Dear Greenwich Roundup,
Not total out of towners. I grew up in Greenwich and my parents &
younger siblings still live there. Relax. I don't want the beaches in
Greenwich over run with out of towners either.
Xoxo,
Jocelyn
Sent from my iPhone
Please see:
Update at 5:01pm:
Rockstar Diary writes:
Off to Los Angeles. Hope I don't get called out for using the beaches
there.
"Girl from Greenwich invades Malibu. She carries an iPhone and scares
the locals with her whitebreadedness........"
Sent from my iPhone
Comment from Greenwich Roundup:
Officially if anybody asks I don't like the iPhone, because of privacy concerns.Officially, I also won't do business with AT&T, the company is a defendant in a class-action lawsuit for selling out their customers to the NSA.
I also, officially don't trust the super secretive Steve Jobs and the crew at Apple.
Here is what riactant discovered when he installed MobileFinder.app, a third-party, native iPhone application that allows browsing of the iPhone’s file system. While he was poking around the iPhone file system he noticed a file called sms.db under the ~/Library/SMS directory. He opened the file in MobileTextEdit.app and saw that it was a SQLLite database file.
He was surprised that every text message He had ever sent or received since he bought his iPhone was stored in sms.db, despite the fact that he “deleted” these text messages long ago.
Here is a book you might want to read about iPhone privacy:This book shows the reader how to recover and extract such information as typing caches, Google map searches, deleted images, email, voicemail and other sensitive data retained by the iPhone.
iPhone Forensics gives IT professionals, security personnel, and law enforcement the knowledge needed to conduct forensic analysis of an iPhone. This book shows the reader how to recover sensitive information from the device and perform disaster recovery, and walks the reader through various scenarios for recovering different types of information. With this guide, the reader will be able to effectively recover live, lost, or deleted email, photos, voicemail, Google Maps searches, typing cache, and other sensitive data retained by the iPhone. The reader will learn advanced techniques including data recovery, properly preserving and preparing evidence, and technical techniques such as bypassing basic passcode security or recovering data even after a full restore (by say, a disgruntled employee).
Before you activate your iPhone, Read this!
However, the real reason that I don't like the iPhone is that my wife will not let me get one.
She really doesn't care that the new 3G iPhone can spy on me twice as fast at only half the cost of the old iPhone.
================================================
Please send your comments and corrections to GreenwichRoundup@gmail.com and I will post it on a discarded laptop running free Linux operating system called Ubuntu.
No comments:
Post a Comment