<br />
<b>Deprecated</b>:  Function create_function() is deprecated in <b>/home/hidefide/public_html/blog/wp-content/plugins/wr-pagebuilder/core/core.php</b> on line <b>127</b><br />
{"id":874,"date":"2014-10-05T18:09:20","date_gmt":"2014-10-05T18:09:20","guid":{"rendered":"https:\/\/icaruspressblog.wordpress.com\/?p=874"},"modified":"2019-04-17T10:28:13","modified_gmt":"2019-04-17T10:28:13","slug":"apple-u2-worst-spam-ever","status":"publish","type":"post","link":"https:\/\/hidefideas.com\/blog\/2014\/10\/05\/apple-u2-worst-spam-ever\/","title":{"rendered":"Apple + U2: Worst. Spam. Ever."},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-876 alignright\" src=\"http:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/maxresdefault.jpg\" alt=\"maxresdefault\" width=\"396\" height=\"223\" srcset=\"https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/maxresdefault.jpg 1536w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/maxresdefault-300x169.jpg 300w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/maxresdefault-768x432.jpg 768w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/maxresdefault-1024x576.jpg 1024w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/maxresdefault-687x386.jpg 687w, https:\/\/hidefideas.com\/blog\/wp-content\/uploads\/2016\/03\/maxresdefault-267x150.jpg 267w\" sizes=\"auto, (max-width: 396px) 100vw, 396px\" \/><br \/>\nIt was bound to happen.<\/p>\n<p>In a world where digital information is cheap, we bandy bits and bytes around like they\u2019re kernels of popcorn inside a giant hot air popper. The bits and bytes, modern currency that trade for news, knowledge, and kitty pics, in and of themselves have no actual value, but how <!--more-->those bits and bytes are strung together determine the usefulness of their existence. They can combine to form a blog post or a nasty tweet. They can become humor or horror. They can morph into a grammatically incorrect meme or they can become music; and apparently, that\u2019s where Apple users draw the line.<\/p>\n<p>In a \u2018Huh. Will you look at that?\u2019 moment, the world seems upside down and topsy turvy after Apple, the company that can\u2019t seem to stop making pretty stuff, announced its <a href=\"http:\/\/www.techtimes.com\/articles\/17178\/20141004\/goodbye-bendgate-heres-how-to-fix-your-bent-iphone-6-iphone-6-plus-video.htm\">bendy<\/a> new iPhones on September 10<sup>th<\/sup>. In case you\u2019ve been living off-world, Apple CEO Tim Cook once again attempted and failed at being Steve Jobs, but no one can blame him, for Jobs was an impossible act to follow. Cook got up there and showed the world Apple\u2019s new gear, and up to that point, everything seemed business as usual. Nothing to see here, folks.<\/p>\n<p>But then there were reports of <a href=\"http:\/\/www.forbes.com\/sites\/gordonkelly\/2014\/10\/02\/ios-8-bluetooth-problems\/\">broken software<\/a>, <a href=\"http:\/\/www.thisismoney.co.uk\/money\/bills\/article-2744787\/Damage-claims-iPhones-soar-44-want-unbreakable-screen.html\">broken screens<\/a>, and phones that bring a whole new meaning to <a href=\"http:\/\/metro.co.uk\/2014\/10\/03\/bendgate-embarrassment-for-apple-after-iphone-6-advert-bends-on-billboard-4891375\/\">butt dialing<\/a>. You\u2019d think those three things would be the real story here for Apple, a company which continues to have a tumultuous ride atop the rollercoaster of broken dreams. Security issues plague the company, with news breaking this week about a flaw in OS X that <a href=\"http:\/\/www.ibtimes.com\/mac-virus-lets-hackers-control-thousands-computers-through-reddit-1699227\">gives hackers access to more than 18,000 Macs<\/a>. Tales of <a href=\"http:\/\/www.smh.com.au\/it-pro\/security-it\/sophisticated-trojan-virus-targets-hk-protesters-iphones-20140930-10ofb5.html\">hacked iPhones and iPads<\/a> are coming out of Hong Kong, where protesters are apparently being spied upon using their own devices. <a href=\"http:\/\/www.smh.com.au\/it-pro\/security-it\/sophisticated-trojan-virus-targets-hk-protesters-iphones-20140930-10ofb5.html\">The bash bug<\/a>, which affects all Unix and Linux-based systems, also puts OS X at risk because it\u2019s based on Unix. And one cannot mention Apple and 2014 in the same breath without \u2018<a href=\"http:\/\/www.tmz.com\/2014\/09\/14\/model-suing-apple-nude-photo-leak-celebrities-hacked-joy-corrigan\/\">nudegate<\/a>,\u2019 the theft of <a href=\"http:\/\/bgr.com\/2014\/09\/21\/apple-icloud-nude-photos-leak\/\">hundreds of nude celebrity photos<\/a> from their iCloud accounts.<\/p>\n<p>Amid all that, you\u2019d think that nothing else was worth discussing on what is undeniably a crappy year for the big A. But something happened, and it seems to have overshadowed everything mentioned above. Apple gave everybody a free album.<\/p>\n<p>Not just any old album. Mega group U2\u2019s newest album, Songs of Innocence. And the world went <a href=\"http:\/\/www.theguardian.com\/technology\/2014\/sep\/21\/u2-album-protest-apple-free-download\">crazy<\/a>. In a US $100 million deal, Apple gave every iTunes user a copy of the album, and how they went about it is just about as spammy as you can get. Users went <a href=\"http:\/\/www.dailymail.co.uk\/sciencetech\/article-2753549\/Apple-outrages-users-automatically-installing-U2-album-devices-firm-paid-100-million-privilege.html\">crazy<\/a>. On a humorous if not distressing note, people flocked to Google to find out just who U2 is. One tweet to Tim Cook asks \u201cmy iPhone has a virus called \u201cU2\u201d how do I uninstall it?\u201d Another states \u201cEveryone&#8217;s scared of MI6 and GCHQ accessing our phones, but I&#8217;d rather that than be forcibly given a U2 album.\u201d People went out of their way to find out how they could delete the unwanted album from their devices. Social media sentiment for both Apple and U2 <a href=\"http:\/\/www.adweek.com\/news\/technology\/apple-u2-duet-causes-41-drop-social-sentiment-160199\">plunged<\/a> in the aftermath. Apple was forced to respond with a U2 album removal tool.<\/p>\n<p><a href=\"http:\/\/www.wired.com\/2014\/09\/apples-devious-u2-album-giveaway-even-worse-spam\/\">Wired<\/a> calls the debacle \u2018worse than spam.\u2019 And it\u2019s easy to see why, in hindsight, what seemed like a pretty good idea has turned into a punchline for the online world. It isn\u2019t that Apple is out of touch with its users by assuming that everyone with an iPod loves U2. They are, but that\u2019s not the point. It\u2019s the arrogance of the big A, assuming that their brand is different than every other brand out there. That they can do things without asking where others are presumed to be subject to scrutiny. It wasn\u2019t that Apple was wrong in assuming it could become music producer where it should have stuck to making tech devices. It was wrong, but that crime pales in comparison to the breach of trust that Apple caused when it stuck its fingers into the digital libraries of millions of users.<\/p>\n<p>Wired points out that \u201cthe delivery mechanism amounts to nothing more than spam with forced downloads, and nothing less than a completely indefensible expansion by Apple beyond its operational purview.\u201d Hopefully, Apple has learned a valuable lesson by alienating and distressing so many of its faithful followers, but we can learn something from this, too. Spam is spam, and people are very attuned to anything that slightly reeks of invasion by unwanted messages, software, and now, it seems, music. No matter who you are.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It was bound to happen. In a world where digital information is cheap, we bandy bits and bytes around like they\u2019re kernels of popcorn inside&hellip; <\/p>\n","protected":false},"author":3,"featured_media":876,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20,13,14],"tags":[11,9,10,8,7],"class_list":["post-874","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-humor","category-security","category-spam","tag-allspammedup","tag-bot","tag-botnet","tag-malware","tag-spam","jsn-master"],"_links":{"self":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/comments?post=874"}],"version-history":[{"count":2,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/874\/revisions"}],"predecessor-version":[{"id":1671,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/posts\/874\/revisions\/1671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/media\/876"}],"wp:attachment":[{"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/media?parent=874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/categories?post=874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hidefideas.com\/blog\/wp-json\/wp\/v2\/tags?post=874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}