How nice of Apple to look after its customers by protecting them from evil developers trying to steal their identity and other details from their iPhones.
And they’re not even charging us for this service. What’s that? How do they decide if an application is ‘bad’?
Well, for starters, we’re guessing any iPhone application that isn’t handing over 30% of revenue to Apple stands a pretty good chance of making the blacklist. Of course, evil hackers would be in that category – they’re not likely to have registered their code with Apple in the first place.
But what about other independent developers? Are they all ‘bad’ if they’re not part of the revenue raising for Apple?
What’s next? Will this ‘benefit’ be extended to users of other Apple products? And hey, if it works for Apple, how long before Microsoft starts telling you what you can and can’t run on your Windows PC? And exactly where does this leave the open source brigade, which prefers to give their software away?
Will Apple blacklist them too unless they hand over 30% of… oh… well… nothing?
This nanny behaviour, as usual raises far more questions than it answers. Surely we’re all big enough now to make our own decisions about what software we run and where we run it.
After, all if we’re that desperate for some nannyism, we’ve got a perfectly good federal government ready and willing to provide the service.
Opinion: Who’s your nanny then?
By
Ian Yates
on Aug 13, 2008 9:11AM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Tech For Good program gives purpose and strong business outcomes

Kaseya Dattocon APAC 2024 is Back
Ingram Micro Ushers in the Age of Ultra

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report