Kill pill

Last updated

In computing, a kill pill is a mechanism or a technology designed to render systems useless either by user command, or under a predefined set of circumstances. Kill pill technology is most commonly used to disable lost or stolen devices for security purposes, but can also be used for the enforcement of rules and contractual obligations.

Contents

Applications

Lost and stolen devices

Kill pill technology is used prominently in smartphones, especially in the disablement of lost or stolen devices. A notable example is Find My iPhone, a service that allows the user to password protect or wipe their iDevice(s) remotely, aiding in the protection of private data. [1] Similar applications exist for other smartphone operating systems, including Android, [2] BlackBerry, [3] and Windows Phone. [4]

Anti-piracy measure

Kill pill technology has been notably used as an anti-piracy measure. Windows Vista was released with the ability to severely limit its own functionality if it was determined that the copy was obtained through piracy. The feature was later dropped after complaints that false positives caused genuine copies of Vista to act as though they were pirated. [5]

Removal of malicious software

The concept of a kill pill is also applied to the remote removal by a server of malicious files or applications from a client's system. Such technology is a standard component of most handheld computing devices, mainly due to their generally more limited operating systems and means of obtaining applications. Such functionality is also reportedly available to applications downloaded from the Windows Store on Windows 8 operating systems. [6]

Vehicles

Kill pill technology is used frequently in vehicles for a variety of reasons. Remote vehicle disablement can be used to prevent a vehicle from starting, to prevent it from moving, and to prevent the vehicle's continued operation. Non-remotely, vehicles can require driver recognition before starting or moving, such as asking for a password or some form of biometrics from the driver. [7]

Kill pill technology is often used by governments to prevent drunk driving by repeat offenders as a punishment and deterrent. The installation of an ignition interlock devices is a sentencing alternative for drunk drivers in almost all 50 of the United States. Such a device requires the driver to blow into a breathalyzer before starting the vehicle. If the driver is found to be over the legal blood alcohol content limit, the vehicle will not start [8]

Other uses

Kill pill technology can also be implemented to contextually disable certain aspects of a smartphone's functionality. A patent obtained by Apple claims the ability to disable the antenna, screen, or camera of a smartphone in settings like theaters, schools, and areas of high security sensitivity. [9]

Criticism

Kill pill technology has been criticized for allowing for the suppression of personal liberties. While a kill pill can be utilized in a school setting to prevent academic dishonesty, it has been suggested that governments may also use it to suppress their people, for example, by disabling a phone's camera or antenna in the area of a protest. [10]

The ability to remotely remove files and applications from a user's device has also come under fire. Apple's apparent ability to blacklist applications, rendering them unusable on any iDevice, has raised concerns about the user's rights when downloading from the App Store. [11] As of July 2014, no applications appear on Apple's blacklist website.

See also

Related Research Articles

<span class="mw-page-title-main">Personal digital assistant</span> Multi-purpose mobile device

A personal digital assistant (PDA) is a multi-purpose mobile device which functions as a personal information manager. By 2007, PDAs have been mostly displaced by the widespread adoption of more highly capable smartphones, in particular those based on iOS and Android, and thus saw a rapid decline afterwards.

<span class="mw-page-title-main">BlackBerry</span> Line of wireless handheld devices and services

BlackBerry is a discontinued brand of smartphones and other related mobile services and devices. The line was originally developed and maintained by the Canadian company BlackBerry Limited from 1999 to 2016, after which it was licensed to various companies.

<span class="mw-page-title-main">Smartphone</span> Handheld mobile device

A smartphone, often simply called a phone, is a mobile device that combines the functionality of a traditional mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multimedia playback and streaming. Smartphones have built-in cameras, GPS navigation, and support for various communication methods, including voice calls, text messaging, and internet-based messaging apps.

<span class="mw-page-title-main">Kill switch</span> Safety mechanism to quickly shut down a system

A kill switch, also known more formally as an emergency brake, emergency stop (E-stop), emergency off (EMO), or emergency power off (EPO), is a safety mechanism used to shut off machinery in an emergency, when it cannot be shut down in the usual manner. Unlike a normal shut-down switch or shut-down procedure, which shuts down all systems in order and turns off the machine without damage, a kill switch is designed and configured to abort the operation as quickly as possible and to be operated simply and quickly. Kill switches are usually designed to be noticeable, even to an untrained operator or a bystander.

A voice-user interface (VUI) enables spoken human interaction with computers, using speech recognition to understand spoken commands and answer questions, and typically text to speech to play a reply. A voice command device is a device controlled with a voice user interface.

Push email is an email system that provides an always-on capability, in which when new email arrives at the mail delivery agent (MDA), it is immediately, actively transferred (pushed) by the MDA to the mail user agent (MUA), also called the email client, so that the end-user can see incoming email immediately. This is in contrast with systems that check for new incoming mail every so often, on a schedule. Email clients include smartphones and, less strictly, IMAP personal computer mail applications.

Windows Vista contains a range of new technologies and features that are intended to help network administrators and power users better manage their systems. Notable changes include a complete replacement of both the Windows Setup and the Windows startup processes, completely rewritten deployment mechanisms, new diagnostic and health monitoring tools such as random access memory diagnostic program, support for per-application Remote Desktop sessions, a completely new Task Scheduler, and a range of new Group Policy settings covering many of the features new to Windows Vista. Subsystem for UNIX Applications, which provides a POSIX-compatible environment is also introduced.

Mobile device management (MDM) is the administration of mobile devices, such as smartphones, tablet computers, and laptops. MDM is usually implemented with the use of a third-party product that has management features for particular vendors of mobile devices. Though closely related to Enterprise Mobility Management and Unified Endpoint Management, MDM differs slightly from both: unlike MDM, EMM includes mobile information management, BYOD, mobile application management and mobile content management, whereas UEM provides device management for endpoints like desktops, printers, IoT devices, and wearables as well.

A mobile operating system is an operating system used for smartphones, tablets, smartwatches, smartglasses, or other non-laptop personal mobile computing devices. While computers such as typical/mobile laptops are "mobile", the operating systems used on them are generally not considered mobile, as they were originally designed for desktop computers that historically did not have or need specific mobile features. This line distinguishing mobile and other forms has become blurred in recent years, due to the fact that newer devices have become smaller and more mobile unlike hardware of the past. Key notabilities blurring this line are the introduction of tablet computers, light laptops, and the hybridization of the two in 2-in-1 PCs.

<span class="mw-page-title-main">Mobile phone</span> Portable device to make telephone calls using a radio link

A mobile phone or cell phone is a portable telephone that can make and receive calls over a radio frequency link while the user is moving within a telephone service area, as opposed to a fixed-location phone. The radio frequency link establishes a connection to the switching systems of a mobile phone operator, which provides access to the public switched telephone network (PSTN). Modern mobile telephone services use a cellular network architecture, and therefore mobile telephones are called cellphones in North America. In addition to telephony, digital mobile phones support a variety of other services, such as text messaging, multimedia messaging, email, Internet access, short-range wireless communications, satellite access, business applications, payments, multimedia playback and streaming, digital photography, and video games. Mobile phones offering only basic capabilities are known as feature phones ; mobile phones that offer greatly advanced computing capabilities are referred to as smartphones.

Pre-installed software is software already installed and licensed on a computer or smartphone bought from an original equipment manufacturer (OEM). The operating system is usually factory-installed, but because it is a general requirement, this term is used for additional software apart from the bare necessary amount, usually from other sources.

<span class="mw-page-title-main">IEEE 1394</span> Serial bus interface standard, also known as Firewire

IEEE 1394 is an interface standard for a serial bus for high-speed communications and isochronous real-time data transfer. It was developed in the late 1980s and early 1990s by Apple in cooperation with a number of companies, primarily Sony and Panasonic. It is most commonly known by the name FireWire (Apple), though other brand names exist such as i.LINK (Sony), and Lynx.

Exchange ActiveSync is a proprietary protocol designed for the synchronization of email, contacts, calendar, tasks, and notes from a messaging server to a smartphone or other mobile devices. The protocol also provides mobile device management and policy controls. The protocol is based on XML. The mobile device communicates over HTTP or HTTPS.

Mobile Business Intelligence is defined as “Mobile BI is a system comprising both technical and organizational elements that present historical and/or real-time information to its users for analysis on mobile devices such as smartphones and tablets, to enable effective decision-making and management support, for the overall purpose of increasing firm performance.”. Business intelligence (BI) refers to computer-based techniques used in spotting, digging-out, and analyzing business data, such as sales revenue by products and/or departments or associated costs and incomes.

HP ePrint was a term used by Hewlett-Packard to describe a variety of printing technologies developed for mobile computing devices, such as smartphones, tablet computers, and laptops.

Lock screen is a computer user interface element used by various operating systems. They regulate immediate access to a device by requiring the user to perform a certain action in order to receive access, such as entering a password, using a certain button combination, or performing a certain gesture using a device's touchscreen. There are various authentication methods to get past the lock screen, with the most popular and common ones being personal identification numbers (PINs), the Android pattern lock, and biometrics.

Remote mobile virtualization, like its counterpart desktop virtualization, is a technology that separates operating systems and applications from the client devices that access them. However, while desktop virtualization allows users to remotely access Windows desktops and applications, remote mobile virtualization offers remote access to mobile operating systems such as Android.

A microphone blocker is a phone microphone connector used to trick feature phones that have a physical microphone switch to disconnect the microphone. Microphone blockers won't operate on smartphones or laptops because the microphone is controlled with software rather than a physical switch.

References

  1. "iCloud - Find my iPhone". Apple Inc. Retrieved 12 February 2013.[ failed verification ]
  2. Lightner, Rob. "5 ways to help find your lost Android device". CNET. Retrieved 12 February 2013.
  3. "BlackBerry Protect". BlackBerry Inc. Retrieved 12 February 2013.
  4. "Finding a lost phone". Microsoft Inc. Retrieved 12 February 2013.
  5. "'Kill switch' dropped from Vista". BBC News. 4 December 2007. Retrieved 13 February 2013.
  6. Robertson, Jordan (16 February 2012). "The Kill Switch Comes to the PC". Businessweek. Archived from the original on March 1, 2012. Retrieved 13 February 2013.
  7. "Vehicle Disabling Systems". US Department of Transportation: Federal Motor Carrier Safety Association. Archived from the original on 21 February 2013. Retrieved 13 February 2013.
  8. Cordell, LaDoris (22 September 2009). "Baby, You Can't Drive Your Car". Slate. Retrieved 13 February 2013.
  9. USpatent 8254902,"Apparatus and methods for enforcement of policies upon a wireless device"
  10. Whittaker, Zack (4 September 2012). "Apple's patent could remotely disable protesters' phone cameras". ZDNet. Retrieved 13 February 2013.
  11. Buchanan, Matt (6 August 2008). "Apple Can Remotely Disable Apps Installed on Your iPhone". Gizmodo. Retrieved 13 February 2013.