Feeds

iPhone 3.0 to nix app redownloading?

Boot your PC or buy again

The essential guide to IT transformation

It appears as if Apple's iPhone 3.0 software may make it impossible for you to use your iPhone to redownload an app that you had previously purchased from the App Store.

This restriction was pointed out by a Sunday posting on The iPhone Blog, which reports that when users running the iPhone 3.0 beta try to redownload an app they've removed from their phone, they're presented with a notification that reads: "You've already purchased this. You can redownload it for free on your computer, or tap Buy to buy it again."

They're then offered the choice to either cancel the transaction or, as the notification says, buy it again.

In the current iPhone Software 2.2 and earlier, if you had deleted an app from your iPhone to, for example, free up space, you were free to redownload it from your iPhone on the fly. Now it appears that you'll be limited to putting an app back onto your iPhone using iTunes running on your Mac or PC.

That is, if this restriction makes it into the final version of iPhone 3.0, which may be released as early as next week at Apple's upcoming Worldwide Developer Conference. Remember, the version of iPhone 3.0 that's currently making the rounds is merely a beta. And betas have this habit of last-minute morphing.

If fact, some of the iPhone Software 3.0-using commentors to the story in the The iPhone Blog report that they're not receiving that "tap Buy" notification.

If, however, Apple does add this restriction to the next iPhone OS, it will be a minor annoyance, but an understandable one. As has been widely reported, Apple will add multi-account management for the iTunes Store in iPhone Software 3.0. This will be a useful addition, for example, when an iPhone is provided to a corporate minion - one account is paid for by the corp, a second by the aforementioned minion, enabling him or her to download and pay for all the apps and tunes they see fit without biting into the corporate bottom line.

This multiple-account feature, however, is ripe for abuse: A miscreant could load his or her phone with multiple accounts of others - obtained either with or without the account-owner's permission - and download any and all apps that the other account owner had paid for.

Although there should be a more elegant way for Apple to circumvent such misuse, if this restriction makes it into iPhone Software 3.0, it'll be yet another example of a company protecting itself from a few bad guys by inconveniencing millions of good guys.

The iPhone Blog is conducting a poll soliciting opinions on this possible restriction. Although we'd defend to the death your right to your own beliefs, put us down for option three: "Don't care." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
6 Obvious Reasons Why Facebook Will Ban This Article (Thank God)
Clampdown on clickbait ... and El Reg is OK with this
So, Apple won't sell cheap kit? Prepare the iOS garden wall WRECKING BALL
It can throw the low cost race if it looks to the cloud
EE fails to apologise for HUGE T-Mobile outage that hit Brits on Friday
Customer: 'Please change your name to occasionally somewhere'
Time Warner Cable customers SQUEAL as US network goes offline
A rude awakening: North Americans greeted with outage drama
We need less U.S. in our WWW – Euro digital chief Steelie Neelie
EC moves to shift status quo at Internet Governance Forum
BT customers face broadband and landline price hikes
Poor punters won't be affected, telecoms giant claims
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.