logoalt Hacker News

otterleytoday at 3:29 AM1 replyview on HN

First, are you a security expert? If so, please provide your bona fides. Apple employs some of the brightest software and hardware security experts in the business. (Cellebrite can attest to this; they possess far fewer capabilities to crack iPhones than every other phone on the market.) If they perceive handling out JIT capabilities to apps as risky, I believe them. You, on the other hand, come with no evidence to the contrary other than a bare assertion.

Second, I already told you that there is no claim in the complaint that Apple is withholding Safari features in order to pad its apps business. If you believe otherwise, please provide relevant passages from the complaint.

Third, you’ve never had to reply to any of my comments. That’s on you.


Replies

leptonstoday at 9:16 AM

>First, are you a security expert? If so, please provide your bona fides.

Nice goalpost move. I'm not playing that game with you.

>Apple employs some of the brightest software and hardware security experts in the business.

And yet Safari still gets hacked.

From the DOJ lawsuit:

16. Apple wraps itself in a cloak of privacy, security, and consumer preferences to justify its anticompetitive conduct. Indeed, it spends billions on marketing and branding to promote the self-serving premise that only Apple can safeguard consumers’ privacy and security interests. Apple selectively compromises privacy and security interests when doing so is in Apple’s own financial interest—such as degrading the security of text messages, offering governments and certain companies the chance to access more private and secure versions of app stores, or accepting billions of dollars each year for choosing Google as its default search engine when more private options are available. In the end, Apple deploys privacy and security justifications as an elastic shield that can stretch or contract to serve Apple’s financial and business interests.

https://www.justice.gov/archives/opa/media/1344546/dl?inline

>If they perceive handling out JIT capabilities to apps as risky, I believe them. You, on the other hand, come with no evidence to the contrary other than a bare assertion.

You are influenced by the reality distortion field, that much is clear, no conversation can be had with a cult member. Have a nice day.

show 1 reply