Recent developments have made the iPhone's original "spyphone". The basis for this evaluation have become one of the leading UK experts in the field of computer technology, Professor Noel Sharkey and activists fighting for privacy.
Evaluation Sharkey, the current ability to "apple" devices to track people's behavior became "intimidating." It is an integrated in the latest version of the operating system of mobile devices Apple - iOS 8 and iOS 7 - the mechanisms fixing any movement owners controlled the software electronics. Recorded, including the time of arrival and departure, the frequency of visits.Expert describes this as a "hidden tracking system."
"It's shocking - said Sharkey. - Every place where you are going, where making a purchase, consume drinks - all of this is written. It's just a dream for divorce lawyer.But what scares me is the extent to which it secret. "
In turn, the Daily Mail reporter Ben Spencer noted that the function of the "Apple quietly introduced a year ago," fixed "the exact time when you left for work, where we bought coffee and where to choose to do shopping."
The "Frequent location" is set to the latest versions of the operating system automatically. To limit the data collection required to delve into the machine settings on five levels ("that's why this little known"), leveraging a series of steps, experts say. Requires a clear "story" in this section (it is immediately displayed on the map - in cities and regions), and disable the "Improvement of cards", and then deactivate the "Frequent location."
It specifies that these steps "will not stop the collection of data" - they simply stop stored on the card. To stop the collection process, it is necessary to turn off all the services associated with the location, as it would deprive the owner of the possibility to use mapping programs on the device.
How to insist at Apple, information "leaves the device" only with the consent of the owner, the use of "improved mapping services." But Professor Sharkey warned that, being "in the wrong hands," such information "can be a powerful and sometimes dangerous (tool)." Activists fear that access to such data - "digging" in the phone - can get, for example, a boss or jealous wife, or they may be confiscated by the police.