|
I would suspect the parents did not set up a fingerprint authorisation and the kid only had to set a new finger print rather than change an existing one - it is still a flaw in the apple system and unconscionable actions by the app designer to accept such volume from a rugrat.
Never underestimate the power of human stupidity -
RAH
I'm old. I know stuff - JSOP
|
|
|
|
|
Mycroft Holmes wrote: I would suspect the parents did not set up a fingerprint authorisation Either that or it was a fun game, showing the girl how to use her thumb with the device.
Should be fun paying the bill, too. I don't think the digit I'd give apple would be a thumb.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Quote: Ms Phillips, 35, said: "I felt sick and was in floods of tears. ... It was hard to be too angry with her because she didn't really know what she was doing and she didn't understand. An eight-year old who can bypass security and install her fingerprint as a new password didn't know what she was doing ?
Well, this is what happens when parents with pointy chins give an eight-year old an £300 iPad.
I fault the parents, and I fault Barclay's for not flagging such a suspicious series of purchases in a short time and notifying the parents,.
To the young lady: I think you have a very bright future, and I suspect MI6 is going to recruit you.
«One day it will have to be officially admitted that what we have christened reality is an even greater illusion than the world of dreams.» Salvador Dali
|
|
|
|
|
Ah yes, modern society where nothing you do is your responsibility, everything bad that happens is the fault of someone else and everyone else has a duty to ensure you face no consequences for your actions.
|
|
|
|
|
No, that's not what I'm saying.
What I'm saying is that designing games to appeal to the vulnerable - and children are that - is much the same as charging 4000% APR on a "pay day loan" designed to scrape the last vestiges of money away from the poor. It's immoral, unethical, and downright reprehensible.
Yes, the kid is to blame, as is the mother, as (perhaps) is iCompany for allowing a security flaw like that to be possible (assuming mummy is telling the truth, the whole truth, and nothing but the truth, which I doubt), as is the credit card company. But the developers shoulder the main blame for deliberately crafting a game to do just that.
And I thought EA was bad with their DLC model ...
"I have no idea what I did, but I'm taking full credit for it." - ThisOldTony
AntiTwitter: @DalekDave is now a follower!
|
|
|
|
|
OriginalGriff wrote: as (perhaps) is iCompany for allowing a security flaw like that to be possible (assuming mummy is telling the truth, the whole truth, and nothing but the truth, which I doubt)
Tested during lunch on a coworkers phone as explained here[^]
In short, don't allow TouchID to authorize sales on someone elses phone.
|
|
|
|
|
If you're vulnerable it's the job of your protectors to keep you safe.
The protector in this case is the parent. Not the game developers.
|
|
|
|
|
In the Netherlands you could challenge the sale in court; not just because the parent didn't authorize the sale, but because the sales are based on misleading the customer.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Quote: "It was hard to be too angry with her because she didn't really know what she was doing and she didn't understand.
"We are really angry, but she is innocent. She said she thought it was free.
"She does look sorry. She looked white when we spoke to her about it and she started crying.
Oh, she looks sorry. I guess that makes it alright.
Without getting into the technical details...she managed to reset the payment settings. She must've known something or she wouldn't have done that.
Quote: Her iPad has been confiscated and she has been banned from using iTunes games as punishment.
What about paying back the money? Clearly the parents are going to have to pay back the debt, but the kid needs to pay back the amount to her parents. She's 8--she's going to need to do chores for a long, long time to come. But she shouldn't be let off the hook. (No, I don't have kids. Yes, that's exactly what I'd be doing.)
Quote: "However, we empathise with Ms Phillips' situation, so we have made arrangements not to charge any interest on the transactions.
How benevolent of the credit card company.
Quote: I thought it must have been fraud at first. But then I saw the transactions were all from Apple and I just thought 'oh my god'.
"oh my god, this confirms it is fraud".
|
|
|
|
|
|
This is not how you comment software, Terrence. This is just not how you do it.
Real programmers use butterflies
|
|
|
|
|
Pull request: Denied
Reason: How about you read the comment guidelines, Burgess?
On a different note, what on Earth code are you reading that has to do with "Intrinsic Ultracontractivity and Probability"?
|
|
|
|
|
It's the C version of antlr - a very early version before it was rewritten in java
Real programmers use butterflies
|
|
|
|
|
You wouldn't want to look at some of my comments. Would make a sailor blush!
Monday starts Diarrhea awareness week, runs until Friday!
JaxCoder.com
|
|
|
|
|
I've had a few of those, but my favorite was a troll of myself? future devs? I won't repeat it here and spoil it
Real programmers use butterflies
|
|
|
|
|
A lot of mine is of the chastising nature or to put it Simpson like DOH! (But in language suitable for a Marine)
Monday starts Diarrhea awareness week, runs until Friday!
JaxCoder.com
|
|
|
|
|
I googled that. "Instrinsic Ultracontractivity and Probability" by Burgress Davis.
WTF are you getting into there, miss codewitch? Contagion research?
|
|
|
|
|
I'm not sure that's the right paper. This is a parser generator.
Real programmers use butterflies
|
|
|
|
|
My thought was maybe the probability equations were somehow useful in parsing. Because yea, Purdue TR90-30 is a paper relating to heat kernels.
|
|
|
|
|
Maybe they reuse numbers. The paper Terrence referred to was pretty old judging by the other comments, though that would be strange if they did.
Real programmers use butterflies
|
|
|
|
|
The paper's from 1990, but maybe the numbers don't distinguish between departments so there's a TR90-30 from the CS department too or something. No clue, but now I know heat kernels are a thing
|
|
|
|
|
haha, well maybe he mistyped the comment. I don't know. this source is decades old - very late 80s in some places.
Real programmers use butterflies
|
|
|
|
|
|
Yeah I found his thesis but it explains the theory of the code, but not the code itself, which is rather convoluted.
Real programmers use butterflies
|
|
|
|
|