Preview

Jailbreaking

Better Essays
Open Document
Open Document
1713 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Jailbreaking
Marcus Penza
4/15/12
English
Professor Kramer

Jailbreaking, Right, Wrong, Legal, Illegal?
Jail breaking, a concept that can offer you complete freedom, but not in the way most would think, instead of freeing you from a 12x12 confined space, jailbreaking frees a technological device’s firmware from its locks and limitations letting the device reach its full potential. Although the process of jailbreaking could be used on a vast variety of devices, throughout this essay we will be examining the jailbreaking of iTouch’s, iPhone’s, and iPad’s. When Apple designs these products, they come with a predesigned firmware that restricts certain capabilities that otherwise the device would be able to do, such as wifi mobile hotspots, direct downloading capabilities, and more insignificant features, like moving screen savers. Along with the understandable, “disserved” capabilities jailbreaking offers, it also enables the ability for the user to access and download apps, and settings that Apple’s firmware protected against due to their illegal content. Thus the question on the topic is if jailbreaking is the “right” thing for a user to do with his/her device. Due to the fact that the user purchases the device outright, they should have the right to do whatever they please with the firmware and device itself even if it enables illegal activities, the user should be able to decide whether or not to obey the law, and the user should have full control of their apple device. When someone purchases any material object, it is the assumption that the buyer has the right to do as he/she pleases with the purchased object, and the situation should not be any different for the iTouch, Phone, or Pad, Thus making the process of jailbreaking morally acceptable, as well as legally just. If a restriction is put on a person’s own property, then the property really is not owned, which is okay, if that is pre-disclosed to the buyer so that they know that everything about the purchased

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Issue: May an owner protect personal property in an un-occupied house against trespassers by installing…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    LRWA carmichael analysis

    • 1136 Words
    • 3 Pages

    To determine whether a person has “possession” of a property the court considers four factors: (1) whether the buyer exercises control over the property adverse to the seller; (2) whether the buyer has an exclusive right to control the property; (3) whether the buyer pays for taxes and improvements, and; (4) whether the both parties publically acknowledges the transfer. Dawson v. Tumlinson, 242 S.W.2d 191 (Tex. 1951); Johnson v. Bridgewater, 140 S.W.2d 282 (Tex. Civ. App. 1940, writ dismissed); Sharp v. Stacy, 535 S.W.2d 345 (Tex. 1976); Thorton v. Central Loan Co., 164 S.W.2d 248 (Tex. Civ. App. 1942, writ refused). The court does not consider who occupies the property. Sharp, 535 S.W.2d at 348. The details of the oral agreement are also not considered. See Dawson, 242 S.W.2d 191; Johnson, 140 S.W.2d 282; Thorton, 164 S.W.2d 248; Id. Every factor is considered, but all of them need not be present. Johnson. Presently, Carmichael paid for taxes and improvements, but each other factor is at issue.…

    • 1136 Words
    • 3 Pages
    Good Essays
  • Good Essays

    other people’s property unless you have traded fairly for it and that when a fair transaction…

    • 1210 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In this article, the authors not only cite the article by A. Fishman and M. Marquis-Boire but also used their own thoughts to make their story effectively “Cyanogen Mod is an open-source firmware distribution based on Android that lets users install apps without granting all requested permissions.” and “Blackphone has an OS that is based on a fork of Android. / Despite the Blackphone’s focus on security, a data-type confusion vulnerability in its code was disclosed and fixed in January 2015. The vulnerability could have allowed remote attackers to execute arbitrary code on Blackphones.” (3), these stories will cause attention to the readers…

    • 143 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    In the 1990’s Mobile Data commercial applications begin to appear with devices like pagers, personal digital assistants (PDA), cell phones with text messaging and laptops. Mobile data also started to disappear this was due to companies started offering better packages that could be used not just locally but nationwide. PDA’s Cellular phone and laptop computers are a huge part of the criminal justice system. (Magnuson, 2009).…

    • 1081 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Case study 1

    • 466 Words
    • 2 Pages

    The blackberry controversy is prominent in Asia, particularly in the Middle East, and not anywhere else in the world because of the instability of the region, government corruption, and restricted freedoms. The governments in the Middle East are under threat and need all of the information on potential terrorist plots so they can get to protect their sovereignty. In order to protect the people, or to maintain a dictatorial grip on the power they wield, they suppressed freedoms for the populace. Also because of the different laws and attitudes towards privacy and human rights along with the differing degrees in the capabilities of governments to crack encryption; finally because of the domestic and regional political instability along with the occurrence of certain incidents that highlighted the security threats posed and the RIM’s secrecy.…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    American Federal Tax Report

    • 4628 Words
    • 19 Pages

    such property, be considered as a liability of the owner of the property." Section 752(c) could…

    • 4628 Words
    • 19 Pages
    Satisfactory Essays
  • Good Essays

    * System of title by registration rather than registration by title (Breskvar v Wall (1971) 126 CLR 376.…

    • 2675 Words
    • 11 Pages
    Good Essays
  • Good Essays

    LA Times contributor Patt Morrison, in her opinion article titled “How Your Cell Phone Betrays You,” effectively claims that stores are morally wrong for using customer’s cell phone information without their consent. Firstly, she supports her claims by asserting that many stores, including the popular Nordstrom, are already using tracking customers throughout the store and obtaining their cell phone information. She uses examples to appeal to the reader’s logical thinking when stating, “Nordstrom, the high-end department store, began using a technology that can use the Wi-Fi signals in shoppers’ smartphones to follow them virtually throughout the store, from display to display, item to item, and check how long they spent looking at what, just as websites can do now” (Morrison). By the author using examples to back up…

    • 543 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cloud Flare Case

    • 2639 Words
    • 11 Pages

    NSA accused for spying on US citizens through third party technological companies (Menn & Weber, 2013)…

    • 2639 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    02

    • 380 Words
    • 2 Pages

    Defense of Right- I deserve this right because I paid for my iPhone already so I can do whatever to my own electronics, including jailbreak.…

    • 380 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    In conclusion, Andrew Sullivan’s Ipod World story helps you give thought to how technology is impacting our lives.…

    • 381 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Brown, K. (2012). Steering the Nation 's Cell Phone Laws in the Right Direction. Temple Journal Of Science, Technology & Environmental Law, 31(1), 31-44…

    • 1261 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    When you have or know anyone that has an iPhone, I pad of iPod touch then could be aware of the term Jailbreak or Jailbreaking. So what dos it mean when individuals Jailbreak there device. Well all iBreakLock actually does is offers the i-phone, iPad or iPod touch consumer the capability to lift all restrictions set in place by apple. So basically you remove any applications limitations that apple has put on there device.…

    • 543 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    I suspect that our modern sense of security has been entrained to operate in collusion with these technological devices that have slyly entrapped our minds even as they have offered us incredible new possibilities. Our reliance on new and ever-advancing technologies, such as the mobile phone – which in a few short years has also become a mobile photo album, mobile internet, camera, video machine and multi-media entertainment center – has developed into quite a habit, an unconscious addiction that is shaping the very nature of our personalities, both personal and collective, and even, God forbid, our souls. What need have we, the general public, for an imagination when so many limitlessly stimulating devices are available in our world? Who needs an inner world at all when the outer world of our own creations has become so evocative, so seducing, so ever-demanding, evasive and totalitarian? We are continually inundated with advertisements and…

    • 29422 Words
    • 118 Pages
    Better Essays

Related Topics