It seems like every week we hear about a smartphone security flaw. Whether it's a massive bug in iOS, apps leaking your location data to the public, or insecure passcodes on our phones, smartphone security isn't taken seriously. Yet it should be: in a lot of cases, you can access someone's entire life with just their phone.The Problem: Your Life Is On Your Phone
If I lose my phone and some ne'er-do-well picks it up, they can get access to pretty much anything they want in a matter of minutes. My home address is right in the Maps app. My bank accounts have apps on my home screen. They can reset all my passwords with access to my email account (even if they have two-factor authentication enabled). While they're at it, I'm sure a quick search of my Dropbox account would reveal something sensitive. Good thing I have two-factor authentication turned on to secure my passwords. Wait, with my phone they can get the authorization tokens for those apps too.
With just my phone—or even just remote access to it—you could see to every important piece of information about me. I don't want to huddle beneath a thick layer of aluminum foil, but every time I read about a smartphone-related hack I add more rolls of Reynolds to my Amazon wish list.
There are so many ways to access this data, too. Apps can leak your private data to the public. Hackers can attack your phone on public Wi-Fi networks. Or you can just lose your phone at a party and accidentally give a stranger access to your entire life.
When I talk with self-described "non-techies" they tend to differentiate their phone from their computer. They're not worried about things like man-in-the-middle attacks on their phone because they don't see it as a threat. Yet the recent Apple bug allowed dedicated hackers to capture all the secure data you transfer without you having any idea. This sounds paranoid but as we've pointed out before it just takes one hacker in a coffee shop. And since you have your phone with you all the time, it's even more likely with your phone than your computer.
What You Can Do to Beef Up Your Phone's Security
If you're not willing to give up your smartphone for a dumbphone you can make your smartphone a bit more secure without losing a ton of convenience.
First off, a few general rules: stay off of public Wi-Fi on your phone, avoid unofficial versions of popular apps (like Flappy Birds knock-offs), avoid apps that need permissions that don't make sense (like an alarm clock that needs access to your phone), and follow the usual precautions with spam or nefarious looking links.
From there, it's all about removing the pieces that make it easy for a hacker to get your personal info. Here are a few ideas on how to do that:
- Get rid of your home address: If you're using Google Maps then you probably have a home and work address set up so you can navigate home. Remove that information so it's not so obvious to someone who picks up your phone. If you have a contact card with your own information on it in your contacts get rid of that too. Oh, and your phone logs everywhere you go, so you might want to disable that as well.
- Set up anti-theft software: If someone steals your phone, the first thing you'll want to do is make it so nobody can get into it. Apple's Find My iPhoneand Google Device Manager are good places to start, but any of these apps will help you do that and track down your phone. Just make sure you set it up before someone steals your phone.1
- Use a secure password manager: It's tempting to use something like iCloud Keychain on iOS or Chrome on Android to save your passwords right in your browser, but it's a terrible idea from a security point of view. If you have to access your passwords on the go, use a password manager with a mobile app like Lastpass or 1Password. 2
- Don't save your password in sensitive apps: It's tempting to save your password in your bank app, but don't. You'll need to log in every single time, but at least you're not openly handing your private information over to the first person to grab your phone. Unfortunately, your email is sensitive too, since anyone with access can reset your password on your other accounts. For total security, you'll need to log out of your email completely every time.
- Use a passcode lock: Even though we already mentioned they're often easy to get around, that doesn't mean you shouldn't have a passcode enabled on your phone. On an iPhone, go for a longer passcode instead of a pin and on Android customize your lockscreen for security.
- Pay attention to what you install and audit your app permissions: We give all kinds of permissionsto apps without paying attention as we click through agreements and as users we're pretty terrible at our own security. Every couple weeks, go through your apps and make sure they only have access to data you approve of.
- Encrypt your private data in the cloud: If you're going to keep an app like Dropbox installed to give you access to your private data from your phone, make sure you encrypt that data. You don't have to encrypt everything, just anything with personal information on it like tax returns or document scans. It's super easy to do, and once it's set up you won't have to worry about someone happening on your private info. Android users also have the option to encrypt everything on the phone, but it'll slow things down a bit.
- Customize your phone to make it harder to use: A few months ago, I had my jailbroken iPhone confiscated by a bouncer (long story). With a custom lock screen, app icons (not to mention the fact I removed app names), and all the default apps removed, the bouncer couldn't get access to what he wanted on my phone without my help. Customizing your phone isn't enough to stop a real hacker, but it's enough to confuse and confuddle a random person who grabs your phone.
- Always update your phone's software: The recent Apple security bug fix is the best example of why it's important to keep your firmware up to date.
Obviously few of you are going to sign out of your email every time, delete your home address from your maps apps, or audit your apps every week. So here's the important part: use a passcode, enable remote wipe, and keep a backup of your phone.
So, smartphone manufacturers, OS developers, and app creators, here's my proposition: I'll do my part and fix my lapses in security if you will too. Like everyone else out there, I love new features, great looking apps, and cool new system level functions. However, I also love knowing my private data is private and my identity is secure. If you want me to track my habits, my movements, my exercise, and everything I do with my smartphone, then you need to give me the security and knowledge that my information is safe.
South Side Chicago native Kathy Stevens was arrested today after the Chicago Police Department received a tip that the woman was looking to sell or trade her child on Craigslist in exchange for a iPhone 5 with the Flappy Bird App.
The Hugely popular mobile app Flappy Bird was removed from the market by the creator Dong Nguyen and has caused the price of phones still containing the App to go as high as $20,000 and more on ebay.
Police say the woman was a troubled 28 year old who was determined to leverage her child to obtain the Flappy Bird App.
2222 Views · 2 Replies ( Last reply by pkmaximum )
In one of the earliest pieces of evidence pointing to Apple's push into the fitness and health monitoring field, the U.S. Patent and Trademark Office on Tuesday granted the company a patent for a biometric headphone system that can sense a variety of metrics including temperature, heart rate and perspiration levels.
Claiming priority over a provisional patent application filed for in 2007, Apple's U.S. Patent No. 8,655,004 for a "Sports monitoring system for headphones, earbuds and/or headsets" proves the company has been investigating integrated activity monitors for at least six years.
According to the patent, the fitness monitoring system is cleverly ensconced in a set of headphones, something users commonly wear to listen to music during workouts. By positioning the headset in or near the ear, the embedded activity sensor can pick up temperature, perspiration and heart rate data, among other metrics.
In addition to skin-based readings, an accelerometer may also be incorporated into the earbud chassis to facilitate the collection of accurate movement data. Some embodiments call for multiple accelerometers, each corresponding to a different axis.
As described, the activity sensor can be housed in the upper or lower portions of an earbud. As seen in the above illustration, an integrated solution would place the sensing apparatus wholly within the earbud frame. The solution would negate the need for users to wear or carry a separate piece of equipment, such as a smartwatch.
Not detailed in the patent is the means by which heart rate, perspiration and other physical data is harvested. Apple has a number of other properties describing embedded electronic sensors that interact with a user's skin, including an invention covering cardiac signal collection as transferred by an iPhone's external metal structures.
While mere speculation, Apple could potentially embed a conductive metal ring into the earbud, or perhaps position the activity sensor to facilitate touch with a user's bare skin. On the latter implementation, the patent points to a loop-style earbud that fixes the activity sensor in the boom arm rather than the headphone frame. Alternatively, the sensor may be a detachable component that fits into the earbud when needed.
As the activity monitor also incorporates accelerometers, Apple proposes a novel means of hands-free navigation involving head gestures. For example, users can change music tracks and adjust volume by tilting or rotating their head in predefined manners. To avoid accidental activation, a priming procedure like a button press may be used to initiate the gesture sequence.
In other embodiments, the activity sensor can be mounted within an inline housing on the headset cord. This implementation appears to be limited to motion data gathering, however, as no contact with the user's skin is noted.
Apple points out that the headphone unit may be wired or wireless, with the latter leveraging Bluetooth connectivity to transfer data back to the host device like an iPhone.
While the majority of the patent covers activity sensing, mention is made of a "psychological" sensor. It is possible that Apple could apply specialized algorithms information gathered by the built-in biometric sensor to create a general picture of a user's mental state. The feature could be something akin to Phyode's W/Me wrist-worn wellness device, which measures a user's autonomic nervous system via EKG electrodes.
With rumors swirling over a so-called "iWatch," Apple has made a number of recent hires from the medical sensor and health industry, leading many to believe the company is working on a standalone monitoring device.
Apple's sports monitoring headphone patent was first filed for in 2008 and credits Christopher Prest and Quin C. Hoellwarth as its inventors.
Continue to patent page here
Apple iCam. Photography becomes smart.
The Apple iCam is a concept camera by Italian designer Antonio DeRosa that imagines a future where cameras are modular and powered by smartphones. Smartphones have already invaded the compact camera market in recent years, but their small lenses and sensors keep them from being seen as suitable alternatives to more advanced cameras. The iCam camera changes that by adding a large sensor and interchangeable lens system to the mix. Simply attach your iPhone 5 to the case and you’ll have yourself a mirrorless interchangeable lens camera with a huge LCD screen, fast processor, internet connectivity, and countless photo apps!
iCam, i Can.
Photography becomes smart.
It was said Steve Jobs had the desire to revolutionize mobile phone, how to watch TV and photography.
Apple has done it with the iPhone, it want to make this again with iTV, but what does it want to do in the world of photography?
We have imagined it as the perfect companion of shots for our iPhone.
- Aluminum Unibody;
- Interchangeable Apple-Lens Lenses, with iMount mounting system;
- Front touch screen for self-portraits and for micro-app;
- LED Flash;
- Front pico-projector;
- SD UHS-i slot;
- Siri Compatible;
- Motion Sensor;
- ISO range from 100 to 3200 (extendable up to 6400 equivalent)
- Full HD at 60fps;
- 10.1-megapixel sensor;
We hope you like iCam!
Spot quiz: What is Apple's fastest-growing product by total dollar sales?
If you thought iPhones or iPads, you'd be wrong. Growth of both of those is in decline.
It's actually e-commerce — via iTunes, iBooks and the app stores. Sales of extra, non-Apple "stuff" via Apple's products were up 19% to $4.4 billion in Q1 2014.
This business is one of Apple's smaller lines, of course. But it's still impressive: If there was a standalone tech startup that was doing greater than $16 billion a year in digital e-commerce sales, and growing at nearly 20% a year, everyone would be talking about it.
It would be the hottest company on the planet. It certainly dwarfs Zappos, an e-commerce company whose last reported annual revenues were just over $2 billion.'A big opportunity on the platform.'
While the tech press is obsessed with Apple's plans for an iWatch and a new Apple TV device, it's instructive to pay closer attention to the business CEO Tim Cook is actually already building. Because it looks an awful lot like Apple's future growth might come from online and mobile retail, not from creating new product categories with new, yet-to-be-invented products.
On his last earnings call, Cook talked about this specifically:
In general, we’re seeing that people love being able to buy content, whether it’s music or movies or books, from their iPhone, using Touch ID. It’s incredibly simple and easy and elegant, and it’s clear that there’s a lot of opportunity there.
The mobile payments area in general is one that we’ve been intrigued with, and that was one of the thoughts behind Touch ID. But we’re not limiting ourselves just to that. So I don’t have anything specific to announce today, but you can tell by looking at the demographics of our customers and the amount of commerce that goes through iOS devices versus the competition that it’s a big opportunity on the platform.
If Cook had made exactly the same statements about watches or TVs, everyone would have freaked out. Apple fanboys would be jumping for joy.
But because he's talking about the dull-but-lucrative business of retail, everyone is ignoring it. In terms of mobile retail, Apple is already ahead of Google and Android. Even though more people own Android phones, most shopping gets done on iPhones. That is probably what Cook is referring to when he refers to "the amount of commerce that goes through iOS devices versus the competition that it’s a big opportunity on the platform."Touch ID is not what you think it's for.
In fact, one of Apple's most important recent technological advances has been retail-oriented.
Most people think that Touch ID is about security — no one can use or steal your iPhone 5S because you cannot unlock it without the owner's fingerprint. But as Business Insider has noted before, Touch ID has a much more important application as a business. Because it makes your phone almost completely secure, the iPhone suddenly becomes an almost perfect mobile payments device.
That's why Eddy Cue, Apple's e-commerce chief, is focused on building a mobile payments business for Apple right now, according to the Wall Street Journal. He and vp/online stores Jennifer Bailey have met with PayPal, Google, Square, Stripe, Braintree and Venmo in their efforts to put this together.
By amazing coincidence — or perhaps not — Apple is simultaneously building a mobile retail marketing infrastructure across the U.S. It's called iBeacon.Apple is building a national shopping infrastructure.
Stores are already installing these low-powered Bluetooth transmitters so that when you walk past a shelf they can ping your iPhone with an ad or an offer. Soon — if you keep your iBeacon functionality switched on — Apple and its iBeacon partners will know where you're shopping, all the time, down to a location of just a few feet.
And if it becomes possible to pay with your phone instead of your wallet, then Apple will have successfully "closed the loop" on mobile retailing.
For years, the El Dorado of mobile marketing has been to figure out a way to encourage a phone user to go to a store and buy something at the checkout, and then to be able to immediately attribute that specific sale to a specific phone or owner. This is what marketers mean by "closing the loop." Some companies have tried, but it is trickier than it sounds — you can check in on Foursquare or Facebook at The Gap all you want, but if the store clerk can't link your checkin to the sale, then the action is nearly useless.
Having an iPhone user accept an offer inside a store via iBeacon and then pay using their phone, in theory, solves that problem.
And if Cook really has got this figured out, it's likely to become a lot bigger business than wristwatches ever will be.
On Friday, Apple quietly released iOS 7.0.6, explaining in a brief release note that it fixed a bug in which "an attacker with a privileged network position may capture or modify data in sessions protected by SSL/TLS." That's the understated version. Another way to put it? Update your iPhone right now.
Oh, and by the way, OS X has the same issues—except there's no fix out yet.
If you understand what that release note meant in full, chances are you were first in line for the iOS update. If it reads like deleted scene from Sneakers, here's what it means for you and your Apple devices.What Is SSL?
SSL stands for Secure Sockets Layer, and it's what helps ensure that communication between your browser and your favorite websites' servers remains private and secure. TLS, or Transport Layer Security, is a more recent protocol that does essentially the same. In brief, SSL/TLS is a cryptographic key that lets a browser and a server know they are who they say they are, a secret digital handshake that keeps your financial information safe when you make an Amazon payment or log into wellsfargo.com.
This all happens in the background; your only direct interaction with SSL/TLS is when you notice the lock icon in your search bar has clamped shut. That means you've got a direct, private, secure line.
While Apple recently patched a major security flaw for iOS, the same vulnerability continues to affect OS X. Until Apple releases a fix--which it… Read…
The Apple bug in question—which, again, has been patched in iOS but not yet in OS X, though Apple tells Reuters that fix is coming "very soon"—means that Safari or one of these other affected applications can't actually know for sure if the servers it's talking to are who they say they are. Which leaves you and everything you transmit over the web vulnerable to a Man in the Middle attack.What's a Man in the Middle Attack?
A Man in the Middle Attack, which we'll call MitM from here for brevity's sake, is basically high-tech eavesdropping. A MitM attacker intercepts the communication between your browser and a site, monitoring, recording, seeing everything that transpires between you.
Gmail. Facebook. Financial transactions. OK Cupid flirting. All of it read, in real-time, by a complete stranger. Here it is in oversimplified chart form:
Normally attacks like this are are foiled by SSL/TLS (encrypted handshakes are hard to get in the middle of), or at least rendered too difficult to be worth it. But this Apple bug makes it painfully easy. That "privileged network position" an attacker needs to be in, referenced in the release notes? That just means he's in the same Starbucks as you.
And this has been going on since September. Of 2012.How Serious Is It?
If you're still scratching your head over what all of this means and how bad it is, the simplest way to explain it is that developers who understand it deeply weren't even willing to talk about it openly, for fear of giving hackers more ammunition than they already had:
— ashkan soltani (@ashk4n) February 22, 2014
Dear everyone: do *not* use Safari until Apple patches their SSL code in Mac OS X. Man-in-the-middle exploits are already in the wild.
— Nick Sullivan (@grittygrease) February 22, 2014
Ok, yes, the iOS/OS X bug does break SSL completely. Like @matthew_d_green I'm going to keep quiet. Patch quickly.
— Adam Langley (@agl__) February 22, 2014
I'm not going to talk details about the Apple bug except to say the following. It is seriously exploitable and not yet under control.
— Matthew Green (@matthew_d_green) February 21, 2014
That same Matthew Green, a Johns Hopkins cryptography professor, also explained to Reuters that it was "as bad as you could imagine, that's all I can say." So there you go!
You can afford to take a little bit of a deep breath; obviously there's not a hacker lurking in every coffee shop, and your personal information is never as interesting to others as you think it is. And if you've updated your iPhone or iPad to 7.0.6, you're fine.
But knowing that this has been going on for a year and a half is troubling just on principle. And knowing that it's been this widely publicized and hasn't yet been fixed for MacBooks means it's worth taking a few extra ounces of precaution.How Did This Happen?
Nobody knows, and Apple's understandably not saying. But theories range from the plausible to the tin foil hatted. Let's start with what probably happened and work our way up.
Google's Adam Langley detailed the specifics of the bug in his personal blog, if you're looking to stare at some code. But essentially, it comes down to one simple extra line out of nearly 2,000. As ZDNet points out, one extra "goto fail;" statement tucked in about a third of the way means that the SSL verification will go through in almost every case, regardless of if the keys match up or not.
Langley's take, and the most plausible? That it could have happened to anybody:
This sort of subtle bug deep in the code is a nightmare. I believe that it's just a mistake and I feel very bad for whomever might have slipped in an editor and created it.
Wow. Nothing is sacred. The Washington Post has discovered that the NSA and FBI have teamed up to tap into the servers of nine US tech… Read…
It doesn't take too much of a stretch of the imagination, though, to draw a few shaky lines between this bug and the NSA's PRISM program. No less an Apple devotee than John Gruber did just that last night, pointing out that the "goto fail;" command first snuck into iOS 6.0, which shipped just a month before Apple was reportedly added to the spy agency's info-snooping PRISM program.
If you want to go full tinfoil hat based on that timing, you're welcome to, but it's highly unlikely that Apple intentionally added this bit of code. It's entirely possible, though, that the NSA found out about it before Apple did, and has been secretly exploiting it for its PRISM purposes.How Can I Prevent It?
If you're on an iOS device, you need to download 7.0.6 immediately. If you've got a 3GS or an old iPod touch, you can download iOS 6.1.6 instead. And if you were looking for an indication of just how seriously Apple is taking this, the fact that they're supporting an iOS version that they are incredibly eager to phase out should be as good an indicator as any.
So far, though, you're out of luck if you're on OS X. The vulnerability is still there, and now that it's been widely publicized, bad guys are going to be keen to take advantage while they can. There's an unofficial patch floating out there, but please know that it's not for beginners.
Your best option in the meantime is to use Chrome or Firefox, which aren't affected on OS X. Also make sure you stay on secured networks, and if you do wind up on a shared network to play it smart (no financial info, no transactions, no personal details). That's a good rule of thumb generally, but especially important until this is made right.
Oh, and to hope that a fix "very soon" means hours or days, not weeks.
After nearly three years on the market, Apple's second-generation iPad, which sports an A5 processor and non-Retina display, is now on the chopping block, and is expected to be discontinued in the near future, AppleInsider has learned.
According to people familiar with Apple's plans, the company has made the decision to ramp down iPad 2 production given that customers are resoundingly shifting purchases towards its more modern and capable iPads, namely the iPad mini and iPad Air.
Apple's iPad 2 first went on sale in March of 2011 and was an immediate success. A year later, when Apple debuted the third-generation iPad with Retina display, it continued to offer the previous-generation iPad 2 at a lower price point of $399.
The $399 iPad 2 may no longer be as appealing to customers with the Retina iPad mini now occupying the same price point.Even with the launch of two more subsequent hardware revisions — most recently last fall with the fifth-generation iPad Air — the iPad 2 has continued to live on as a legacy device in Apple's product lineup. Its remaining availability has been somewhat perplexing, suggesting that Apple continued to find success with the device at $399.
But starting last fall, Apple began offering another model at the $399 price point — the iPad mini with Retina display. And while the iPad 2 has had a tremendous run, customers are now said to be opting for the more compact and higher-resolution iPads.
The anticipated discontinuation of the iPad 2 aligns with a prediction made by analyst Ming-Chi Kuo of KGI Securities last November. He revealed that Apple was set to ship just 0.3 million iPad 2 units in the current quarter, suggesting to him that the product is nearing end-of-life.
Still, after nearly three years on the market, the iPad 2 has been a smash success for Apple in its long stay on the market. One study published late last year suggested the iPad 2 remained the company's most popular tablet in use, accounting for some 38 percent of units in the wild before the debut of the iPad Air and Retina iPad mini.
When it launched in 2011, the iPad 2 represented a major redesign from the first-generation model, which was immediately discontinued. The second-generation tablet was also the first to sport compatibility with Apple's magnetic Smart Cover, the first to be offered in white in addition to black, and the first to feature a forward facing FaceTime camera.
Following on the heels of a California bill, four Democratic senators on Thursday proposed a federal law that would require those that make cellular devices to equip them with the ability to be permanently deactivated if stolen.
Unlike the extremely broad California proposal, the Senate bill appears to target only devices with a cellular connection, though it is still likely to encounter stiff resistance from portions of the cellular and electronics industries, many of whom oppose mandatory kill-switch laws or have significant reservations.
The bill would require smartphones to be equipped with both a kill switch and the ability for consumers to remotely wipe their personal data from a lost or stolen device.
The cellular industry trade group CTIA has put its support behind efforts to build a database of stolen phones and spoke out Thursday against the new bill.
“While Senator Klobuchar and CTIA are of like mind when it comes to wanting to prevent the theft of wireless devices, we clearly disagree on how to accomplish that goal,” Jot Carpenter, CTIA VP of government affairs, said in a statement. “Rather than impose technology mandates, a better approach would be to enact Senator Schumer’s legislation to criminalize tampering with mobile device identifiers. This would build on the industry’s efforts to create the stolen device databases, give law enforcement another tool to combat criminal behavior, and leave carriers, manufacturers, and software developers free to create new, innovative loss and theft prevention tools for consumers who want them.”
Some, including T-Mobile, have said they are not opposed to a kill-switch requirement per se, but want to protect against unintended consequences, such as malware that allows a consumer’s phone to be hijacked and held for ransom.
Apple includes within iOS 7 an activation lock feature that offers many of the protections proposed in the bill, though Apple has made the feature optional.
The California and U.S. Senate bills build on an earlier “Secure Our Smartphones” effort by prosecutors in San Francisco, New York and London.
Apple CEO Tim Cook and Samsung's mobile chief and co-CEO JK Shin reportedly met last week to try and thrash out a settlement to their long-running intellectual property dispute. The meeting, while unconfirmed by either party, is being reported by multiple Korean news outlets and adheres to the companies' promise to try and come to an amicable agreement before resuming their legal antagonism next month.
Sources indicate that the mediation effort was unproductive, which comes as no surprise given the history of animosity between Apple and
Samsung and the fact that similar talks were fruitless back in 2012.
Shin was expected to fly out to the US next week, ahead of a February 19th deadline for conducting these talks, but Chosun reports he's presently in Korea and has no plans to leave the country before that date — suggesting that he has already been to the US and met with the Apple CEO. Although Tim Cook has repeatedly expressed his distaste for legal entanglement, this particular disagreement appears to be intractable enough to keep the companies returning to the courtroom time after time.
Apple knows it bungled big time with the iPhone 5C and in the most recent earnings call CEO Tim Cook admitted that Apple got the product mix wrong with respect to the demand for the iPhone 5S and iPhone 5C. Now Apple seems to be taking course correction measures by slashing the price of the 16GB variant of the iPhone 5C in India. While there is no official update on the extent of the price cut, some color variants of the iPhone 5C are available for as low as Rs 36,999 or a drop of approximately Rs 5,000 from its launch price of Rs 41,900 at most online retail stores. This translates to a price cut of approximately 12 percent, which is unprecedented. Considering most online retailers have dropped prices, it is not an isolated retailer getting rid of its stocks and it is most likely to be reflected even in brick and mortar stores.
Till now, Apple has never dropped the price of any iPhone unless a new variant is introduced. However, of late, Apple has been introducing various buyback offers and the most recent buyback scheme offered a minimum of Rs 5,000 off for exchanging an old smartphone for the iPhone 5C 16GB. There is no official word on the price drop, yet, but BGR India understands Apple could disguise it as an offer leading up to Valentine’s Day, just like the current buyback scheme.
Surprisingly, there has been no change in the price of the 32GB variant of the iPhone 5C, which continues to be available for a steep Rs 53,500.
UPDATE: BGR India can confirm that Apple has not officially slashed the price of the iPhone 5C 16GB, yet. However, it seems to be a case where retailers are offering a cash discount in lieu of the Rs 5,000 cashback offer Apple is offering on the iPhone 5C 16GB in exchange of an old smartphone.
Bing, crackjack, Google, Yahoo, chinitheng, Facebook, +96hondaex, +joala, Peshe, +HOTFIRE125