decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
D604,305 and iPhone 5 | 111 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
Chinese company uses leaked photos to copy, patent iPhone 5 design
Authored by: Anonymous on Wednesday, September 12 2012 @ 01:24 PM EDT
Link
Memo to Samsung (005930): Now this is how you get away with copying Apple (AAPL)! GizChina reports that a Chinese manufacturer has used leaked photos of Apple’s next- generation iPhone to slap together a quick knockoff of the device called the Goophone I5 and release it before Apple has a chance to launch the genuine article later this month. What’s more, the company has actually patented the knockoff design in China and is poised to sue Apple if it launches the next-generation iPhone in China later this year.

[ Reply to This | Parent | # ]

Baking a KindleBerry Pi
Authored by: Anonymous on Wednesday, September 12 2012 @ 02:00 PM EDT
The plan was, using a Kindle as a screen, connecting it to the processing power of the Raspberry Pi while using an external keyboard to work comfortably. Since connecting an external keyboard to the Kindle seemed impossible at that point, I needed to use the Raspberry Pi as the ‘hub’.

The tinkering started and the KindleBerry Pi was soon to be born.

damaru, ponnuki

[ Reply to This | Parent | # ]

"New feature": iPhone 5 not back compatible for free...
Authored by: IMANAL_TOO on Wednesday, September 12 2012 @ 02:13 PM EDT
http://money.cnn.com/2012/09/12/technology/apple-iphone-5-event/index.html

"Another new feature -- correctly foreshaowded by rumors -- is
"lightning," Apple's new eight-pin connector, which is significantly
smaller than the 30-pin connector that Apple has used since 2003. Apple will
sell adapters so people can still use old chargers and legacy connectors."

LOL!

Apple...



---
______
IMANAL


.

[ Reply to This | Parent | # ]

D604,305 and iPhone 5
Authored by: Anonymous on Wednesday, September 12 2012 @ 06:51 PM EDT
I'm not sure if this is the correct place to mention this, but I think I recall during the first day of testimony that one of the Apple witnesses mentioned that the 4 by 4 grid was "ornamental" rather than functional. However, the iPhone 5, as announced today adds a 5th row as a result of the additional screen real-estate. Wouldn't that make D604,305 functional rather than ornamental? If it was an ornamental decision surely they'd have maintained the 4 by 4 grid, correct?

[ Reply to This | Parent | # ]

CBC: Instagram hashtags help Aussie police crack down on marijuana
Authored by: Anonymous on Wednesday, September 12 2012 @ 09:12 PM EDT

There's a news article on the CBC web site Instagram hashtags help Aussie police crack down on marijuana about how police are using Instagram hashtags to find marijuana smokers. The rights or wrongs of marijuana are not relevant here, but it is interesting how some people seem to have a false sense of anonymity on the Internet.

Police are cracking down on illegal grow-ops and marijuana possession in Australia right now, thanks in part to the help of snap-happy potheads who flag their Instagram photos with tags like #aussiestoners #weedstagram and #oznugs.

A Victoria Police spokesman warned this week that “online dopes” would be tracked and prosecuted through photo-sharing websites, and would face hefty penalties if caught.

They're not even trying very hard to hide themselves.

Pictures of joints, bongs, clouds of smoke, bags of weed and tools like grinders are found in many of the photos. Some show full-out crops of the illegal plants.

Some even leave their location coordinates on!. I suspect that's a result of simple stupidity though, not brazenness.

While most instagrammers have remembered to turn off the service's automatic geo-location feature before posting these photos, some do not. Many of the photos also contain identifiers like faces, locations and regularly-used screennames.

I think this is a good example of what a lot of "Face-Twit" users are really like. They really don't know what they are doing when it comes to personal security, and aren't prepared to listen to anyone who does know. They will however act completely amazed when it all catches up to them. A lot of people haven't clued into the fact that anyone who wants to find them, will.

I won't be surprised if police eventually start to use image recognition software more advanced than what we use today to start trolling social media sites for pictures of various crimes or other legal or political infractions. There will be a huge treasure trove of people doing stupid things to draw on,

Governments already use sites like Facebook to identify political "enemies". That happened in the city where I live, where a young girl was detained by police as a potential "troublemaker" because she had a photo of herself on Facebook standing beside the leader of the opposition at a public event. There was no suggestion that she had done anything wrong or planned to do anything wrong. She wasn't a member of any political party. The prime minister's staff were simply using Facebook to target anyone who had contact with opposition politicians to "sanitize" the city prior to a visit by their boss. This is "democracy" in our enlightened world today.

So to everyone who has Facebook or Twitter accounts, the question you need to ask yourself is "how could someone use this against me if they wanted to"? A lot of people would answer "but I'm no one, so who would go through the trouble of bothering me"? Well when software is developed which can rifle through your past cheaply and easily, bothering you really won't be much trouble at all for someone. It will all be automated except for the actual arrest.

As Cardinal Richelieu is believed to have once said: "If you give me six lines written by the hand of the most honest of men, I will find something in them which will hang him."

[ Reply to This | Parent | # ]

Want global LTE roaming on iPhone 5?
Authored by: Anonymous on Wednesday, September 12 2012 @ 10:03 PM EDT
Don’t buy it from AT&T arstechnica

Samsung are gonna have their work cut out hackin' thru the 4G market jungle...

[ Reply to This | Parent | # ]

Google's Enlightening Statement on FRAND Related Patent Injunctions to Congressional Commitee!
Authored by: Anonymous on Thursday, September 13 2012 @ 12:56 AM EDT
If you only thought Apple, Microsoft and Nokia may be plotting against Google and it's Android OHA members, read this. Google and it's partners need for everybody in this country to be aware of what's going on in the Netherworlds, that Nokia, Microsoft and Apple are attempting to misinform the public and turn us against those that built our Wireless technologies from scratch!

Many of these members are responsible for spending Billions of Dollars on the development of ETSI Standards for Wireless Telecommunications. So stand by to be thoroughly enlightened, while reading Google's Statement especially if you haven't already read it: (Google's Statement begins about half way down this PDF)

Statements to Congressional Committee Google on Frand and Injunctions

What I'm most impressed by is Google's perspicuous insights into the motives and strategies employed by these 3 companies in a for sure collaborative effort to eliminate Choice for Consumers. The anticompetitive nature of these viperous three corporations should wake you up to what they are really attempting to sell on.

The Triad; Microsoft, Nokia and Apple are pulling out all the stops in an attempt to paint SAMSUNG, Motorola and HTC as the bad guys, they are only trying to save us from. While filling us with copious amounts of Media RDF, Balmer Ranting Snake oil and painting themselves as little puppy underdogs like Nokia. It seems they want us to believe they're all about to have the life snuffed out of themselves by the big old mean and nasty Google and their fellow corporate criminals! ....but in reality, I'm sure "EMBRACE EXTEND EXTINGUISH" is the foundation of this EVIL TRIAD ULtIMATE AIMS!!!

[ Reply to This | Parent | # ]

Apple founder regrets patent dispute - ... not that innovative
Authored by: Anonymous on Thursday, September 13 2012 @ 07:08 AM EDT
From a Bloomberg interview with the Woz: “I hate it,” Wozniak said when asked about the patent fights between Apple and Samsung. “I don’t think the decision of California will hold. And I don’t agree with it -- very small things I don’t really call that innovative."

[ Reply to This | Parent | # ]

Chip-and-pin security is completely broken
Authored by: Anonymous on Thursday, September 13 2012 @ 11:40 AM EDT
Rese archers have published some new flaws in the widely-used "Chip and PIN" smartcard systems (used worldwide in credit cards, bank cards, etc.) Half of the ATM brands they tested, proved vulnerable. They've built proof-of-concept prototypes of all stages of the main attack against ATMs whose "unpredictable numbers" are not really unpredictable. Also, the "unpredictable number" is not tamper-proof in communication between the ATM and the issuing bank, so even with ATMs whose UN generation is properly secured, man-in-the-middle network attacks still give the same result: details skimmed from a card days or weeks earlier can be presented to a legitimate ATM using a fake card, and the issuing bank can't tell the difference.

These new attacks are effectively as powerful as being able to just clone the info on the smartcard (which is what the entire Chip-and-PIN system supposedly makes impossible).

The best part is this: As these new cards were deployed, all of the banks switched from making the merchants liable for the fraudulent transactions, to making the CARDHOLDERS liable! Because the cards are "secure" now. So if your account gets ripped off, your bank probably won't reimburse you.

The paper is quite readable, even for non-cryptography experts.

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )