iOS 10 requires express permission from the user to access the music library

iOS 10 what's new

Apple implemented security measures in iOS some time ago so that when an application requests access to the contact list, the calendar, the photographs or the location of the device, a dialog window was opened for the user to expressly give their consent. . In iOS 9 and earlier versions of Apple's operating system for your mobile devices, however, this measure was not applied to access the device's music library.

An Apple developer, Ben Dodson, pointed out this problem last January in a blog post. In it, he explained that when a developer wanted to access the device's library, he could do so without any type of barrier, collect the information, create a file with it and upload it to the Internet in less than two seconds. Apple took note of this bug and has now introduced a new security policy, called NSAppleMusicUsageDescription, that all developers are required to use in each application that requests access to media content on iOS 10 or higher. This change assures users that they will have to give their express consent at the same time that an application tries to access the musical content of the device.

This new security measure will prevent application developers from companies outside of Apple from being able to access a user's music library and collect information from its content without the user's permission. This measure also includes the changes that you want to make in the music library and that could later be used by third parties for the purpose of analyzing the information for advertising or monitoring purposes.

Apple showed iOS 10 last Monday, during the WWDC convention. In addition, it also presented the first beta of the operating system.


Follow us on Google News

Be the first to comment

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: AB Internet Networks 2008 SL
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.