IoT Smart-Locks: Apple HomeKit & Schlage Sense-lessness (or how to spend $2000 on a deadbolt)

IoT Smart-Locks: Apple HomeKit & Schlage Sense-lessness (or how to spend $2000 on a deadbolt)

The goal

  • Upgrade home-office security and take the opportunity to join the Star Trek generation of smart-home IoT.

Exec summary

  • Describe my experience installing and configuring a couple of Schlage Sense smart-locks and configuring them to connect to a couple of Apple TVs as their HomeKit hubs.
  • Examine the pro’s and con’s of smart-home devices: their features are compelling when they work, but IoT remains a bleeding-edge, artful science. (more…)

Highlights from the Apple Worldwide Developers Conference 2016 (WWDC16)

Highlights from the Apple Worldwide Developers Conference 2016 (WWDC16)

Apple held WWDC16 in San Francisco earlier this month to introduce new versions of iOS, tvOS, watchOS, and a new version of OS X that’s been rebranded as macOS. These new versions are available to developers now and will be more widely available through Apple’s Public Beta program soon, with final releases this Fall. Alongside the new software, Apple announced some exciting changes coming to the App Store, too: Search Ads and more open and flexible subscriptions. If you have an app for any of Apple’s platforms that could use an update for the new releases or are looking to build something new, now is a great time, so get in touch. Let’s take a look at some of the announcements in more detail. (more…)

Learning Auto Layout for iOS, tvOS, and OS X

Learning Auto Layout for iOS, tvOS, and OS X

iPadPro10-ApplePencil-SmartKeyboard-Splitview_PR-PRINTWith the release of the iPhone SE and the iPad Pro, along with the expectation that iPad apps will include support for slide over and split screen mode it’s now clear that Auto Layout is here to stay. If you’re not already developing apps using Auto Layout and Size Classes now is a great time to learn more about them and prepare yourself for any updates to the APIs that Apple introduces at WWDC in June.

Fortunately there’s a lot of great resources to quickly get up to speed and learn the best way to support a variety of devices and size classes in your next app.

(more…)

FBI vs. Apple: the Impact on Software Developers and You

FBI vs. Apple: the Impact on Software Developers and You

At Art & Logic, I wear many hats … a likely consequence of having numerous interests: I am passionate about software and the development process; I am passionate about IT operations; I am passionate about information security, cryptography, privacy, and how those topics intersect when our customers seek our services. It does not surprise many of my colleagues to learn I have been closely following the legal battle between the US Dept. of Justice and Apple over an encrypted iPhone 5c … but they are often surprised by why. This case has potentially far-reaching implications for those of us who write software for a living. Equally, so might it affect our customers; companies who seek to use custom software for their own business goals.

Make No Mistake, This Is Not Just about One iPhone

The outcome of the legal debate around the case will not merely affect just the San Bernardino suspect’s iPhone. It will serve to shape legal precedent, policy, and very likely the form of ‘secure’ technology in the future. We build technology – frequently with necessary security properties requested by our customers.

If you have not been following the case, there are a couple of key facts that have emerged. One is that the work phone of suspect Syed Farook is currently protected by Apple’s OS using encryption and a four-digit PIN. That last bit is important: Neither Apple nor the FBI has the ability to undo the encryption on the phone without the key (which is partly derived from the user’s four digit PIN). Unfortunately, it appears that the key was only known by the deceased suspect. The case aside, it is a good thing that a person without the key cannot get into the phone. Encryption has so many subtle yet important uses in modern computing … if it were possible to trivially break it, our digital world could have a host of troubles. E-commerce and online banking, for example, are built on trust that our details for exchanging money are kept private between the parties involved in the transaction. Software updates for your phone, tablet, and computers rely on the ability to deliver them to the machine without tampering. Of course, there’s a desire to communicate privately between two people. All of these rely on encryption to accomplish their tasks… and require that we can trust that encryption in the first place. (more…)