![]() |
2009-11-18
, 20:40
|
|
Posts: 11,700 |
Thanked: 10,045 times |
Joined on Jun 2006
@ North Texas, USA
|
#2
|
The Following 6 Users Say Thank You to Texrat For This Useful Post: | ||
![]() |
2009-11-18
, 20:43
|
|
Posts: 1,656 |
Thanked: 1,196 times |
Joined on Apr 2008
@ Alabama, USA
|
#3
|
The Following 6 Users Say Thank You to andrewfblack For This Useful Post: | ||
![]() |
2009-11-18
, 20:46
|
|
Posts: 1,111 |
Thanked: 1,985 times |
Joined on Aug 2009
@ Åbo, Finland
|
#4
|
The Following 6 Users Say Thank You to mece For This Useful Post: | ||
![]() |
2009-11-18
, 20:48
|
Posts: 1,746 |
Thanked: 2,100 times |
Joined on Sep 2009
|
#5
|
Which is, what are the consequences of open source for a mobile computer connected to the internet and gsm network?
What if there was some evil developer to create a trojan, maybe covered by an application, that slowly uses your Data for spamming or what not. Or even makes undercover calls? sends out your contacts or text messages to marketing 'baddies'.
![]() |
2009-11-18
, 20:50
|
Posts: 336 |
Thanked: 47 times |
Joined on Jul 2008
|
#6
|
Correct me if i'm making mistakes in my thinking process.
I was thinking about the N900, and that i am not buying it yet, and that is probably the reason i started to gather negative points about the device to relativate, which led me to a thing that i actually found interesting to see others, maybe more experienced developers or programmers, with a better perspective, comment on.
Which is, what are the consequences of open source for a mobile computer connected to the internet and gsm network?
What if there was some evil developer to create a trojan, maybe covered by an application, that slowly uses your Data for spamming or what not.
Or even makes undercover calls? sends out your contacts or text messages to marketing 'baddies'.
edit: request: norton for maemo
The Following User Says Thank You to yukop4 For This Useful Post: | ||
![]() |
2009-11-18
, 20:51
|
Posts: 388 |
Thanked: 842 times |
Joined on Sep 2009
@ Finland
|
#7
|
What if there was some evil developer to create a trojan, maybe covered by an application, that slowly uses your Data for spamming or what not.
Or even makes undercover calls? sends out your contacts or text messages to marketing 'baddies'.
![]() |
2009-11-18
, 20:53
|
Posts: 607 |
Thanked: 450 times |
Joined on Sep 2009
@ Washington, DC
|
#8
|
The Following User Says Thank You to DaveP1 For This Useful Post: | ||
![]() |
2009-11-18
, 21:03
|
|
Posts: 531 |
Thanked: 79 times |
Joined on Oct 2006
@ This side of insane, that side of genius
|
#9
|
The Following 3 Users Say Thank You to brendan For This Useful Post: | ||
![]() |
2009-11-18
, 21:09
|
|
Posts: 7,075 |
Thanked: 9,073 times |
Joined on Oct 2009
@ Moon! It's not the East or the West side... it's the Dark Side
|
#10
|
The Following User Says Thank You to Dave999 For This Useful Post: | ||
I was thinking about the N900, and that i am not buying it yet, and that is probably the reason i started to gather negative points about the device to relativate, which led me to a thing that i actually found interesting to see others, maybe more experienced developers or programmers, with a better perspective, comment on.
Which is, what are the consequences of open source for a mobile computer connected to the internet and gsm network?
What if there was some evil developer to create a trojan, maybe covered by an application, that slowly uses your Data for spamming or what not.
Or even makes undercover calls? sends out your contacts or text messages to marketing 'baddies'.
edit: request: norton for maemo