<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Who owns our modern stuff?</title>
	<atom:link href="http://www.epanorama.net/blog/2013/03/21/who-owns-our-modern-stuff/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.epanorama.net/blog/2013/03/21/who-owns-our-modern-stuff/</link>
	<description>All about electronics and circuit design</description>
	<lastBuildDate>Tue, 14 Apr 2026 22:35:42 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.14</generator>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/21/who-owns-our-modern-stuff/comment-page-2/#comment-1752439</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 22 Jan 2022 15:25:53 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18038#comment-1752439</guid>
		<description><![CDATA[Reuse vs ‘refuse’: A Hoover case study
https://www.edn.com/reuse-vs-refuse-a-hoover-case-study/]]></description>
		<content:encoded><![CDATA[<p>Reuse vs ‘refuse’: A Hoover case study<br />
<a href="https://www.edn.com/reuse-vs-refuse-a-hoover-case-study/" rel="nofollow">https://www.edn.com/reuse-vs-refuse-a-hoover-case-study/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/21/who-owns-our-modern-stuff/comment-page-2/#comment-1750672</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 10 Jan 2022 12:39:30 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18038#comment-1750672</guid>
		<description><![CDATA[https://hackaday.com/2022/01/08/the-year-of-owning-it/]]></description>
		<content:encoded><![CDATA[<p><a href="https://hackaday.com/2022/01/08/the-year-of-owning-it/" rel="nofollow">https://hackaday.com/2022/01/08/the-year-of-owning-it/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/21/who-owns-our-modern-stuff/comment-page-2/#comment-1723623</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 06 Sep 2021 19:53:35 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18038#comment-1723623</guid>
		<description><![CDATA[Samsung Can Remotely Disable Any of Its TVs Worldwide
The technology is called TV Block, and it&#039;s pre-loaded on every Samsung TV.
https://uk.pcmag.com/tvs/135256/samsung-can-remotely-disable-any-of-its-tvs-worldwide

On July 11, a distribution center located in KwaZulu-Natal, South Africa was looted and an unknown number of Samsung televisions were stolen. However, all of those TVs are now useless as Samsung has revealed they are fitted with remote blocking technology.

What you may be surprised to hear is that Samsung can do this to any of its TVs, regardless of where they are in the world. The company admitted as much in its latest Samsung Newsroom post detailing how the TVs in South Africa were stolen and then disabled.

The technology is called TV Block and it&#039;s &quot;pre-loaded on all Samsung TV products.&quot; Whenever a TV is confirmed as being stolen, Samsung logs the serial number of the TV and then waits for it to be connected to the internet. At that point a Samsung server is connected to by default, the serial number is checked, and if it&#039;s on the list, &quot;the blocking system is implemented, disabling all the television functions.&quot;]]></description>
		<content:encoded><![CDATA[<p>Samsung Can Remotely Disable Any of Its TVs Worldwide<br />
The technology is called TV Block, and it&#8217;s pre-loaded on every Samsung TV.<br />
<a href="https://uk.pcmag.com/tvs/135256/samsung-can-remotely-disable-any-of-its-tvs-worldwide" rel="nofollow">https://uk.pcmag.com/tvs/135256/samsung-can-remotely-disable-any-of-its-tvs-worldwide</a></p>
<p>On July 11, a distribution center located in KwaZulu-Natal, South Africa was looted and an unknown number of Samsung televisions were stolen. However, all of those TVs are now useless as Samsung has revealed they are fitted with remote blocking technology.</p>
<p>What you may be surprised to hear is that Samsung can do this to any of its TVs, regardless of where they are in the world. The company admitted as much in its latest Samsung Newsroom post detailing how the TVs in South Africa were stolen and then disabled.</p>
<p>The technology is called TV Block and it&#8217;s &#8220;pre-loaded on all Samsung TV products.&#8221; Whenever a TV is confirmed as being stolen, Samsung logs the serial number of the TV and then waits for it to be connected to the internet. At that point a Samsung server is connected to by default, the serial number is checked, and if it&#8217;s on the list, &#8220;the blocking system is implemented, disabling all the television functions.&#8221;</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/21/who-owns-our-modern-stuff/comment-page-2/#comment-1722882</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Mon, 30 Aug 2021 10:20:03 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18038#comment-1722882</guid>
		<description><![CDATA[Who Owns The Machine Anyway?
https://hackaday.com/2021/08/28/who-owns-the-machine-anyway/

The story of the McDonalds’ frozen treat machine involves technology, trade secrets, inside business dealings, franchiser/franchisee friction, and an alleged NDA violation. In short: lots of money and lawyers. But it also involves something that matters to all of us hackers — what it means to own a machine.

The brief background is that McDonald’s requires its franchisees to buy a particular Taylor Soft Serve machine. The machine would enter pasteurizing mode and has opaque error codes that are triggered apparently without the owners or operators understanding, at which point Taylor service techs come in to fix them — and get paid for their service, naturally. A small hardware startup, Kytch, stepped into the mess with a device that man-in-the-middles the Taylor machine’s status codes, allowing the machine’s owners to diagnose and monitor it themselves. Heroes, right?

Taylor, naturally, wants to look at a Kytch device, but they’re locked up under NDAs that Kytch require users to sign in order to protect their trade secrets. So when Taylor gets their hands on one, Kytch takes them to court for, ironically, reverse engineering their device that they built to reverse Taylor’s protocols.

There are no good guys in this fight: it’s corporate secrecy fighting corporate secrets. None of which, by the way, is Hackaday particularly fond of. Why? Because these secrets rob the ostensible owners of the devices of their ability to inspect, fix, and operate their machines. This is akin to the “right to repair” idea, but it’s somehow even more fundamental — the right to know what your own devices are doing.]]></description>
		<content:encoded><![CDATA[<p>Who Owns The Machine Anyway?<br />
<a href="https://hackaday.com/2021/08/28/who-owns-the-machine-anyway/" rel="nofollow">https://hackaday.com/2021/08/28/who-owns-the-machine-anyway/</a></p>
<p>The story of the McDonalds’ frozen treat machine involves technology, trade secrets, inside business dealings, franchiser/franchisee friction, and an alleged NDA violation. In short: lots of money and lawyers. But it also involves something that matters to all of us hackers — what it means to own a machine.</p>
<p>The brief background is that McDonald’s requires its franchisees to buy a particular Taylor Soft Serve machine. The machine would enter pasteurizing mode and has opaque error codes that are triggered apparently without the owners or operators understanding, at which point Taylor service techs come in to fix them — and get paid for their service, naturally. A small hardware startup, Kytch, stepped into the mess with a device that man-in-the-middles the Taylor machine’s status codes, allowing the machine’s owners to diagnose and monitor it themselves. Heroes, right?</p>
<p>Taylor, naturally, wants to look at a Kytch device, but they’re locked up under NDAs that Kytch require users to sign in order to protect their trade secrets. So when Taylor gets their hands on one, Kytch takes them to court for, ironically, reverse engineering their device that they built to reverse Taylor’s protocols.</p>
<p>There are no good guys in this fight: it’s corporate secrecy fighting corporate secrets. None of which, by the way, is Hackaday particularly fond of. Why? Because these secrets rob the ostensible owners of the devices of their ability to inspect, fix, and operate their machines. This is akin to the “right to repair” idea, but it’s somehow even more fundamental — the right to know what your own devices are doing.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/21/who-owns-our-modern-stuff/comment-page-2/#comment-1672073</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Wed, 04 Mar 2020 08:20:57 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18038#comment-1672073</guid>
		<description><![CDATA[Farmers Are Hacking Their Tractors Because of a Repair Ban
https://m.youtube.com/watch?feature=youtu.be&amp;v=EPYy_g8NzmI]]></description>
		<content:encoded><![CDATA[<p>Farmers Are Hacking Their Tractors Because of a Repair Ban<br />
<a href="https://m.youtube.com/watch?feature=youtu.be&#038;v=EPYy_g8NzmI" rel="nofollow">https://m.youtube.com/watch?feature=youtu.be&#038;v=EPYy_g8NzmI</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/21/who-owns-our-modern-stuff/comment-page-2/#comment-1668308</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 24 Jan 2020 05:43:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18038#comment-1668308</guid>
		<description><![CDATA[Unauthorized Charcoal: GE fridges won&#039;t dispense ice or water unless your filter authenticates as an official ($55!) component
https://boingboing.net/2020/01/23/proprietary-carbon.html/amp?__twitter_impression=true



https://mobile.twitter.com/IamShaneMorris/status/1220367934947758080]]></description>
		<content:encoded><![CDATA[<p>Unauthorized Charcoal: GE fridges won&#8217;t dispense ice or water unless your filter authenticates as an official ($55!) component<br />
<a href="https://boingboing.net/2020/01/23/proprietary-carbon.html/amp?__twitter_impression=true" rel="nofollow">https://boingboing.net/2020/01/23/proprietary-carbon.html/amp?__twitter_impression=true</a></p>
<p><a href="https://mobile.twitter.com/IamShaneMorris/status/1220367934947758080" rel="nofollow">https://mobile.twitter.com/IamShaneMorris/status/1220367934947758080</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/21/who-owns-our-modern-stuff/comment-page-2/#comment-1666613</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sun, 05 Jan 2020 09:30:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18038#comment-1666613</guid>
		<description><![CDATA[Apple Is Bullying a Security Company with a Dangerous DMCA Lawsuit
https://www.ifixit.com/News/apple-is-bullying-a-security-company-with-a-dangerous-dmca-lawsuit

Corellium’s software creates virtual iPhones in a web browser, so that app developers and security researchers can tinker without needing a physical device. It’s nerdy stuff that most people will never need, but it’s genuinely useful. So useful, in fact, that Apple tried to buy the company. When the founders refused, Apple decided to sue them into oblivion.]]></description>
		<content:encoded><![CDATA[<p>Apple Is Bullying a Security Company with a Dangerous DMCA Lawsuit<br />
<a href="https://www.ifixit.com/News/apple-is-bullying-a-security-company-with-a-dangerous-dmca-lawsuit" rel="nofollow">https://www.ifixit.com/News/apple-is-bullying-a-security-company-with-a-dangerous-dmca-lawsuit</a></p>
<p>Corellium’s software creates virtual iPhones in a web browser, so that app developers and security researchers can tinker without needing a physical device. It’s nerdy stuff that most people will never need, but it’s genuinely useful. So useful, in fact, that Apple tried to buy the company. When the founders refused, Apple decided to sue them into oblivion.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/21/who-owns-our-modern-stuff/comment-page-2/#comment-1664161</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Fri, 13 Dec 2019 20:12:51 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18038#comment-1664161</guid>
		<description><![CDATA[https://www.uusiteknologia.fi/2019/12/12/vuoden-turhake-on-korjauskelvoton-elektroniikka/]]></description>
		<content:encoded><![CDATA[<p><a href="https://www.uusiteknologia.fi/2019/12/12/vuoden-turhake-on-korjauskelvoton-elektroniikka/" rel="nofollow">https://www.uusiteknologia.fi/2019/12/12/vuoden-turhake-on-korjauskelvoton-elektroniikka/</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/21/who-owns-our-modern-stuff/comment-page-2/#comment-1657868</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 02 Nov 2019 10:11:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18038#comment-1657868</guid>
		<description><![CDATA[Broken AirPods Pro? Don&#039;t Bother Trying to Fix Them Yourself
BY JUSTIN HERRICK 31 OCT 2019, 9:29 P.M.
https://uk.pcmag.com/apple-airpods-2nd-generation/123349/broken-airpods-pro-dont-bother-trying-to-fix-them-yourself

&#039;While theoretically semi-serviceable, the non-modular, glued-together design and lack of replacement parts makes repair both impractical and uneconomical,&#039; iFixit says.]]></description>
		<content:encoded><![CDATA[<p>Broken AirPods Pro? Don&#8217;t Bother Trying to Fix Them Yourself<br />
BY JUSTIN HERRICK 31 OCT 2019, 9:29 P.M.<br />
<a href="https://uk.pcmag.com/apple-airpods-2nd-generation/123349/broken-airpods-pro-dont-bother-trying-to-fix-them-yourself" rel="nofollow">https://uk.pcmag.com/apple-airpods-2nd-generation/123349/broken-airpods-pro-dont-bother-trying-to-fix-them-yourself</a></p>
<p>&#8216;While theoretically semi-serviceable, the non-modular, glued-together design and lack of replacement parts makes repair both impractical and uneconomical,&#8217; iFixit says.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tomi Engdahl</title>
		<link>https://www.epanorama.net/blog/2013/03/21/who-owns-our-modern-stuff/comment-page-2/#comment-1652347</link>
		<dc:creator><![CDATA[Tomi Engdahl]]></dc:creator>
		<pubDate>Sat, 21 Sep 2019 19:01:14 +0000</pubDate>
		<guid isPermaLink="false">http://www.epanorama.net/blog/?p=18038#comment-1652347</guid>
		<description><![CDATA[An increasing number of companies are taking steps to make it illegal to repair our own electronics outside of the manufacturer. Why are they doing this and what does it mean for your devices? via Quartz


Why are companies trying to make it illegal to repair our electronic devices?
https://qz.com/1028356/why-are-companies-trying-to-make-it-illegal-to-repair-our-electronic-devices/?utm_source=facebook&amp;utm_medium=partner-share&amp;utm_campaign=partner-forbes]]></description>
		<content:encoded><![CDATA[<p>An increasing number of companies are taking steps to make it illegal to repair our own electronics outside of the manufacturer. Why are they doing this and what does it mean for your devices? via Quartz</p>
<p>Why are companies trying to make it illegal to repair our electronic devices?<br />
<a href="https://qz.com/1028356/why-are-companies-trying-to-make-it-illegal-to-repair-our-electronic-devices/?utm_source=facebook&#038;utm_medium=partner-share&#038;utm_campaign=partner-forbes" rel="nofollow">https://qz.com/1028356/why-are-companies-trying-to-make-it-illegal-to-repair-our-electronic-devices/?utm_source=facebook&#038;utm_medium=partner-share&#038;utm_campaign=partner-forbes</a></p>
]]></content:encoded>
	</item>
</channel>
</rss>
