There is no doubt that the issues of privacy and confidentiality in your use of the iPhone are of utmost importance in the smartphone community, its users, developers and even its companies, so we talk a lot about it to educate everyone about the importance of this matter, especially with the large spread of smartphones around the world and its recent popularity and what this popularity will inevitably cause from the spread of penetration Privacy, confidentiality and user information theft.

We reviewed Previously, ways to protect the iPhone and your data on it, including the Find My iPhone service of Apple's paid me.com service, which accurately locates the stolen iPhone and enables you to control it remotely, such as closing it and wiping its data, but Apple seems to think that this is not enough to come to us. With a patent registered in its name recently and very advanced, its job is to catch the thief of your device and record its data with great accuracy! Yes, do not be surprised when you read the mechanism of action of this invention as it does the following:

  • Voice recording from the hand of the iPhone currently.
  • Take his photo.
  • Determine its location geographically.
  • Moreover, running the accelerometer or the Accelerometer to determine the position and movement of the device currently in the hands of the user and thus determine the position of its holder!

This invention takes multiple random pictures from the iPhone remotely without any "flash" so that no one feels that these pictures are taken and sends them to Apple for analysis and trying to find out the location and position of the user. This technology then notifies the user Binder By Apple (i.e. the original owner of the iPhone) through multiple means such as SMS or instant messages or VoIP calls that someone uses his device, then it then transfers sensitive data to a remote provider for safekeeping and then wipes all the data on the phone Present. Also, this technology disables some capabilities and features of the device to become unusable.

What is more, this technology may use highly sophisticated methods to determine the reliability of the current user of the device or not, such as a special sensor to determine the heartbeat of the current iPhone user to verify it, as well as some well-known methods such as determining the number of times to enter the correct password before shutting down the phone!

To here, this technology may seem very sophisticated and imaginative, especially the part about identifying the heartbeat and tension of the user, and at the same time it raises horror, we know that many major companies such as Google, Microsoft, Facebook and others have a lot of real sensitive information about their users and any wrong or harmful use in this The information may expose these companies to loss of credibility and consequently the loss and loss of their users, and we have seen how the taking of a few pictures by Google on the streets in European and Asian cities sparked a sensation against them and legal claims in the courts, which led to their retreat, recognition and apology. Therefore, any misuse of this information is a suicide for these companies, especially with the fierce competition.

But the problem with Apple is not here, but in its definition of Trusted User It considers, for example, that whoever uses jailbreaking, unlocking the protection and unlocking the network, or using unauthorized or pirated programs, is an untrusted user who may lead to the application of that technology on him and thus expose his information and breach his privacy, and this is what many bodies raised after the news of this new invention was published. Camel.

It is good for Apple to seek to keep the user’s devices from being stolen in these advanced ways, but what about the "legality" of the jailbreak as recognized by some US courts, what about the privacy of its users, and what about the wrong and dangerous use of this technology in other forms?

We think Apple has a lot to explain on this topic. We believe that not every patent is suitable for actual execution. What do you think?

Related articles