is in trouble with Apple, it could signal that trouble may be on the way.
So there are two potential scenarios in which the app stores block Twitter: if it tries to circumvent in-app purchases and if it doesn’t police its content to the satisfaction of Apple and Google. That means the road to Musk creating a successful subscription service runs right through those two tech giants.
Taiwanese chipmaker TSMC is planning to produce chips with advanced 3-nanometre technology at its new factory in the U.S. state of Arizona but the plans are not completely finalised yet, the company's founder Morris Chang said on Monday.
Apple should be worried that the three major software interface design projects -- Safari last year, Stage Manager and System Settings this year -- ended up to be much less than successful. It does seem that Apple is making iPadOS too complicated, and macOS too simplified; Which, of course, is the opposite of what the strength of the two different operating systems are.
~
Thanks for reading.