I’ve created a roadmap for Take Me Home that outlines my plans for new features. Take Me Home is currently at 1.0.0, and I hope to release version 1.3 by the end of January. I’m going to do one feature at a time to get new features out as soon as possible, rather than have big releases with lots of time between them.
My first iPhone application is for sale! It’s called Take Me Home, and its sole utility is to create a map from your current location — automatically determined via GPS — to your saved home address, saving you clicks and providing convenience.
UPDATE: Google has released a version of Google Earth (including the plugin) without the self-updating feature.
The Mac blogs around the ‘net are all abuzz today about Google’s release of a Mac version of the Google Maps API, but I noticed something funny when I installed it. The plug-in is a standard Mac Internet Plug-In, meaning you can install it at either
/Library/Internet Plug-Ins or
~/Library/Internet Plug-Ins. So why does the install package prompt you for administrator credentials when you choose to install it into your home folder? The answer lives at
It turns out that when you install the plugin, the installer also installs a software update component, code-named “keystone.” It installs the following components:
- An application bundle at
- A “Ticket Store” at
/Library/Google/GoogleSoftwareUpdate/TicketStore/— does anyone know what this does? I sure don’t.
- A LaunchDaemon that runs as root on demand, at
- A LaunchAgent (
/Library/LaunchAgents/com.google.keystone.agent.plist) that runs when you’re logged in, presumably to fire up the daemon so you can receive updates without administrative privileges.
Interestingly enough, this software component is never mentioned by Google. It isn’t an option you can deselect in the installer. Even worse, the plugin’s uninstall instructions don’t say a thing about it. This means that after you follow the plugin uninstall instructions, your computer is still checking in with Google’s servers to make sure that it’s up-to-date. I’m reluctant to call this malware, but it sure seems like spyware, doesn’t it? At the very least the installer ought to mention something.
Be cautious when installing this plugin onto any computer where security is essential. Any software component that runs as root, such as the updater this installer installs, is another attack vector for intruders trying to get at your data.
For what it’s worth, the API plugin does work if you only copy the stuff in /Library/Internet Plug-Ins to a computer or to your user account, so it appears that you can still use the plugin in a secure environment, you’ll just have to update it yourself and not have Google do it for you.
I’ve also mentioned this on the official Google Group.
Here’s a quick tip that slipped through the blogosphere (at least none of the Mac blogs I subscribe to featured it): in Safari 3.2, released last week, Apple’s added a feature from Firefox 3’s “awesome bar”: when you’re on a secure website, such as a bank’s, that has identification information, it’s displayed in green (though in Safari it’s at the top-right of the title bar). A screenshot:
Along with a phishing filter, it looks like Safari is stepping up to the plate as a secure browser.
I’ve been busy, between wedding planning, work, and moving, but I’m back on the blogosphere!