zaterdag, augustus 01, 2009

De gevaren van Jailbreaken volgens Apple

Apple: Jailbreaken is gevaarlijk - 

gepost samen met de laatste update 3.0.1 ...




Geplaatst op zaterdag, 1 augustus 2009 om 12:54 uur - door Daan (iPhoned)

Nieuws

Apple: Jailbreaken is gevaarlijk

Apple heeft op de support sectie van hun website gewaarschuwd voor de gevaren van het jailbreaken. Op de pagina, die hier te bezoeken is, beschrijft Apple de mogelijke bijeffecten als de consument zijn of haar iPhonejailbreakt. Ook meld Apple onderaan de suport pagina dat je geen enkele hulp van Apple kunt verwachten als je problemen hebt met je iPhone, en je toestel gejailbreakt is.

Apple geeft aan dat jailbreaken de volgende negatieve gevolgen kan hebben voor je toestel:

  • Instabiliteit van je toestel en applicaties
  • Het verslechten van de batterijduur van je toestel
  • Het verslechten van je internetverbinding tijdens internetten en bellen
  • De veiligheid van je toestel wordt verminderd
  • Het mogelijk verstoren van diensten
  • Onherstelbare schade (ook na het installeren van een softwareupdate)

Bij het suport artikel wordt aangegeven dat het artikel duit op alle generaties iPhone en natuurlijk ook alle iPod Touch apparaten.

Via: TheiPhoneBlog


Unauthorized modification of iPhone OS has been a major source of instability, disruption of services, and other issues

  • Laatst gewijzigd op: 30 juli, 2009
  • Artikel: HT3743

Summary

This article is about adverse issues experienced by customers who have made unauthorized modifications to the iPhone OS (this hacking process is often called "jailbreaking"). Issues that have been encountered include instability, disruption of services, and compromised security.

Products Affected

iPhone, iPod touch, iPhone 3G, iPhone 3GS, iPod touch (2nd generation)

As designed by Apple, the iPhone OS ensures that the iPhone and iPod touch operate reliably. Some customers have not understood the risks of installing software that makes unauthorized modifications to the iPhone OS ("jailbreaking") on their iPhone or iPod touch. Customers who have installed software that makes these modifications have encountered numerous problems in the operation of their hacked iPhone or iPod touch. Examples of issues caused by these unauthorized modifications to the iPhone OS have included the following:

 
Device and application instability:  Frequent and unexpected crashes of the device, crashes and freezes of built-in apps and third-party apps, and loss of data.
 
Unreliable voice and data:  Dropped calls, slow or unreliable data connections, and delayed or inaccurate location data.
 
Disruption of services:  Services such as Visual Voicemail, YouTube, Weather, and Stocks have been disrupted or no longer work on the device. Additionally, third-party apps that use the Apple Push Notification Service have had difficulty receiving notifications or received notifications that were intended for a different hacked device. Other push-based services such as MobileMe and Exchange have experienced problems synchronizing data with their respective servers.
 
Compromised security:  Security compromises have been introduced by these modifications that could allow hackers to steal personal information, damage the device, attack the wireless network, or introduce malware or viruses.
 
Shortened battery life:  The hacked software has caused an accelerated battery drain that shortens the operation of an iPhone or iPod touch on a single battery charge. 
 
Inability to apply future software updates:  Some unauthorized modifications have caused damage to the iPhone OS that is not repairable. This can result in the hacked iPhone or iPod touch becoming permanently inoperable when a future Apple-supplied iPhone OS update is installed.
 
Apple strongly cautions against installing any software that hacks the iPhone OS. It is also important to note that unauthorized modification of the iPhone OS is a violation of the iPhone end-user license agreement and because of this, Apple may deny service for an iPhone or iPod touch that has installed any unauthorized software. 

Geen opmerkingen: