Why We Hate Internet Providers: Example #74737282
Just had to share this:
1. Buy new phone from Optus Store
2. Get phone home and connect it to computer.
3. Message says OS on the new phone is too old to allow transfer of apps / data from old phone backup.
Read: we sold you stock that’s been sitting here a while and Apple have released two updates since then, one of which killed a lot of people’s phone batteries if they dared to use a phone older than the one you purchased today.
4. Start to download update – using Optus NBN Fibre to the Premises 100/40 connection i.e. an NBN connection as fast (and expensive) as you can get in Australia at present.
5. Notice that download is going slow. Stop download and do speed test. Surprise surprise, 4MBps download speeds as has occurred anytime between 8am and 2am the next morning over the past three weeks. Upload speed at 35 MBps.
6. Call Optus. They get me to do a factory reset and allegedly do something their end as well. Now get 10MBps downloads at best. Optus person makes out it’s a great improvement at 10% of what I optimally should be getting (and have gotten close to previously). Am told that there is indeed congestion issues at the exchange , and that they will contact me when resolved (yeah right).
So now I wait for 4 hours to download a software update for an Optus-purchased product on a massively sub-standard Optus NBN connection. Royal Commission anyone?
New iDongle Universal Adapter
With the mission Apple is on with removing as many ports from their products as possible, it’s time for a universal adapter to make everyone’s life easier:
Cyndi Lauper As You’ve Never Heard Her Before
I’ve been a fan of Cyndi Lauper’s for more than thirty years and over that time it’s been amazing to watch how she’s continued to go from strength to strength.
Her voice is as brilliant as it’s ever been and it got me thinking. I saw someone had done a 33rpm upload of Dolly Parton’s Jolene and I immediately wanted to try the same with one of Cyndi Lauper’s songs. And what a gem it’s turned out to be.
Check out I Drove All Night on vinyl at 33rpm.
What do you think? Would love to hear your thoughts
Review: Hole In Your Pocket – The Panics
I don’t know what it is specifically about WA-bred bands, but they know how to write some big songs.
As someone who rates The Triffids as one of the best bands to ever come out of Australia, I’m more than willing to put The Panics in that company. And they’ve produced enough great songs to give Born Sandy Devotional one hell of a run for its money. Yes that’s a big call but i stand by it.
Hole In Your Pocket is the fifth album from The Panics and it’d be unfair to say they’ve hit their stride as that arguably happened more than five years ago. This album is polished without sounding self-assured and passionate without being florid. Cinematic is a term often applied to this group and it’s for good reason – the scope of these songs vary but they all feel like significant events.
Highlights for me are Carparks of Greschen, Not Apart, Not Together and the first release from the album, Weatherman. That said, at nine songs the album has no flab anyway so it’s an academic exercise finding outright favourites.
If you’re after fist-pumping four to the floor rock then look elsewhere – although this outfit are no slouches in the live arena either from the couple of gigs I’ve seen. They’re about to hit the road in coming months in support of the album.
If you like some real meat on the bones of your rock music, then you may just want to check out Hole In Your Pocket and pretty much every other release from these guys.
Check out Weatherman right now:
Sometimes CEOs earn their money
Yes it definitely does occur: even some of our highest paid CEOs earn their money sometimes. Apple CEO Tim Cook probably has certainly earned some of his stash the past few months if the open letter he’s just published is any indication.
The full text is below (or the original can be found here). The summary: according to Apple the FBI have asked them to create a version of iOS that has some back doors that the FBI could use to access a suspect’s data. Apple have said no. My guess is that Apple have had to say no multiple times and are still feeling pressured so have published the open letter.
For what it’s worth I think Cook’s stance is correct. For sure they should be helping authorities on a case by case basis, but having an alternate version of iOS with holes in it is a recipe for disaster. What do you think?
A Message to Our Customers
The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.
This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.
The Need for Encryption
Smartphones, led by iPhone, have become an essential part of our lives. People use them to store an incredible amount of personal information, from our private conversations to our photos, our music, our notes, our calendars and contacts, our financial information and health data, even where we have been and where we are going.
All that information needs to be protected from hackers and criminals who want to access it, steal it, and use it without our knowledge or permission. Customers expect Apple and other technology companies to do everything in our power to protect their personal information, and at Apple we are deeply committed to safeguarding their data.
Compromising the security of our personal information can ultimately put our personal safety at risk. That is why encryption has become so important to all of us.
For many years, we have used encryption to protect our customers’ personal data because we believe it’s the only way to keep their information safe. We have even put that data out of our own reach, because we believe the contents of your iPhone are none of our business.
The San Bernardino Case
We were shocked and outraged by the deadly act of terrorism in San Bernardino last December. We mourn the loss of life and want justice for all those whose lives were affected. The FBI asked us for help in the days following the attack, and we have worked hard to support the government’s efforts to solve this horrible crime. We have no sympathy for terrorists.
When the FBI has requested data that’s in our possession, we have provided it. Apple complies with valid subpoenas and search warrants, as we have in the San Bernardino case. We have also made Apple engineers available to advise the FBI, and we’ve offered our best ideas on a number of investigative options at their disposal.
We have great respect for the professionals at the FBI, and we believe their intentions are good. Up to this point, we have done everything that is both within our power and within the law to help them. But now the U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone.
Specifically, the FBI wants us to make a new version of the iPhone operating system, circumventing several important security features, and install it on an iPhone recovered during the investigation. In the wrong hands, this software — which does not exist today — would have the potential to unlock any iPhone in someone’s physical possession.
The FBI may use different words to describe this tool, but make no mistake: Building a version of iOS that bypasses security in this way would undeniably create a backdoor. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.
The Threat to Data Security
Some would argue that building a backdoor for just one iPhone is a simple, clean-cut solution. But it ignores both the basics of digital security and the significance of what the government is demanding in this case.
In today’s digital world, the “key†to an encrypted system is a piece of information that unlocks the data, and it is only as secure as the protections around it. Once the information is known, or a way to bypass the code is revealed, the encryption can be defeated by anyone with that knowledge.
The government suggests this tool could only be used once, on one phone. But that’s simply not true. Once created, the technique could be used over and over again, on any number of devices. In the physical world, it would be the equivalent of a master key, capable of opening hundreds of millions of locks — from restaurants and banks to stores and homes. No reasonable person would find that acceptable.
The government is asking Apple to hack our own users and undermine decades of security advancements that protect our customers — including tens of millions of American citizens — from sophisticated hackers and cybercriminals. The same engineers who built strong encryption into the iPhone to protect our users would, ironically, be ordered to weaken those protections and make our users less safe.
We can find no precedent for an American company being forced to expose its customers to a greater risk of attack. For years, cryptologists and national security experts have been warning against weakening encryption. Doing so would hurt only the well-meaning and law-abiding citizens who rely on companies like Apple to protect their data. Criminals and bad actors will still encrypt, using tools that are readily available to them.
A Dangerous Precedent
Rather than asking for legislative action through Congress, the FBI is proposing an unprecedented use of the All Writs Act of 1789 to justify an expansion of its authority.
The government would have us remove security features and add new capabilities to the operating system, allowing a passcode to be input electronically. This would make it easier to unlock an iPhone by “brute force,†trying thousands or millions of combinations with the speed of a modern computer.
The implications of the government’s demands are chilling. If the government can use the All Writs Act to make it easier to unlock your iPhone, it would have the power to reach into anyone’s device to capture their data. The government could extend this breach of privacy and demand that Apple build surveillance software to intercept your messages, access your health records or financial data, track your location, or even access your phone’s microphone or camera without your knowledge.
Opposing this order is not something we take lightly. We feel we must speak up in the face of what we see as an overreach by the U.S. government.
We are challenging the FBI’s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications.
While we believe the FBI’s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.
Tim Cook
Recall of Apple AC Wall Plug Adapters
If you live in Australia, Argentina, Brazil, Continental Europe, New Zealand or South Korea, and own an AC wall adepter that came with your iPhone, iPad, iPod or Mac device, you may want to read below:
CUPERTINO, California — 29 January 2016— Apple® today announced a voluntary recall of AC wall plug adapters designed for use in Argentina, Australia, Brazil, Continental Europe, New Zealand and South Korea. In very rare cases, affected Apple two-prong wall plug adapters may break and create a risk of electrical shock if touched. These wall plug adapters shipped with Mac® and certain iOS devices between 2003 and 2015 and were also included in the Apple World Travel Adapter Kit. Apple is aware of 12 incidents worldwide.
The recall does not affect any other Apple AC wall plug adapters designed for Canada, China, Hong Kong, Japan, United Kingdom, United States or any Apple USB power adapters.
Â
Because customer safety is the company’s top priority, Apple is asking customers to stop using affected plug adapters. Customers should visit www.apple.com/support/ac-wallplug-adapter for details about how to exchange the affected adapters for new, redesigned ones.
Â
An affected two-prong plug adapter has either four or five characters or no characters on the inside slot where it attaches to the main Apple power adapter. Visit the program website for more details on how to identify an affected adapter.
Recent Comments