p2pnet view Freedom | P2P:- “This is generally directed to identifying unauthorized users of an electronic device. In some embodiments, an unauthorized user of the electronic device can be detected by identifying particular activities that may indicate suspicious behavior. In some embodiments, an unauthorized user can be detected by comparing the identity of the current user to the identity of the owner of the electronic device. When an unauthorized user is detected, various safety measures can be taken. For example, information related to the identity of the unauthorized user, the unauthorized user’s operation of the electronic device, or the current location of the electronic device can be gathered. As another example, functions of the electronic device can be restricted. In some embodiments, the owner of the electronic device can be notified of the unauthorized user by sending an alert notification through any suitable medium, such as, for example, a voice mail, e-mail, or text message.”
Meet Apple’s latest DRM (Digital Restrictions Management) consumer control system —- Systems and Methods for Identifying Unauthorized Users of an Electronic Device, United States Patent Application 20100207721, August 19, 2010 .
It “describes several ways a device could sense who is using an iPhone or iPad”, says Ars Technica, going on, “Among the methods considered are voice print analysis, photo analysis, heartbeat analysis (!), hacking attempts, or even ‘noting particular activities that can indicate suspicious behavior’.
“If the various analyses detect someone who is not authorized to use the device, it could set off a number of automated features designed to protect the device’s data, suss out the offending party, and alert the device owner. Sensitive data could be backed up to a remote server and the device could be wiped.”
Apple products automatically snapping pix of “unauthorized users” and recording the GPS coordinates, as well as logging keystrokes, phone calls, “or other activity”, as Ars sums it up.
Would you want Apple having access to, and control of, this kind of information?
Cynics might also think of governments, companies and agencies making use of it.
Apple, of all companies, following you on- and offline by listening to your heartbeat.
Think about it.
The frightening thing is: it’s being presented as though it’s perfectly reasonable.
Definitely stay tuned.
… and identi.ca
Ars Technica – Apple may be looking to lock out unauthorized iOS users, August 19, 2010
Use free p2pnet newsfeeds for your site. It`s really easy!
Net access blocked by government restrictions? Use Psiphon from the Citizen Lab at the University of Toronto. Go here for details.