- Jan 8, 2011
… claiming that he had been forced to do so after Apple carried out a “multi-step sting” operation. Whether this is true, or just a face-saving story for getting things wrong, it is broadly consistent with what we know about how Apple catches leakers.
Apple has so many methods of identifying leakers – some of them incredibly subtle – that we and others have to be extremely careful in order to protect our source.
In terms of how Apple catches leakers, these are just some of the ways we know or suspect the company uses.
- Invisible watermarks
- Serial numbers
- Non-subtle typeface changes
- Word or punctuation changes
- False information