Spanning-Tree Protocol is a link management protocol that provides

Document Sample
Spanning-Tree Protocol is a link management protocol that provides Powered By Docstoc
					  Steven Cook

The Apple iPhone

   BTST 310


Dr. Scott Mensch
                         Table of Contents

Abstract                                     1

Introduction                                 2

Specifications, and Models                   4

Security                                     5

Jailbreaking                                 7

Conclusion                                   10

Works Cited                                  11
        The Apple iPhone is one of the most high tech devices of the 21st century
and will be unrivaled by any phone that will be created from now till the end of
time. You may be thinking to yourself that this is a lie or that this is an opinion
and it isn't true, well you're correct. What better way to drag people in to a debate
other than waving that bacon in front of the fan boys who really care about this
kind of stuff or maybe your just a simple iPhone user who wants to know a little
background on the iPhone and the neat stuff that it can do. Well if you fit any of
the categories that you have been placed in please keep on reading and if you don't
fit, lose some weight and read on anyway!
        The iPhone is a series of multimedia based and Internet capable smart

phones created and produced by Apple Inc. The first of the iPhones was created in


Each iPhone has a camera, texting, a portable iPod player, e-mail, visual

voicemail, multi-touch, WiFi, web browsing, GPS, games, social networking, and

other applications. The iPhone has been sweeping the world with it's

revolutionary technology and advanced media player, but before any of this had

even been created there was an other device that came before it; that device was

called the ROKR which was made in 2005 by Motorola. The main difference

between these devices was The ROKR could only hold 100 songs, had to be

plugged into a computer to access itunes, had a slow and clunky navigation, and

was designed like a BlackBerry. The iPhone could hold about 1,500 songs, access

iTunes wirelessly, tap and go touch screen interface, and had a sleek aluminum

design. “Even as the ROKR went into production, Jobs was realizing he'd have to

build his own phone. In February 2005, he got together with Cingular to discuss a
Motorola-free partnership. At the top-secret meeting in a midtown Manhattan

hotel, Jobs laid out his plans before a handful of Cingular senior execs, including

Sigman. Jobs delivered a three-part message to Cingular: Apple had the

technology to build something truly revolutionary, "light-years ahead of anything

else." Apple was prepared to consider an exclusive arrangement to get that deal

done. But Apple was also prepared to buy wireless minutes wholesale and become

a de facto carrier itself.” (Wired, 2008) This kind of brash decision making

allowed for Jobs to call most of the shots, which in the case of The Motorola

ROKR where they each had an equal say turned out horrible and resulted in a

terrible product. Thankfully the release of the ARM11 chipset allowed for fast

music, video, and data connections at WiFi speeds which made the iPhone even

more appealing. Many companies turned down Apple for it request to make the

iPhone. Cingular which is now AT&T was the only one who would give Jobs the

power he was requesting in order to obtain this device. Jobs even went to Verizon

at one point and they immediately shut him down. He then decided to turn to

Cingular as the sole holder of the iPhone and they would sign a contract that

would make the iPhone belong to AT&T for 5 years. Just as of recent has that

contract expired and the rumors and talk of the iPhone coming to Verizon started.

Which to this point is only speculation and no hard evidence has been produced to

prove it has or has not started production. The issue there is with the CDMA

network that Verizon uses is completely different than the network used by

AT&T. This issue is much different than the issues produced by the first
production of the iPhones, their issue were what Operating System should be used

or how the screen was to be engineered. Apple took a long hard look at the Linux

for its OS, but decided that it needed to use it's own OS so they redesigned OS X

for use on the iPhone instead. They also tried using an iPod as a shell for the first

prototype of the iPhone which didn't work as well for web browsing as it did for

calling. Once figuring out that issue they needed to look into the actual phone

aspects of the device such as antenna design, network simulation, dropped calls,

and radiation. The entire time Apple was working on doing this they needed to

make sure that the entire project was kept hush-hush. During production he kept

ever team separate from the others, hardware in one room, software in another,

and transmitters in a different company. When each of the teams visited a location

they were signed in as different names than Apple, Inc. to keep from raising

suspicion. They even went as far as completely renaming the project and feeding

fake information to each of the groups to keep rumors down.      After everything

was said and done only 30 of the 200 engineers on the project actually got to see

the device, before MacWorld 2006. The iPhone was a success and has continued

to grow to this day.

       There are currently 4 different models of the iPhone in existence. The first

is the original iPhone (known as the iPhone 2G) which had either 4GB, 8GB, or

16GB models, with 128MB or DRAM, and started on iOS 1.0. The second was

the iPhone 3G which only had a 8GB or 16GB model, with still just 128MB

DRAM and ran iOS 2.0. The third is the iPhone 3GS which has an 8GB, 16GB,
and 32GB model, with 256MB DRAM , and ran iOS 3.0. The fourth and newest

iPhone is the iPhone 4 which has a 16GB model and a 32GB one, with 512MB

DRAM this time, and runs on the current 4.2 iOS. The newest features of the

iPhone 4 are a 3-axis gyroscope which allows for better accuracy when moving

the iPhone from original to landscape position and for using geo-location apps or

games. It comes with 2 cameras one on the front and one on the back, the front

camera is used for face-time which is like web chatting on your phone and is .3

MP with tap to focus and video recording at 480p Standard Definition. The back

camera is significantly more impressive with a 5MP camera that can also record in

720P High Definition at 30 fps. Which is significantly higher than most mobile

phones on the market, but is bested by only a few. Another interesting, but not

new feature of the iPhone is the Multi-touch feature which allows for a user to

have more than one finger on the screen control different aspects of the device

such as zoom and pan. The iPhone also has 3 sensors that help to determine what

the phone is doing. There is a proximity sensor which shuts down the display and

touchscreen when the phone is held to an ear. An ambient light sensor that

automatically adjusts the brightness to save battery life, and finally an

accelerometer to decide between portrait or landscape.

       The next order of discussion is the iPhones security and how it can or can

not be accessed by people who don't need to be in the phone. Most anti-iPhone

claim “the iPhone is the most insecure phone we've ever seen and the words
iPhone and security do not belong in the same sentence.” (TheMacLawyer, 2010).

Most of these individuals bring up 3 examples as to why the iPhone is insecure: 1.

It is far to easy to JailBreak, 2. There are too many encryption weaknesses, and 3.

It store screen shots. Finis Price of TechnoEsq a practicing lawyer and computer

forensics expert had this to say about it; “The fact is that many so called

“smart”phones can be cracked and the data stolen. Of course, the same can be said

of laptops, and how many lawyers have theirs encrypted? One key difference with

the iPhone is that it allows you to remotely wipe the email in the event that is ever

lost. Starting back with the iPhone 2.1, it is possible to have the iPhone wipe its

data after ten invalid tries, with each attempt being longer and longer. How many

attorneys can do that with their laptops? Further, if your corporate email is set up

correctly, your mail disappears if your password expires. While this can be

annoying, it is more secure than the BlackBerry, which stores the email on the

device itself. Also, the iPhone holds only 150 emails at most, which while

annoying is more secure than the BlackBerry, which stores much more. Therefore,

even if you use POP email, you are only risking 150 emails. The allegation that

the iPhone has encryption weaknesses rings hollow. There are about 100 security

apps in the App Store which allow you to encrypt the iPhone to protect it in case it

is lost or stolen. You will soon be able to add biometric security to the iPhone

through apps if you so desire (learn more here). The fact is that since the 3G-S

version was introduced two years ago, the iPhone has been as secure, if not more

secure, than any laptop – period. I believe that the argument about storing
screenshots is outright silly. Yes, the iPhone gives you the ability to store

screenshots in your photo album, but you have to work a little by pressing a couple

of buttons every time to make one. Despite the clamoring made by some, this is

not done automatically. Moreover, the only way you would not know about this

happening was if you never looked at your photos. I will acknowledge that I have

accidentally done this on my home page, but I have never done in by accident

within an app. Is anything 100% secure? Of course not. Law offices are subject to

being broken into and/or having wandering eyes (such as cleaning crews) access

client information. Legal pads and paper files get lost or misplaced, and how

secure is a briefcase to someone who wants to get inside of it? One could argue

that even the information stored inside the lawyers’ brains is not secure.” (Price,

2010). These issues are merely ones that can be debated over and over again and

can be proven each time true or false, but one issue that the iPhone has that is

undebatable is the ability to access contacts while the phone is locked. This can be

done by pressing the emergency call button, typing ###, and calling that number

than hitting lock immediately. This would allow the creeper access to the phone,

address book, call history, and voicemail on the iPhone. Which can be a serious

inconvenience if the person needed a certain number or a voicemail containing

important information. Apple has promised that it would provide an update that

will fix this problem in iOS 4.2 which was just recently released. Many users out

there have a huge security concern and in the case that the iPhone doe not offer the

right amount of security for you, then there is always an app out there that will do
the job for you.   Depending on the area of need there is an app for password

management, ID management, GPS tracking or locater service, Spam prevention,

and virus thread monitoring. For password and ID management there is LastPass

which costs $12.00/year and SpalshID which is a one time fee of $9.95. These 2

apps allows an iPhone user to save all their passwords in one location and generate

random passwords at will, the area where the passwords are saved is encrypted

and protected from all forced entry. The SplashID allows you to save all your

usernames, emails, and passwords with the option of syncing your data to the PC

as well. The next level of security is for location services. If you were to ever

lose your iPhone then there is a service for that called MoblieMe which is offered

by Apple and allows you to track a lost phone, wipe a device remotely, store files

online, and sync emails, contacts, and calendars online as well. The third issue is

email security and Spam prevention, there are few different apps out there that can

allow a user to block spam such as Mobile Active Defense and Spam Arrest; these

apps send emails through a filter and block spam emails before they get to you and

Spam Arrest sends the person emailing you a query to prove they are a person and

if they fail they get blocked. The 3rd level of encryption is folder and file

password protection which allows a user to encrypt any, some, or all of their

folders and files on the device and to send the files to a computer, these apps are

Folder Lock and iDiscrete.

       Apart from keeping the device safe from hackers and wrong doers there is

always the opposite end of the spectrum, which is the wrong doer, hacker, or the
just plain old locked out customers. Since the creation of the iPhone Apple has

had a death grip on the device. It will only do what they want, when they want,

for who they want, and at their said time, but thankfully there is a process that

allows an iPhone user to gain full control over the iPhone, this process is known as

Jailbreaking. When Jailbreaking first made it's appearance Apple was quick to

throw the book at it. They claimed that Jailbreaking a device voided the warranty,

made the device unsafe, and was illegal. Which after the U.S. Government got

through with Apple it was no longer illegal and it technically didn't make the

device unsafe, but would still void your warranty. On July 19th 2010 the U.S.

Government ruled it legal to Jailbreak any device that a consumer has purchase

and feels the need to use said software on the device. Steve Jobs tried to con the

state into choosing his side by stating that “the nation's cellphone networks could

suffer “potentially catastrophic” cyberattacks by iPhone-weilding hackers at home

and abroad if iPhone owners are permitted to legally jailbreak their shiny wireless

devices.” (Kravets, 2010). The point that was brought up to counter this

accusation was that if iPhone users would do this once it was legal, then why

haven't they for the last 3 years when it was illegal; would it really make that much

of a difference? The act of “Jailbreaking is the process of hacking an iPhone to

free it from Apple restrictions.” (iPhoneReview, 2009). A few of the reason why

someone would want to Jailbreak an iPhone would be no restrictions, custom

wallpapers, themes, ringtones for MMS, SMS, and Calls, hide native apps, join a

subculture to free yourself from Apple, and to unlock your iPhone so it can be
used with any carrier such as T-Moblie. Some of the cons are voiding your

warranty, updates will break Jailbreaks, increased instability, security risk, fear of

bricking the device (making it useless), and possible viruses. When deciding if

you want to Jailbreak your iPhone you need to weigh your options before making

a decision. Since the beginning of Jailbreaking in 2007 there have always been

these pros and cons, but they always haven't been legal. The first Jailbreaks were

designed by George Hotz, Comex, iPhone Dev Team, and Zibri. Since the

beginning of the iPhone it has always been a game of cat and mouse with the

iPhone and will continue to be till the end of the phone. As per the previous

models they will remain Jailbreakable forever, The iPhone 2G stopped at iOS 4.1,

the iPhone 3g stopped at 4.2.1, and the iPhone 3GS stopped at 4.2; all of which are

jailbreakable iOS'. These many different devices and iOS firmwares are all

hackable from a plethora of Jailbreaks from ones that exploit PDF errors in the

Safari Browser, ones that hack the baseband of the iPhone, and ones that allow for

users to hack the device via the firmware. It really doesn't matter why you would

or would not want to Jailbreak your iPhone, but that this device is one of the most

technically advanced phone in the consumer, business, and education world today.

There is other competition such as the Droid and HTC phones, but still none has

been able to completely surpass the iPhone. So as per conclusion of the iPhone

debate, it is a great phone with great apps, on a semi-great network. The

possibilities for the iPhone are endless and the ideas for the iPhone in society is
endless. One thing is sure and that is the battle for high tech supremacy is far from

over and the competition is only getting rougher.
                                     Work Cited
Apple, Inc., Initials. (2010, November 28). The apple iphone. Retrieved from

Goldman, J. (2010, July 2). iphone security apps buying guide . Retrieved from e.php/3890346/iPhone-Security-

Keller, M. (2009, November 12). Jailbreaking your iphone: the pros and cons .
       Retrieved from

Kravets, D. (2010, July 26). U.s. declares iphone jailbreaking legal, over apple’s
      objections. Retrieved from -

Honan, M. (2007, Jan 9). Apple unveils iphone. Retrieved from cle/54769/2007/01/iphone.html

Martian, D. (2009, April 8). Sweaty workouts killing iphone. Retrieved from -19512_7-10214153-233.html

Price, F, & Stevens, B. (2010, April 6). The truth about iphone security. Retrieved
       from -truth-about-

Scott, B. (n.d.). The apple iphone - why society cannot live without it. Retrieved
       from -Apple-iPhone---Why-Society-Cannot-
Live- Without-It&id=4813278

Staff, M. (2010, November 22). ios 4.2: ten great features . Retrieved from

Vogelstein, F. (2008, January 9). The untold story: how the iphone blew up t he
      wireless industry. Retrieved from -02/ff_iphone?

Shared By: