Mozilla backs move to decriminalize iPhone jailbreaking
Firefox unwelcome on the iPhone, says CEO, who says 'choice shouldn't be criminalized'
In comments submitted to the U.S. Copyright Office, the maker of Firefox said it supports the Electronic Frontier Foundation (EFF) in its request for an exemption to the Digital Millennium Copyright Act (DMCA). The EFF wants the Copyright Office to let users jailbreak their phones without fear of copyright infringement penalties.
Apple opposes the exemption, and in its own filing with the Copyright Office, has said that jailbreaking is a violation of copyright laws that protect its software.
"This is not us criticizing Apple," Mozilla CEO John Lilly said in an interview on Monday. "But it's the principle of the thing. Choice is good for users, and choice shouldn't be criminalized. The Internet is too important for all of us for that."
"Jailbreak" is the term used to describe circumventing the digital rights management (DRM) technology on a cell phone so that the user can install third-party applications not authorized by the phone's maker or the mobile carrier. The term was popularized by iPhone owners after several groups of programmers figured out how to hack the first-generation iPhone's operating system.
Although it never mentioned the iPhone by name in its comments, Mozilla made no bones about the danger it sees if a company like Apple is the sole gatekeeper of a smartphone. "By controlling the software that can be installed on these cellular phones, these companies can limit and control the type of programs and functionality that is available to users of their devices," Mozilla's general counsel, Harvey Anderson, wrote in the comments submitted to the Copyright Office (download PDF).
Anderson said that the DRM technology used to prevent people from installing software has a "chilling effect on users and innovation" because they are afraid that jailbreaking their phones is illegal.
He went on to argue that smartphones are akin to a computer, and because they can be used to access the Internet, should not be limited to the software authorized by the handset maker and/or the mobile service provider. "These devices contain Internet Web browser, and are therefore effectively users' doorway to the Internet -- a public commons," Anderson said. "Consumers should be entitled to use any software program they choose to access the Internet."
Apple includes a version of its own Safari browser on the iPhone, and decides which third-party applications can be downloaded from its App Store online mart, the only authorized distribution channel. In the past, Apple has rejected programs it says duplicate its own iPhone software, a notion that is reportedly spelled out in the iPhone's software development kit (SDK) licensing agreement. So far, no major rival to Safari has been offered to users through the App Store.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts