>chaining together a dozen dilapidated second-generation iPhone SEs and harnessing Apple's Live Text optical character-recognition feature to find possible inventory tags
I think Tesseract is the smarter/faster/less obnoxious choice if you're not trying to parse weird meme text like the blog is doing. There's almost certainly a better paid option available in our enlightened AI age, but I don't even think you'd need AI for this use-case.
Some of these developer devices get 'destroyed' and sold as scrap. dosdude1 has restored some of these kinds of devices to working order. There's pretty neat video of the restorations:
This is why solutions like Bitlocker with a good TPM or FileVault are so important.
They can essentially guarantee that the disk encryption key will only be released from the security module if the computer is running a fully-trusted and signed OS. Even if you take the drive out of the machine, the data on that drive is completely useless to you.
Incidentally, this is also what makes short PINs secure; the TPM contents are unreadable, even to a skilled attacker, so if the TPM is guaranteeed to wipe itself after 10 tries, even a 4-digit PIN is secure enough.
the TPM contents are unreadable, even to a skilled attacker
Depends how "skilled". Nation-state level? Most definitely not. "IC break" services in China? Maybe. AFAIK TPMs are based on similar secure-processor designs as the chips in payment cards and other smartcards, and even those with enough determination and $$$, or the right equipment, will get you through.
> After he evaluated the Time Capsule's contents, Bryant notified Apple about his findings, and the company's London security office eventually asked him to ship the Time Capsule back.
> Bryant again reported his findings to Apple and returned the Mac Mini to them.
Why the hell did he do that?! It's, like, the worst thing one can possibly do with these kinds of devices. Just publish stuff that doesn't have anyone's personal data in it. That'll make the world better in the end.
IMO, it's a personal philosophy. Similar to why hackers choose to report vulnerabilities to bug bounties vs. release findings on sites like Hack Forums.
We all know companies are predatory, and in many cases companies (looking right at you Google and Microsoft) continue to refuse to pay people for discovering, documenting and reporting high-severity vulnerabilities. That doesn't mean we as individuals forfeit our principles and become just as corrupt as the "faceless corporate entities."
Would you be willing to publish the iOS OCR server you made? It would be greatly useful in some of my products, as as you’ve noted other options have either low-quality results (tesseract, some cloud-based solutions) or are expensive in comparison for large amounts of images (most cloud-based solutions). That and it’d allow some of us to put our old phones to use.
Here's something i've used a few times. It's not using the phone, but rather a mac mini that's sitting in the corner. Quickly made this repo -- mind the mess.
the only things anyone ever wanted to know from apple is their aggressive business tactics... and most of that is already public thanks to the many processes they lost along the way. from labour salary fixing across industries to pushing obvious monopolies in the face of the publishing industry.
I think the only piece I'd pay to read is how they negotiated with spotify.
krackers|1 year ago
This is the second time I've read about an iPhone OCR rack https://findthatmeme.com/blog/2023/01/08/image-stacks-and-ip...
Is this still state of the art in terms of local OCR?
mandatory|1 year ago
talldayo|1 year ago
epakai|1 year ago
ARM Apple Silicon Developer Transition Kit: https://www.youtube.com/watch?v=reQq8fx4D0Q iPod Touch dev board: https://www.youtube.com/watch?v=qLCt6oHPTQM
The PCB repair technique for the DTK is pretty cool on its own.
userbinator|1 year ago
JKCalhoun|1 year ago
miki123211|1 year ago
They can essentially guarantee that the disk encryption key will only be released from the security module if the computer is running a fully-trusted and signed OS. Even if you take the drive out of the machine, the data on that drive is completely useless to you.
Incidentally, this is also what makes short PINs secure; the TPM contents are unreadable, even to a skilled attacker, so if the TPM is guaranteeed to wipe itself after 10 tries, even a 4-digit PIN is secure enough.
userbinator|1 year ago
Depends how "skilled". Nation-state level? Most definitely not. "IC break" services in China? Maybe. AFAIK TPMs are based on similar secure-processor designs as the chips in payment cards and other smartcards, and even those with enough determination and $$$, or the right equipment, will get you through.
Here's an old but quite thorough discussion of the techniques involved: https://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-630.pdf
noident|1 year ago
egorfine|1 year ago
grishka|1 year ago
> Bryant again reported his findings to Apple and returned the Mac Mini to them.
Why the hell did he do that?! It's, like, the worst thing one can possibly do with these kinds of devices. Just publish stuff that doesn't have anyone's personal data in it. That'll make the world better in the end.
tomcam|1 year ago
notinmykernel|1 year ago
We all know companies are predatory, and in many cases companies (looking right at you Google and Microsoft) continue to refuse to pay people for discovering, documenting and reporting high-severity vulnerabilities. That doesn't mean we as individuals forfeit our principles and become just as corrupt as the "faceless corporate entities."
egorfine|1 year ago
citation needed.
rbanffy|1 year ago
Or, at least, catalogued, scanned, and photographed.
JKCalhoun|1 year ago
mandatory|1 year ago
jamesy0ung|1 year ago
popcalc|1 year ago
The_SamminAter|1 year ago
_boffin_|1 year ago
https://github.com/mr-boffin/fruit-native-ocr
kotaKat|1 year ago
I've seen everything from Amazon's palm-scanners to a tactical LTE base station once used by NIST to all sorts of Zebras full of fun software.
kome|1 year ago
fsflover|1 year ago
brandondebra|1 year ago
[deleted]
muscomposter|1 year ago
[deleted]
userbinator|1 year ago
[deleted]
jfdjkfdhjds|1 year ago
I think the only piece I'd pay to read is how they negotiated with spotify.