MOBILE

Apple Reprimanding Developers For Selling Access To iOS Betas

8/16/2012 3:23:03 PM

Over the last several months, Apple has been displaying a little muscle in regards to their UDID (Unique Device Identification) program. Developers- and developers only- can register 100 devices to access to iOS beta's for a fee of $99 per year. Last month Andy Baio, who writes for Wired Magazine, brought this issue to light. If you want access to a buggy beta version of iOS 6, no problem! There is a group of public websites that will sell you access while totally ignoring Apple's UDID conditions.

Description: Apple reprimanding developers for selling access to iOS betas]

Apple reprimanding developers for selling access to iOS betas

Apple may charge developers $99, but most of these sites will charge a small fee of $10 in exchange for one of their "developer only" UDID access codes. To get a better idea of the amount of revenue these sites are pulling in, Baio writes:

"For a small developer, unauthorized activations are a lucrative business that's likely worth the risks. UDID Activation publishes their order queue on their official site, which shows more than 2,300 devices activated in the last week alone. At $8.99 for each activation, that's more than $20,600 in revenue, with $2,277 paid to Apple for the 23 developer accounts. Their homepage claims that more than 19,000 devices were activated so far, and that's only one of several services. And since device activations only last for a year, each service can reuse their expired slots with no additional cost."

Description: The Apple iOS Range

The Apple iOS Range

A large number of these sites vanished in recent weeks after Wired published Baio's article (activatemyios.com, iosudidregistrations.com, activatemyudid.com, udidregistration.com, instantudidactivation.com). Will this aggressive behavior on Apple's part stop other sites from popping up? One thing is for sure, websites that are caught selling UDID access codes will be facing a DMCA request made to their host.

Other  
  •  XNA Game Studio 4.0 : Windows Phone Sensors and Feedback (part 2) - Locating a Windows Phone with the Location Service
  •  XNA Game Studio 4.0 : Windows Phone Sensors and Feedback (part 1) - Acceleration Data using the Accelerometer
  •  What Does The Ipad 3 Mean For IT Security Teams?
  •  Pocket Intel (Part 2)
  •  Pocket Intel (Part 1)
  •  Motorola S1LK TRBO : Sleeker Voice
  •  Motorola Atrix 2 : Tricks With Atrix 2
  •  HTC One X : Beauty With A Beast (Inside)
  •  Garmin NUVI 50LM
  •  CSL Switch Dual II MI357 : Bait And Switch
  •  Blackberry Curve 9360 Throws A Curve
  •  Learning jQuery 1.3 : The journey of an event
  •  Learning jQuery 1.3 : Compound events
  •  Programming the iPhone : Tables and Embedded Controls
  •  Programming the iPhone : Scrolling Controls
  •  BlackBerry Java Application Development : Networking - Testing for availability of transports
  •  XNA Game Studio 4.0 : Multitouch Input For Windows Phones (part 2) - Displaying GestureSample Data
  •  XNA Game Studio 4.0 : Multitouch Input For Windows Phones (part 1)
  •  Motorola Motoluxe
  •  Apple's Undiscovered Country : The future of the iPhone
  •  
    Top 10
    Nikon 1 J2 With Stylish Design And Dependable Image And Video Quality
    Canon Powershot D20 - Super-Durable Waterproof Camera
    Fujifilm Finepix F800EXR – Another Excellent EXR
    Sony NEX-6 – The Best Compact Camera
    Teufel Cubycon 2 – An Excellent All-In-One For Films
    Dell S2740L - A Beautifully Crafted 27-inch IPS Monitor
    Philips 55PFL6007T With Fantastic Picture Quality
    Philips Gioco 278G4 – An Excellent 27-inch Screen
    Sony VPL-HW50ES – Sony’s Best Home Cinema Projector
    Windows Vista : Installing and Running Applications - Launching Applications
    Most View
    Exploiting SQL Injection : Enumerating the Database Schema (part 2) - MySQL
    Top 10 Windows 8 Tips & Tricks - December 2012
    Simple Audio vs. Sonos
    HP Spectre XT 13 - Fashionably Sleek Design
    Windows Server 2003 : Protecting Network Communications with Internet Protocol Security - IPSec Basics (part 1) - Security Advantages of IPSec
    Building LOB Applications : Using Visual Studio 2010 WCF Data Services Tooling
    Flora - Nature - Photo Expert (Part 6) - Fungi
    2012 - The Year to Come (Part 2)
    Exchange Server 2010 : Deploying a Database Availability Group (part 1) - Creating the File Share Witness
    .NET Security : Programming the Event Log Service (part 3) - Using Custom Event Logs, Monitoring Event Logs
    Memory update to boost mobile devices : Manufacturer backing
    Nikon Coolpix S3300
    DirectX 10 Game Programming : 3D Introduction - The Triangle
    Supermicro MicroCloud - Same Space, Evolving Demands
    Summer games
    Gemini Joytab 8” Tablet PC
    20 Top Tips Sunrise & Sunset (Part 2)
    Extending Safari Easily
    Learn With Your Mac (Part 2)
    Christmas Gadgets (Part 1)