SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Downloaden Sie, um offline zu lesen
User resistance and repurposing:
a look at the iOS ‘jailbreaking’ scene in
Brazil
Adriana Amaral
University of Vale do Rio dos Sinos - Brazil

Rosana Vieira de Souza
University of Vale do Rio dos Sinos - Brazil

The 14th Annual Conference of the Association of Internet
October 23 - 26, 2013, Denver, CO - USA
• The mobile environment
• Jailbreaking as resistance
• Purpose
• Methods
• Discussion: motivations and critical incidents
• Conclusions

Quick Overview

3
• The rise of “closed spaces” in the mobile environment
(Benkler, 2006; Galloway, 2006 and Zittrain, 2008)
• Computer-mediated platforms and the role of mobile
operating systems (e.g. iOS, Android)
• Apple iOS devices (iPod, iPhone, iPad) as highly controlled
spaces
• Handsets tied to a specific carrier
• Third-party apps not allowed

• Users’ strategies to unlock the handset and the desire to run
unofficial apps (out of the official App Store).

The Mobile Environment

4
• The practice called ‘jailbreaking’ has emerged in 2007 as
an alternative to Apple’s restrictions

• Jailbreaking allows users to change a device’s operating
system to run a number of applications not approved by
Apple or to open up additional features
• The procedure includes the download of free computer
software that installs a hack onto the device and the
installation of an alternative store called Cydia
• Around 22.8 million jailbroken iOS devices running Cydia
Store (Perez, 2013)

Jailbreaking as Resistance

5
• Tools and the iOS hacker communities:
• Redsn0w (by the iPhone Dev Team)
• Spirit and “JailbreakMe 2.0” (by Comex)
• Evasi0n (by Evad3rs)
• Absinthe (by Chronic Dev Team)

Jailbreaking as Resistance

6
“JailbreakMe is the easiest way to free your device. Experience
iOS as it could be, fully customizable, themeable, and with every
tweak you could possibly imagine. Jailbreaking gives you control
over the device you own”.

Source: Google
images

7
• To discuss the growth of mobile platforms and
the emergence of user counter-power in these
environments;
• To reflect upon jailbreaking practices from the
users’ point of view.

Purpose

8
• Qualitative approach and data collected by
• observation of discussion forums (iPhoneMod Brasil Forum);
• in-depth interviews with jailbreakers;

• This preliminary phase of interviews was conducted from
April to June 2013 (24 critical incidents from 12
interviewers):
• motivations for jailbreaking;
• critical events perceived as highly significant for either
success or failure of the practice (Critical Incident Technique,
Flanagan, 1954).

Methods

9
• CIT:
Think of a recent situation regarding the jailbreaking
experience with your mobile phone. Describe the
situation and exactly what happened.
1. When did the incident happen?
2. What specific circumstances led up to this
situation?
3. What did you do? (coping strategy do deal with
the event)

Methods

10
Source: data
collection

Discussion

Screenshot of jailbroken iPhone Home screen with
personalization app

11
1. Users motivations to engage in jailbreaking practices
• High performance handset + freedom to optimization =
experience that resembles the flexibility provided by the
internet;
• Need to extend the device capabilities in order to keep it more
personalized;
• Trade-off: concerns about the high costs of the iOS devices in
the Brazilian market:
• too expensive to risk vs. too expensive for not expanding their
capabilities;
“You stop and think that you pay a lot for something that is not what you
expected, and since Apple does not allow you to perform a ‘test drive’ for
apps, then it is complicated” (Camila, 19)

Discussion

12
1.

Critical Incidents
• iOS updates
“I’m always running an older version of the iOS cause it takes time for them [the hacker
community] to crack the program. iTunes keep on asking me for updating but if I
update the version I have in my device I will lose my jailbreak and Cydia” (Breno, 26)

• App failure and unexpected outcomes
“In the jailbreaking world you can never know for sure (…) when I know the app is very
important for my presentations, I need to buy it ‘cause I cannot take the risk of having
an unstable app” (James, 23)
“I consider myself experienced in jailbreaking and it was like a chock” (Camila, 19)

• Now I can, too
“Now I can, too, ‘cause I spent months seeing the games they could play in the US and I
could not” (Alexandre, 17)

“Now I can play the same game as the girls, otherwise, I could not ‘cause my parents do
not allow me to pay for apps” (Laila, 15)

Discussion

13
• iOS devices and their networks do not invite user innovation;

• Jailbreaking works as a social counter-power and indicates a
resistance to negative aspects of the market restrictions (control,
lack of flexibility, customization and reinvention);
• It emerges from a free culture logic that legitimates the freedom
to access, distribute or modify content and creative work;
• However, there is a permanent tension and feeling of ambivalence
• In the paradoxical nature of technology (e.g. new / obsolete)
• In the trade-offs the iOS users need to cope with (e.g. stability,
security and control vs. risk of instability and freedom)

Conclusions

14

Weitere ähnliche Inhalte

Ähnlich wie User resistance and repurposing: a look at the iOS ‘jailbreaking’ scene in Brazil

Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
Sara Dow
 
Forensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptxForensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptx
FatemaAkter78
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
mayank272369
 

Ähnlich wie User resistance and repurposing: a look at the iOS ‘jailbreaking’ scene in Brazil (20)

Mobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the UglyMobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the Ugly
 
Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)
 
Media presentation
Media presentationMedia presentation
Media presentation
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for Smartphones
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 
Forensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptxForensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptx
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Glass' evolution, some suggestions
Glass' evolution, some suggestionsGlass' evolution, some suggestions
Glass' evolution, some suggestions
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
IoTA
IoTAIoTA
IoTA
 
IoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social NetworkIoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social Network
 
IoT in Social Media
IoT in Social MediaIoT in Social Media
IoT in Social Media
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Mobile Learning Guide App: Webinar for Training MagazineLearned
Mobile Learning Guide App: Webinar for Training MagazineLearnedMobile Learning Guide App: Webinar for Training MagazineLearned
Mobile Learning Guide App: Webinar for Training MagazineLearned
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile world
 
Report: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesReport: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using Smartphones
 
Media presentation
Media presentationMedia presentation
Media presentation
 
UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...
UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...
UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 

Mehr von Adriana Amaral

Reconfigurações das praticas de consumo musical
Reconfigurações das praticas de consumo musicalReconfigurações das praticas de consumo musical
Reconfigurações das praticas de consumo musical
Adriana Amaral
 
As redes sociais e as patrulhas do gosto
As redes sociais e as patrulhas do gostoAs redes sociais e as patrulhas do gosto
As redes sociais e as patrulhas do gosto
Adriana Amaral
 
Aula Aberta Convergência - Jenkins
Aula Aberta Convergência - JenkinsAula Aberta Convergência - Jenkins
Aula Aberta Convergência - Jenkins
Adriana Amaral
 
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Adriana Amaral
 
Mesa epistemologia Sandra Montardo
Mesa epistemologia Sandra MontardoMesa epistemologia Sandra Montardo
Mesa epistemologia Sandra Montardo
Adriana Amaral
 

Mehr von Adriana Amaral (20)

Reconfigurações das praticas de consumo musical
Reconfigurações das praticas de consumo musicalReconfigurações das praticas de consumo musical
Reconfigurações das praticas de consumo musical
 
As redes sociais e as patrulhas do gosto
As redes sociais e as patrulhas do gostoAs redes sociais e as patrulhas do gosto
As redes sociais e as patrulhas do gosto
 
Withchouse
WithchouseWithchouse
Withchouse
 
S2, S2: Estrategias do Happy Rock Gaucho nas Midias Socias
S2, S2: Estrategias do Happy Rock Gaucho nas Midias SociasS2, S2: Estrategias do Happy Rock Gaucho nas Midias Socias
S2, S2: Estrategias do Happy Rock Gaucho nas Midias Socias
 
Curadoria de Informacao no Ciberjornalismo
Curadoria de Informacao no CiberjornalismoCuradoria de Informacao no Ciberjornalismo
Curadoria de Informacao no Ciberjornalismo
 
Aula1 apresentaçao
Aula1 apresentaçaoAula1 apresentaçao
Aula1 apresentaçao
 
Posfácio Neuromancer 2008
Posfácio Neuromancer 2008Posfácio Neuromancer 2008
Posfácio Neuromancer 2008
 
Ebook Blogs.com Estudos sobre blogs e comunicação
Ebook Blogs.com Estudos sobre blogs e comunicaçãoEbook Blogs.com Estudos sobre blogs e comunicação
Ebook Blogs.com Estudos sobre blogs e comunicação
 
Metodos de Pesquisa para Internet
Metodos de Pesquisa para InternetMetodos de Pesquisa para Internet
Metodos de Pesquisa para Internet
 
dissertacao
dissertacaodissertacao
dissertacao
 
Performance e representação Guitar Hero e DJ Hero
Performance e representação Guitar Hero e DJ HeroPerformance e representação Guitar Hero e DJ Hero
Performance e representação Guitar Hero e DJ Hero
 
Aula Aberta Convergência - Jenkins
Aula Aberta Convergência - JenkinsAula Aberta Convergência - Jenkins
Aula Aberta Convergência - Jenkins
 
Amaral Guitar Hero DJ Hero
Amaral Guitar Hero DJ HeroAmaral Guitar Hero DJ Hero
Amaral Guitar Hero DJ Hero
 
Pesquisa em Cibercultura BR EUA
Pesquisa em Cibercultura BR EUAPesquisa em Cibercultura BR EUA
Pesquisa em Cibercultura BR EUA
 
Steampunk
SteampunkSteampunk
Steampunk
 
Palestra Fansourcing II Musicom
Palestra Fansourcing II MusicomPalestra Fansourcing II Musicom
Palestra Fansourcing II Musicom
 
Pesquisa em Cibercultura no Brasil
Pesquisa em Cibercultura no BrasilPesquisa em Cibercultura no Brasil
Pesquisa em Cibercultura no Brasil
 
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
 
Mesa epistemologia Sandra Montardo
Mesa epistemologia Sandra MontardoMesa epistemologia Sandra Montardo
Mesa epistemologia Sandra Montardo
 
Epistemologia em cibercultura Abciber 2009
Epistemologia em cibercultura Abciber 2009Epistemologia em cibercultura Abciber 2009
Epistemologia em cibercultura Abciber 2009
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

User resistance and repurposing: a look at the iOS ‘jailbreaking’ scene in Brazil

  • 1.
  • 2. User resistance and repurposing: a look at the iOS ‘jailbreaking’ scene in Brazil Adriana Amaral University of Vale do Rio dos Sinos - Brazil Rosana Vieira de Souza University of Vale do Rio dos Sinos - Brazil The 14th Annual Conference of the Association of Internet October 23 - 26, 2013, Denver, CO - USA
  • 3. • The mobile environment • Jailbreaking as resistance • Purpose • Methods • Discussion: motivations and critical incidents • Conclusions Quick Overview 3
  • 4. • The rise of “closed spaces” in the mobile environment (Benkler, 2006; Galloway, 2006 and Zittrain, 2008) • Computer-mediated platforms and the role of mobile operating systems (e.g. iOS, Android) • Apple iOS devices (iPod, iPhone, iPad) as highly controlled spaces • Handsets tied to a specific carrier • Third-party apps not allowed • Users’ strategies to unlock the handset and the desire to run unofficial apps (out of the official App Store). The Mobile Environment 4
  • 5. • The practice called ‘jailbreaking’ has emerged in 2007 as an alternative to Apple’s restrictions • Jailbreaking allows users to change a device’s operating system to run a number of applications not approved by Apple or to open up additional features • The procedure includes the download of free computer software that installs a hack onto the device and the installation of an alternative store called Cydia • Around 22.8 million jailbroken iOS devices running Cydia Store (Perez, 2013) Jailbreaking as Resistance 5
  • 6. • Tools and the iOS hacker communities: • Redsn0w (by the iPhone Dev Team) • Spirit and “JailbreakMe 2.0” (by Comex) • Evasi0n (by Evad3rs) • Absinthe (by Chronic Dev Team) Jailbreaking as Resistance 6
  • 7. “JailbreakMe is the easiest way to free your device. Experience iOS as it could be, fully customizable, themeable, and with every tweak you could possibly imagine. Jailbreaking gives you control over the device you own”. Source: Google images 7
  • 8. • To discuss the growth of mobile platforms and the emergence of user counter-power in these environments; • To reflect upon jailbreaking practices from the users’ point of view. Purpose 8
  • 9. • Qualitative approach and data collected by • observation of discussion forums (iPhoneMod Brasil Forum); • in-depth interviews with jailbreakers; • This preliminary phase of interviews was conducted from April to June 2013 (24 critical incidents from 12 interviewers): • motivations for jailbreaking; • critical events perceived as highly significant for either success or failure of the practice (Critical Incident Technique, Flanagan, 1954). Methods 9
  • 10. • CIT: Think of a recent situation regarding the jailbreaking experience with your mobile phone. Describe the situation and exactly what happened. 1. When did the incident happen? 2. What specific circumstances led up to this situation? 3. What did you do? (coping strategy do deal with the event) Methods 10
  • 11. Source: data collection Discussion Screenshot of jailbroken iPhone Home screen with personalization app 11
  • 12. 1. Users motivations to engage in jailbreaking practices • High performance handset + freedom to optimization = experience that resembles the flexibility provided by the internet; • Need to extend the device capabilities in order to keep it more personalized; • Trade-off: concerns about the high costs of the iOS devices in the Brazilian market: • too expensive to risk vs. too expensive for not expanding their capabilities; “You stop and think that you pay a lot for something that is not what you expected, and since Apple does not allow you to perform a ‘test drive’ for apps, then it is complicated” (Camila, 19) Discussion 12
  • 13. 1. Critical Incidents • iOS updates “I’m always running an older version of the iOS cause it takes time for them [the hacker community] to crack the program. iTunes keep on asking me for updating but if I update the version I have in my device I will lose my jailbreak and Cydia” (Breno, 26) • App failure and unexpected outcomes “In the jailbreaking world you can never know for sure (…) when I know the app is very important for my presentations, I need to buy it ‘cause I cannot take the risk of having an unstable app” (James, 23) “I consider myself experienced in jailbreaking and it was like a chock” (Camila, 19) • Now I can, too “Now I can, too, ‘cause I spent months seeing the games they could play in the US and I could not” (Alexandre, 17) “Now I can play the same game as the girls, otherwise, I could not ‘cause my parents do not allow me to pay for apps” (Laila, 15) Discussion 13
  • 14. • iOS devices and their networks do not invite user innovation; • Jailbreaking works as a social counter-power and indicates a resistance to negative aspects of the market restrictions (control, lack of flexibility, customization and reinvention); • It emerges from a free culture logic that legitimates the freedom to access, distribute or modify content and creative work; • However, there is a permanent tension and feeling of ambivalence • In the paradoxical nature of technology (e.g. new / obsolete) • In the trade-offs the iOS users need to cope with (e.g. stability, security and control vs. risk of instability and freedom) Conclusions 14