pdabbadabba writes "A Florida iPhone and iPad app developer, Blue Toad, has come forward claiming that it is the source of the Apple UDIDs previously released by Anonymous. Their dataset, they say, is a 98% match for the one Anonymous hackers claim to have stolen from an FBI laptop. If so, this development would cast serious doubt on Anonymous' claims and, possibly, calm fears that this data is evidence of an ongoing FBI surveillance operation (a claim the FBI has also denied)."
Have you META-MODERATED today? Sign up for the Slashdot Daily Newsletter! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25.×
itwbennett writes "Hoping to avoid a sales ban in the Netherlands, Samsung has said that Android's multitouch software doesn't work as well as Apple's. Samsung lawyer Bas Berghuis van Woortman said that while Apple's technology is a 'very nice invention,' the Android system is harder for developers to use. Arguing the bizarre counterpoint, Apple's lawyer Theo Blomme told judge Peter Blok, that the Android multitouch isn't inferior and does so infringe on Apple's patent: 'They suggest that they have a lesser solution, but that is simply not true,' said Blomme."
Nerval's Lobster writes "Apple plans on taking a big bite of the streaming-music market, according to unnamed sources speaking to The New York Times. Those sources suggested that an Apple streaming-music service would 'probably' center on an app of some kind, and link to iTunes in order to better evaluate the listener's musical interests. In broad strokes, that would make it similar to Spotify, a streaming-music service that also requires an app. Other popular cloud-music hubs, including Pandora and Last.fm, operate primarily as browser-based services. The Wall Street Journal, citing its own unnamed sources, indicated that any Apple streaming service would work on iOS devices such as the iPad, Macs, and 'possibly on PCs running Microsoft Corp.'s Windows operating system.' In keeping with Apple's intense rivalry with Google, one source added, the service would not appear on Android devices."
An anonymous reader writes "On Thursday a U.S. District Judge approved a settlement between the Department of Justice and three publishers accused to colluding to inflate ebook prices (order). 'The Justice Department had accused Apple and five publishers in April of illegally colluding on prices as part of an effort to fight internet retailer Amazon.com Inc's dominance of e-books. The publishers who agreed to settle are News Corp's HarperCollins Publishers Inc, CBS Corp's Simon & Schuster Inc and Lagardere SCA's Hachette Book Group. Apple; Macmillan, a unit of Verlagsgruppe Georg von Holtzbrinck GmbH; and Pearson Plc's Penguin Group have vowed to fight the Justice Department's lawsuit with a trial due to start on June 3 next year.' The decision came after a lengthy period of public comment. According to the AP, 'The ruling released Thursday cast aside the strident objections of Apple, other book publishers, book sellers and authors who argued the settlement will empower Internet retailing giant Amazon.com Inc. to destroy the "literary ecosystem" with rampant discounting that most competitors can't afford to match. Those worries were repeatedly raised in court filings about the settlement. More than 90 percent of the 868 public comments about the settlement opposed the agreement.'"
hypnosec writes "Just yesterday Apple released updates to fix Java vulnerabilities, but it seems the patch doesn't actually target the recently discovered high-profile Java bug that has been the talk of the web during the last two weeks. The two updates – Java for OS X 2012-005 for OS X Lion and Java for Mac OS X 10.6 Update 10 for Mountain Lion, are meant to tackle the vulnerability described in CVE-2012-0547. But according to KerbsOnSecurity, it seems Cupertino hasn't addressed the recent mega-vulnerabilities in Java as described in CVE-2012-4681." Update: 09/07 12:00 GMT by S : As readers have pointed out, these updates address flaws in Java 6, which is the version Apple maintains. The recently-reported Java vulnerabilities primarily affect Java 7, the patching of which is handled solely by Oracle. Nothing to see here.
pigrabbitbear writes "Now that Apple is putting the finishing touches on the most anticipated smartphone in history, Chinese students are again being pressed into service on the factory line inside the largest single internship program in the world. This according to two separate stories in the Chinese press. A report today in the Shanghai Daily says that hundreds of students in the city of Huai'an were forced to help fulfill iPhone 5 orders starting last Thursday. Classes in town had allegedly been interrupted as a result, since the two-month long internships would fulfill the students' need to 'experience working conditions.'"
Sharp is one of the small handful of companies that actually make the LCDs that go into products badged with many other companies' names. Now, itwbennett writes "The company was asked by one of its main banks to put its physical assets, including its Apple screen plant, up as collateral for about $2 billion in emergency loans, according to an IDG News Service report. Sharp expects to lose over $3 billion this fiscal year."
WIn5t0n writes "Even though AT&T has now promoted itself to the 'Largest 4G Network' (HSPA+), it is still lagging far behind in advancing its LTE Coverage. AT&T's largest competitor, Verizon, has turned up the heat on the company now that it claims to cover 75 percent of US population with LTE, while AT&T's network only fully covers a few cities. However, AT&T has recognized consumer unrest and has planned to expand its 4G LTE coverage into '48 new markets' by the end of the year. With the iPhone 5 (rumored to have LTE capabilities) likely to be in consumers hands by the end of this month, AT&T is now feeling the pressure to make sure its customers can take full advantage of their new phones on a faster network. The company's full rollout of 4G LTE coverage is not scheduled to be complete until at least 2013."
sl4shd0rk writes "According to sources, Apple hasn't offered any specs to developers for the new '9-pin Connector' to be used on the next version of the iPhone. Apple has also said it may use 'licensing agreements and threats of lawsuits' to prevent third-party adapters from hitting the market through at least 2012. There have been suggestions that this tactic is to allow Apple time to leverage competition and reap in revenues of $100 million for every 10 million Dock Connector Adapters it sells for $10. It remains unclear whether Apple will allow third-party developers to release competing alternatives after 2012."
First time accepted submitter WIn5t0n writes "Just a day after the alleged leak of 12million Apple UDID's, both Apple and FBI have denied the story that Anonymous, a global hacking community, gained access to the files by hacking into an FBI laptop through a Java vulnerability. Earlier this morning the FBI claimed that, even though the agent cited in Anonymous's story is an actual FBI operative, neither he nor anyone else in the agency has or has had access to Apple device information. This afternoon Apple followed up on the FBI's statement, with an unidentified Apple representative claiming that, 'The FBI has not requested this information from Apple, nor have we provided it to the FBI or any organization.' It should also be noted that while the hackers claim to have accessed 12 million UDID's, only 1 million were publicly released. The Apple representative who made the previous statements also said that, 'Apple has replaced the types of identifiers the hackers appear to have gotten and will be discontinuing their use.' Even though neither Anonymous nor the FBI/APPLE will admit where the data actually came from, it does appear that at least some of the leaked UDID's are legit and can be tied back to current, privately owned devices. So far no information besides the devices UDID, DevToken ID, and device name has been released, however the original hackers claimed that some devices were tied to details as exact as phone numbers and billing addresses."
An anonymous reader writes "ReadWriteWeb makes the case that Apple should stop censoring submissions to the App Store. The company made headlines last week for banning an app showing the locations of drone strikes in Pakistan, Yemen, and Somalia. The article says Apple should restrict its bans to apps that have terrible functionality or a poor UI, and 'get out of the business of censorship.' Quoting: 'Last year in Syria, antigovernment activists began using an iPhone app to disseminate news, maps, photos and videos about the conflict in a country that doesn't exactly rank highly for its press freedom. Mobile tech in the hands of Syrian dissidents proved enough of a nuisance that the government banned the iPhone in late 2011, presumably to quash content that the regime found, um, objectionable. This example raises a few questions. First, why are pins on a map more objectionable than photos and video clips from a war zone? Why does content that effectively agitates for one government to be overthrown make the cut, while content that may make another government look bad (depending on one's own perspective) doesn't? Is Apple taking sides in international conflicts? Perhaps more disturbing is the notion that, were Apple to apply these standards consistently, apps like the one used by Syrian dissidents — and perhaps some news apps — would be barred from the App Store as well.'"
judgecorp writes "The FBI has denied the UDID codes released yesterday came from an agent's laptop, as claimed by the AntiSec hacker group. The FBI says it does not hold such data, and the attack never happened. However, the agent named by AntiSec is real, and some of the published UDID codes have been found to be genuine. So where did they come from?"
Orome1 writes "A file containing a million and one record sets containing Apple Unique Device Identifiers (UDIDs) and some other general information about the devices has been made available online by Anonymous hackers following an alleged breach of an FBI computer. 'During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java,' the hackers claim." Update: 09/04 13:44 GMT by T : A piece at SlashCloud points out that if the leak is genuine, this raises some sticky questions about privacy and security; in particular: "[H]ow did the agency obtain said information, and to what purpose? Why did all that personal data reside on the laptop of one special agent?"
First time accepted submitter oobayly writes "It appears that Bruce 'Die Hard' Willis isn't too impressed that he can't include his iTunes collection in his estate when he dies. According to the article: 'Bruce Willis, the Hollywood actor, is said to be considering legal action against Apple so he can leave his iTunes music collection to his three daughters.' Such a high profile individual complaining about the ability to own your digital music can only be a good thing, right?"
judgecorp writes "Latest market share figures show the difference between perception and reality. Windows 7 just nudged past Windows XP with both around the the 43 percent mark. OS X and Windows Vista divide the rest of the spoils, with all versions of OS X only just adding up to a little more than the failed Windows version, according to data from Netmarketshare."