In my experience, enforcing log-in for for this kind of consumer product done for the sake of security, rather than user hostility. Internet connected hardware on a home network is a very attractive attack vector, especially if commands are unauthenticated.
In my experience, my consumer products are significantly MORE secure when not requiring a log-in or in fact anything that requires any level of external network access to be facilitated or that mandates a requirement for personal or authentication related services to be hosted outside of my network, and that includes their applications. A potential avenue for security related incidents is now being forced upon users where previously it did not exist. Phillips can't leak my data due to incompetence when they don't have it, only now, they will.
This logic breaks down for hardware vendors don’t allow access to an underlying Linux system the IoT device is running on. The malware looks for easy targets to get root on - not so much turning on and off lights.
Yes, and the same goes for information about the WiFi network. Lots of apps for IoT devices require this information to set up products, but the OS presents this as location tracking.
Because several sources are claiming that Apple Music represents less than 1% of Apple's value or whatever. I guess what I'm wondering is if there is an app that would induce a company to cheat to try to juice it? Something like MS cheating with DOS and Windows to try to juice Excel vs Lotus?
Technically, it's not satellite, but aerial imagery from multiple angles. Geometry is reconstructed with pose estimation and SfM (the open source Ceres solver originated from this and other work).