19. It’s not really a secret, per se, but
there’s a quiet understanding among
many iOS app developers that it is
acceptable to send a user’s entire
address book, without their permission,
to remote servers and then store it for
future reference. It’s common practice,
and many companies likely have your
address book stored in their database.
Dustin Curtis, Febrary 8, 2012
Copyright (c) 2012 CommonsWare, LLC
20. Carrier IQ is able to query any metric from a
device... The scope of the word metric is very
broad though, including device type, such as
manufacturer and model, available memory and
battery life, the type of applications resident on
the device, the geographical location of the
device, the end user’s pressing of keys on the
device, usage history of the device, including
those that characterize a user’s interaction with
a device.
Trevor Eckhart, November 12, 2011
Copyright (c) 2012 CommonsWare, LLC
32. This HOWTO will guide you
through the process of cracking
the pin used to encrypt an
Android device (Ice Cream
Sandwich and Jelly Bean) using
brute force on Santoku Linux
Community edition.
Santoku Linux Blog, September 17, 2012
Copyright (c) 2012 CommonsWare, LLC
45. The links on this page provide a starting point for
locating information on government policies
relating to Web accessibility in different
countries around the world. Information linked
from this page may include laws, regulations,
policies, directives, government-related
standards or guidelines, or implementation
guidance which relates to Web accessibility, as
well as government speeches, press releases,
etc.
W3C WAI Policy Page, September 18, 2012
Copyright (c) 2012 CommonsWare, LLC