Wired April 7
Wired August 17, 2015
Wired April 2, 2015
WIRED has posted a new story on the Apple Watch, which revolves around interviews with Apple human interface designer Alan Dye and Apple’s VP Technology Kevin Lynch, who heads Apple Watch software. The piece shines new light on the foundation of the smartwatch project at Apple as well as some new details about the product — which ships later this month.
Amusingly, Lynch did not know what he would be working on when he accepted the Apple job. He walked into the role with the project already underway; early ‘experiments’ from the iPod team with click-wheels and such. Dye says that the idea for a watch blossomed during design meetings for iOS 7, Apple’s major software overhaul.
Wired February 24, 2015
Wired September 25, 2014
Apple has officially issued a statement regarding the iPhone 6 bending controversy saying the issue is rare during real world use and that it’s only received complaints from 9 customers (via CNBC). Apple adds, according to the reports, that the “new iPhones feature steel/titanium inserts to reinforce stress locations and use the strongest glass in the industry.” Apple also commented that bending is “extremely rare” during normal use and that it performs a number of strength and durability tests (as you’d expect) before it ships new devices (via WSJ):
Since going on sale Friday, Apple said only nine customers have contacted the company about a bent iPhone 6 Plus—the larger and more expensive of its two new iPhones. Apple said both the iPhone 6 and iPhone 6 Plus passed a series of tests meant to check the products’ strength and durability to withstand every day, real-life use.
Wired September 3, 2014
A forensics consult and security researcher who analyzed metadata from leaked photos of Kate Upton said that the photos appear to have been obtained using software intended for use by law enforcement officials, reports Wired. The software, Elcomsoft Phone Password Breaker (EPPB), allows users to download a complete backup of all data on an iPhone once the iCloud ID and password have been obtained.
If a hacker can obtain a user’s iCloud username and password with iBrute, he or she can log in to the victim’s iCloud.com account to steal photos. But if attackers instead impersonate the user’s device with Elcomsoft’s tool, the desktop application allows them to download the entire iPhone or iPad backup as a single folder, says Jonathan Zdziarski, a forensics consult and security researcher. That gives the intruders access to far more data, he says, including videos, application data, contacts, and text messages …