I have a Series 5 Watch and it just drained completely in 2 hours since upgrading. Anyone have tips? Think this could be corrected with another update?
130gb space left, also i noticed if you're on a phone call using your Air Pods and the iPhone is in the lock mode and you try to unlock the phone from the caller screen it has a nasty flickering bounce effect and will not unlock until you try it a 2nd time.Maybe you didn't have enough storage space left on the phone?
I just do automatic update on all my stuff. Seems a bit more safer for the last few years now Doing this method. the last time my iPhone 14 pro max took over 2 weeks before it finally updated on its own.
Oh130gb space left, also i noticed if you're on a phone call using your Air Pods and the iPhone is in the lock mode and you try to unlock the phone from the caller screen it has a nasty flickering bounce effect and will not unlock until you try it a 2nd time.
that's bad advice - security updates are important
You just got lucky. If your phone had been targeted by Intellexa spyware, blocked by the latest update, you would not have been so lucky.Is it? Whenever I get a new iPhone, I just leave at that sw version (x.0) I've dealt with the copy-paste error on the iPhone 14 Pro, and didn't neeed to deal with any new bugs iOS gives us with updates. Worked just fine for the past year.
It's kinda ok.. My work iPad is 6th and I did install 17 on it and my work iPhone 13. The iPad was already getting a bit slow and I don't really use it much.. I've held off installing 17 on my personal devices.. My 2015 MBA isn't supported above Monterey and I'm leery of updating personal iPad and iPhone further fearing they may not work well together anymore. I may do it later in the year once it seems these bugs/security issues in 17 have been worked out.Anyone here running iOS 17 on the old iPad 6th gen...? How's the performance like...?
Thanks for the link!You just got lucky. If your phone had been targeted by Intellexa spyware, blocked by the latest update, you would not have been so lucky.
Plan for what?I wish they'd make their iOS support schedule known... Like is iOS 15 going to keep getting updates like iOS 12 did for so long?
It's so hard to plan without Apple making any sort of support cycle known.
Thanks for the link!
Well, I guess i've been lucky for quite a few years in a row now, as I stopped updating sw myself. The only update I get is when buying new hardware. I've never had an issue, attack or anything, and neither have heard of others.
Except for when Apple screwed up and left the root pw blanc on the Mac. That was spooky, so I applied that fix.
Would it make a difference that I'm not using Safari, but Opera without cookies?
Should’ve not been released without the fixes. this quick fix after release means not enough internally tested across all devices in use that are supported.That was quick.
Should’ve not been released without the fixes. this quick fix after release means not enough internally tested across all devices in use that are supported.
Early next week you should have the option to try iPadOS 17.1 beta 1 is the general consensus of when it arrives. Get free account read here.Since updating to iOS 17.0.1, my Magic Keyboard is not connecting to my iPad Pro. I get an “accessory not supported” error. I’ve tried disconnecting and reconnecting the keyboard and restarting the iPad to no avail. I suspect a bug in the update.
I’m on the same boat here. 17.0 has been very solid on my 14 Pro Max and battery life has been quite better. I’m not even sure I wanna upgrade 😂17.0 runs so well on my 12 Pro I don't even want to upgrade![]()
What folks need to understand is that most times these exploits don’t remain as “secret” and “protected” as the narrative might have you think. These articles seem to imply that only government agencies/nation-states are buying these products and using them… but that isn’t entirely true, most of them have eventually leaked out and end up kracked on the “dark web”. And even if the programs don’t leak, often the security vulnerability-chains they use get reverse engineered and other products using them released. Then you end up with technically-competent “script kiddies”, who could never have figured these attacks out on their own, using them against people who called them an “incel” on X or in looking for nudes against random scantily-clad IG “influencers” or fscking with randos on Fb for lulz. Or jack-boot low-level law enforcement bullies abusing their position of privilege and access to the apps using them against exes or others with whom they have an axe to grind, because that’s what jack-booted bullies do. And can.Well, I guess i've been lucky for quite a few years in a row now, as I stopped updating sw myself. The only update I get is when buying new hardware. I've never had an issue, attack or anything, and neither have heard of others.
It's unlikely that you personally would be targeted by Pegasus or Predator spyware, but if you were, you wouldn't even know. The sole purpose of those evil software implants is to harvest your personal data, track your messages, see what your camera is seeing, listen through your microphone etc.
What folks need to understand is that most times these exploits don’t remain as “secret” and “protected” as the narrative might have you think. These articles seem to imply that only government agencies/nation-states are buying these products and using them… but that isn’t entirely true, most of them have eventually leaked out and end up kracked on the “dark web”. And even if the programs don’t leak, often the security vulnerability-chains they use get reverse engineered and other products using them released. Then you end up with technically-competent “script kiddies”, who could never have figured these attacks out on their own, using them against people who called them an “incel” on X or in looking for nudes against random scantily-clad IG “influencers” or fscking with randos on Fb for lulz. Or jack-boot low-level law enforcement bullies abusing their position of privilege and access to the apps using them against exes or others with whom they have an axe to grind, because that’s what jack-booted bullies do. And can.
And there is next-to-no accountability being employed in these cases. Apple surely doesn’t want users to know they’ve been exploited! That goes against their narrative! And this is one exceptional example of how Apple’s security paradigm works against its own users… you ALSO don’t know what’s going on behind the curtains of the black box you’re using.
An interesting coincidental post at Slashdot:
![]()
Did Teens Ally with Ransomware Gangs for MGM Breach? - Slashdot
Recent breaches of MGM's casino systems "were probably carried out by teens and young adults who have allied themselves with one of the world's most notorious ransomware gangs," writes the Washington Post's technology reporter. Their alliance with the "Scattered Spider" group is described as...yro.slashdot.org
I skimmed the thread and I may have missed this if someone else brought it up. Has no one else seen the significance of 17.0.1? As in NCC1701?
No, but I actually think I had one last night from another phone to mine.. I'll have to prove that out again when I have time..Anyone having failed airdrops from iPhone to Macs?
You just got lucky. If your phone had been targeted by Intellexa spyware, blocked by the latest update, you would not have been so lucky.