{"id":3571,"date":"2010-10-16T12:49:38","date_gmt":"2010-10-16T16:49:38","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=3571"},"modified":"2022-12-30T15:33:42","modified_gmt":"2022-12-30T20:33:42","slug":"apple-wants-to-patent-spyware","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/apple-wants-to-patent-spyware\/","title":{"rendered":"Apple Wants to Patent Spyware"},"content":{"rendered":"<p><a href=\"https:\/\/web.archive.org\/web\/20200913142959\/https:\/\/www.makeuseof.com\/tag\/how-to-get-rid-of-a-trojan-horse-virus-that-wont-go-away\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-110601 size-thumbnail\" title=\"Apple Wants to Patent Spyware\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-22.jpg?resize=75%2C75&#038;ssl=1\" alt=\"Apple Wants to Patent Spyware\" width=\"75\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-22.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-22.jpg?w=116&amp;ssl=1 116w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>The <a title=\"Electronic Frontier Foundation\" href=\"https:\/\/www.eff.org\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Electronic Frontier Foundation<\/a> (<a href=\"https:\/\/www.eff.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">EFF<\/a>) is <a href=\"https:\/\/www.eff.org\/deeplinks\/2010\/08\/steve-jobs-watching-you-apple-seeking-patent-0\" target=\"_blank\" rel=\"noopener noreferrer\">reporting<\/a> that <a href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple, Inc.<\/a>, (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) has filed a <a href=\"https:\/\/web.archive.org\/web\/20110726190454\/http:\/\/www.patentvest.com\/console\/reports\/docs\/app\/20100207721.html\" target=\"_blank\" rel=\"noopener noreferrer\">patent application<\/a> for a &#8220;Systems and Methods for Identifying Unauthorized Users of an Electronic Device. &#8221; The patent is for a device to investigate a user&#8217;s identity to decide if that user is &#8220;unauthorized.&#8221;<\/p>\n<h3>Information Apple plans to collect<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.eff.org\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-110604 size-thumbnail\" title=\"EFF logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/eff_logo-3.png?resize=75%2C45&#038;ssl=1\" alt=\"EFF logo\" width=\"75\" height=\"45\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/eff_logo-3.png?resize=75%2C45&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/eff_logo-3.png?resize=150%2C90&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/eff_logo-3.png?w=400&amp;ssl=1 400w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/a>The system can take a picture of the user&#8217;s face, &#8220;<em>without a flash, any noise, or any indication that a picture is being taken to prevent the current user from knowing he is being photographed<\/em>&#8220;;<\/li>\n<li>The system can record the user&#8217;s voice, whether or not a phone call is even being made;<\/li>\n<li>The system can determine the user&#8217;s unique individual heartbeat &#8220;signature&#8221;;<\/li>\n<li>To decide if the device has been hacked, the device can watch for &#8220;<em>a sudden increase in memory usage of the electronic device<\/em>&#8220;;<\/li>\n<li>The user&#8217;s &#8220;<em>Internet activity can be monitored or any communication packets that are served to the electronic device can be recorded<\/em>&#8220;; and<\/li>\n<li>The device can take a photograph of the surrounding location to find where it is being used.<\/li>\n<\/ul>\n<h3>Who is the responsible party<\/h3>\n<p><a href=\"https:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-110606 size-thumbnail\" title=\"Apple logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_logo-10.jpg?resize=67%2C75&#038;ssl=1\" alt=\"Apple logo\" width=\"67\" height=\"75\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_logo-10.jpg?resize=67%2C75&amp;ssl=1 67w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_logo-10.jpg?resize=135%2C150&amp;ssl=1 135w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/apple_logo-10.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 67px) 100vw, 67px\" \/><\/a>The EFF believes that as a result of this new technology, Apple will know who you are, where you are, and what you are doing and saying, and even how fast your heart is beating. In some embodiments of Apple&#8217;s &#8220;invention,&#8221; this information &#8220;can be gathered every time the electronic device is turned on, unlocked, or used.&#8221;\u00a0 When an &#8220;unauthorized use&#8221; is detected, Apple can contact a &#8220;responsible party.&#8221; A &#8220;responsible party&#8221; may be the device&#8217;s owner or as the EFF points out the &#8220;responsible party may also be &#8220;proper authorities or the police.&#8221; Once an unauthorized user is identified, Apple could wipe the device and remotely store the user&#8217;s &#8220;sensitive data.&#8221; Apple&#8217;s patent application suggests it may use the technology not just to limit &#8220;unauthorized&#8221; uses of its phones but also to shut down a stolen phone.<\/p>\n<p>However, the EFF says Apple&#8217;s new technology would do much more. The EFF believes that this patented device enables Apple to secretly collect, store, and potentially use sensitive biometric information about the user. This is dangerous in two ways according to the EFF:<\/p>\n<ol>\n<li>It is far more than what is needed just to protect you against a lost or stolen phone. It&#8217;s extremely privacy-invasive and it puts you at great risk if Apple&#8217;s data on you are compromised. But it&#8217;s not only the biometric data that are a concern.<\/li>\n<li>Apple does not explain what it will do with all of this collected information on its users, how long it will keep this information, how it will use this information, or if it will share this information with other third parties. We know based on long experience that if Apple collects this information, law enforcement will come for it, and may even order Apple to turn it on for reasons other than simply returning a lost phone to its owner.<\/li>\n<li>Apple&#8217;s technology includes various types of usage monitoring \u2014 also very privacy-invasive. This patented process could be used to retaliate against users who jailbreak or tinker with their device in ways that Apple views as &#8220;unauthorized&#8221; even if it is perfectly legal under copyright law.<\/li>\n<\/ol>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>The EFF says this is a new business opportunity: spyware and what they are calling &#8220;traitorware.&#8221; The patent would allow Apple to find and punish users who tinker with their devices. The EFF says it&#8217;s not just spyware, it&#8217;s &#8220;traitorware,&#8221; since it is designed to allow Apple to retaliate against customers who do something Apple doesn&#8217;t like.<\/em><\/p>\n<p><em>This patent is downright creepy and invasive \u2014 certainly far more than would be needed to respond to the possible loss of a phone. Spyware, and its new cousin traitorware, will hurt customers and companies alike \u2014 Apple should shelve this idea before it backfires on both it and its customers<\/em>.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/web.archive.org\/web\/20120307101052\/http:\/\/tech.fortune.cnn.com\/2010\/03\/11\/how-rich-is-steve-jobs-today\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-110609\" title=\"Steve Jobs wants you\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/stevejobs2.jpg?resize=250%2C131&#038;ssl=1\" alt=\"Steve Jobs wants you\" width=\"250\" height=\"131\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/stevejobs2.jpg?w=137&amp;ssl=1 137w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/stevejobs2.jpg?resize=75%2C39&amp;ssl=1 75w\" sizes=\"auto, (max-width: 250px) 100vw, 250px\" \/><\/a><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"https:\/\/www.eff.org\/deeplinks\/2011\/12\/2011-review-patents\" target=\"_blank\" rel=\"noopener noreferrer\">2011 in Review: Patents Misused to Stifle Innovation<\/a> (eff.org)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>EFF says Apple filed a patent to investigate a user&#8217;s identity to decide if that user is unauthorized it will monitor the users face heartbeat Internet activity<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[3240,420,101,1452,266,974,1135,304,23,56,1036,254],"class_list":["post-3571","post","type-post","status-publish","format-standard","hentry","category-malware","tag-3240","tag-aapl","tag-apple","tag-biometrics","tag-eff","tag-electronic-frontier-foundation","tag-ios","tag-iphone","tag-malware","tag-patents","tag-spyware","tag-steve-jobs"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/3571","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=3571"}],"version-history":[{"count":5,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/3571\/revisions"}],"predecessor-version":[{"id":122559,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/3571\/revisions\/122559"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=3571"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=3571"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=3571"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}