SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
User resistance and repurposing:
a look at the iOS ‘jailbreaking’ scene in
Brazil
Adriana Amaral
University of Vale do Rio dos Sinos - Brazil

Rosana Vieira de Souza
University of Vale do Rio dos Sinos - Brazil

The 14th Annual Conference of the Association of Internet
October 23 - 26, 2013, Denver, CO - USA
• The mobile environment
• Jailbreaking as resistance
• Purpose
• Methods
• Discussion: motivations and critical incidents
• Conclusions

Quick Overview

3
• The rise of “closed spaces” in the mobile environment
(Benkler, 2006; Galloway, 2006 and Zittrain, 2008)
• Computer-mediated platforms and the role of mobile
operating systems (e.g. iOS, Android)
• Apple iOS devices (iPod, iPhone, iPad) as highly controlled
spaces
• Handsets tied to a specific carrier
• Third-party apps not allowed

• Users’ strategies to unlock the handset and the desire to run
unofficial apps (out of the official App Store).

The Mobile Environment

4
• The practice called ‘jailbreaking’ has emerged in 2007 as
an alternative to Apple’s restrictions

• Jailbreaking allows users to change a device’s operating
system to run a number of applications not approved by
Apple or to open up additional features
• The procedure includes the download of free computer
software that installs a hack onto the device and the
installation of an alternative store called Cydia
• Around 22.8 million jailbroken iOS devices running Cydia
Store (Perez, 2013)

Jailbreaking as Resistance

5
• Tools and the iOS hacker communities:
• Redsn0w (by the iPhone Dev Team)
• Spirit and “JailbreakMe 2.0” (by Comex)
• Evasi0n (by Evad3rs)
• Absinthe (by Chronic Dev Team)

Jailbreaking as Resistance

6
“JailbreakMe is the easiest way to free your device. Experience
iOS as it could be, fully customizable, themeable, and with every
tweak you could possibly imagine. Jailbreaking gives you control
over the device you own”.

Source: Google
images

7
• To discuss the growth of mobile platforms and
the emergence of user counter-power in these
environments;
• To reflect upon jailbreaking practices from the
users’ point of view.

Purpose

8
• Qualitative approach and data collected by
• observation of discussion forums (iPhoneMod Brasil Forum);
• in-depth interviews with jailbreakers;

• This preliminary phase of interviews was conducted from
April to June 2013 (24 critical incidents from 12
interviewers):
• motivations for jailbreaking;
• critical events perceived as highly significant for either
success or failure of the practice (Critical Incident Technique,
Flanagan, 1954).

Methods

9
• CIT:
Think of a recent situation regarding the jailbreaking
experience with your mobile phone. Describe the
situation and exactly what happened.
1. When did the incident happen?
2. What specific circumstances led up to this
situation?
3. What did you do? (coping strategy do deal with
the event)

Methods

10
Source: data
collection

Discussion

Screenshot of jailbroken iPhone Home screen with
personalization app

11
1. Users motivations to engage in jailbreaking practices
• High performance handset + freedom to optimization =
experience that resembles the flexibility provided by the
internet;
• Need to extend the device capabilities in order to keep it more
personalized;
• Trade-off: concerns about the high costs of the iOS devices in
the Brazilian market:
• too expensive to risk vs. too expensive for not expanding their
capabilities;
“You stop and think that you pay a lot for something that is not what you
expected, and since Apple does not allow you to perform a ‘test drive’ for
apps, then it is complicated” (Camila, 19)

Discussion

12
1.

Critical Incidents
• iOS updates
“I’m always running an older version of the iOS cause it takes time for them [the hacker
community] to crack the program. iTunes keep on asking me for updating but if I
update the version I have in my device I will lose my jailbreak and Cydia” (Breno, 26)

• App failure and unexpected outcomes
“In the jailbreaking world you can never know for sure (…) when I know the app is very
important for my presentations, I need to buy it ‘cause I cannot take the risk of having
an unstable app” (James, 23)
“I consider myself experienced in jailbreaking and it was like a chock” (Camila, 19)

• Now I can, too
“Now I can, too, ‘cause I spent months seeing the games they could play in the US and I
could not” (Alexandre, 17)

“Now I can play the same game as the girls, otherwise, I could not ‘cause my parents do
not allow me to pay for apps” (Laila, 15)

Discussion

13
• iOS devices and their networks do not invite user innovation;

• Jailbreaking works as a social counter-power and indicates a
resistance to negative aspects of the market restrictions (control,
lack of flexibility, customization and reinvention);
• It emerges from a free culture logic that legitimates the freedom
to access, distribute or modify content and creative work;
• However, there is a permanent tension and feeling of ambivalence
• In the paradoxical nature of technology (e.g. new / obsolete)
• In the trade-offs the iOS users need to cope with (e.g. stability,
security and control vs. risk of instability and freedom)

Conclusions

14

Mais conteúdo relacionado

Semelhante a User resistance and repurposing: a look at the iOS ‘jailbreaking’ scene in Brazil

Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
Sara Dow
 
Forensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptxForensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptx
FatemaAkter78
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
mayank272369
 

Semelhante a User resistance and repurposing: a look at the iOS ‘jailbreaking’ scene in Brazil (20)

Mobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the UglyMobile App Testing: The Good, the Bad, and the Ugly
Mobile App Testing: The Good, the Bad, and the Ugly
 
Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)
 
Media presentation
Media presentationMedia presentation
Media presentation
 
On the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for SmartphonesOn the Availability of Anti-Forensic Tools for Smartphones
On the Availability of Anti-Forensic Tools for Smartphones
 
Smartphones with Smarter Apps
Smartphones with Smarter AppsSmartphones with Smarter Apps
Smartphones with Smarter Apps
 
Forensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptxForensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptx
 
(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx(300-400 words)1- Watch anyone of the following documentarymovi.docx
(300-400 words)1- Watch anyone of the following documentarymovi.docx
 
Glass' evolution, some suggestions
Glass' evolution, some suggestionsGlass' evolution, some suggestions
Glass' evolution, some suggestions
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Privacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile TechnologyPrivacy Exposed: Ramifications of Social Media and Mobile Technology
Privacy Exposed: Ramifications of Social Media and Mobile Technology
 
IoTA
IoTAIoTA
IoTA
 
IoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social NetworkIoTA : Where IoT Meets Social Network
IoTA : Where IoT Meets Social Network
 
IoT in Social Media
IoT in Social MediaIoT in Social Media
IoT in Social Media
 
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
When Worlds Collide: Tracking the Trends at the Intersection of Social, Mobil...
 
Mobile Learning Guide App: Webinar for Training MagazineLearned
Mobile Learning Guide App: Webinar for Training MagazineLearnedMobile Learning Guide App: Webinar for Training MagazineLearned
Mobile Learning Guide App: Webinar for Training MagazineLearned
 
Security and risk in a mobile world
Security and risk in a mobile worldSecurity and risk in a mobile world
Security and risk in a mobile world
 
Report: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using SmartphonesReport: A Model For Remote Parental Control System Using Smartphones
Report: A Model For Remote Parental Control System Using Smartphones
 
Media presentation
Media presentationMedia presentation
Media presentation
 
UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...
UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...
UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and U...
 
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
NETC 2012_Mobile Security for Smartphones and Tablets (pptx)
 

Mais de Adriana Amaral

Reconfigurações das praticas de consumo musical
Reconfigurações das praticas de consumo musicalReconfigurações das praticas de consumo musical
Reconfigurações das praticas de consumo musical
Adriana Amaral
 
As redes sociais e as patrulhas do gosto
As redes sociais e as patrulhas do gostoAs redes sociais e as patrulhas do gosto
As redes sociais e as patrulhas do gosto
Adriana Amaral
 
Aula Aberta Convergência - Jenkins
Aula Aberta Convergência - JenkinsAula Aberta Convergência - Jenkins
Aula Aberta Convergência - Jenkins
Adriana Amaral
 
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Adriana Amaral
 
Mesa epistemologia Sandra Montardo
Mesa epistemologia Sandra MontardoMesa epistemologia Sandra Montardo
Mesa epistemologia Sandra Montardo
Adriana Amaral
 

Mais de Adriana Amaral (20)

Reconfigurações das praticas de consumo musical
Reconfigurações das praticas de consumo musicalReconfigurações das praticas de consumo musical
Reconfigurações das praticas de consumo musical
 
As redes sociais e as patrulhas do gosto
As redes sociais e as patrulhas do gostoAs redes sociais e as patrulhas do gosto
As redes sociais e as patrulhas do gosto
 
Withchouse
WithchouseWithchouse
Withchouse
 
S2, S2: Estrategias do Happy Rock Gaucho nas Midias Socias
S2, S2: Estrategias do Happy Rock Gaucho nas Midias SociasS2, S2: Estrategias do Happy Rock Gaucho nas Midias Socias
S2, S2: Estrategias do Happy Rock Gaucho nas Midias Socias
 
Curadoria de Informacao no Ciberjornalismo
Curadoria de Informacao no CiberjornalismoCuradoria de Informacao no Ciberjornalismo
Curadoria de Informacao no Ciberjornalismo
 
Aula1 apresentaçao
Aula1 apresentaçaoAula1 apresentaçao
Aula1 apresentaçao
 
Posfácio Neuromancer 2008
Posfácio Neuromancer 2008Posfácio Neuromancer 2008
Posfácio Neuromancer 2008
 
Ebook Blogs.com Estudos sobre blogs e comunicação
Ebook Blogs.com Estudos sobre blogs e comunicaçãoEbook Blogs.com Estudos sobre blogs e comunicação
Ebook Blogs.com Estudos sobre blogs e comunicação
 
Metodos de Pesquisa para Internet
Metodos de Pesquisa para InternetMetodos de Pesquisa para Internet
Metodos de Pesquisa para Internet
 
dissertacao
dissertacaodissertacao
dissertacao
 
Performance e representação Guitar Hero e DJ Hero
Performance e representação Guitar Hero e DJ HeroPerformance e representação Guitar Hero e DJ Hero
Performance e representação Guitar Hero e DJ Hero
 
Aula Aberta Convergência - Jenkins
Aula Aberta Convergência - JenkinsAula Aberta Convergência - Jenkins
Aula Aberta Convergência - Jenkins
 
Amaral Guitar Hero DJ Hero
Amaral Guitar Hero DJ HeroAmaral Guitar Hero DJ Hero
Amaral Guitar Hero DJ Hero
 
Pesquisa em Cibercultura BR EUA
Pesquisa em Cibercultura BR EUAPesquisa em Cibercultura BR EUA
Pesquisa em Cibercultura BR EUA
 
Steampunk
SteampunkSteampunk
Steampunk
 
Palestra Fansourcing II Musicom
Palestra Fansourcing II MusicomPalestra Fansourcing II Musicom
Palestra Fansourcing II Musicom
 
Pesquisa em Cibercultura no Brasil
Pesquisa em Cibercultura no BrasilPesquisa em Cibercultura no Brasil
Pesquisa em Cibercultura no Brasil
 
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
Consumption Practices And Uses Of Social Tagging By Last.Fms Brazilian Users ...
 
Mesa epistemologia Sandra Montardo
Mesa epistemologia Sandra MontardoMesa epistemologia Sandra Montardo
Mesa epistemologia Sandra Montardo
 
Epistemologia em cibercultura Abciber 2009
Epistemologia em cibercultura Abciber 2009Epistemologia em cibercultura Abciber 2009
Epistemologia em cibercultura Abciber 2009
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

User resistance and repurposing: a look at the iOS ‘jailbreaking’ scene in Brazil

  • 1.
  • 2. User resistance and repurposing: a look at the iOS ‘jailbreaking’ scene in Brazil Adriana Amaral University of Vale do Rio dos Sinos - Brazil Rosana Vieira de Souza University of Vale do Rio dos Sinos - Brazil The 14th Annual Conference of the Association of Internet October 23 - 26, 2013, Denver, CO - USA
  • 3. • The mobile environment • Jailbreaking as resistance • Purpose • Methods • Discussion: motivations and critical incidents • Conclusions Quick Overview 3
  • 4. • The rise of “closed spaces” in the mobile environment (Benkler, 2006; Galloway, 2006 and Zittrain, 2008) • Computer-mediated platforms and the role of mobile operating systems (e.g. iOS, Android) • Apple iOS devices (iPod, iPhone, iPad) as highly controlled spaces • Handsets tied to a specific carrier • Third-party apps not allowed • Users’ strategies to unlock the handset and the desire to run unofficial apps (out of the official App Store). The Mobile Environment 4
  • 5. • The practice called ‘jailbreaking’ has emerged in 2007 as an alternative to Apple’s restrictions • Jailbreaking allows users to change a device’s operating system to run a number of applications not approved by Apple or to open up additional features • The procedure includes the download of free computer software that installs a hack onto the device and the installation of an alternative store called Cydia • Around 22.8 million jailbroken iOS devices running Cydia Store (Perez, 2013) Jailbreaking as Resistance 5
  • 6. • Tools and the iOS hacker communities: • Redsn0w (by the iPhone Dev Team) • Spirit and “JailbreakMe 2.0” (by Comex) • Evasi0n (by Evad3rs) • Absinthe (by Chronic Dev Team) Jailbreaking as Resistance 6
  • 7. “JailbreakMe is the easiest way to free your device. Experience iOS as it could be, fully customizable, themeable, and with every tweak you could possibly imagine. Jailbreaking gives you control over the device you own”. Source: Google images 7
  • 8. • To discuss the growth of mobile platforms and the emergence of user counter-power in these environments; • To reflect upon jailbreaking practices from the users’ point of view. Purpose 8
  • 9. • Qualitative approach and data collected by • observation of discussion forums (iPhoneMod Brasil Forum); • in-depth interviews with jailbreakers; • This preliminary phase of interviews was conducted from April to June 2013 (24 critical incidents from 12 interviewers): • motivations for jailbreaking; • critical events perceived as highly significant for either success or failure of the practice (Critical Incident Technique, Flanagan, 1954). Methods 9
  • 10. • CIT: Think of a recent situation regarding the jailbreaking experience with your mobile phone. Describe the situation and exactly what happened. 1. When did the incident happen? 2. What specific circumstances led up to this situation? 3. What did you do? (coping strategy do deal with the event) Methods 10
  • 11. Source: data collection Discussion Screenshot of jailbroken iPhone Home screen with personalization app 11
  • 12. 1. Users motivations to engage in jailbreaking practices • High performance handset + freedom to optimization = experience that resembles the flexibility provided by the internet; • Need to extend the device capabilities in order to keep it more personalized; • Trade-off: concerns about the high costs of the iOS devices in the Brazilian market: • too expensive to risk vs. too expensive for not expanding their capabilities; “You stop and think that you pay a lot for something that is not what you expected, and since Apple does not allow you to perform a ‘test drive’ for apps, then it is complicated” (Camila, 19) Discussion 12
  • 13. 1. Critical Incidents • iOS updates “I’m always running an older version of the iOS cause it takes time for them [the hacker community] to crack the program. iTunes keep on asking me for updating but if I update the version I have in my device I will lose my jailbreak and Cydia” (Breno, 26) • App failure and unexpected outcomes “In the jailbreaking world you can never know for sure (…) when I know the app is very important for my presentations, I need to buy it ‘cause I cannot take the risk of having an unstable app” (James, 23) “I consider myself experienced in jailbreaking and it was like a chock” (Camila, 19) • Now I can, too “Now I can, too, ‘cause I spent months seeing the games they could play in the US and I could not” (Alexandre, 17) “Now I can play the same game as the girls, otherwise, I could not ‘cause my parents do not allow me to pay for apps” (Laila, 15) Discussion 13
  • 14. • iOS devices and their networks do not invite user innovation; • Jailbreaking works as a social counter-power and indicates a resistance to negative aspects of the market restrictions (control, lack of flexibility, customization and reinvention); • It emerges from a free culture logic that legitimates the freedom to access, distribute or modify content and creative work; • However, there is a permanent tension and feeling of ambivalence • In the paradoxical nature of technology (e.g. new / obsolete) • In the trade-offs the iOS users need to cope with (e.g. stability, security and control vs. risk of instability and freedom) Conclusions 14