Mozilla backs move to decriminalize iPhone jailbreaking
Firefox unwelcome on the iPhone, says CEO, who says 'choice shouldn't be criminalized'
In comments submitted to the U.S. Copyright Office, the maker of Firefox said it supports the Electronic Frontier Foundation (EFF) in its request for an exemption to the Digital Millennium Copyright Act (DMCA). The EFF wants the Copyright Office to let users jailbreak their phones without fear of copyright infringement penalties.
Apple opposes the exemption, and in its own filing with the Copyright Office, has said that jailbreaking is a violation of copyright laws that protect its software.
"This is not us criticizing Apple," Mozilla CEO John Lilly said in an interview on Monday. "But it's the principle of the thing. Choice is good for users, and choice shouldn't be criminalized. The Internet is too important for all of us for that."
"Jailbreak" is the term used to describe circumventing the digital rights management (DRM) technology on a cell phone so that the user can install third-party applications not authorized by the phone's maker or the mobile carrier. The term was popularized by iPhone owners after several groups of programmers figured out how to hack the first-generation iPhone's operating system.
Although it never mentioned the iPhone by name in its comments, Mozilla made no bones about the danger it sees if a company like Apple is the sole gatekeeper of a smartphone. "By controlling the software that can be installed on these cellular phones, these companies can limit and control the type of programs and functionality that is available to users of their devices," Mozilla's general counsel, Harvey Anderson, wrote in the comments submitted to the Copyright Office (download PDF).
Anderson said that the DRM technology used to prevent people from installing software has a "chilling effect on users and innovation" because they are afraid that jailbreaking their phones is illegal.
He went on to argue that smartphones are akin to a computer, and because they can be used to access the Internet, should not be limited to the software authorized by the handset maker and/or the mobile service provider. "These devices contain Internet Web browser, and are therefore effectively users' doorway to the Internet -- a public commons," Anderson said. "Consumers should be entitled to use any software program they choose to access the Internet."
Apple includes a version of its own Safari browser on the iPhone, and decides which third-party applications can be downloaded from its App Store online mart, the only authorized distribution channel. In the past, Apple has rejected programs it says duplicate its own iPhone software, a notion that is reportedly spelled out in the iPhone's software development kit (SDK) licensing agreement. So far, no major rival to Safari has been offered to users through the App Store.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts