TidBITS#982/15-Jun-09
=====================
  Issue link: <http://db.tidbits.com/issue/982>

  As the excitement dies down from Apple's WWDC announcements, we're
  once again flitting among topics. Rich Mogull draws on his years of
  security analyst work to offer five suggestions for how Apple could
  improve Mac and iPhone security, made all the more timely by Apple
  finally fixing a 9-month-old Java vulnerability today. Rich also
  explains how you might be able to get better upgrade pricing on an
  iPhone 3G S, Doug McLean reveals that the new 13- and 15-inch
  MacBook Pros can boot from their new SD card slots and examines the
  world of artistic iPhone photography, Glenn Fleishman looks at the
  latest Wi-Fi SD card from Eye-Fi, and Adam reviews a tool that lets
  you post photo links to Twitter from within iPhoto. We also cover
  the release of Microsoft Office 2008 12.19 and 2004 11.5.5, and
  glance at the releases of Firefox 3.0.11, Script Debugger 4.5.3, and
  1Password 2.9.19.

Articles
    Apple Patches Nine-Month-Old Java Vulnerabilities
    Office 2008 12.1.9 and Office 2004 11.5.5 Updates
    New MacBook Pros Boot From SD Cards
    Eye-Fi Pro Card Adds Raw Uploads, Computer Transfers
    iPhoto2Twitter Simplifies Tweeting Photos
    Five Ways Apple Can Improve Mac and iPhone Security
    Call AT&T for the Best iPhone Upgrade Price
    The Art of iPhone Photography
    TidBITS Watchlist: Notable Software Updates for 15-Jun-09
    ExtraBITS for 15-Jun-09
    Hot Topics in TidBITS Talk for 15-Jun-09


------------ This issue of TidBITS sponsored in part by: --------------

* READERS LIKE YOU! Support TidBITS with a contribution today!
  <http://www.tidbits.com/about/support/contributors.html>
  Special thanks this week to David L. Ballenger, Harold Appel,
  James Pistrang, and Sita Likuski for their generous support!

* Fetch Softworks: Fetch 5.5 has new support for Mac OS X
  10.5 Leopard technologies like Quick Look. And you can
  upload with the oldest technology of all, Copy and Paste!
  Download your free trial version! <http://fetchsoftworks.com/>

* WebCrossing Neighbors Creates Private Social Networks
  Create a complete social network with your company or group's
  own look. Scalable, extensible and extremely customizable.
  Take a guided tour today <http://www.webcrossing.com/tour>

* Bare Bones Software's BBEdit 9.2 -- A burly upgrade with new
  Sleep command, LassoScript support, plus enhancements to Projects
  and core features like Find and Multi-File Search windows,
  editing in browsers, and text completion. <http://barebones.com/>

* THE MISSING SYNC: If you have a smartphone, we can sync it!
  Sync your address book, calendar, notes, music, pictures, and
  more between your BlackBerry, Windows Mobile, Symbian OS or
  Palm OS phone and your Mac. <http://www.markspace.com/bits>

* VMware Fusion. The most seamless way to run Windows on
  your Mac. Backed by nearly a decade of proven virtualization
  technology. Try VMware Fusion today for only $79.99.
  Visit: <http://www.tidbits.com/about/support/vmware-fusion.html>

* Microsoft's MacBU: Supporting Mac users with Office 2008.
  Straighten up your Office with the latest updates to Word,
  Excel, PowerPoint, and Entourage. Update today at Mactopia!
  <http://www.microsoft.com/mac/downloads.mspx>

* Speak up with MacSpeech Dictate! Get the all-new MacSpeech
  Dictate with spelling and phrase training. Speech recognition
  so good, about the only thing it can't do is speak for you.
  Learn more: <http://www.tidbits.com/about/support/macspeech.html>

---------- Help support TidBITS by supporting our sponsors ------------


Apple Patches Nine-Month-Old Java Vulnerabilities
-------------------------------------------------
  by Glenn Fleishman <[email protected]>
  article link: <http://db.tidbits.com/article/10352>

  Fixes for a number of serious vulnerabilities in the version of Java
  in Mac OS X 10.4 and 10.5 were released by Apple today - about six
  months after Sun Microsystems released updated packages for all
  other platforms that Sun supports, including Windows. Apple releases
  its own updated versions of Java for Mac OS X.

<http://support.apple.com/kb/HT3179>
<http://www.java.com/en/download/manual.jsp>

  As Rich Mogull discussed in "Protect Yourself from the Mac OS X Java
  Vulnerability" (2009-05-20), the flaws could allow a Java applet on
  a malicious Web site to execute arbitrary code on your computer,
  among other vulnerabilities. To work around the problem, Rich
  explained how to disable Java in Safari and Firefox. Rich also
  chided Apple for leaving such a major hole unpatched for so long.

<http://db.tidbits.com/article/10292>

  The Java updates can be retrieved via Software Update, or at Apple's
  Support Download site. The updates are listed for the last or latest
  releases of Leopard and Tiger: Mac OS X 10.5.7 (158 MB) and Mac OS X
  10.4.11 (80 MB). No restart is required, but all browsers should be
  quit before installing the updates.

<http://support.apple.com/downloads/Java_for_Mac_OS_X_10_5_Update_4>
<http://support.apple.com/downloads/Java_for_Mac_OS_X_10_4__Release_9>


Office 2008 12.1.9 and Office 2004 11.5.5 Updates
-------------------------------------------------
  by Doug McLean <[email protected]>
  article link: <http://db.tidbits.com/article/10341>

  Microsoft has released its latest updates for Office 2008 and Office
  2004, as well as its Open XML File Format Converter, fixing critical
  security issues in each program. According to Microsoft, all three
  updates address two vulnerabilities in Word that could allow remote
  code execution if you were to open a specially crafted malicious
  Word file.

<http://support.microsoft.com/kb/971822>
<http://support.microsoft.com/kb/969661>
<http://support.microsoft.com/kb/971824>

  The updates block this vulnerability by altering the way Word opens
  and parses files. The Office 2008 update also "readies Office 2008
  for Mac for the installation of Microsoft Entourage 2008 for Mac,
  Web Services Edition, and must be installed before Entourage 2008,
  Web Services Edition is installed." That version of Entourage, which
  brings enhanced compatibility to servers running Exchange 2007
  Service Pack 1 or later by connecting via the Exchange Web Services
  format instead of via WebDAV, is currently in beta and expected for
  final release later this year.

  The Microsoft Office 2008 for Mac 12.1.9 Update requires Mac OS X
  10.4.9 or later, and that you have already installed the 12.1.0
  update (the updater is a combo updater, meaning it contains all
  fixes since 12.1.0). It's a 268 MB download from Microsoft's Web
  site, and is also available via the Microsoft AutoUpdate utility
  launched by choosing Check for Updates from any Office 2008
  application.

  The Microsoft Office 2004 for Mac 11.5.5 Update requires Mac OS X
  10.2.8 or later, and that you've previously installed the Microsoft
  Office 2004 for Mac 11.5.4 Update. It's a 59 MB download from
  Microsoft's Web site and is also available via the Office 2004
  version of Microsoft AutoUpdate.

  The Microsoft Open XML File Format Converter for Mac 1.0.3 requires
  Mac OS X 10.4.9 or later, and that you are running Office 2004
  11.4.0 or later, or Office X 10.1.9 or later. Microsoft recommends
  that you install the Office 2004 11.5.5 update prior to the Open XML
  Converter installation. It's a 45 MB download from Microsoft's Web
  site, and is also available via the Office 2004 version of Microsoft
  AutoUpdate.


New MacBook Pros Boot From SD Cards
-----------------------------------
  by Doug McLean <[email protected]>
  article link: <http://db.tidbits.com/article/10344>

  When Apple announced the swapping of the ExpressCard slot on the
  15-inch MacBook Pro for an SD (Secure Digital) memory card slot, the
  few users of ExpressCard-compatible peripherals - at least those
  other than SD card readers - were understandably disappointed.
  (Apple claimed that only a "single-digit" percentage of MacBook Pro
  users used the ExpressCard slot.) For most people, the addition of
  the SD slot is welcome, since the majority of consumer-level digital
  cameras use SD cards for storage. Nevertheless, it didn't seem like
  that big of a deal either way.

<http://en.wikipedia.org/wiki/Secure_Digital_card>

  However, a recent Apple KnowledgeBase article reveals an extremely
  useful and previously unmentioned feature of the SD card slot: users
  can boot the Mac from an SD card with Mac OS X installed on it.

<http://support.apple.com/kb/HT3553>

  To make a bootable SD card, you must first change the default
  partition table to GUID using Disk Utility, and format the card to
  use the Mac OS Extended file format (as opposed to the FAT32 file
  format). You can then install Mac OS X onto the device, enabling it
  to boot the Mac, which could be very handy in a troubleshooting
  situation.

  The MacBook Pro SD card slot accepts cards that conform to the SD
  1.x and 2.x standards. This includes Standard SD cards, which hold
  between 4 MB and 4 GB; SDHC cards, which hold between 4 GB and 32
  GB; and the older MMC cards. MiniSD, MicroSD, MiniSDHC and MicroSDHC
  cards can work if used with adapters that enable the cards to
  conform to the necessary physical configuration. While the MacBook
  Pro can read (but not boot from) cards that use the FAT32 file
  format (the standard for most SD cards), cards that use the exFAT
  system will not work.


Eye-Fi Pro Card Adds Raw Uploads, Computer Transfers
----------------------------------------------------
  by Glenn Fleishman <[email protected]>
  article link: <http://db.tidbits.com/article/10339>

  Eye-Fi has updated its line of Secure Digital (SD) Wi-Fi cards with
  the Eye-Fi Pro, which adds support for raw format image files. The
  new model ($150 for a 4 GB card) can also use ad hoc networking, a
  computer-to-computer Wi-Fi transfer method supported by Mac OS X and
  all desktop operating systems.

<http://www.eye.fi/cards/pro.html>
<http://www.tidbits.com/resources/2009-06/Eye-Fi-Pro.jpg>

  For initial configuration, you connect the card to the Mac or a
  Windows system via an included USB card reader, after which you can
  set preferences and enter Wi-Fi network passwords. Several models,
  including the Eye-Fi Pro, are automatically configured to connect to
  any of 10,000 AT&T Wayport hotspots in the United States. (One
  year's service is included; each subsequent year costs $15.)

  The card works independently of the camera; the camera is, in fact,
  unaware that anything is different about the card. All five models
  of Eye-Fi (which vary in features, and start at $50 for the basic
  Home version) automatically transfer files whenever they encounter a
  Wi-Fi network that matches one in the card's profile.

  Professional - and many regular - photographers prefer to use raw
  image formats, as raw images retain as much as possible of the data
  captured by a sensor without being processed into something more
  palatable. Raw isn't exactly a standard, but major image-editing
  software can interpret and convert the various (often proprietary)
  formats used by camera makers. Except for this new Eye-Fi Pro, the
  Eye-Fi cards can't transfer raw images, though they are stored on
  the card normally.

  Ad hoc networking, another new feature, lets you send images from
  the Eye-Fi Pro to a Mac or other computer without having a base
  station nearby. Ad hoc networking is a special mode in the 802.11
  protocols that allows communication among computers and other
  devices without a central coordinating hub. Mac OS X is unique in
  having both ad hoc networking (AirPort menu > Create Network) and
  Internet sharing over Wi-Fi, which simulates a hardware base station
  (Sharing preferences pane > Internet Sharing). By adding support for
  ad hoc networking, the Eye-Fi Pro becomes more useful for anyone
  wanting to dump photos to a Mac while shooting far from a Wi-Fi
  network.

  Eye-Fi also upgraded all cards, old and new, to include Selective
  Transfer, a feature that lets you choose which images and videos (on
  cards that support video uploads) to transfer. Previously, every
  photo or video would be uploaded automatically. This new option lets
  you tag images with a camera's protected or locking feature (which
  varies by camera), and only locked/protected photos are then
  uploaded.

  With all of these changes, it seems like Eye-Fi has addressed
  several of TidBITS publisher Adam Engst's complaints in "Why I Hate
  the Eye-Fi Share Wireless SD Card," 2008-08-18.

<http://db.tidbits.com/article/9737>

* Uploading other than JPEG images: The Pro model handles videos and
  raw files; the Explore Video model ($100) uploads videos.

* Selecting which pictures to transfer: The Selective Transfer feature
  adds this option, which prevents all photos from being transferred
  or uploaded to a photo-sharing service.

  I wrote a contrasting article at the same time as Adam's (see "Why I
  Like the Eye-Fi Explore Wireless SD Card," 2008-08-18) and nearly
  all my remaining provisos about the Eye-Fi have been taken care of.

<http://db.tidbits.com/article/9738>

  There are still plenty of items left on Adam's list, many of which
  require camera makers to work with Eye-Fi to integrate the card's
  options into camera firmware. Companies that make cameras seem to
  not quite understand the way in which their users want to use Wi-Fi.
  Even the cleverest of Wi-Fi-enabled cameras is a pure frustration
  compared to any Eye-Fi card.


iPhoto2Twitter Simplifies Tweeting Photos
-----------------------------------------
  by Adam C. Engst <[email protected]>
  article link: <http://db.tidbits.com/article/10338>

  All the Twitter clients for the iPhone that I've seen make it easy
  to take a photo and post it to Twitter (via a service like TwitPic).
  Many of the Twitter clients on the Mac have features for posting
  photos too, but they often revolve around selecting files, which
  isn't easy if all your photos are in iPhoto. And it's a bit silly to
  import your normal digital camera's photos to iPhoto, and then sync
  them to the iPhone just to post to Twitter.

<http://twitpic.com/>

  (Tip: In iPhoto, to view a photo's file in the Finder, Control-click
  it and choose Show File from the contextual menu that appears. You
  can then drag the file's icon into an Open dialog to upload it to
  TwitPic, for instance, but whatever you do, don't move or rename
  that file!)

  Blue Crowbar Software has just come out with another simple solution
  to this problem: iPhoto2Twitter, an iPhoto export plug-in that posts
  a selected photo to Twitter via TwitPic.

<http://www.bluecrowbar.com/software/iphoto2twitter/>

  Once iPhoto2Twitter is installed, select the photo you want to post
  to Twitter, choose File > Export (Command-Shift-E), click the
  iPhoto2Twitter button, enter a message, choose an export size, and
  click the Export button. iPhoto2Twitter posts your photo to TwitPic
  and the message, with a link to the photo, to Twitter.

<http://www.tidbits.com/resources/2009-06/iPhoto2Twitter.png>

  Of course, the first time you use iPhoto2Twitter, you must click the
  Setup button to enter your Twitter login credentials; it can also
  pull Twitter login credentials from your keychain, making it easy to
  switch among accounts.

  That's really all there is to it - iPhoto2Twitter is a one-trick
  pony, but if you've avoided posting photos to Twitter because of a
  lack of integration with iPhoto, or if you just prefer to think
  about photos when you're already in iPhoto, iPhoto2Twitter is ideal.

  iPhoto2Twitter requires Mac OS X 10.5 Leopard and works with iPhoto
  '08 and iPhoto '09. It costs 4.95 euros and is a 566 KB download.
  Blue Crowbar Software also offers Aperture2Twitter, which provides
  the same functionality for Aperture 2 and costs 5.95 euros.

<http://www.bluecrowbar.com/software/aperture2twitter/>


Five Ways Apple Can Improve Mac and iPhone Security
---------------------------------------------------
  by Rich Mogull <[email protected]>
  article link: <http://db.tidbits.com/article/10321>

  Over the past few weeks we've seen significant developments, both
  positive and negative, in how Apple approaches security. On the
  negative side is Apple's laggard response to providing a patch for a
  nine-month-old Java vulnerability that was fixed on other major
  platforms six months ago - and which the company finally fixed today
  (see "Protect Yourself from the Mac OS X Java Vulnerability,"
  2009-05-20, and "Apple Patches Nine-Month Old Java Vulnerabilities,"
  2009-06-15). On the positive side is Apple's recent decision to hire
  Ivan Krstic, the engineer behind the well-respected security
  architecture for the One Laptop Per Child (OLPC) program.

<http://db.tidbits.com/article/10292>
<http://db.tidbits.com/article/10352>
<http://arstechnica.com/apple/news/2009/05/apple-hires-former-olpc-security-head-to-harden-mac-os-x.ars>

  These developments seem almost contradictory, on one side failing to
  manage one of the most basic security issues faced by a software
  vendor, and on the other hiring a leading mind in engineering
  software security. It's clear that Apple considers security
  important, but that the company also struggles to execute
  effectively when faced with security challenges.

  With the impending release of the next versions of both Mac OS X and
  the iPhone operating system, it seems a good time to evaluate how
  Apple could improve their security program. Rather than focusing on
  narrow issues of specific vulnerabilities or incidents, or offering
  mere criticism, I humbly present a few suggestions on how Apple can
  become a leader in consumer computing security over the long haul.


**Appoint and Empower a Chief Security Officer (CSO)** -- Apple
  currently lacks both a public face for their security efforts and a
  single internal executive dedicated to security. But two positions
  aren't necessary: a Chief Security Officer (CSO) at a major software
  vendor like Apple can be both external evangelist and internal
  security manager, so Apple should hire such a person right away.

  Apple's CSO would play a number of roles, including communicating
  about Apple's security efforts externally, directing responses to
  new vulnerabilities and other security issues, coordinating internal
  secure development efforts, and participating in product development
  to ensure security is appropriately considered and integrated into
  new products.

  None of this will work if the CSO is merely a figurehead, and this
  must be an executive management position with the budget, staff, and
  authority to get the job done. Ideally, the CSO will be a member of
  the inner circle of Apple executives that drives the company
  forward, so as to avoid the position becoming marginalized in
  company politics.


**Adopt a Secure Software Development Program** -- Software is
  surprisingly difficult to design and program securely. Modern
  software is rarely built completely from scratch, relying heavily on
  various frameworks, code libraries, and third-party components. Even
  when software is designed from the ground up, few developers focus
  on security or have extensive secure development training. And even
  when you have well-trained developers, human error ensures they will
  never produce a perfectly secure product.

  In response to these challenges, some software vendors have adopted
  special security development programs and processes (often called
  "secure software development" or the "secure software development
  lifecycle"). These techniques are extremely effective at reducing
  the number and severity of bugs that result in security
  vulnerabilities, and they are slowly becoming standard practice
  throughout large organizations and product vendors. Security
  development programs usually have the added benefit of improving
  overall software quality and reducing the number of costly patches a
  vendor releases.

  Based on a variety of sources, we know that Apple does not have a
  formal security program, and as such fails to catch vulnerabilities
  that would otherwise be prevented before product releases.

  To address this lack, Apple should integrate secure software
  development into all internal development efforts. This includes
  programmer training, development standards, design requirements,
  threat modeling, code review, use of security testing tools,
  specialized pre-release testing, and root cause analysis for
  post-release bugs.


**Establish a Proactive Security Response Team** -- Although Apple
  does have dedicated security engineers, and a small product security
  team, there is no public security response team to manage externally
  reported vulnerabilities or other security issues in a consistent
  and coherent fashion. Based on public handling of certain security
  issues it appears that the current product security team lacks
  sufficient resources or influence to effectively manage all Apple
  security issues in a consistent and coherent fashion.

  An enhanced Apple security response team would manage communications
  with external researchers reporting vulnerabilities and the internal
  developers that develop the fixes. Since Apple relies so much on
  third-party software, much of it open source, the security response
  team would also track and coordinate security responses for these
  products. This could enable Apple to manage security issues like the
  recent Java and DNS flaws proactively, so Apple users are no longer
  exposed even after these components have been fixed by their
  programmers.

  Having spent years working with both researchers and vendors, I've
  learned that a communicative security response team typically
  generates goodwill with researchers reporting bugs, and is more
  likely to avoid messy disclosure situations that place users at
  risk.


**Manage Vulnerabilities in Included Third-party Software** -- As I've
  mentioned multiple times, one of Apple's most significant security
  problems lies with patching versions of third-party software (much
  of it open source) included in Apple products. Apple has a history
  of patching these components long after fixes are released on other
  platforms (examples include Java, Samba, Apache, and DNS, and even
  Apple's own open-source WebKit and mDNS).

  This is more than merely a roadmap for an attacker, it's an
  unimpeded highway straight to your Mac. For example, the world's
  most popular free penetration testing (hacking) tool, Metasploit,
  can now target Mac OS X specifically, and functional attacks (for
  any platform) are typically available for Metasploit only hours or
  days after new patches are released.

<http://metasploit.com/>

  As the barriers to exploiting new vulnerabilities continue to drop,
  Apple absolutely can't afford to leave its customers exposed. The
  solution to this is a formal program to track vulnerabilities
  reported in third-party components, and to work with internal
  development teams to integrate fixes as they become available.
  Apple's CSO and security response team would become responsible for
  actively engaging with these external developers, and for ensuring
  Apple is able to release fixes in a timely manner.


**Complete the Implementation of Anti-Exploitation Technologies** --
  With the release of Mac OS X 10.5 Leopard, Apple began to include a
  collection of what are known as "anti-exploitation technologies."
  Even if Apple adopts all of my suggestions above, that still won't
  eliminate all security vulnerabilities in our systems. Heck, even if
  all Apple software is perfectly secure, we'll still see
  vulnerabilities in the non-Apple software we purchase for our Macs
  and iPhones.

  Anti-exploitation technologies assume that vulnerabilities are
  inevitable, and try to prevent attackers from taking advantage of
  them to hurt our systems. Sandboxing, library randomization,
  no-execute flags (which tie to special hardware hooks inside our
  Intel-based Macs), and stack protection are all partially
  implemented in Mac OS X, but these implementations are either
  incomplete or flawed in ways that nearly eliminate their security
  advantages.

  As Microsoft is learning, it's also important to enforce these
  controls in individual applications, not just the operating system,
  so a single Web browser plug-in like Flash or Java can't circumvent
  anti-exploitation technologies. Apple is in a stronger position to
  enforce these rules than Microsoft, thus better protecting Mac and
  iPhone users. Rumor is we may see some of these advances in the
  upcoming Snow Leopard release of Mac OS X, which would be a positive
  development.

  It's inarguable that using Apple products today is currently a
  relatively safe experience, but there are early signs that if Apple
  doesn't start to do a better job with security policies and
  architecture, we customers may be at greater risk down the road. I
  didn't write this article because I'm worried about the security of
  all seven of my Macs this week, but because I'd like to continue to
  enjoy safe computing for the foreseeable future. By following these
  suggestions Apple could extend its current (if not entirely
  deserved) reputation for security to become a long-term leader in
  consumer computing security.


Call AT&T for the Best iPhone Upgrade Price
-------------------------------------------
  by Rich Mogull <[email protected]>
  article link: <http://db.tidbits.com/article/10350>

  When Apple announced that the new iPhone 3G S pricing would be the
  same as that of the iPhone 3G at its launch, applause could be heard
  far beyond the Worldwide Developers Conference presentation hall.
  Since users moving from the original iPhone to the iPhone 3G last
  year weren't charged any penalties for upgrading in mid-contract,
  many people assumed Apple had cut some sort of deal with AT&T to put
  shiny new iPhones in the hands of early adopters. But within hours
  after the announcement, we learned that most iPhone 3G owners
  wouldn't qualify for discounted pricing on launch day, or, in many
  cases, for an additional 6 months or more.

  Most existing AT&T iPhone customers who don't qualify at the
  $199/$299 price points (for the 16 GB or 32 GB models) can still
  purchase an iPhone 3G S for "early upgrade" pricing of $399/$499.
  Customers who bought their phones too recently even for that pricing
  can upgrade for full retail price at $599/$699. To confuse the
  situation even more, eligibility for the different tiers of upgrade
  pricing isn't as simple as how long you've had your phone... and in
  some cases AT&T's system for determining eligibility makes mistakes.


**Wireless Subsidies and iPhone Pricing** -- In the United States and
  many other countries, we rarely pay the full price for our mobile
  phones. These ubiquitous computing devices pack an incredible amount
  of technology into a pocket-sized package, and that's especially
  true of powerful smartphones like the iPhone or BlackBerry. Since
  mobile providers make most of their profits on our monthly
  subscriptions, they subsidize the cost of the phones to hook us on
  technologies that will steer us toward more-expensive plans. Devices
  lose their cutting-edge appeal over time in comparison with new
  models, so the carriers re-hook us with additional subsidies as our
  contracts come close to expiring. It makes sense that mobile
  carriers want to recoup any losses incurred when they sell us phones
  below cost. (Mobile phones aren't the only devices sold at a loss;
  most gaming platforms like the Microsoft Xbox 360 and Sony
  PlayStation 3 are initially sold below the cost to make them, with
  the manufacturers making it up with the residuals paid by game
  sales.)

  The original iPhone was sold without any subsidies, and thus when
  the iPhone 3G was released in July 2008, AT&T was able to offer
  subsidized pricing to anyone who wanted to upgrade (and lock in to a
  new, 2-year contract). All the original iPhones were sold at full
  retail price, so AT&T didn't have any gap to make up.

  Since the iPhone 3G _was_ subsidized, AT&T wants to recover its
  costs on the phone, which is why the company isn't offering the
  full, discounted prices to all existing iPhone users. While we might
  argue that AT&T is missing a golden opportunity to build brand
  loyalty before it loses its exclusive contract with Apple, or
  perhaps the company might want to make up for the lack of MMS,
  tethering, or faster network supported by the iPhone 3G S, we can't
  argue that AT&T is being unfair for wanting to recover the capital
  outlay on discounted phones. But AT&T uses more than contract age to
  determine when users qualify for phone upgrades, which is creating
  confusion as the horde of iPhone addicts prepares to mass-migrate on
  a single day.


**A Tale of Two iPhone Families** -- Like many iPhone addicts, once
  the iPhone 3G S was announced, I quickly logged into Apple's online
  iPhone store to reserve my model. I saw that I qualified only for
  the early upgrade pricing of $499 for the 32 GB model, sighed in
  disappointment, and made my reservation. I assumed pricing was
  directly tied to the age of my contract, but then I started to
  notice reports that upgrade eligibility didn't seem to be tied
  directly to contract expiration date. A couple days later, I also
  realized that we are a two-iPhone family, with my wife using my
  original, unsubsidized model, and perhaps we could upgrade that
  phone more quickly.

<https://buyiphone.apple.com/>

  I decided to call AT&T directly to check my status, and that one
  call saved me hundreds of dollars. The online iPhone store shows you
  only your _current_ pricing for a single line, not potential pricing
  for other phones on the same account, or when you qualify for the
  fully subsidized price. I learned that my wife's iPhone was
  immediately eligible for an upgrade, and my iPhone 3G (purchased on
  launch day in July 2008) would be eligible on 12-Jul-09; less than a
  month later, and only 12 months after purchase. I'd be able to
  upgrade one phone on launch day (swapping SIM cards after the fact,
  since my wife isn't nearly as geeky as I am), and we could upgrade
  the second a few weeks later. With a fairly new baby, we are looking
  forward to the improved photo and video capabilities of the iPhone
  3G S - otherwise we would have kept my current iPhone 3G.

  TidBITS contributor Chris Pepper encountered a completely different
  situation. Like me, he's in a two-iPhone family with an iPhone 3G
  for himself and an original model handed down to his wife (we do
  wonder how our wives put up with us at times). We've both been on
  AT&T for about the same length of time, although I used a BlackBerry
  for my first 5 months. We're on different AT&T family plans, but we
  pay within $20 a month of each other.

  When Chris called in, the AT&T customer representatives informed him
  that _neither_ of his lines was eligible for upgrades until his
  contract expiration dates. He was required to pay the higher early
  upgrade pricing even on his original, unsubsidized iPhone. At one
  point Chris and I were on the phone at the same time, talking to
  different AT&T representatives as we shared our findings over iChat.
  Despite our circumstances being extremely similar, our upgrade
  situations were very different.


**Investigating Further** -- After Chris and I compared results, I put
  out a call on Twitter and email to find out what other people were
  experiencing. The results were all over the map, with users in very
  similar circumstances (including the same subscription price tier)
  reporting very different upgrade eligibility dates. Fellow TidBITS
  editor Glenn Fleishman and I started to compare notes, and it became
  clear that contract date, last upgrade date, and price plan weren't
  the only factors involved in determining iPhone upgrade pricing.

  I contacted AT&T representative Seth Bloom, who responded
  immediately to clear up the confusion. It turns out that phone
  upgrade eligibility, for the iPhone or any other hardware, is tied
  to overall account history, using a number of factors. Seth said,

    "The main factor is how far you are into your contract. You will likely be 
eligible in the latter part of it. We also look as such things as how promptly 
you pay your bill, the date of your last subsidized handset, etc.  Please note, 
though, that all of these factors simply add up to how early (i.e., prior to 
the end of the contract) AT&T can give another subsidized device to an iPhone 
customer.

    "Customers can check their eligibility at http://www.att.com/iPhone or by 
visiting any of our company-owned retail stores. If you're not currently 
eligible, we'll give you the date you may qualify. You also can call *639# from 
your AT&T handset and receive a text with information about your upgrade 
eligibility."


**A Mistake Was Made** -- This made a lot of sense. AT&T, like any
  company, has higher and lower value customers. High value customers
  tend to receive greater incentives to stay with the company. Since I
  was paying, on average, $240 more a year than Chris, it's
  understandable that I would be able to upgrade sooner. But this
  still doesn't explain why Chris couldn't upgrade his completely
  unsubsidized iPhone on launch day. AT&T didn't pay a dime for it,
  and thus has no costs to recoup.

  Chris called AT&T back for a third time and managed to get through
  to a supervisor who realized something was wrong on Chris's account.
  By AT&T's own policies, Chris should qualify for the full upgrade
  discount on his wife's older iPhone. The supervisor escalated
  Chris's case, and he should hear back in the next couple of days.

  Since none of us have access to AT&T's eligibility algorithm,
  there's no way to predict anyone's eligibility for a discounted
  iPhone without checking with the source. I personally assumed I
  would qualify only after my contract expired, and I'm glad I called
  in to learn I was eligible immediately on one line, with the second
  following less than a month later. Chris learned that there was a
  problem with his account, and he will now likely be eligible to
  upgrade at least his older iPhone on launch day.


**Call for the Best Price** -- If you don't know, for sure, that
  you're getting the $199/$299 pricing, we recommend that you call
  AT&T, stop by a store, or check their online system for your upgrade
  eligibility date. If you think it's wrong, especially if you have an
  original iPhone, ask to talk to a supervisor and see if there might
  be a mistake on your account.

<http://www.att.com/iPhone>

  And if you happen to be in Phoenix on June 19th, look for me in line
  bright and early at the Biltmore Apple Store.


The Art of iPhone Photography
-----------------------------
  by Doug McLean <[email protected]>
  article link: <http://db.tidbits.com/article/10289>

  It's common knowledge: the iPhone's 2-megapixel camera is nothing
  special. It was unimpressive when it shipped, and every day it
  suffers more and more in comparison with modern point-and-shoot
  cameras, or even the latest camera phones. The common feature
  wishlist among users is long, with many hungering for more
  megapixels, video capabilities, zoom, and autofocus. While the
  camera is certainly a much-appreciated convenience, it doesn't lend
  itself to taking the kind of breathtaking pictures we expect from
  modern digital cameras. (And yes, the 3-megapixel camera in the
  iPhone 3G S should be an improvement; we'll know more about that
  soon.)

  But because of its convenience, the iPhone camera, like many mobile
  phone cameras, is often used merely as a kind of visual text message
  - the photo might not look great, but it gets the point across.
  People use it effectively to send images via email or Twitter that
  say, "Look at this giant burger I'm about to scarf," or even
  "There's a plane in the Hudson!" And it works pretty well with
  Evernote for visual reminders.

<http://twitpic.com/135xa>
<http://evernote.com/>

  But, as we'll see, the iPhone camera's technical limitations haven't
  prevented some artists from making great art with it, much the way
  artists have long produced amazing images using old or unusual
  photographic equipment.


**iPhone Photo Pioneers** -- There's a rich history of photographers
  using crude or basic tools, like pinhole or Holga cameras, to
  produce beautiful and memorable images. In many respects, those
  leading the charge of iPhone photo enthusiasm are seizing upon this
  tradition, though, ironically, their "crude" tool happens to be an
  expensive and sophisticated piece of technology. Among the leaders
  of this pack are a professional photographer, a self-described
  amateur, and a passionate online group of committed hobbyists.

<http://photo.net/pinhole/pinhole.htm>
<http://microsites.lomography.com/holga/history>

  Chase Jarvis is a professional photographer based in Seattle,
  Washington. In addition to running a photography studio that has
  garnered a slew of press and recognition, Jarvis has taken to using
  his iPhone for making images whose origins you would never suspect.

<http://www.chasejarvis.com/#s=0&mi=2&pt=1π=10000&p=5&a=0&at=0>
<http://press.chasejarvis.com/press/>
<http://www.tidbits.com/resources/2009-05/Jarvis.png>

  "The best camera is the one that's with you," Jarvis writes, "As
  such, I take between 1 and 1000 iPhone images every day..." He goes
  on to say he uses only native iPhone apps for editing instead of the
  expected choice, Photoshop. Considering the crisp edges, bold
  colors, and dynamic compositions in his photos, it's a claim that
  can be hard to believe.

  Greg Schmigel - a self-described amateur living in Maryland - is
  another well known name in the world of iPhoneography. While
  Schmigel is humble about his involvement in the medium, his Web site
  Just What I See has attracted much attention. Boasting hundreds of
  iPhone photos, most focusing on people in public places, Schmigel's
  site is a contemplation on the ephemeral beauty of the everyday.

<http://morristsai.com/2008/05/iphone-photography-in-the-hand.html>
<http://www.justwhatisee.com/>
<http://www.tidbits.com/resources/2009-05/schmigel_site.png>

  Another pool of iPhone camera talent gathers on Flickr, the iPhone
  Photography Group. With a collection of nearly 6,000 photos and over
  250 active members from around the world, the Flickr group is an
  excellent spot to expand your conception of what an iPhone photo can
  look like.

<http://www.flickr.com/groups/iphonephotography/>


**Tools of the Trade** -- At first glance, I couldn't figure out how
  many of these photos were made with the iPhone, but reading these
  sites made it clear that many were edited and enhanced using iPhone
  photo apps. This, of course, is good news since it means that you
  too can achieve similar results without ever leaving your iPhone or
  purchasing expensive photo manipulation applications for the Mac.

  The most popular apps, the ones that were referenced repeatedly in
  the Flickr group and whose effects became easy to spot, were
  CameraBag, ToyCamera, Photonasis, Photo fx, and TiltShift. They
  enable users to apply various filters to alter the appearance of a
  photo. For example, Camera Bag offers filters that "age" a photo and
  replicate the appearance of, say, a Polaroid from the 1980s, or a
  crisp black-and-white shot from the 1960s. Similarly, ToyCamera
  approximates the warm lo-fi effects attained by, well, cheap toy
  cameras.

<http://itunes.com/apps/camerabag>
<http://itunes.com/apps/toycamera>
<http://itunes.com/apps/photonasis>
<http://itunes.com/apps/photofx>
<http://itunes.com/apps/tiltshift>

  TiltShift offers only one effect, but it's an intriguing one that
  replicates the effects of tilt shift photography, which can result
  in creating pictures that appear to be photographs of miniature
  versions of the real thing.

<http://en.wikipedia.org/wiki/Tilt-shift_photography>
<http://www.tidbits.com/resources/2009-05/tiltshift.jpg>

  These sorts of apps are widely popular for their capability to
  emulate various camera effects and aesthetics. In fact, at least one
  app has actually been rejected from the App Store for replicating
  too well a set of proprietary camera effects. The Poladroid phone
  app, developed by Paul Ladroid, was rejected for containing features
  that "resemble Polaroid photographs." Given the number of validated
  apps containing similar features, this one will have to be chalked
  up to Apple's sometimes opaque review process (see "Developers Could
  Turn Away from iPhone App Store", 2008-09-25).

<http://www.poladroid.net/news-Poladroid_for_iPhone_rejected_by_APPLE-15.html>
<http://db.tidbits.com/article/9784>

  One last app worth mentioning is Stepcase's Darkroom (previously
  called Steadycam). Darkroom is interesting in that it helps you to
  take clearer pictures by using your iPhone's accelerometer. When you
  press the shutter button on your iPhone, Darkroom waits till your
  accelerometer reads as being relatively stable before it snaps the
  shot - resulting in a clearer photograph, especially in low-light
  situations. Another app called Night Camera does exactly the same
  thing.

<http://itunes.com/apps/steadycam>
<http://itunes.com/apps/nightcamera>

  For more information on the world of iPhone photography and the apps
  that populate it, check out the iPhoneography Blog.

<http://www.iphoneography.com/>


**Time-Traveling with Cameras** -- One thing I couldn't help but
  notice after looking at hundreds of iPhone photographs is the
  apparent desire to mimic older photographic forms, techniques, and
  equipment. As I mentioned, apps like CameraBag enable users to
  transform their photographs into what appear to be images from
  another era.

  Maybe the explanation for this phenomenon is a simple one: that
  low-resolution images taken with the iPhone are well suited to
  impersonate other forms of low-end photography? Yet perhaps the
  reason lies deeper; in the sudden and magical transformation from a
  mundane image to one with historical aura. Maybe it's the wonder of
  time travel that's implied - I may not be able to build a time
  machine, but I can make it look like I was 25 years old in 1970. Or
  it's possibly just another face of the collective nostalgia we seem
  to have for our childhood eras.

  Whatever the reason, it is curious that these effects are so
  ubiquitously utilized by users of what is one of the most innovative
  and forward-thinking technological devices we've seen in recent
  years.

  Of particular curiosity to me is that many of the images I came
  across replicated the appearance of Polaroid instant film - an apt
  ancestor of the iPhone photograph given its instantaneous nature.
  But this relationship is also peculiar given that Polaroid, the
  company, announced this past year it will no longer continue making
  instant film. The digital camera undoubtedly killed demand for
  physical instant film. Yet, people still seem to want exactly the
  aesthetic that their new tools put to out to pasture. It's a strange
  example of new technology destroying the old, only to come to
  resemble it. It raises a funny question: in 10 years will artists be
  replicating the blurry pixelated quality of the 2-megapixel iPhone
  camera from which most people now seek to escape?

<http://thelede.blogs.nytimes.com/2008/02/08/polaroid-abandons-instant-photography/>


TidBITS Watchlist: Notable Software Updates for 15-Jun-09
---------------------------------------------------------
  by Doug McLean <[email protected]>
  article link: <http://db.tidbits.com/article/10340>

  Firefox 3.0.11 from Mozilla is a security and stability update to
  the popular Web browser. Several critical security vulnerabilities
  that could be exploited to run arbitrary code have been repaired.
  Other more minor security vulnerabilities have also been addressed,
  as well as an issue causing the bookmark database to become
  corrupted. Finally, several problems with the SQLite internal
  database have been fixed. (Free update, 17.2 MB)

<http://www.mozilla.com/en-US/>
<http://www.mozilla.org/security/known-vulnerabilities/firefox30.html#firefox3.0.11>

  Script Debugger 4.5.3 from Late Night Software is a maintenance
  update to the AppleScript authoring environment. Changes include the
  pasting of object specifiers as a series of nested tell blocks
  instead of one object reference, an improved Balance command,
  automatic closing of AppleScript blocks, and the capability to
  continue when Script Debugger detects duplicate symbols coming from
  your libraries. Also several issues have been fixed including a
  hanging bug that occurred when viewing the InDesign dictionary, a
  bug that blocked auto-close and balance when unbalanced characters
  appeared in a style comment, and a bug that caused references to
  'path' outside of a tell block to create incorrect 4-character
  codes. ($199 new, free update, 10.8 MB)

<http://www.latenightsw.com/sd4/>

  1Password 2.9.19 from Agile Web Solutions is a minor compatibility
  update to the password syncing utility. The latest version brings
  full support for Safari 4 on Mac OS X 10.4 Tiger and 10.5 Leopard.
  ($39.95 new, free update, 11.8 MB)

<http://agilewebsolutions.com/products/1Password>


ExtraBITS for 15-Jun-09
-----------------------
  by TidBITS Staff <[email protected]>
  article link: <http://db.tidbits.com/article/10349>

**No More Prepaid GoPhone Plans for the iPhone** -- According to a
  TUAW article by Erica Sadun, anyone using AT&T's prepaid GoPhone
  plan to avoid the 2-year contract will be forced to switch to a
  normal contract to maintain 3G data access. It's unclear how many
  iPhone users have jumped through the necessary hoops to use a
  GoPhone plan, but if you're among that group, you might want to
  upgrade to an iPhone 3G S just so there's some upside to being
  forced into a 2-year contract. (Posted 2009-06-15)

<http://www.tuaw.com/2009/06/15/atandt-to-discontinue-prepaid-iphone-plans/>


**Adam Recaps WWDC in a Cowtown MUG Video Chat** -- In this three-part
  MacNotables video podcast, Adam and host Chuck Joiner talk with the
  members of the Cowtown Macintosh User Group in Fort Worth, Texas,
  about Apple's announcements at the Worldwide Developers Conference.
  (It's in three parts to make the downloads more manageable.) (Posted
  2009-06-15)

<http://www.macnotables.com/wordpress/macnotables-920-adam-engst-and-chuck-joiner-discuss-wwdc-announcements-with-the-cowtown-mac-user-group-part-1/>


**Apple's WWDC App Wall** -- Why should I have gone to WWDC when I was
  able to get all the news from home? To check out Apple's wildly cool
  App Wall in person! TechCrunch has posted some pictures and video of
  the pulsating wall of apps - a four-by-five grid of 30-inch Cinema
  Displays jam-packed with iPhone app icons. Each time an app was
  purchased in the store, its icon pulsed on the wall. (Posted
  2009-06-12)

<http://www.techcrunch.com/2009/06/08/apples-cool-matrix-style-app-wall/>


**Glenn and Adam Discuss AirPort Networking on MacVoices** -- Listen
  in as Glenn Fleishman and Adam Engst chat with MacVoices host Chuck
  Joiner about both the latest developments with Apple's AirPort
  wireless networking devices and what's new in the world of Wi-Fi
  security. (Posted 2009-06-12)

<http://www.macvoices.com/wordpress/macvoices-976-glenn-fleishman-and-adam-engst-take-control-of-airport-80211n-networks-and-wifi-security/>


**Adam Talks Through WWDC News on Your Mac Life** -- Tune in to this
  week's Your Mac Life show to listen to Adam and host Shawn King talk
  through all of what went down at the Worldwide Developers
  Conference. And yes, the Twitter hype is real - Shawn did get Adam
  to swear on the air. (Posted 2009-06-11)

<http://yourmaclifeshow.com/archives/2009/06/09/wwdc-pick-topic>


**iPhone 3G S Specs Revealed** -- Wired is reporting that T-Mobile (in
  the Netherlands) has let the cat out of the bag with regard to the
  technical specs of the iPhone 3G S. Apple has been keeping the exact
  details of the new phone's chipset under wraps, but now we know the
  deal: 256 MB of RAM for the OS, twice that of the original iPhone,
  and a 600 MHz processor, up from 412 MHz. (Posted 2009-06-11)

<http://www.wired.com/gadgetlab/2009/06/t-mobile-accidentally-posts-secret-iphone-3g-s-specs/>


**Apple's WWDC Keynote Video Now Available** -- By now you've probably
  read oodles of reports about Apple's keynote presentation at this
  year's Worldwide Developers Conference. But if you want to see how
  it all went down, or want to watch the many iPhone OS 3.0 app demos,
  Apple has posted a QuickTime video of the presentation. (Posted
  2009-06-09)

<http://events.apple.com.edgesuite.net/0906paowdnv/event/>


Hot Topics in TidBITS Talk for 15-Jun-09
----------------------------------------
  by Jeff Carlson <[email protected]>
  article link: <http://db.tidbits.com/article/10351>

**One "Trick," One Quirk in Microsoft's Bing** -- Readers share their
  experiences with, and thoughts about, Bing, Microsoft's new search
  engine. (43 messages)

<http://emperor.tidbits.com/TidBITS/Talk/2699>


**iTunes 8.2 not syncing podcasts correctly to iPhone** -- A smart
  album in iTunes 8.2 explains odd podcast sync behavior. (4 messages)

<http://emperor.tidbits.com/TidBITS/Talk/2700>


**New iPhone 3GS Boosts Power, Performance, and More** -- Readers
  attempt to figure out AT&T's opaque upgrade policies for the iPhone
  3G S. (5 messages)

<http://emperor.tidbits.com/TidBITS/Talk/2701>


**Apple Previews Snow Leopard for September Release** -- Snow
  Leopard's slimmed size and welcome $29 upgrade price attract
  discussion. (4 messages)

<http://emperor.tidbits.com/TidBITS/Talk/2702>


**iPhone 3.0--Icon limit** -- One welcome improvement in the iPhone
  3.0 software is support for more application screens. (5 messages)

<http://emperor.tidbits.com/TidBITS/Talk/2703>


**Safari 4 "Favorites"** -- Safari 4's Top Sites feature could be
  useful, but not if you already have a system for going to your
  favorite sites. (2 messages)

<http://emperor.tidbits.com/TidBITS/Talk/2705>


**The "other" Apple announcement on June 8** -- Apple's use of
  adaptive HTTP streaming invites comparison with how QuickTime
  currently streams content. (3 messages)

<http://emperor.tidbits.com/TidBITS/Talk/2707>


**MobileMe calendar sync problem** -- When MobileMe gets confused, it
  seems to do it in a big way. A reader details how he has tried to
  get calendar sync working, to no avail. Another reader reports
  success with Apple's help. (2 messages)

<http://emperor.tidbits.com/TidBITS/Talk/2708>


**One unfortunate shortcoming of the new MacBook Pro** -- The new
  MacBook Pro design takes us back to removing lots of screws of
  varying lengths in order to open the case and upgrade RAM or the
  hard disk. (3 messages)

<http://emperor.tidbits.com/TidBITS/Talk/2709>


**How to use a Mac with websites that require Internet Explorer** --
  What's the best way to access a Web site that requires Internet
  Explorer from a Mac? (7 messages)

<http://emperor.tidbits.com/TidBITS/Talk/2710>


$$

This is TidBITS, a free weekly technology newsletter providing timely
news, insightful analysis, and in-depth reviews to the Macintosh and
Internet communities. Feel free to forward to friends; better still,
please ask them to subscribe!

Non-profit, non-commercial publications and Web sites may reprint or
link to articles if full credit is given. Others please contact us. We
do not guarantee accuracy of articles. Caveat lector. Publication,
product, and company names may be registered trademarks of their
companies. TidBITS ISSN 1090-7017.

Copyright 2009 TidBITS: Reuse governed by Creative Commons license.

Contact us at:    <[email protected]>
TidBITS Web site: <http://www.tidbits.com/>
License terms:    <http://www.tidbits.com/terms/>
Full text search: <http://www.tidbits.com/search/>
Subscriptions:    <http://www.tidbits.com/about/list.html>
Account help:     <http://www.tidbits.com/about/account-help.html>






--
If you want to unsubscribe or change your address, use this link
http://emperor.tidbits.com/webx?unsub@@.3c557dc4!u=306a67f9

Reply via email to