Posted on 03/25/2018 8:05:21 PM PDT by Swordmaker
Facebook scraped call, SMS data for years from Android phones. iPhones never allowed this.
When you think there's something lurking in the dark, you turn on the lights. And, now that Facebook's data harvesting, hoarding, and exploitation is being lit up by the internet version of the Bat Signal, more and more problems are being discovered. Most recently: That Facebook was scraping call and SMS logs of Android phone users.
And yes, this is what happens when neither your operating system nor your app care about your privacy.
From ArsTechnica:
"This past week, a New Zealand man was looking through the data Facebook had collected from him in an archive he had pulled down from the social networking site. While scanning the information Facebook had stored about his contacts, Dylan McKay discovered something distressing: Facebook also had about two years worth of phone call metadata from his Android phone, including names, phone numbers, and the length of each call made or received."
Others reported finding the same, and Ars was able to independently verify the data collection.
"If you granted permission to read contacts during Facebook's installation on Android a few versions agospecifically before Android 4.1 (Jelly Bean)that permission also granted Facebook access to call and message logs by default. The permission structure was changed in the Android API in version 16. But Android applications could bypass this change if they were written to earlier versions of the API, so Facebook API could continue to gain access to call and SMS data by specifying an earlier Android SDK version. Google deprecated version 4.0 of the Android API in October 2017the point at which the latest call metadata in Facebook user's data was found. Apple iOS has never allowed silent access to call data."
People began looking into the records because of the #DeleteFacebook movement, which followed the revelation that the Facebook data of 50 million users was abused by political data firm Cambridge Analytica.
It's unclear whether Facebook's tool to delete contact information would also delete the call and SMS logs. It's also unclear why this was happening, whether Facebook was intentionally scraping the information for exploitation, or whether it was an unforeseen side-effect of the contact sharing implementation. What is clear, though, is that repeated problems like this form a pattern and a pattern of problems makes negligence indistinguishable from malice.
More recent versions of Android should prevent this kind of data collection.
The salient point is, of course, that iOS never allowed it. This type of abuse was simply never possible if you used an iPhone. Apple built it that way on purpose and it protected its users from privacy violations like this before they ever happened.
Google and Facebook's business model allow them to give you a lot of great, convenient services for free. Apple's business model allows them to give you great privacy protections by default.
If you're concerned about any of this, consider how much, if at all, and in what way you want to continue using Facebook or Android. Everything is a tradeoff. Everything has advantages and disadvantages. But for many, those cost of free-as-in-your-data is becoming too high a price to pay.
When I want to post on FR I carve notes on birchbark and give a local boy corn meal and grain alcohol to carry them to the FR server in Fresno.
I send smoke signals and use can to string can communication.
A better solution for Fakebook scraping phone calls and texts: don’t install Fakebook.
Bttt
“I grow my own food, sew my own clothes, forge my own transistors and never ever connect to the internet.”
—
Phhht, big deal. I made my own PC out of rocks and tree branches.
“There is no privacy on the internet. The illusion of privacy, much like the illusion of security, is just that - an illusion.”
—
Even if you don’t interact with any site, your device still does anyway:
https://aruljohn.com
Yet another reason I wont ever get an Android device (as much as Id like to). A years old OS, without regular updates, is simply unacceptable.
I can understand why people would not want an Apple device believe me. But until anyone can convince me Android devices are just as secure, Ill unfortunately ha entire keep buying Apple. (I cant use a simple flip phone its impossible to work professionally).
Hacking is Illegal! So who is going to Jail and When?
Babyface suckerburg should be in jail.
Google is tracking you:
https://www.youtube.com/watch?v=S0G6mUyIgyg
Do you seriously think that Apple left that vulnerability from 2011 open for seven years, all the way to today? When it was discovered in 2012, Apple closed it again and then did lock it down. Users have always had the option to not accept any cookies should they choose not to, or to use a completely private Window for any browsing they chose to do.
This article is about the LAWSUIT filed by the New York Attorney General's office for the invasion of privacy of New York citizens. There are OTHER suits from other Attorneys Generals. Google had to pay other settlements already including one at the Federal Level to the FTC last year for this evil act (remember their motto "Do Not do Evil").
The point is that Apple corrected it's error which YOU imply is still there today. Apple is far more trustworthy about its customers privacy than other companies. They treat their customers AS customers to be respected, not as a product to be sold to the highest bidder. Apple takes the privacy of its customers seriously.
Some have gone to jail. . . but the problem is that corporations are a tad hard to imprison. I prefer the corporate version of drawing and quartering: huge fines. $17 million isn't even a slap on the wrist for Google.
The EU may have the correct idea. . . their fines for some misdeeds by corporations can be as high as the previous year's entire profits. Samsung was faced with such a fine five or so years ago for mis-using FRAND patents against Apple, refusing to license Standards Essential Patents (SEP) which they owned and had registered as part of the cellular phone STANDARD, and which they had agreed to license to ALL cellular phone manufacturers under Fair, Reasonable, And Non-Discriminatory terms, so that they too could also license the SEPs owned by other such manufacturers.
Instead, Samsung had been attempting what is called a Patent Hold-Up, demanding far higher than FRAND licensing rates from Apple AND demanding a cross licensing from Apple's iPhone non-SEP intellectual patents to gain access to the SEPs Samsung owned. The proposed fine was over the equivalent of $18 billion. They settled for several Billion Euros, IIRC. . . and licensed their SEPs to Apple at FRAND rates.
Facebook claims they have Android users’ permissions to collect all these data...
http://www.freerepublic.com/focus/chat/3642634/posts?page=1
Why, then, did you feel it necessary to go back seven years to find a closed, minor glitch to claim that Apple was not being proactive in protecting its customers' privacy? It's pretty clear you did that deliberately and you obviously wanted readers to infer that situation held true until today, or you would have mentioned it was closed quickly, and not negligently ignored after it was found out.
Did you seriously think that Android left the vulnerability described in the article that you posted open all the way until today?
Actually,The fact is, that it IS still open today, as both Facebook AND Google are making money off this vulnerability feature. And today Facebook claimed that Android users have actually given them permission to mine that data when they installed the Facebook App. In addition, Android devices which are not updated to the newest and latest version of Android as they should be if and when Google does eliminate the default open setting, with Google relying on the carriers to distribute THEIR versions of Android to their customers, or hoping that Android users might go and get security updates for some of the versions of Android, will remain vulnerable. So, yes, I do believe that it is still there.
I've seen you make so many unfounded assumptions about Apple's security, based on ZERO factual data, and yet you continue to argue, no matter what factual data is brought to bear. . . along with snide insults. . . including your unfounded and false claims that Apple lies about its levels of security and that Apple does not allow its 256 bit AES encryption to be audited.
Unlike the way they treat the workers putting their products together in Asian hell holes - just another commodity rented from the lowest bidder LOL
More of your abysmal ignorance. Tell me Garth, why do you think that Chinese workers on assembly lines in the SAME factory queue up by the thousands to apply to work on Apple's assembly lines? Is it because they want to sign up for poor treatment? More poor wages?
No, Garth, it's because Apple's contracts with the assembly companies and other companies in Apple's supply chain require the workers on product lines receive better pay then workers on other products and get also get better treatment. Apple puts its own employee monitors in those plants to assure those contract requirements are adhered to.
Apple has actually CANCELLED contracts when those provisions are ignored, including an over $2 billion contract for a contractor found not adhering to working conditions and taken that contract to a higher bidder who would adhere to the working condition provisions. These are facts, Garth.
As a result of Apple's contract policies, the wages of ALL such assembly workers in Chinese have been pressured to rise to greater rates.
The more than 700 other manufacturers who use the exact SAME contract assembler that Apple uses, Foxconn, do nothing of the kind that Apple has done to improve their working conditions, instead satisfying themselves by joining organizations that merely gives lip service to worker conditions, such as China Labor Watch, a New York based Non-profit, which has been caught falsifying videosusing old video from another non-related company's worker dormitories and mis-translating worker interviews to make its accusations against Apple. China Labor Watch was one of the sponsors of Mike Daisey's "The Agony and Ecstasy of Steve Jobs," a supposed exposé of Apple's Chinese labor misdeeds, which had to be pulled from NPR for egregious falsehoods, false evidence, mis-translated worker interviews, and outright lies.
Before you even try to raise the "Apple worker suicide issues" at Foxconn, you better do some basic research. It never happened. The 18 assembly workers, from a work force that ranged from 750,000 to 1.2 million during that period, who did actually commit suicide during an eighteen month period at Foxconn in 2010-2011, were variously workers on assembly lines making Microsoft X-boxes, Nokia cellular phones, Sony Playstations, and HP computers.
Not a single suicide was a worker on an Apple assembly line. . . and outside investigators discovered that not a single one of the suicide victims did so due to working conditions, instead each was found to have killed themselves for the same reasons that people around the world kill themselves.
Another supposed "suicide" incident that China Labor Watch tried to attribute to Apple was a threat by supposedly 250 workers to jump en masse from a factory roof over "labor issues." That incident actually involved only around 125 workers who were demonstrating on the plant's roof about having been transferred from assembling Sony Playstation, where they had had ample overtime opportunities, to another assembly line where they'd be assembling HP computer cases which had NO overtime opportunities. Some of the demonstration's leaders SAID they'd jump if they weren't given the overtime the group demanded. The plant involved was nowhere near any plant assembling Apple products. As always though, including "Apple assembler Foxconn" in the headline, even if Apple was not even mentioned in the body of the story gets more clicks which means more advertising revenue. That also did not stop CLW from conflating the workers to Apple employees, as well, because THAT brings in more donations from the Apple haters who will, like you, swallow anything anti-Apple.
Here are more than 50 of the ~700 manufacturing customers who have their assemblies done through Foxconn:
- Acer Inc. (Taiwan)
- Alcatel (France)
- Amazon (United States)
- Amoi (China)
- Apple Inc. (United States)
- Archos (France)
- ASRock (Taiwan)
- Asus (Taiwan)
- BBK (China)
- Barnes & Noble (United States)
- BenQ (South Korea)
- Blackberry (Canada)
- Cisco (United States)
- Coolpad (China)
- Dell Inc.(United States)
- EVGA Corporation (United States)
- Fujitsu (Japan)
- GE Thomson
- Google (United States)
- Griffin Technologies (United States)
- Gründig Mobile (Germany)
- Haier (China)
- Hewlett-Packard (United States)
- HiSense (China)
- Honor (China)
- HTC (Taiwan)
- Huawei (China)
- Intel (United States)
- IBM (United States)
- Kyocera Communications (Japan)
- Komko (China)
- LeEcco (China)
- Lenovo (China)
- Lenovo/Motorola Mobility (China)
- LG Lucky GoldStar (South Korea)
- Meizu (China)
- Microsoft (United States)
- Microsoft MSI (Taiwan)
- Motorola Communications (United States)
- NCR (United States)
- NEC Casio Communication (Japan)
- Netgear (United States)
- Nintendo (Japan)
- Nokia Oyj (Finland)
- Olivetti (Italy)
- OnePlus (China)
- Oppo (China)
- PackardBell (Netherlands)
- Panasonic (Japan)
- Philips (Netherlands)
- Pioneer Electronics (Japan)
- Samsung (South Korea)
- Sanyo (Japan)
- Sharp (Japan)
- Siemens (Germany)
- Smartisan (China)
- Sony (Japan)
- TCL Communication Technology (China)
- Technology Happy Life (China)
- Telefunken (Germany)
- Thomson (France)
- Toshiba (Japan)
- Vivo (China)
- VSun (China)
- Vizio (United States)
- Vodophone (UK)
- Wasam (China)
- Xiaomi (China)
- Zoostorm (New Zealand)
- ZTE (China)
- ZUK (China)
Saying someone is ignorant is not an insult, its a statement of fact, especially when its self-admittedly true.
Im ignorant about many things I have yet to study because I yet to get around to them. It doesnt bother me to be told Im ignorant about something I know little about. You said you know very little about Apple, which became more and more evident the more you posted, and I told you ignorance is curable by learning something about it. I even TOLD YOU to read Apples White Papers on their security, but you did not bother to do so, but dove right in trying to tell ME why it couldnt work, despite the evidence that it has been working for years, when you kept showing me you did not have a clue HOW it worked.
You spouted generalities about hacking and how easy hacking an iOS device with a Secure Enclave would be, ignoring (ignorant again) that hackers have been TRYING to crack into the Secure Enclave for years and not succeeding. You could not concede that just perhaps I did know more than you did about this particular subject, especially in encryption. You REALLY demonstrated it with you challenges to the math of very large keys and the time even a powerful computer would take to brute force crack them. You pop-up with articles from years ago from hackers who make claims that were not repeatable, and continue the same argument when I show you the claim was not supported by peer testing.
You ignore facts. . . responding in generalities and believe false claims, not to mention thats the birth of ignorance. You trivialize anything I post to you, just as youre doing here, which is a form of ad hominem attack.
You now want me to go back and engage you in that other thread. In a word no. Its a waste of my time. You are the only one there. YOU are a waste of my time to bother.
Im responding here where you are invading another thread to smear Apple with a trivial, non sequitur myth about Apple and Chinese workers when in fact, as Im pointing out, while you singled out Apple for your slur, there are really more than 700 consumer electronic manufacturers who contract with the same assembler, but Apple is the ONLY one of those contractors who puts working conditions, worker pay, and prohibitions on child labor in ALL of their contracts for their entire supply chain AND ENFORCES IT WITH ON SITE MONITORS AND WITH DRACONIAN ECONOMIC PENALTIES AND FOLLOWS THROUGH WITH ACTIONS FOR VIOLATIONS. . . including contract cancellations for violators! I also pointed out that you singled out Apple but ignored the other companies who are far worse, yet YOU want to blame the one company who is trying to proactively do something about it.
For example, in child labor, Apple specifies in their contracts that if an underage worker is found employed at any of the companies working on Apple products, that employer is required to fund a full ride scholarship college or university education, including room and board, through age 26 or graduation in the field of the childs choice. . . Regardless of how that child came to be employed there. Thats a huge disincentive for hiring underage workers.
Ive read far more than you on the history of what happened with Apple in China, and we are NOT talking about your strawman history of "labor/ownership" anywhere else in the world, Garth. We are just discussing the non sequitur topic YOU BROUGHT UP that had NOTHING TO DO WITH THE PRIMARY TOPIC AT HAND WHICH YOU APPARENTLY INTENDED TO INDUCE A FLAME WAR. . . Ive posted the authoritative articles on FR on that subject over the past fifteen years or so, and commented on them with links to expert analysis, Garth, a subject you seem to only know the propaganda line about!
You dont bother to seem to comprehend what I wrote, Garth, before you started thinking of your response. These are workers who ALREADY have employment in the same factory applying to move OVER to the Apple assembly lines.
And, no, Garth, China is no longer a communistic command Totalitarian State. They learned thirty years ago that didnt work. It is a totalitarian state combining many features of socialism, with a growing Capitalistic Economy. I believe I told you Im an Economist, so dont try to tell me my line of specialized knowledge.
Youve an arrogant attitude when you post in Apple threads that you are going to educate us Apple rubes who dont know anything when it really is YOU who is spouting the false mythology about Apple and using ad homonem insulting names such as "Swordfish" and snide commentary. You admit you dont know anything about Apple but then proceed to spout ex cathedral colored, ignorant screeds about generalized crap that doesnt apply and make assertions that are false, such as Apple will not allow its 256 bit AES encryption to be audited when it is certified by NIST. As I stated, you are IGNORANT. You dont know, but you post claims as if you do know.
So, are you saying that third parties are still able to access users' call logs on today's Android without the users' permissions, Swordfish? That's a new one on me, autist. Can you provide me with a link that backs up your claim?
Garth, in case you did not notice it, this article is about CURRENTLY AVAILABLE ANDROID DEVICES and their users finding their phone data on Facebook. They are NOT talking about Android in the past. The companies involved are dancing around making excuses that users could have turned off such permissions when they installed Facebook, but many Android users are reporting they are NOT finding that capability available to them. Perhaps its the carriers version of Android thats the problem? I dont know. Im ignorant in this area. . . So might you be.
Google/Android has already closed the hole that allowed third parties to change a user's default setting - read the article, dude. You do understand what "and" means, don't you? Because you do seem to have misused it there.
Youve made the assertion that Google has blocked Facebooks egregious behavior on Android. . . you show US the link where theyve gotten it out to all Android devices capable of connection to Facebook, garth.
Its also not all about changing the users settings, Garth, its about what the default setting are in the first place and is it an "opt in" or "opt out" default? Again, I dont know. Im ignorant in this area.
The second part of your statement does reflect a difference in Apple's and Android's view of how computer security should be handled. Apple thinks that they should push out security and all other updates and Android (following the mantra that it is your computer and you should be in control of it) relies on the user to update their phone as they see fit.
Again, you show ignorance of Apples model with your "push out" mischaracterization of Apples approach to security. Users are free to accept or not accept updates. . . But they ARE available to iOS users either through their computers or over-the-air on demand. Apple does not install anything unbidden on users devices without their permission, not even the infamous free U2 album. It was just available for free download, but it was NOT pushed on to anyones devices, contrary to claims and lawsuits making that specious claim.
So fine, you dont like what you think you know about Apples security model, a model that has kept malware off of what has now grown to 1.3 Billion active devices for almost eleven years. But Androids model has allowed millions of malware to be written for it. For example, just a month ago, on February 14, 2018, over 60 million Android users phones were hit with a bitcoin mining malware.
Im certain youll do your Googling in an attempt to find some iOS malware to post on this thread and youll find some. . . But 99% of the small amount that youll find there is in the wild is for jailbroken devices, and most of that is in China. You certainly wont find a mass infection of iPhones afflicted in any significant numbers like you do with Androids insecurity model.
You do remember your failure to address (let alone refute) my statement that the encryption theory behind AES256 is meaningless if Apple implemented it wrongly in their code, right?
It is accepted knowledge in the field of modern encryption methods that the secrecy of properly implemented encryption algorithms has nothing to do with the security of the encrypted data - only the secrecy of the algorithm's inputs does. So tell me, autist... why does Apple refuse to publish their implementation?
If you want to discuss this matter further - take it back to the thread that YOU ABANDONED IN SHAME.
There you go with the snide, superior attitude again.
I "abandoned nothing in shame," asshat. I answered your ignorant assertion, I not only addressed your assertions, but I completely refuted them with authoritative facts from quotations from qualified source materialsFACTS that hoist you on your own ignorant and uninformed petard, Garth.
Yes, that "asshat, is an insult, Garth, but youre earning it and some more for your false assertions, in spades!
Oh, yes, thats the part where YOU CLAIMED Apples 256 bit AES encryption implementation was not audited by anyone to assure it even worked correctly and that Apple refused to let anyone see it (now where did you get those lies from, Garth?). Do you recall I TOLD YOU TO READ APPLES SECURITY WHITE PAPERS? If you had, you wouldnt be so damned ignorant and spouting such uninformed TWADDLE as that false crap!
Exactly what part of "Apples encryption algorithms are audited AND Certified by the National Institute of Standards and Technology to Federal Information Processing Standard (FIPS)140Security Level 2which I TOLD YOUdid you fail to grasp?
Was it the certification process which requires an audit of both the hardware and software algorithms? Perhaps you just didnt read it?
The National Institute of Standards and Technology (NIST) issued the FIPS 140 Publication Series to coordinate the requirements and standards for cryptography modules that include both hardware and software components. Protection of a cryptographic module within a security system is necessary to maintain the confidentiality and integrity of the information protected by the module. This standard specifies the security requirements that will be satisfied by a cryptographic module. The standard provides four increasing, qualitative levels of security intended to cover a wide range of potential applications and environments. The security requirements cover areas related to the secure design and implementation of a cryptographic module. These areas include cryptographic module specification; cryptographic module ports and interfaces; roles, services, and authentication; finite state model; physical security; operational environment; cryptographic key management; electromagnetic interference/electromagnetic compatibility (EMI/EMC); self-tests; design assurance; and mitigation of other attacks.[3]Federal agencies and departments can validate that the module in use is covered by an existing FIPS 140-1 or FIPS 140-2 certificate that specifies the exact module name, hardware, software, firmware, and/or applet version numbers. The cryptographic modules are produced by the private sector or open source communities for use by the U.S. government and other regulated industries (such as financial and health-care institutions) that collect, store, transfer, share and disseminate sensitive but unclassified (SBU) information. A commercial cryptographic module is also commonly referred to as a hardware security module (HSM).
FIPS 140Security Level 1
Security Level 1 provides the lowest level of security. Basic security requirements are specified for a cryptographic module (e.g., at least one Approved algorithm or Approved security function shall be used). No specific physical security mechanisms are required in a Security Level 1 cryptographic module beyond the basic requirement for production-grade components. An example of a Security Level 1 cryptographic module is a personal computer (PC) encryption board.FIPS 140Security Level 2
Security Level 2 improves upon the physical security mechanisms of a Security Level 1 cryptographic module by requiring features that show evidence of tampering, including tamper-evident coatings or seals that must be broken to attain physical access to the plaintext cryptographic keys and critical security parameters (CSPs) within the module, or pick-resistant locks on covers or doors to protect against unauthorized physical access. (Apples implementation meets this level by having the Secure Enclave Processor sealed and no plaintext keys are stored at all on the device.Swordmaker)
Of course, to get this certification, idiot, Apples Encryption implementation must be submitted for examination which you claim was NOT DONE, a lie. . . but then Im getting to expect that level of assertive myth from you.
Here is the statement I posted to you on the thread you claim I abandoned," cited from Apples latest 78 page IOS Security White Paper published January 2018:
Cryptographic validation (FIPS 140-2)
The cryptographic modules in iOS have been repeatedly validated for compliance with U.S. Federal Information Processing Standards (FIPS) 140-2 Level 2 following each release since iOS 6. As with each major release, Apple submits the modules to CMVP for re-validation when the iOS operating system is released.
The Cryptographic Module Validation Program (CMVP) is a joint American and Canadian security accreditation program for cryptographic modules. The program is available to any vendors who seek to have their products certified for use by the U.S. Government and regulated industries (such as financial and health-care institutions) that collect, store, transfer, share and disseminate "sensitive, but not classified" information. All of the tests under the CMVP are handled by third-party laboratories that are accredited as Cryptographic Module Testing Laboratories by the National Voluntary Laboratory Accreditation Program (NVLAP). Product certifications under the CMVP are performed in accordance with the requirements of FIPS 140-2.The CMVP was established by the U.S. National Institute of Standards and Technology (NIST) and the Communications Security Establishment (CSE) of the Government of Canada in July 1995.
The Cryptographic Algorithm Validation Program (CAVP), which provides guidelines for validation testing for FIPS approved and NIST recommended cryptographic algorithms and components of algorithms, is a prerequisite for CMVP.[1]
This program validates the integrity of cryptographic operations for Apple apps and third-party apps that properly utilize iOS cryptographic services and approved algorithms.
Common Criteria Certification (ISO 15408)
Since the release of iOS 9, Apple has achieved iOS certifications for each major iOS release under the Common Criteria Certification program for the following:
iOS 11 includes additional certifications for the following:
- Mobile Device Fundamental Protection Profile
- VPN IPSec Client Protection Profile
- Extended Package for Mobile Device Management Agents Extended Package for Wireless LAN Clients
- Application Software Protection Profile
- Extended Package for Email Clients
- Extended Package for Web Browsers
Apple plans to do so with each successive major release of iOS. Apple has taken an active role within the International Technical Community (ITC) in developing currently unavailable Collaborative Protection Profiles (cPPs) focused on evaluating key mobile security technology. Apple continues to evaluate and pursue certifications against new and updated versions of the cPPs available today.
Commercial Solutions for Classified (CSfC)
Where applicable, Apple has also submitted the iOS platform and various services for inclusion in the Commercial Solutions for Classified (CSfC) Program Components List. As Apple platforms and services undergo Common Criteria Certifications, they will be submitted for inclusion under CSfC Program Components List as well.To view the most recently listed components, go to:
https://www.nsa.gov/resources/everyone/csfc/components-list/
Security configuration guides
Apple has collaborated with governments worldwide to develop guides that give instructions and recommendations for maintaining a more secure environment, also known as device hardening for high-risk environments. These guides provide defined and vetted information about how to configure and utilize built-in features in iOS for enhanced protection.
Apple iOS encryption is now certified even higher, idiot, as its been chosen as a mobile device suitable for use by the U.S. government for TOP SECRET level and above access, and for the U.S. Military. In addition, the British Military have authorized the iPhone for use in the field as well . . . due to its encryption ability. You dont get that level of authorization without submitting your algorithms for certification.
May I suggest you go back to your information source and tell HIM hes an ignorant, uninformed dolt spreading anti-Apple mythology and recommend HE cure his ignorance before infecting more people with his Apple Derangement Syndrome.
I found that to be true, when I bought my IPhone X, about 10 days ago, at the Vintage Faire Mall. The only other Apple store I had ever been to, was in Emoryville, where I got my Mac Book Pro. They treated me the same way.
I put a Globe SIM in the X, and it worked perfectly. Now, I have no monthly plan to worry about. Its a beautiful thing. 👍😁
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.