Russians clone Macs again

 

A Russian start-up has started churning out cloned Macs in defiance of legal threats from Apple.

Apple has failed to gain any ground in Russia - perhaps because the pragmatic Russian market fails to see the point of not eating for a year to buy an MP3 player.

Historically the Soviet Union used a lot of Apple clones, machines manufactured in Bulgaria.

When the Berlin Wall fell, so did the Bulgarian economy and its light manufacturing industry. The cloned Apple Macs disappeared.

But the Russian Mac clone is back courtesy of RussianMac.

According to the company's website, RussianMac builds Mac clones that come with a full version of Mac OS X Leopard pre-installed. The company claims the system is advanced enough to fool Apple into sending it automatic software updates.

The computers are sold at 30-50 per cent of the price of a real Mac, the company said, but come with three to five year warranties and feature components from the likes of Intel, Asus and Gigabyte.

RussianMac claims that it does not violate the terms of Apple's licence agreement because it has bought the software legitimately from Apple.

At present, the company says, it cannot distribute its machines beyond the Russian border "because of difficult process related to customs." 

The company says it is "working hard on a solution" and is very interested in distributing its products to the wider European market.

theinquirer.net (c) 2010 Incisive Media


Russians clone Macs again
 
 
 
Top Stories
The ethics of security
[Blog post] Where did that zero-day go?
 
Rio Tinto's big data play delivers promised ore
Returns trickle in from long-term technology investment.
 
Time management tips for CIOs
[Blog post] How to get to the genba.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  10%
 
Denial of service attacks
  6%
 
Insider threats
  11%
TOTAL VOTES: 1149

Vote