ttk2-old
ttk2
ttk2-old

@Kerensky97: was it really a human germ? I was under the impression that is was simply a earth germ.

is this the memo i missed?

@darthvolta: What makes me shudder is the potential cost.

@AcidSpoon: its all subjective, obviously the person who made the page thinks so.

Better browser better rate, interesting.

@MattSTKC: It requires access to dock connector, access to the internet and a host of other things a flashlight app should not have needed, if that slipped by apple then what makes it more likely that they would notice a malicious app that pulls up and sends out contact info or something of that nature?

@pandaSmore: Do you remember the flash light app that had a hidden tethering function? If a app can get through with tethering code unnoticed like that i really do not see what is stopping people from getting a app through with malicious code instead.

And what about malicious ios apps?

@N.ayyala: the "30 texts a day" part kind of invalidated your last paragraph.

@sam-a: if only lives came conveniently packaged in green mushrooms.

@Dezerus Richardson: My brother is the same way, i really one have a phone in case of emergency and or work. I have not called anyone not in my family in months.

I hardly send a text a week, as a High school student i guess that means i have no life.

@Light_of_Aether: that would not work, you can never allow any one to violate anyone else's rights at any point. It only invites disaster. What we need is a legal precedent that would prevent all ballots, televised debates ect from showing only democrats and republicans, by getting a few more parties into this i think

I hate this, its like watching a train wreck. It has reached the point where we just have two parties more interested in disagreeing with one another than getting anything done.

Here is a tangentially related question, if you are arrested and they demand you decrypt your encrypted machine can you plead the fifth?

Here is a tangentially related question, if you are arrested and they demand you decrypt your encrypted machine can you plead the fifth?

We have seen more malicious apps get through apples useless approval process only to be pulled just as quickly and Google pulled this one. The difference here is that Google skipped the step where they make the devs wait weeks to get their apps approved.