Apple Has Quietly Started Tracking iPhone Users Again, And It’s Tricky To Opt Out

 

Read more: http://www.businessinsider.com/ifa-apples-iphone-tracking-in-ios-6-2012-10#ixzz2AJlhp6FJ

 

Apple’s launch of the iPhone 5 in September came with a bunch of new commercials to promote the device.

But Apple didn’t shout quite so loud about an enhancement to its new mobile operating system, iOS 6, which also occurred in September: The company has started tracking users so that advertisers can target them again, through a new tracking technology called IFA or IDFA.

Previously, Apple had all but disabled tracking of iPhone users by advertisers when it stopped app developers from utilizing Apple mobile device data via UDID, the unique, permanent, non-deletable serial number that previously identified every Apple device.

For the last few months, iPhone users have enjoyed an unusual environment in which advertisers have been largely unable to track and target them in any meaningful way.

In iOS 6, however, tracking is most definitely back on, and it’s more effective than ever, multiple mobile advertising executives familiar with IFA tell us. (Note that Apple doesn’t mention IFA in its iOS 6 launch page).

Users can switch off that targeting, but it’s tricky, as we discovered a couple of days ago. Although at least iOS 6 users are able to turn off tracking, which they weren’t before.

Here’s how it works.

IFA or IDFA stands for “identifier for advertisers.” It’s a random, anonymous number that is assigned to a user and their device. It is temporary and can be blocked, like a cookie.

When you look at an app, or browse the web, your presence generates a call for an ad. The publisher’s site that you’re looking at then passes the IFA to the ad server. The advertiser is then able to know that a specific iPhone user is looking at a specific publication and can serve an ad targeting that user. IFA becomes particularly useful, for instance, if an ad server notices that a particular IFA is looking at a lot of different car sites. Perhaps that user is interested in buying a new car. They’ll likely start seeing a lot of car ads on their iPhone.

More importantly, IFA will allow advertisers to track the user all the way to “conversion” — which for most advertisers consists of an app download. Previously, advertisers had no idea whether their ads actually drove people to download apps or buy things. Now IFA will tell them.

The IFA does not identify you personally — it merely provides a bunch of aggregate audience data that advertisers can target with ads.

Tracking is on by default

 

The new iPhone operating system comes with three things that make tracking easier for advertisers and reduce the likelihood that you’ll opt out.

  • iOS 6 comes in a default “tracking on” position. You have to affirmatively switch it off if you do not want advertisers to see what you’re up to.
  • The tracking control in iPhone’s settings is NOT contained where you might expect it, under the “Privacy” menu. Instead, it’s found under “General,” then “About,” and then the “Advertising” section of the Settings menu.
  • The tracking control is titled “Limit Ad Tracking,” and must be turned to ON, not OFF, in order to work. That’s slightly confusing — “ON” means ads are off! — so a large number of people will likely get this wrong.

Those three factors combined mean that a huge proportion of iPhone users are unlikely to ever opt out of tracking.

“It’s a really pretty elegant, simple solution,” says Mobile Theory CEO Scott Swanson. “The biggest thing we’re excited about is that it’s on by default, so we expect most people will leave it on.”

(His take on IFA’s capabilities was confirmed by two other mobile ad execs at rival companies.)

Again, IFA doesn’t identify you as a person to advertisers. What it does do, however, is provide advertisers with “a really meaningful inference of behavior,” Swanson says. “We haven’t had access to that information before.”

Not to be left behind, VirtuaTechSupport.com now has a mobile site.

 

http://www.inc.com/maeghan-ouimet/how-mobile-will-change-business.html

Survey: How Mobile Will Change Business

In the near future, developers say car apps will be big and Facebook may be the social network of the past.

mobile

How do you unseat a Goliath like Facebook? The strategy in a nutshell: Think mobile.

According to a survey conducted by Appcelerator and research firm IDC, more than 66% of mobile developers believe that start-ups have a fighting chance against Facebook–if they go mobile first.

“Developers are highlighting a cautionary note that all businesses should pay attention to: Mobile has the power to reshape entire industries and these changes will be swift,” the survey reads. “It is not enough to port elements of your existing business model over to mobile. Staying competitive in the era of mobility requires fundamentally re-envisioning traditional business models through a mobile-first lens.”

It’s worth noting that there have been some attempts already to chip away at Facebook’s dominance via mobile apps: fast-growing social network Path is one, which the survey doesn’t mention. But these are still early days. The survey’s larger point is that every business–not just those in the social media space–will need to take a mobile-first approach in the coming years.

The report surveyed 5,526 mobile developers from August 22-28, 2012 on their perceptions of the mobile space and its future integration with social media and the cloud. According to Appcelerator and IDC, this report compiles the world’s largest mobile developer survey conducted to date.

Respondents also weighed in on future mobile predictions: 84% believe they will be building apps for television by 2015 and 74% of developers say they will be building apps for cars by the same date. Above all, most respondents acknowledged the speed at which mobile development is growing and highlighted its importance in the small business community.

“Mobile provides enterprises with an unprecedented opportunity to transform their relationships and build towards competitive advantage–even faster than was possible when Web technologies emerged,” the survey says.

But be warned: Mobile “will also leave a wake of casualties among companies that underestimate the speed of disruption.”

Don’t buy a $350 baby monitor with smartphone streaming…

For anyone even considering getting ripped off buying a $350 baby monitor that has a built-in smartphone app that lets you monitor the camera from your phone…save yourself the money and do this instead…

Just get the iCam phone app for $5 and a regular webcam then connect it to a computer from http://skjm.com/icam

Download the iCamSource FREE PC software and install it, then connect your webcam to the software (the software even auto configures your router for you).

Create a iCamUsername/iCamPassword in the camera setup window on your PC and click Start.

Open the iCam app on your phone and log in…instant streaming from the camera to your phone…and you can connect up to 4 cameras to the software and view all at once or zoom in to one.

 

I just purchased it to test it out myself before writing this and finished the setup and had my camera displaying on my phone in less than 5 minutes…it really is that easy!

I’m not used to getting something for nothing…I like it…

I found something interesting out today.

I found out that Comcast has added a new service feature for both residential and business-class subscribers called Xfinity WiFi.

The network’s currently not very large but is growing, and what it is is a secured wireless network named xfinitywifi that residential Performance level service or higher & business class Standard level service or higher can log into with their Comcast website login and take their internet service mobile with them when they leave the house.

Stranger still is that Comcast is including it in the subscription with no additional cost to the customers.

I’m not used to getting something for nothing, hopefully this trend continues.

LINK OF THE WEEK – I backup with Carbonite. You should too!

 

This is an awesome service that I just started using this year!!!  At $59 a year and you never worry about losing your computer files again. They also include more expensive packages for full system images and overnight delivery of a new hard drive with your image pre installed.

Try Carbonite Home free & get 2 BONUS months when you subscribe.

With Carbonite Home, you get simple, secure and affordable online backup for all of your irreplaceable computer files, like photos, music, spreadsheet and more. Once installed, your files will be backed up automatically to the cloud, so you can rest easy knowing your files are safe.

http://www.carbonite.com/lp/mktg/refer-signup.aspx?catid=201801&cf_from=http%3A%2F%2Fwww.carbonite.com%2Flp%2Fmktg%2Frefer-signup-join.aspx%3Fcm_mmc%3Dpopup-_-USA%253ACON%253AUSA-CON-PU-PROMO-RAF-CF-SEPT2012-_-click2-_-091112%26cm_lm%3Dcorrea.robert.j%2540gmail.com&cf_synd_id=_6iust1

BACK UP

Once you install Carbonite, you’ll never have to remember to back up again. The automatic backup runs continually in the background, protecting new and changed files whenever your computer is connected to the internet.

RELAX

Carbonite creates encrypted copies of your files and transmits them to one of Carbonite’s state-of-the-art data centers using secure socket layer (SSL) security technology.

RESTORE

When you need to get your files back, Carbonite walks you through an easy-to-follow process that restores your backed up files to the right place on your computer.

ACCESS

Not at your computer? You can get to your backed up files from any computer connected to the Internet — or even from your iPhone®, Android™ or BlackBerry® smartphone.

LINK OF THE WEEK – Hackers leak 1 million Apple device IDs

 

From TECHNOLOG on NBCNews.com

http://www.nbcnews.com/technology/technolog/hackers-leak-1-million-apple-device-ids-977988

 

To cap off a summer of devastating corporate data breaches, hackers yesterday posted online what might be the crown jewel of 2012 data dumps: 1 million identification numbers for Apple iPhones, iPads and iPod Touch’s, all purportedly stolen from the FBI.

 

There may also be an additional 11 million Apple device IDs yet to be released, many with users’ full names, addresses and telephone numbers attached.

“Why exposing [sic] this personal data?” asked the unnamed writer ofthe Pastebin posting announcing the data dump, who claimed to be affiliated with the anti-government hacktivist group AntiSec. “Well, we have learnt it seems quite clear nobody pays attention if you just come and say ‘Hey, FBI is using your device details and info and who the [expletive] knows what the hell are they experimenting with that,’ well sorry, but nobody will care.”

Safe … for now
Users of the 1 million affected devices are, for the moment, probably not in any danger of identity theft or account takeovers. However, they may want to know why the FBI apparently had their device IDs on file.

[ 10 Ways the Government Watches You ]

Apple unique device identification numbers (UDIDs) establish a single iOS device’s identity in the Apple ecosystem, letting iTunes and app developers know which device is running what.

UDIDs are what lock most iOS devices into installing only software from the iTunes App Store, and what let game developers keep track of each user’s high score.

The 88-megabyte file posted by AntiSec on several file-sharing sites is heavily encrypted, but the Pastebin posting offers detailed instructions for decrypting it using open-source software.

To check whether your iPhone, iPad or iPod Touch’s UDID might be among those affected, a software developer based in Florida has already posted a tool at http://kimosabe.net/test.html.

Apple UDIDs can be found by plugging an iOS device into a computer, opening iTunes and clicking on the device serial number displayed.

Mac-centric website MacOS Rumors has verified that many of the UDIDs in the data dump are genuine, but notes that “UDIDs themselves are rather harmless in isolation.”

However, New Zealand-based security researcher Aldo Cortesi has shown that thanks to disregard of Apple’s security guidelines by iOS game and app developers, it’s possible to determine a user’s identity through an UDID alone.

Hacker counterintelligence
The Pastebin post claims that the UDIDs were stolen thanks to an Anonymous hack into the laptop of FBI agent Christopher Stangl, a member of a New York-based cybercrime task force.

Stangl has spoken publicly on matters of cybersecurity, appearing in February 2011 on a panel discussion on cybercrime attended by SecurityNewsDaily. Two years earlier, he starred in a FBI recruitment video posted on Facebook.

Stangl was also among 44 American and European law-enforcement personnel copied on an email, sent in January 2012, inviting recipients to join a conference call to discuss efforts against the hacktivist groups Anonymous and LulzSec.

Anonymous intercepted the email and used it to eavesdrop on and record the conference call, which they then posted online in February 2012.

According to yesterday’s Pastebin post, hackers used a then-new Java exploit to get into Stangl’s machine.

“During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java,” the posting states. “During the shell session some files were downloaded from his Desktop folder one of them with the name of ‘NCFTA_iOS_devices_intel.csv’ turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted on many parts.”

“No other file on the same folder makes mention about this list or its purpose,” adds the writer of the Pastebin post.

“CSV” is the Windows filetype associated with a list of comma-separated values, which separate database entries with a comma and can be read by Microsoft Excel and many other applications.

“NFCTA” may refer to the National Cyber-Forensics & Training Alliance, a Pittsburgh-based non-profit organization that, in its own words, “functions as a conduit between private industry and law enforcement with a core mission to identify, mitigate and neutralize cybercrime.”

It is not clear why an FBI agent would have a database of 12.4 million iOS device UDIDs on his laptop, nor why the NFCTA would have provided them to him.

Requests for comment by SecurityNewsDaily to Apple and the NFCTA were not immediately returned. An FBI spokeswoman said the bureau was aware of the reports but had no further comment.

Sprechen Sie Deutsch?
In a blog posting this morning, Errata Security CEO Robert Graham theorizes that the hackers may have used the intercepted FBI email to “spear phish ” the email’s recipients, luring them to a rigged website that would have loaded the brand-new, or “zero-day,” Java exploit onto their machines.

“If I have an email list of victims, and a new [zero]-day appears, I’m immediately going to phish with it,” wrote Graham. “It’s not Chinese uber APT [advanced persistent threat] hackers, it’s just monkeys mindless[ly] following a script.”

Graham Cluley, a security researcher with the British firm Sophos,pointed out today that the Pastebin writer may be a native German speaker thanks to an impolite message in German to Mitt Romney at the end of the post. The stilted English grammar, frequent use of the preposition “so” to begin sentences, a reference to Austrian banks and a Goethe quotation also indicate a German-language connection.

As might be expected, the writer makes shout-outs to Anonymous, WikiLeaks, the Syrian rebels and the imprisoned Russian punk bandPussy Riot, and criticizes National Security Agency head Gen. Keith Alexander’s appeal in July to hackers to join the government.

But the writer also cites Jack Henry Abbott, the prison-based writer who was paroled in 1981 thanks to the efforts of famed author Norman Mailer. Abbott killed another man six weeks into his parole and spent the rest of his life in prison.

The writer also uses the Latin phrase “argumentum ad baculum,” or “appeal to the stick,” the proposition that arguments, however flawed, can be won through use of force.

In a dig at the press, the writer also demands that Adrian Chen, a technology reporter at the gossip blog Gawker who has written extensively on Anonymous, humiliate himself on camera.

“No more interviews to anyone till Adrian Chen get featured in the front page of Gawker, a whole day, with a huge picture of him dressing a ballet tutu and shoe on the head,” the posting says. “No Photoshop.”

Update 1:30 p.m. ET, Sept. 4:  A law enforcement official who spoke to NBC News on condition of anonymity said that there is no evidence the FBI ever requested the Apple data through the legal process.  It’s believed to be likely a hoax designed to infect other users because of malware in the posting. No evidence, so far, of any FBI computers being compromised, though that is still being checked.

 

 

 

Tools for Managing EXIF Data of your Images

After seeing the video posted in the LINK OF THE WEEK I started looking for more information on the Exif Data included in the photographs we take.

I found the following article from May 20th of this year in “digital inspiration – tech a la carte”

 

http://www.labnol.org/software/exif-data-editors/14210/

 

Tools for Managing EXIF Data of your Images

Most digital camera record and save EXIF data with every photograph. Learn about tools that can help you view and edit Exif tags of your photographs.

When you capture a photograph with your digital camera, the camera will not only store the current date and time into the image file but even the camera settings.

Exif Metadata in Photographs

The information that is recorded by the camera into the photograph may include details about the camera model itself, the lens that was used, shutter speed, aperture, focal length and so on. Some modern digital cameras and camera phones are GPS enabled and they can therefore save even the location co-ordinates (latitude and longitude) with the photographs.

All this “metadata” is embedded into photographs using the standard Exif format that can easily be read by most image editing programs as well as online photo sharing websites like Flickr and Picasa Web Albums.

1. How to View Exif Data of Images

If you are impressed by a photograph and would like to know more about the camera make and the lens settings that were used when capturing that picture, here’s what you can do do.

Go to Jeffrey’s Exif Viewer and upload the photograph (or if you found the picture on the web, simply copy-paste the image URL). The tool will create a nice summary of all the meta data stored in that photograph along with the location information (see example).

Alternatively, you may use Google’s Picasa, Windows Live Photo Gallery, or any other photo viewer programs to display Exif data from photographs on your desktop.

2. How to Edit Exif Data in Photographs

Why would anyone want to modify the Exif data of photographs? Well, there can be several genuine reasons.

For instance, the internal date of your camera was incorrect and therefore all the pictures were captured with a wrong timestamp. Or you want to add your name to the photograph’s metadata so that people immediately know who the owner is. WIth an Exif editor, you can also geo-tag your photographs manually even if your camera doesn’t have GPS.

You may be a bit surprised but Windows Explorer is actually a wonderful Exif editor. Just right click any image file, choose Properties and click the Details tab. You can now edit a wide range of metadata associated with that image from the camera model to the shooting date to copyright information and more.

Windows Explorer won’t let you edit GPS related information of photographs but Google’s Picasa software is a good choice for doing that.

Finally, if you want to change the Exif data in tons of photographs, you can edit them all in one go using a dedicated Exif editors like Geosetter or Microsoft Pro Photo.  Geosetter can pull Exif tags from one photograph and apply them to all your other photos while Pro Photo is more suited for geo-tagging pictures.

Similar stuff can also be done with the help of command like utilities like jHead and ExifTool– these are very powerful tools but implementation is obviously a bit geeky.

3. How to Remove Metadata from Photographs

Sometimes the Exif data of your photographs may reveal more than what you would expect. It may therefore sometimes sense to strip your images of all the meta information before uploading them to the web.

To remove all the metadata from a photograph, just right-click the files inside Windows Explorer and choose Properties. Now click the Details tab and select the option that says “Remove Properties and Personal Information.”

Choose “Remove the follow properties from this file” followed by “Select All” and click OK. All the private metadata tags are now erased from the photograph. Simple!

 

Why Remote Workers Are More (Yes, More) Engaged

From: Harvard Business Review

by Scott Edinger | 8:00 AM August 24, 2012

Who is more engaged and more committed to their work and rates their leaders the highest?

A. People who work in the office
B. People who work remotely

If you picked A, you might be as surprised as the investment firm I worked with recently, which found in reviewing results of a 360-degree feedback process that the answer was, in fact, B.

The team members who were not in the same location with their leaders were more engaged and committed — and rated the same leader higher — than team members sitting right nearby. While the differences were not enormous (a couple of tenths of a point in both categories), they were enough to provoke some interesting speculations as to why this might be happening.

It made perfect sense to me, though. Here is why:

Proximity breeds complacency. I’ve worked with leaders who sit in the same office with those they manage but go for weeks without having any substantive face-time with them. In fact they may use e-mail as their primary source of communication when they sit less than 50 feet away. It’s even worse if they sit in different parts of a building — or all the way on another floor. This is not to say that these leaders are in any way lazy — just that because the possibility of communicating is so easy, it is so often taken for granted.

Absence makes people try harder to connect. When I managed a team of professionals in nine different locations, I made a point of deliberately reaching out to each of them by phone at least once a week, and frequently more often. I’m not an anomaly here. Most leaders I work with make an extra effort to stay connected to those they don’t ordinarily run into. They can see that taking even a few minutes to talk about what’s happening in their respective worlds before addressing the tasks at hand makes a difference in maintaining the connection with a colleague. What’s more, because they have to make an effort to make contact, these leaders can be much more concentrated in their attention to each person and tend to be more conscious of the way they express their authority.

Leaders of virtual teams make a better use of tools. Because leaders of far-flung teams have to use videoconferencing, instant messaging, e-mail, voicemail, and yes, the telephone, to make contact, they become proficient in multiple forms of communication, an advantage in leadership that their traditional counterparts could well develop but not so automatically.

Leaders of far-flung teams maximize the time their teams spend together. Having had to make such an effort to get the team together, these leaders naturally want to make the best use of their precious time. They take care to filter out as many distractions as possible so they can focus on the work to be done together. They also typically spend more than an ordinary work day together, socializing at planned luncheons, dinners, and activities. This level of focused attention is hard to replicate day to day. I’ve heard from some employees who work near their bosses on teams whose other members work elsewhere that the most time they spend with their leader is when the others come in for such meetings.

None of this is to say that working remotely is better than coming to the office. Or that virtual teams are better than traditional ones. On the contrary, I’m suggesting that they are exactly the same this regard: Someone working in the same office with their leader needs just as much effective communication as someone located in a different office. It’s just that, ironically, they’re less likely to get it.

Read More: http://blogs.hbr.org/cs/2012/08/are_you_taking_your_people_for.html

Forget Apple, Forget Facebook: Here’s The One Company That Actually Terrifies Google Execs

From: Business Insider

Nicholas Carlson | Aug. 15, 2012, 2:42 PM
It’s very easy to get caught up in the Android versus iPhone duel and Google’s recruiting battles with its newly-public Silicon Valley neighbor, Facebook.

But neither one of those companies worry Google executives as much as another that is actively taking money out of their pockets.

This company is from Washington, but no, it’s not Microsoft.

Google’s real rival, and real competition to watch over the next few years is Amazon.

Google is a search company, but the searches that it actually makes money from are the searches people do before they are about to buy something online. These commercial searches make up about 20 percent of total Google searches. Those searches are where the ads are.

What Googlers worry about in private is a growing trend among consumers to skip Google altogether, and to just go ahead and search for the product they would like to buy on Amazon.com, or, on mobile in an Amazon app.

There’s data to prove this trend is real. According to ComScore, Amazon search queries are up 73 percent in the last year. But it makes intuitive sense doesn’t it?

Why go through these steps …

  • Google search “rubber galoshes,”
  • Analyze some text links,
  • Click on one to go to a product page on some e-commerce store,
  • Click to add the item to your cart,
  • Input your credit card,
  • Input your address,

… when you can just …

  • Search amazon for “rubber galoshes,”
  • Click one button to buy the product with your usual credit card and have it shipped to your normal address.

On mobile, where Amazon has its own app and Google is just a search bar for a smaller-screened browser, the equation tips further in Amazon’s balance.

The scenario gets even scarier for Google if Kindle phones and Kindle tablets gain ubiquity.

If you have a Kindle phone, which comes with free movies and books because you have an Amazon Prime account, which also gives you free shipping, why in the WORLD would you ever search to buy something through anything but Amazon?

You wouldn’t.

That’s why Amazon is practically giving its hardware away.

It’s also why Amazon scares Google more than anything Facebook or Apple are up to.

Read more: http://www.businessinsider.com/forget-apple-forget-facebook-heres-the-one-company-that-actually-terrifies-google-execs-2012-8#ixzz24TgPbAW8