Comments on: Podcast #23: Goodbye Jeff, Restricting Address Book Access, Tweetbot http://apple.blogoverflow.com/2012/02/podcast-23-goodbye-jeff-restricting-address-book-access-tweetbot/ Ask Different - answers for your Apple questions Tue, 01 Mar 2016 11:50:43 +0000 hourly 1 https://wordpress.org/?v=4.5.6 By: Jeff Berg http://apple.blogoverflow.com/2012/02/podcast-23-goodbye-jeff-restricting-address-book-access-tweetbot/#comment-457 Thu, 16 Feb 2012 16:40:25 +0000 http://apple.blogoverflow.com/?p=938#comment-457 One the reasons Apple tries to reduce the number of times the OS asks the user to make choices, particularly choices pertaining to security, is that they strive to provide protection without administration. When faced with a choice about security most users will make the wrong decision. Bruce Schneier explores this theme in The Psychology of Security and revisits it regularly on his blog. Schneier is also an advocate of finding the correct balance between security and usability.

Rick Wash explores Folk Models of Home Computer Security and how users make decisions based on their conceptualization of those models.

In short, security issues like the recent iOS address bookgate need to be addressed, but my hope is that Apple will find minimally intrusive ways to do so. Presenting users with endless choices, and multiple, finite settings, is not the answer.

]]>
By: Kyle Cronin http://apple.blogoverflow.com/2012/02/podcast-23-goodbye-jeff-restricting-address-book-access-tweetbot/#comment-454 Thu, 16 Feb 2012 01:54:25 +0000 http://apple.blogoverflow.com/?p=938#comment-454 The encrypted data would be derived from the private address book data, and would therefore also carry the flag indicating that it cannot be transmitted over the network without permission. Granted, this sort of model would be extremely difficult to retrofit both into Objective-C and Cocoa as well as support backwards compatibility with existing, compiled apps, but is technically possible.

]]> By: Anon http://apple.blogoverflow.com/2012/02/podcast-23-goodbye-jeff-restricting-address-book-access-tweetbot/#comment-452 Tue, 14 Feb 2012 17:37:31 +0000 http://apple.blogoverflow.com/?p=938#comment-452 Jason is right. Once an app gets contact information, it can encrypt it in any way it wants, send it over the network, and that’s that.

]]>