éå¶å©å£ä½Electronic Frontier Foundationï¼EFFï¼ã¯8æ23æ¥ï¼ç±³å½æéï¼ãç±³Appleãåºé¡ä¸ã®ã»ãã¥ãªãã£é¢é£æè¡ã®ç¹è¨±ã«ã¤ãã¦ããã©ã¤ãã·ã¼ã®è¦³ç¹ããæ¸å¿µã示ãã³ã¡ã³ããçºè¡¨ããããã¹ãã¤ã¦ã§ã¢ã©ããããï¼ã¦ã¼ã¶ã¼ãè£åãï¼âTraitorwareâã ãã¨å½¢å®¹ãã¦ããã åé¡ã®ç¹è¨±ã¯ãAppleãåºé¡ãã¦ãããSYSTEMS AND METHODS FOR IDENTIFYING UNAUTHORIZED USERS OF AN ELECTRONIC DEVICEãï¼é»åæ©å¨ã®éæ£è¦ã¦ã¼ã¶ã¼ãèªèããã·ã¹ãã ããã³æ¹æ³ï¼ã§ã8æ19æ¥ã«åºé¡ä¸ã§ãããã¨ããªã³ã©ã¤ã³ã§æããã«ãªã£ãã ããã¯ãå社ã®ãiOSããæè¼ããããã¤ã¹ãã¦ã¼ã¶ã¼ã®IDã使ç¨æ¹æ³ã調ã¹ãã¦ã¼ã¶ã¼ãæ£è¦ã¦ã¼ã¶ã¼ãã©ãããèå¥ã§ããããã«ãããã®ããã®æè¡ã«ãããã¦ã¼ã¶ã¼ã®é³å£°ãé²é³ãã

{{#tags}}- {{label}}
{{/tags}}