Palm has reported Apple, to the USB Implementers Forum for improper use of the Vendor ID used to identify devices using the USB interface.
“Palm believes that openness and interoperability offer better experiences for users by allowing them the freedom to use the content they own without interference across devices and services, so on behalf of consumers, we have notified the USB Implementers Forum of what we believe is improper use of the Vendor ID number by another member.”
This move is a bold statement by Palm given the company’s apparent misuse of Apple’s USB Vendor ID in order to permit iTunes media syncing.
When plugging a Palm Pre running WebOS 1.1, it’s identifies itself with an Apple USB Vendor ID:
Product ID: 0x8002
Vendor ID: 0x05ac (Apple Inc.)
Manufacturer: Palm Inc.
Such use of another manufacturer’s Vendor ID is “strictly prohibited” by the USB Implementers Forum:
When you apply for a USB Vendor ID, you sign a form that explicitly states that:
“Unauthorized use of assigned or unassigned USB Vendor ID Numbers and associated Product ID Numbers are strictly prohibited.”
Palm announced that it has released WebOS 1.1, it brings an array of new features and improvements to the Palm Pre including restoration of iTunes media syncing.
iTunes 8.2.1 stopped unauthorized devices from syncing with iTunes but now with the release of the latest WebOS, Palm has enabled it once again. The iTunes syncing is the latest if a series of incidents between Apple and Palm. Palm hired several formed Apple executives and engineers to lead the company’s turnaround, and Apple has issued threats against Palm regarding intellectual property contained in the iPhone, that has appeared in similar forms in the Palm Pre.
The full list of new features available in webOS 1.1 can be found in Palm’s release notes for the update.
Jonathan Zdziarski, a member of the iPhone Dev-Team, says that Apple’s encryption on the iPhone 3GS for business users is not as good as it should be and could put company data at risk. He said that the encryption is so weak, that it could be cracked in two minutes using nothing more than some easily available freeware.
He said after making this discovery: “I don’t think any of us developers have ever seen encryption implemented so poorly before, which is why it’s hard to describe why it’s such a big threat to security.”
The iPhone 3GS is the first device to officially feature encryption, but Zdziarski says sensitive information like credit card numbers and social security digits on a 3GS are just as easy to access as they were on the 3G and first generation iPhone.
He used Redsn0w and PurpleRa1n to install a custom kernel on the device, then he installed used an SSH client to port the raw disk image onto his computer.
Some iPhone users have been experiencing strange problems with their iPhone receiving AIM messages which were not sent to them, but Apple’s push notification system sent it to the wrong people. However it’s not Apple’s fault as some believed it to be.
The iPhone generates unique private/public keys upon activation that identity each handset, so that they correct messages can be sent to the correct device. However using unlocking tools breaks this as they use duplicated keys to facilitate illicit use. Now that single identifiers have been registered to multiple phones instant messages, messages can be sent to any of those devices.