Feeds

Heathrow fingered over prints as Apple bungles EULA

And don't use a gun for home improvement

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

Comments Apple cocked up the licence agreement for its Safari browser by forbidding installation on Windows PCs. The EULA only allowed users to install the browser on "a single Apple-labeled computer at a time." Apple quickly changed the licence agreement to say that you can install it on "each computer owned or controlled by you." But it can't exist on more than one computer at a time. What fun. We've included comments on both articles.

Apple-labeled computer? So, sticky label + marker pen = Valid Licence?

Anonymous Coward


That's not impossible! You just have to install Windows on your Intel Mac.

Then you'd be compliant. And totally stupid.

Murray Pearson


My PC has a Golden Delicious sticker on it, does that comply with the EULA?

Michael Sheils


Actually, I'm fairly sure Apple can't legally offer Safari for Windows anyway.

Why? Well, it uses WebKit for Windows, which is based on the LGPL-licensed KHTML. Now, the LGPL requires that all libraries that the LGPL-licensed code depends on are also under the LGPL or a compatible license (except ones supplied with the OS or complier). This is to prevent unscrupulous companies circumventing the intention of the LGPL by sticking critical parts of the code in closed source libraries under nasty license terms.

Apple's Windows port of WebKit depends on several closed-source, non-redistributable libraries - specifically, Windows ports of Apple frameworks. Therefore, it violates both the spirit and the letter of the LGPL, they have no legal right to distribute it, and any major contributor to KHTML before the fork could take them to court, force them to cease distribution, and probably make some nice cash on the side.

(Also, Apple's license for these libraries is nasty - as far as I can tell, it forbids anyone who compiles the Windows version of Webkit themselves from redistributing their compiled version, since the libraries are statically linked and the license forbids redistribution in any form.)

Anonymous Coward


So, I don't have to own the computer, but I can control it? Kind of puts a neat spin on allowing hackers to push the software for us, completely legally. Maybe it is a way for Apple to justify pushing this software to all of the Windows computers out there... All your PC are belong to us!

Anonymous Coward


Isnt Safari free? What do Apple care about how many machines I install it on?

Jonathan


This is very frustrating as an IT admin. I have a very specific job of maintaining AND UPDATING ~ 1400 PCs day in and day out, and the idea that Apple sliding their browser into the "critical updates" screen is like MS adding "ONE CARE" to their "critical updates" list. And to forget to change your EULA to reflect these new changes is simply catching Jobs with his pants down in an effort to increase the popularity of his software. If I had previously installed Safari and confirmed our cold fusion backends were approved for SAFARI browsing, then I would not be so upset.

*siiiigh* And now my phone is ringing off the hook... Time for a pub break....

OpenSorce Phreak


US airport control staff have begun inspecting the contents of passengers' laptops. This raises concerns over privacy and whether one can truly be held responsible for everything on their machine. You didn't like it one bit:

Which user are they going to log on as? If I create a new user (no admin rights) and log on as that then its not going to give them much at all is it?

As its a work's laptop I can always say that I do not have admin privs (or access to the administrator account) so they can't see anything that doesn't belong to the user they've logged on as.

I guess they'd just seize my computer and lock me up

Anonymous Coward


What would happen if you have information on your laptop that is under a Non Disclosure Agreement ?

Letting the customs see it will violate the NDA not letting the customs look through it would be making yourself a likely candidate for government harassing untill you give in.

wim


If you run an operating system that has some sort of security then you could:

1. Create a dummy account containing a number of unimportant files. Give this account the minimum number of privileges.

2. Use this account when stopped at the border with your laptop and asked to start the machine.

3. When asked to provide access to other files, you can reasonably claim not to have sys admin rights and refer the enquirer to your corporate IT department (if you have one), hoping that they aren't going to bother. Of course, they might bother and corporate IT might give them the sys admin password over the phone, but how likely is that?

Richard Barnes


Anon rodent says: "Terrorists win, again"—if you still believe this is all about terrorism.

While you focus primarily on personal privacy issues, what about business? You might be returning from a field-research trip, some conference, contract negotiations or whatever, your computer might be filled to the brim with critical business or even NDA-material, or maybe your latest novel or critical analysis of modern-day fashism that makes government X look bad. Now would you please hand that over, decrypted, for reasons of national security, to be copied, analyzed, stored?

Invasive searches like the ones described lead to people no longer carrying any data of any value whatsoever, thereby curbing travellers' work efficiency -> "Terrorists win". So if you bother to take along a computer at all, you will have all data on some secure remote sever, and you will rather not put the server data (and no encryption, no hidden partitions, no nothing) on the machine but in your head. If you believe in secure remote severs that is. Now if that machine got inspected, you would be suspicious as hell, and you know what happens to suspicious people who will not admit. They get special treatments, sometimes even a free vacation in an interesting place. Like Syria. So you might better fill your machine with some random "identity" bull in order to make it look "pure". Thereby, being denied privacy essentially promotes a culture of lies and deception. I am not even touching on the inherently connected issues of classism and racism that determine who is searched and who is not.

Anonymous Coward

3 Big data security analytics techniques

More from The Register

next story
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
Spanish village called 'Kill the Jews' mulls rebranding exercise
Not exactly attractive to the Israeli tourist demographic
Lego is the TOOL OF SATAN, thunders Polish priest
New minifigs like Monster Fighters are turning kids to the dark side
Dark SITH LORD 'Darth Vader' joins battle to rule, er, Ukraine
Only I can 'make an empire out of a republic' intones presidential candidate
Chinese company counters pollution by importing fresh air
Citizens line up for bags of that sweet, sweet mountain air
Google asks April Fools: Want a job? Be our 'Pokemon Master'
Mountain View is prankin' like it's 1999...
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.