Skip to main content

APPLE BANS

APPLE BANS ALEX JONES' INFOWARS APP FROM APP STORE FOR 'OBJECTIONABLE CONTENT' 

Apple Inc said on Friday that it had banned from its App Store the Infowars app belonging to popular US conspiracy theorist Alex Jones after finding that it had violated the company’s rules against “objectionable content”.
The move makes Apple the latest tech company or social media platform to take action against Jones, a deeply controversial right-wing radio talk-show host who has suggested that the 2012 Sandy Hook massacre was a hoax, among other sensational claims.

Apple said the guidelines Jones violated bar “defamatory, discriminatory, or mean-spirited content, including references or commentary about religion, race, sexual orientation, gender, national/ethnic origin, or other targeted groups, particularly if the app is likely to humiliate, intimidate, or place a targeted individual or group in harm’s way.”



Representatives for Jones could not immediately be reached for comment by Reuters on Friday evening.
On Thursday, Twitter Inc permanently banned Jones and his website from its platform and Periscope, saying in a tweet that the accounts had violated its behavior policies.
In a video posted on the Infowars website on Thursday, Jones said in response: “I was taken down not because we lied but because we tell the truth and because we were popular.”
Last month, Twitter banned Jones and Infowars for seven days, citing tweets that it said violated the company’s rules against abusive behavior, which state that a user may not engage in targeted harassment of someone or incite other people to do so.
Apple said at the time that the Infowars app remained in its store because it had not been found to be in violation of any content policies, although it had removed access to some podcasts by Jones.
The podcasts differ from the Infowars app by allowing access to an extensive list of previous episodes, subjecting all of those past episodes to Apple’s content rules.
The Infowars app contains only rebroadcasts of the current day’s episodes, subjecting a much smaller set of content to the rules. Apple said it regularly monitors all apps for content violations.
Google parent Alphabet Inc, Facebook Inc and Spotify Technology SA have also removed content produced by Jones.

Comments

Popular posts from this blog

Momo suicide game

Microsoft clamps down on sick 'Momo suicide game' in 'Minecraft' Microsoft is clamping down on the sick “Momo suicide challenge,” which recently infiltrated the wildly popular online game “Minecraft.”The tech giant owns “Minecraft” developer Mojang. The vile “Momo suicide game” has been garnering attention after spreading on WhatsApp, prompting police warnings. "Momo" is a viral challenge that asks people to add a contact via WhatsApp - they are then   urged   to commit self-harm or suicide. The "game" has fueled comparisons to the sinister " Blue Whale challenge " that led to reports of suicides in Russia and the U.S, as well as the online fictional character of "Slender Man." In 2014 two 12-year-old girls in Wisconsin  attempted to kill   a classmate in an attempt to please the horror character. The Buenos Aires Times recently  reported  that police in Argentina are investigating whether “Momo” is linked to the suicide of a 12-y...

Create WAR file in Spring Boot

This is just a three step simple procedure to package your application into war. Extending Main Class First, we extend our main class to SpringBootServletInitializer. This tells spring that your main class will be the entry point to initialize your project in server. ? 1 2 3 4 5 6 7 @SpringBootApplication public class Application extends SpringBootServletInitializer{        public static void main(String[] args) {          SpringApplication.run(Application. class , args);      } } Overriding configure method Next, we overload the configure method of SpringBootServletInitializer. We tell spring to build the sources from our Main class. Your final Main class should look like this: ? 1 2 3 4 5 6 7 8 9 10 11 12 @SpringBootApplication public class Application extends SpringBootServletInitializer{        public static void main(String[] args) {     ...

Kali Linux 2017.2

Most Advanced Penetration Testing Distribution, Ever. New and Updated Packages in Kali 2017.2 In addition to all of the standard security and package updates that come to us via Debian Testing, we have also added more than a dozen new tools to the repositories, a few of which are listed below. There are some really nice additions so we encourage you to ‘apt install’ the ones that pique your interest and check them out. hurl  – a useful little hexadecimal and URL encoder/decoder phishery  – phishery lets you inject SSL-enabled basic auth phishing URLs into a .docx Word document ssh-audit  – an SSH server auditor that checks for encryption types, banners, compression, and more apt2  – an Automated Penetration Testing Toolkit that runs its own scans or imports results from various scanners, and takes action on them bloodhound  – uses graph theory to reveal the hidden or unintended relationships within Active Directory crackmapexec  – a post-expl...