Appeals Court Sides with Mac News Sites over Apple -- In a major victory for online news sources, an appeals court ruled last week that Apple could not subpoena email in order to trace the source of leaked trade secrets. In December 2004, PowerPage and Apple Insider posted stories about an unannounced Apple audio product, code-named Asteroid, which included information and drawings leaked from sources inside the company. Apple could not identify the sources of the leaks, and therefore sued "John Does" for breach of confidentiality agreements; as part of the discovery process, Apple sought to subpoena PowerPage's ISP to obtain stored email that might reveal the sources' identities. Apple claimed that the site's owners were not genuine journalists and that, even if they had been, they had no right to protect their anonymous sources. The Electronic Frontier Foundation (EFF) took up the case, arguing that Apple's attempts to obtain this information violated both federal and California laws. Although a lower court had sided with Apple in March 2005, last week's ruling by the California Court of Appeals overturns that decision. One upshot of last week's ruling is that ISPs cannot be forced to turn over confidential email in response to civil lawsuits - and that apparently applies to everyone, not just journalists. [JK]
Viewing Wi-Fi Details in Snow Leopard
In Snow Leopard, hold down the Option key before clicking the AirPort menu. Doing so reveals additional technical details including which standards, speeds, and frequencies you're using to connect, as well as what's in use by other networks. With the Option key held down and with a network already joined, the AirPort menu reveals seven pieces of information: the PHY Mode, the MAC (Media Access Control) address, the channel and band in use, the security method that's in use, the RSSI (Received Signal Strength Indication) measurement, the transmit rate, and the MCS Index. In Leopard, some, but not all, of these details are revealed by Option-clicking the AirPort menu.