Feeds

Apple ticks off trigger-happy Bitcoiners with App Store snub

Ban on trading tools prompts iPhone shoot-em-up

Combat fraud and increase customer satisfaction

Apple has issued a series of takedowns on Bitcoin trading apps, prompting outraged users to destroy iPhones in protest.

The company has removed a number of Apps that allow users to trade Bitcoins on their iOS devices. Most recently, Apple pulled the popular Blockchain tool from the App Store, prompting a user backlash amongst Bitcoin aficionados.

According to the developers of Blockchain, Apple gave no notice to as to why it had decided to pull down the Bitcoin trading application. While Bitcoin wallets and transaction tools have been taken down, the App store still offers Bitcoin and cryptocurrency tracking applications.

"These actions by Apple once again demonstrate the anti-competitive and capricious nature of the App Store policies that are clearly focused on preserving Apple's monopoly on payments rather than based on any consideration of the needs and desires of their users," Blockchain said following the takedown.

"The blockchain application is the same one that has been on the App Store for 2 years, with more than 120,000 downloads, no customer complaints, and a broad user base. The only thing that has changed is that bitcoin has become competitive to Apple's own payment system."

Among the protests is a movement born from Reddit which asks users to smash their iOS devices in protest of Apple's takedowns. The Reddit user, who originally went by the moniker "round-peg" (profile since removed and replaced) offered a Nexus 5 to the first five people who posted videos of themselves destroying their iPhones (the contest has since closed).

Users responded with a series of videos featuring iPhones being smashed in a number of mildly inventive and entertaining ways,

Youtube Video

Youtube Video

...culminating with a user disposing of his iPhone 4S via high-powered rifle.

Youtube Video

Apple has yet to issue a comment on the matter. The company sold 51 million iPhones last quarter, so losing a few to violence shouldn't phase it too much. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
IRS boss on XP migration: 'Classic fix the airplane while you're flying it attempt'
Plus: Condoleezza Rice at Dropbox 'maybe she can find ... weapons of mass destruction'
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
New Facebook phone app allows you to stalk your mates
Nearby Friends feature goes live in a few weeks
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.