you are viewing a single comment's thread.

view the rest of the comments →

[–]christnmusicreleases[S] 1 insightful - 2 fun1 insightful - 1 fun2 insightful - 2 fun -  (5 children)

Malware is software intentionally designed to perform malicious actions against the software or the user.

Apple software is software intentionally designed to perform malicious actions against the user. Such actions including spying, totalitarian control of information and device usage, and leaving backdoors open to agencies and hackers in the know. Furthmore, Apple works in collusion with other software and hardware providers to do these things and worse. And that's just the tip of the iceberg, I encourage everyone to actually read the article instead of just the comments.

[–]Trajan 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (1 child)

I definitely encourage people to read the article, including its sources. I also encourage people to do some research. Finally, I’d encourage them to read your post and note the number of arguments made in support of that barrage of claims you just made. Reading your arguments will not take long.

Most of all, I’d encourage people to read-up on malware and then see how many of the issues claimed fit the common understanding of the term.

[–]Trajan 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Seriously, you think this nonsense makes sense? Here's one last bit of fun one I noticed because I forgot to close the window:

iThings automatically upload to Apple's servers all the photos and videos they make. iCloud Photo Library stores every photo and video you take, and keeps them up to date on all your devices. Any edits you make are automatically updated everywhere. […]

Yes, if you choose to enable iCloud Photos. By the same logic Backblaze is malware because it backs-up anything I put on my hard drive. By this definition any standard implementation of IMAP is malware.

There is a way to deactivate iCloud, but it's active by default so it still counts as a surveillance functionality.

Yes, it's called not creating an Apple ID. Another option is to simply disable any features you don't want.

Unknown people apparently took advantage of this to get nude photos of many celebrities. They needed to break Apple's security to get at them, but NSA can access any of them through PRISM.

From what I read of that, leaks were people not using two-factor. That's stupid for any online system that offers it. Some porn sites starting using the 'iCloud leak' because it got people interested even if the images didn't come from iCloud. The article they link for PRISM doesn't even mention iCloud.

[–]Trajan 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (2 children)

Seriously, you think this nonsense makes sense? Here's one last bit of fun one I noticed because I forgot to close the window:

iThings automatically upload to Apple's servers all the photos and videos they make. iCloud Photo Library stores every photo and video you take, and keeps them up to date on all your devices. Any edits you make are automatically updated everywhere. […]

Yes, if you choose to enable iCloud Photos. By the same logic Backblaze is malware because it backs-up anything I put on my hard drive.

There is a way to deactivate iCloud, but it's active by default so it still counts as a surveillance functionality.

Yes, it's called not creating an Apple ID. Another option is to simply disable any features you don't want.

Unknown people apparently took advantage of this to get nude photos of many celebrities. They needed to break Apple's security to get at them, but NSA can access any of them through PRISM.

From what I read of that, leaks were people not using two-factor. That's stupid for any online system that offers it. Some porn sites starting using the 'iCloud leak' because it got people interested even if the images didn't come from iCloud. The article they link for PRISM doesn't even mention iCloud.

Just list one thing that would be malware as understood by anybody in the industry outside of the GNU collective. Provide sources and/or evidence. Just one piece of evidence of software/hardware that fits the definition normal people use. Change my mind.

[–]christnmusicreleases[S] 1 insightful - 2 fun1 insightful - 1 fun2 insightful - 2 fun -  (1 child)

I shouldn't need to deactivate malware. It shouldn't exist.

Most of all don't buy Crapple or any other mainstream vendor.

[–]Trajan 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

Yes, comrade.