• chevron_right

      Keynote iPhone 12 : comment suivre la conférence Apple prévue ce mardi

      Maxime Claudel · news.movim.eu / Numerama · Tuesday, 13 October, 2020 - 08:50

    Conférence Apple du 13 octobre 2020

    Apple organise un nouveau keynote ce mardi 13 octobre, à partir de 19h. Il sera normalement centré sur la nouvelle gamme d'iPhone, entre autres surprises. [Lire la suite]

    Abonnez-vous à notre chaîne YouTube pour ne manquer aucune vidéo !

    L'article Keynote iPhone 12 : comment suivre la conférence Apple prévue ce mardi est apparu en premier sur Numerama .

    • chevron_right

      iPhone 12, iPhone 12 Pro : écran 120 Hz, encoche, prix… Tout ce que l’on sait sur les futurs smartphones Apple

      Maxime Claudel · news.movim.eu / Numerama · Monday, 12 October, 2020 - 16:46

    Si la situation le permet, Apple lancera une nouvelle gamme de smartphones en fin d'année comme à l'accoutumée. Les premières rumeurs sur la génération 12 des iPhone sont déjà là. On fait le point sur ce que l'on sait sur le design, les caractéristiques, les nouveautés et le lancement. [Lire la suite]

    Abonnez-vous à notre chaîne YouTube pour ne manquer aucune vidéo !

    L'article iPhone 12, iPhone 12 Pro : écran 120 Hz, encoche, prix… Tout ce que l’on sait sur les futurs smartphones Apple est apparu en premier sur Numerama .

    • chevron_right

      Apple can continue blocking iOS Fortnite as Epic Games trial moves forward

      Kyle Orland · news.movim.eu / ArsTechnica · Monday, 12 October, 2020 - 15:14

    Artist

    Enlarge / Artist's conception of competing lawyers from Apple and Epic Game focusing their legal arguments on the court. Metaphorically, of course.

    Apple can continue to block Epic Games' Fortnite from the iOS App Store as the parties move to a trial, Federal District Judge Yvonne Gonzalez Rogers said in a ruling issued late Friday.

    In the 39-page ruling , Judge Rogers restates her previous finding that any harm Epic is currently facing to its Fortnite business, or to the game's reputation, is self-inflicted on Epic's part. The company brought about the current state of affairs when it issued a hotfix update offering a new Epic Direct Payments in-app purchase (IAP) system for Fortnite , a move that was in direct violation of its iOS App Store development contract with Apple.

    "In short, Epic Games cannot simply exclaim 'monopoly' to rewrite agreements giving itself unilateral benefit," Judge Rogers writes in denying Epic's request for an injunction restoring Fortnite to the App Store. "The current predicament is of its own making."

    Read 12 remaining paragraphs | Comments

    index?i=Rlt1hWWIaF8:oGTdcC2OLGM:V_sGLiPBpWUindex?i=Rlt1hWWIaF8:oGTdcC2OLGM:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA
    • chevron_right

      Apple’s T2 security chip has an unfixable flaw

      WIRED · news.movim.eu / ArsTechnica · Saturday, 10 October, 2020 - 11:04 · 1 minute

    2014 Mac mini and 2012 Mac mini

    Enlarge / The 2014 Mac mini is pictured here alongside the 2012 Mac mini. They looked the same, but the insides were different in some key—and disappointing—ways. (credit: Andrew Cunningham )

    A recently released tool is letting anyone exploit an unusual Mac vulnerability to bypass Apple's trusted T2 security chip and gain deep system access. The flaw is one researchers have also been using for more than a year to jailbreak older models of iPhones . But the fact that the T2 chip is vulnerable in the same way creates a new host of potential threats. Worst of all, while Apple may be able to slow down potential hackers, the flaw is ultimately unfixable in every Mac that has a T2 inside.

    In general, the jailbreak community hasn't paid as much attention to macOS and OS X as it has iOS, because they don't have the same restrictions and walled gardens that are built into Apple's mobile ecosystem. But the T2 chip, launched in 2017 , created some limitations and mysteries. Apple added the chip as a trusted mechanism for securing high-value features like encrypted data storage, Touch ID, and Activation Lock, which works with Apple's "Find My" services. But the T2 also contains a vulnerability, known as Checkm8, that jailbreakers have already been exploiting in Apple's A5 through A11 (2011 to 2017) mobile chipsets. Now Checkra1n, the same group that developed the tool for iOS, has released support for T2 bypass.

    On Macs, the jailbreak allows researchers to probe the T2 chip and explore its security features. It can even be used to run Linux on the T2 or play Doom on a MacBook Pro's Touch Bar. The jailbreak could also be weaponized by malicious hackers, though, to disable macOS security features like System Integrity Protection and Secure Boot and install malware. Combined with another T2 vulnerability that was publicly disclosed in July by the Chinese security research and jailbreaking group Pangu Team, the jailbreak could also potentially be used to obtain FileVault encryption keys and to decrypt user data. The vulnerability is unpatchable, because the flaw is in low-level, unchangeable code for hardware.

    Read 13 remaining paragraphs | Comments

    index?i=W0mOsUwthoo:meuHwbliPw0:V_sGLiPBpWUindex?i=W0mOsUwthoo:meuHwbliPw0:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA
    • chevron_right

      Microsoft thumbs its nose at Apple with new “app fairness” policy

      Kate Cox · news.movim.eu / ArsTechnica · Friday, 9 October, 2020 - 19:22 · 1 minute

    Microsoft sign at the entrance of their Silicon Valley campus in Mountain View, California.

    Enlarge / Microsoft sign at the entrance of their Silicon Valley campus in Mountain View, California. (credit: Nicolas McComber | Getty Images )

    Microsoft this week adopted a whole slew of "fairness principles" for its Windows app store. The list of principles does look like a decent set of guidelines for both consumers and developers—but it also looks a whole lot like Microsoft is taking the metaphorical ball, throwing it at Apple's face, and daring their iCompetitor to make the next move.

    The principles, which Microsoft listed in a corporate blog post , essentially promise that Windows will keep on doing what it already does with regard to app distribution, interoperability, payment systems, and everything else.

    The first item, for example, promises that developers may choose whether to distribute Windows programs through the Microsoft Store or through their own competing app storefronts. This has always been the case, and it's why Steam, the Epic Games store, and every other Windows software distribution method exist. Windows also promises not to block an app from Windows "based on a developer's choice of which payment system to use" for processing in-app purchases which, again, is why and how both Web-based and app-based digital software storefronts for Windows exist.

    Read 10 remaining paragraphs | Comments

    index?i=6lT_LUlTJ8U:dpDeMzFdbwo:V_sGLiPBpWUindex?i=6lT_LUlTJ8U:dpDeMzFdbwo:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA
    • chevron_right

      Liveblog: All the news from Apple’s “Hi, Speed” event

      Samuel Axon · news.movim.eu / ArsTechnica · Friday, 9 October, 2020 - 17:41

    An Apple logo is surrounded by colorful concentric circles.

    Enlarge / The promotional key art graphic Apple sent out with its announcement about its October 13, 2020, product launch event. (credit: Apple )

    Liveblog starts in:

    View Liveblog

    At 10:00am Pacific time (1pm Eastern) on Tuesday, October 13, Apple will hold its second live event in less than a month—almost certainly to announce new iPhones this time, after the previous event focused on iPads and the Apple Watch.

    Ars Technica will be liveblogging the event and publishing the major announcements in real time as usual. Return to this page when the event starts to follow the updates.

    This event carries the tagline "Hi, Speed," which could refer to any number of things: 5G modems in new phones, the faster A14 chip that was already introduced last month, or even Apple Silicon in the first non-Intel Mac in many years.

    Read 3 remaining paragraphs | Comments

    index?i=mR5scoqdDoo:-fATVBC5gDw:V_sGLiPBpWUindex?i=mR5scoqdDoo:-fATVBC5gDw:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA
    • chevron_right

      HomePod mini : l’enceinte connectée d’Apple va bientôt rapetisser

      Maxime Claudel · news.movim.eu / Numerama · Friday, 9 October, 2020 - 12:32

    Apple devrait lever le voile sur une nouvelle enceinte connectée lors de sa conférence du 13 octobre. Il s'agirait du HomePod mini, déjà évoqué par le passé. [Lire la suite]

    Abonnez-vous à notre chaîne YouTube pour ne manquer aucune vidéo !

    L'article HomePod mini : l’enceinte connectée d’Apple va bientôt rapetisser est apparu en premier sur Numerama .

    • chevron_right

      Keynote Apple : bienvenue à l’iPhone 12 mini, l’iPhone 12, l’iPhone 12 Pro et l’iPhone 12 Pro Max

      Maxime Claudel · news.movim.eu / Numerama · Friday, 9 October, 2020 - 09:21

    Apple Store

    À quelques jours de la prochaine conférence Apple centrée sur les iPhone, une grosse fuite crédible permet d'obtenir quelques détails sur les produits attendus. [Lire la suite]

    Voitures, vélos, scooters... : la mobilité de demain se lit sur Vroom ! https://www.numerama.com/vroom/vroom//

    L'article Keynote Apple : bienvenue à l’iPhone 12 mini, l’iPhone 12, l’iPhone 12 Pro et l’iPhone 12 Pro Max est apparu en premier sur Numerama .

    • chevron_right

      White-hat hackers who had control of internal Apple network get $288,000 reward

      Dan Goodin · news.movim.eu / ArsTechnica · Thursday, 8 October, 2020 - 23:47

    Inside a black-and-white Apple logo, a computer screen silhouettes someone typing.

    Enlarge (credit: Nick Wright. Used by permission.)

    For months, Apple’s corporate network was at risk of hacks that could have stolen sensitive data from potentially millions of its customers and executed malicious code on their phones and computers, a security researcher said on Thursday.

    Sam Curry , a 20-year-old researcher who specializes in website security, said that, in total, he and his team found 55 vulnerabilities. He rated 11 of them critical because they allowed him to take control of core Apple infrastructure and from there steal private emails, iCloud data, and other private information.

    The 11 critical bugs were:

    Read 16 remaining paragraphs | Comments

    index?i=s8dQk5HZyoY:SkRwld-yTFs:V_sGLiPBpWUindex?i=s8dQk5HZyoY:SkRwld-yTFs:F7zBnMyn0Loindex?d=qj6IDK7rITsindex?d=yIl2AUoC8zA