Apple Answers Questions Regarding iPhone Location Data.

Apple answers questions regarding iPhone Location Data through its Press Release page. To summarize Apple’s answers:

  • Apple is not tracking anyone.
  • The iPhone is not logging user’s location.
  • It is the database of Wi-Fi hotspots and cell towers around user’s current location. Some are located far away from user’s actual locations.
  • This database is used to triangulate the iPhone location when Locations Services is running.
  • The current database is not encrypted, but protected in a different way. Next software update will encrypt the file.
  • Geo-tagged Wi-Fi hotspot and cell-tower data are sent to Apple in an anonymous and encrypted form.
    “Apple cannot identify the source of this data.”
  • The Location Data cache is stored longer than expected due to software bug.

Apple also mentions:

Software Update
Sometime in the next few weeks Apple will release a free iOS software update that:

  • reduces the size of the crowd-sourced Wi-Fi hotspot and cell tower database cached on the iPhone,
  • ceases backing up this cache, and
  • deletes this cache entirely when Location Services is turned off.

In the next major iOS software release the cache will also be encrypted on the iPhone.

“Next Major iOS Software Release” could mean iOS 5.

Still Lazy Tuesday: PlayStation Network Information Breach

PlayStation Network went down on Wednesday April 20th, 2011 as a result of “external intrusion” that prompted Sony to take down the service. As many have feared, the problem was worse than just malfunctions.

From PlayStation.com:

We have discovered that between April 17 and April 19, 2011, certain PlayStation Network and Qriocity service user account information was compromised in connection with an illegal and unauthorized intrusion into our network. In response to this intrusion, we have:

  1. Temporarily turned off PlayStation Network and Qriocity services
  2. Engaged an outside, recognized security firm to conduct a full and complete investigation into what happened
  3. Quickly taken steps to enhance security and strengthen our network infrastructure by re-building our system to provide you with greater protection of your personal information.

We greatly appreciate your patience, understanding and goodwill as we do whatever it takes to resolve these issues as quickly and efficiently as practicable.

According to official statement from Sony, an authorized person managed to obtain information provided by PlayStation Network users including:

  • Name
  • Address
  • Email address
  • Birthdate
  • PlayStation Network/Qriocity password security answers

Sony also added that user’s credit card number (excluding security code) and expiration date might have been compromised.

Sony has suspended PlayStation Network indefinitely.

The group Anonymous stated that they had nothing to do with the breach nor the outage.

Psi Kappa Rho. reCAPTCHA

Sometimes I wonder if I could read the captcha in plain Alphabet, let alone something in Greek Alphabet.

ψκρ. nciesi

Did I get it right?

Apple releases iOS 4.3.2 and iOS 4.2.7.

Apple releases iOS 4.3.2 and iOS 4.2.7 today.

iOS 4.2.7 is for iPhone 4 CDMA model:

  • Contains the latest security updates

iOS 4.3.2 is for:

  • iPhone 4 (GSM model)
  • iPhone 3GS
  • iPad 2
  • iPad
  • iPod touch (4th generation)
  • iPod touch (3rd generation)

Fixes in iOS 4.3.2:

  • Fixes an occasional graphics glitch on iPod touch (4th generation)
  • Resolves bugs related to activating and connecting to some cellular networks
  • Fixes image flicker when using Apple Digital AV Adapter with some TVs
  • Resolves an issue authenticating with some enterprise web services

Automattic and WordPress.com: Security Incident.

If you are using any Automattic services, please read the announcement regarding security incident.

From Matt Mullenweg:

Tough note to communicate today: Automattic had a low-level (root) break-in to several of our servers, and potentially anything on those servers could have been revealed.

We have been diligently reviewing logs and records about the break-in to determine the extent of the information exposed, and re-securing avenues used to gain access. We presume our source code was exposed and copied. While much of our code is Open Source, there are sensitive bits of our and our partners’ code. Beyond that, however, it appears information disclosed was limited.

When was the last time you changed your password? It’s about time, do it today.