Has the same issue last week. Not sure what happened, but I had to fully close the app then reopen it to get it to refresh.
Has the same issue last week. Not sure what happened, but I had to fully close the app then reopen it to get it to refresh.
I just saw this post that clarified it was a fully automatic machine gun. Weapon of mass destruction sounds like a nuke, but from a legislative perspective, I can see how a fully automatic machine gun would qualify.
RIP. It’s been coming for a while, and Control Panel will likely be on hospice for a few more years, but it will be a sad day when control panel is gone.
While there are some really cool things coming (spatial video, action button, etc), the only reason to recommend an upgrade this year is for Apple Intelligence features. If your phone is old and it’s just your time to upgrade, then it’s a great year for it. But if you’ve got a newer phone, don’t rush for the upgrade.
MDMs already allow business to manage security permissions for apps. I don’t see why this would be any different. If the company has an MDM, this change should have no impact on their users. If they don’t have an MDM, they really need to get one, not just for this, but a lot of other security and usability reasons.
This will really suck for users of personal devices, though.
Security Now is amazing. For anyone that wants the deep dive tech perspective, plus what it means for everyday people and users, this is a great option.
I’m guessing it’s a little bit of both…
As someone that has managed MDM platforms before, I absolutely agree with this. If it’s a work laptop, then yeah they have the right to install MDM on it. If it’s a personal laptop, I really wouldn’t recommend it.
MDM gives the admins full control over the device. They can run commands to wipe the device, install software, set policies, gather inventory data, or any custom action they want.
The MDM platforms I’ve used can’t be used to spy on people, but they absolutely have the power to install software or run scripts that can spy on you. IT probably doesn’t have time to actually watch individual employees, but anything they do likely has a built in report that can give data on who did what, prioritizing based on whatever the company is looking for.
Always assume that companies are monitoring everything going on with the computers and WiFi networks that they own. They likely are checking things out to make sure activity is safe and appropriate.