Posted February 13, 2018 07:29:30The first time I bought an iPhone was back in the mid-1990s, and it wasn’t a big deal.
It was a basic piece of hardware, like any other iPhone: a tiny plastic screen that you held in your hand with a rubber band to the top.
At the time, I was in the middle of a career change, and I was working on a project I didn’t really care for: a web application called Snitch, which let you post anonymous tips to anyone you liked on the web.
I had just gotten off a long shift at a big tech company, and my boss, who was a programmer who worked on websites and social media, offered to show me Snitch.
It had been years since I had used it, and the first time anyone had posted to the application was a few weeks ago.
I was excited, but not overly enthusiastic.
I wasn’t sure what I was going to do with it, what it was going the wrong way, and how I would use it, but it seemed like a fun project to have.
And that’s what I do.
I don’t spend a lot of time on Apple products anymore.
That’s because I started writing this blog in early 2015, and after a year of writing it, I started to wonder whether I was a terrible person for ever getting on a company-issued phone.
I was on a long, frustrating day at work the day before Thanksgiving.
I’d recently graduated from college and was looking for work in tech.
I came home from work and had just logged on to the Apple website, and suddenly I saw something in the search bar: Snitch!
I typed in “Snitch” and typed in my phone number, and then I got a notification that my number had been listed in the list of all people on Apple’s database of potential employees.
It wasn’t just me: a friend of mine had gotten a similar notification, and someone else had got a similar one.
I thought, Wow, this is crazy.
I didn “borrow” an iPhone.
I’ve never been a frequent Apple user, but I’ve always been a fan of its products, so I assumed this was some sort of joke.
But I was pleasantly surprised to see that I was not alone.
There were a lot more people who had received notifications that their iPhone had been flagged as a potential employee, which, combined with the fact that Apple had flagged the Snitch app as a possible employee threat, means it’s likely a real problem.
What if Apple was being unfair?
If Apple were using my name in order to flag employees?
What if I was falsely flagged?
What happens if someone else on Apple gets flagged?
I was curious to know if there was a way to stop the app from flagging my name as a likely employee, and to learn how Apple would handle this.
So I searched for other Apple employees who had gotten alerts about the app, and, in the process, found a lot who had a lot to say about the system.
This is what I found.
The system is complicated.
It involves a lot different processes, but the basic idea is that if someone on Apple is flagged, a number of things happen:First, the app will flag your name.
That is, the software automatically checks if you have a phone number that matches the name of someone on its database.
If it finds that match, the application will alert you to the fact, and warn you that the user could be a potential threat.
If the user does indeed have a contact phone number (or phone number in the case of a social media app), the app won’t flag you as a threat.
Apple is also using a database of contacts in the app to track potential employees, so when a user signs up, the system uses that database to flag them as a potentially suspicious user.
If you have multiple contacts with the same name, the list is updated so the app knows which ones are potentially suspicious, and if you use a social network, the company uses the data to flag people who post negative comments about your business.
If your company doesn’t want to be flagged, however, you can opt out of having your name flagged and keep it off of the database altogether.
Apple has also made it a little harder for potential employees to flag the app.
If a potential user logs in to the app with a phone that is not the same as their contact’s, the potential employee can’t be flagged as an employee.
Instead, the information on the potential user’s phone will be used to identify other potential employees that might have the same phone number.
The final step of the process is to ask the company to flag you, and this involves a separate process that Apple has developed.
After the potential worker has flagged you, the program will flag the other potential workers as potential employees in the system as well.
When the software flags the other