Written on 2nd September, 2014 in Apple, iPhone, and iCloud.

Apple has has released a statment saying that the mass theft of photos did not occur because of a breach of Apple’s iCloud service. They do say that certain celebrities were the subject of targeted hacking attempts.

(via The Verge‘s Jacob Kastrenakes).

Written on 2nd September, 2014 in Apple, Mobile, and Phones.

I’m talking about the fact that people won’t feel the same way about their phones after this. Your phone is no longer a part of you. It’s a weapon, pointed at you.

Michael Arrington.

Written on 21st August, 2014 in Apple, and iOS.

Using the tel URI scheme you can launch a telephone call in a native iOS application without having to prompt the user. This functionality is actually written about in Apple’s developer documentation says:

When a user opens a URL with the tel scheme in a native app, iOS does not display an alert and initiates dialing without further prompting the user.

Phone Links from Apple URL Scheme Reference.

Written on 6th August, 2014 in Copyright, Public Domain, and Photography.

Photographer’s claim is that the photo isn’t in the public domain because the he did all the setup and all the monkey did was take the picture.

Wikimedia’s claim is that for the photographer to claim copyright, they “would have had to make substantial contributions to the final image, and even then, they’d only have copyright for those alterations, not the underlying image”. And because animals aren’t people and don’t have civil rights then the images fall under the public domain.

TODO insert pun about monkey business and copyright.

Update (21 August, 2014 at 3:10pm)

The U.S. Copyright Office says that the photograph is unprotected by intellectual property.

The Office will not register works produced by nature, animals, or plants. Likewise, the Office cannot register a work purportedly created by divine or supernatural beings, although the Office may register a work where the application or the deposit copy state that the work was inspired by a divine spirit

Compendium of US Copyright Office Practices, Third Edition (PDF Copy of the Report).

Written on 25th July, 2014 in Python, and Email.

A Python library (from Mailgun) to extract message quotations and signatures.


>>> from talon.signature.bruteforce import extract_signature
>>> message = """Awesome.
... ---
... Myles Braithwaite"""
>>> text, signature = extract_signature(message)
>>> print text
>>> print signature
Myles Braithwaite

Written on 3rd July, 2014 in CASL.

Yet Faber’s initial experience is precisely what one might expect: as companies shift to opt-in lists with customers who explicitly consent to receive messages, they are more likely to open the emails and to click on the links. I asked Faber about the experience to date and he indicated that the company’s list has unsurprisingly slimmed down, but that it is much more qualified, will grow back over time, and offers a more engaged audience, which he prefers.

The Benefits of Consent by Michael Geist.