Feeds

For PITY'S SAKE, DON'T BUY an iPHONE 5S, begs FSF

'Secret and untrustworthy' says Free Software Foundation

The Power of One Brief: Top reasons to choose HP BladeSystem

The Free Software Foundation has taken issue with fingerprint recognition in the iPhone 5S and has called on users to reject Apple’s closed system smartphones.

Executive director John Sullivan used the launch of the iPhone 5S and 5C on Tuesday to zero in on the iPhone 5S, the expensive iPhone variant that comes equipped with a fingerprint scanner.

Sullivan repeated the FSF’s earlier attacks on closed system and proprietary handsets, saying the new phones grant further power to software programs “whose operations are secret and untrustworthy".

“We can't imagine a more hostile reaction to the wave of privacy concerns sweeping the world right now than debuting a proprietary, network-accessible fingerprint scanner as your new 'feature',” he said.

Sullivan didn’t provide details, but he seemed to be referring to the Edward Snowden disclosure that spooks at the NSA and GCHQ had “broken” encryption on the web.

“Apple has given us new hardware with the same old restrictions, allowing only Apple-approved software, putting users – along with their data, their privacy, and their freedom of expression – at the mercy of programs whose operations are secret and demonstrably untrustworthy,” he added.

He used the iPhone launch to promote the FSF’s belief that only “free” software on phones can be trusted, saying:

The first step is rejecting Apple’s restrictions.

It was the FSF's president, Richard Stallman, who marked the 2011 passing of Apple chief Steve Jobs by saying he was glad Jobs was gone because the Apple boss had exerted a "malign influence" on computing with his closed systems.

The FSF’s exec director also encouraged users to investigate the free Android fork called Replicant and the F-Droid application repository. ®

Application security programs and practises

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.