Iphone

LG Might Sell iPhones In Its Stores After Quitting Android Devices (androidauthority.com) 20

LG will reportedly start selling iPhones and iPads in its South Korean stores this August -- mere months after the company quit making Android devices. Android Authority reports: According to MacRumors, the Herald Economic Daily claims LG has struck a deal with Apple to sell the iPhone and iPad in 400 stores across South Korea starting in August. LG may have to overcome some hurdles to make this happen. The company reportedly signed a "win-win" agreement with the country's National Mobile Communication Distribution Association that bars it from selling a direct competitor's phones in its stores. That deal was made in 2018, however, or well before LG signaled that it would quit making phones and tablets. LG is supposedly planning to renegotiate the agreement once it officially sells the iPhone and iPad in its shops. The deal unsurprisingly wouldn't include Macs, as systems like the MacBook Air compete directly with the Gram series and other LG computers where the iPhone and iPad are relatively safe.
Cellphones

Scientists Create the World's Toughest Self-Healing Material (interestingengineering.com) 19

An anonymous reader quotes a report from Interesting Engineering: [Researchers at the Indian Institute of Science Education and Research (IISER), Kolkata] along with those at the Indian Institute of Technology (IIT), Kharagpur decided to focus on developing something that is harder than conventional self-healing material, as reported by The Telegraph India. The researchers used a piezoelectric organic material, which converts mechanical energy to electrical energy and vice versa, to make needle-shaped crystals that aren't more than 2 mm long or 0.2 mm wide, according to the experimental results which were published in the journal Science. Due to their molecular arrangement in the specially designed crystals, a strong attractive force developed between two surfaces. Every time a fracture occurred, the attractive forces joined the pieces back again, without needing an external stimulus such as heat or others that most self-healing materials would need.

"Our self-healing material is 10 times harder than others, and it has a well-ordered internal crystalline structure, that is favored in most electronics and optical applications," lead researcher Professor Chilla Malla Reddy of IISER said. "I can imagine applications for an everyday device," said Bhanu Bhushan Khatua, a member of the team from IIT Kharagpur." Such materials could be used for mobile phone screens that will repair themselves if they fall and develop cracks."

Cellphones

iOS and Android Activations Now Split Evenly In the US, Research Shows (macrumors.com) 113

Activations of iOS and Android devices are now evenly split in the United States, with little sign of movement toward either platform dominating over the past two years, according to data sourced by Consumer Research Intelligence Partners (CIRP). MacRumors reports: CIRP estimates that iOS and Android each had 50 percent of new smartphone activations in the year ending this quarter. iOS's share of new smartphone activations climbed from 2017 to 2020, but has now remained at its peak level for a second consecutive year. CIRP Partner and Co-Founder Josh Lowitz said that the finding is significant because for several years, Android smartphones "had a significant edge, with over 60 percent of customers opting for an Android phone in most quarters. In the past couple of years, though, iOS has closed the gap, and now splits the market with Android."

Both Android and iOS users have had a high level of loyalty historically. Android loyalty has varied very slightly, in a narrow range of 90 to 93 percent in the past four years. iOS loyalty, on the other hand, has gradually increased over the past four years, from a low of 86 percent in early 2018 to 93 percent in the most recent quarter ending in June 2021. Loyalty and tendency to switch platforms may explain some of the change in the share of new smartphone activations, where iOS has gained loyalty in a market with a limited amount of switching.

Iphone

Despite the Hype, iPhone Security No Match For NSO Spyware (washingtonpost.com) 116

International investigation finds 23 Apple devices that were successfully hacked. From a report: The text delivered last month to the iPhone 11 of Claude Mangin, the French wife of a political activist jailed in Morocco, made no sound. It produced no image. It offered no warning of any kind as an iMessage from somebody she didn't know delivered malware directly onto her phone -- and past Apple's security systems. Once inside, the spyware, produced by Israel's NSO Group and licensed to one of its government clients, went to work, according to a forensic examination of her device by Amnesty International's Security Lab. It found that between October and June, her phone was hacked multiple times with Pegasus, NSO's signature surveillance tool, during a time when she was in France. The examination was unable to reveal what was collected. But the potential was vast: Pegasus can collect emails, call records, social media posts, user passwords, contact lists, pictures, videos, sound recordings and browsing histories, according to security researchers and NSO marketing materials.

The spyware can activate cameras or microphones to capture fresh images and recordings. It can listen to calls and voice mails. It can collect location logs of where a user has been and also determine where that user is now, along with data indicating whether the person is stationary or, if moving, in which direction. And all of this can happen without a user even touching her phone or knowing she has received a mysterious message from an unfamiliar person -- in Mangin's case, a Gmail user going by the name "linakeller2203." These kinds of "zero-click" attacks, as they are called within the surveillance industry, can work on even the newest generations of iPhones, after years of effort in which Apple attempted to close the door against unauthorized surveillance -- and built marketing campaigns on assertions that it offers better privacy and security than rivals.

[...] Researchers have documented iPhone infections with Pegasus dozens of times in recent years, challenging Apple's reputation for superior security when compared with its leading rivals, which run Android operating systems by Google. The months-long investigation by The Post and its partners found more evidence to fuel that debate. Amnesty's Security Lab examined 67 smartphones whose numbers were on the Forbidden Stories list and found forensic evidence of Pegasus infections or attempts at infections in 37. Of those, 34 were iPhones -- 23 that showed signs of a successful Pegasus infection and 11 that showed signs of attempted infection.

Cellphones

Investigation Reveals Widespread Cellphone Surveillance of the Innocent (theguardian.com) 184

Cellphones "can be transformed into surveillance devices," writes the Guardian, reporting startling new details about which innocent people are still being surveilled (as part of a collaborative reporting project with 16 other media outlets led by the French nonprofit Forbidden Stories).

Long-time Slashdot reader shanen shared the newspaper's critique of a "privatised government surveillance industry" that's made NSO a billion-dollar company, thanks to its phone-penetrating spy software Pegaus: [NSO] insists only carefully vetted government intelligence and law enforcement agencies can use Pegasus, and only to penetrate the phones of "legitimate criminal or terror group targets". Yet in the coming days the Guardian will be revealing the identities of many innocent people who have been identified as candidates for possible surveillance by NSO clients in a massive leak of data... The presence of their names on this list indicates the lengths to which governments may go to spy on critics, rivals and opponents.

First we reveal how journalists across the world were selected as potential targets by these clients prior to a possible hack using NSO surveillance tools. Over the coming week we will be revealing the identities of more people whose phone numbers appear in the leak. They include lawyers, human rights defenders, religious figures, academics, businesspeople, diplomats, senior government officials and heads of state. Our reporting is rooted in the public interest. We believe the public should know that NSO's technology is being abused by the governments who license and operate its spyware.

But we also believe it is in the public interest to reveal how governments look to spy on their citizens and how seemingly benign processes such as HLR lookups [which track the general locations of cellphone users] can be exploited in this environment.

It is not possible to know without forensic analysis whether the phone of someone whose number appears in the data was actually targeted by a government or whether it was successfully hacked with NSO's spyware. But when our technical partner, Amnesty International's Security Lab, conducted forensic analysis on dozens of iPhones that belonged to potential targets at the time they were selected, they found evidence of Pegasus activity in more than half.

The investigators say that potential targets included nearly 200 journalists around the world, including numerous reporters from CNN, the Associated Press, Voice of America, the New York Times, the Wall Street Journal, Bloomberg News, Le Monde in France, and even the editor of the Financial Times.

In addition, the investigators say they found evidence the Pegasus software had been installed on the phone of the fiancée of murdered Saudi journalist Jamal Khashoggi. NSO denies this to the Washington Post. But they also insist that they're simply licensing their software to clients, and their company "has no insight" into those clients' specific intelligence activities.

The Washington Post reports that Amnesty's Security Lab found evidence of Pegasus attacks on 37 of 67 smartphones from the list which they tested. But beyond that "for the remaining 30, the tests were inconclusive, in several cases because the phones had been replaced. Fifteen of the phones were Android devices, none of which showed evidence of successful infection. However, unlike iPhones, Androids do not log the kinds of information required for Amnesty's detective work."

Familiar privacy measures like strong passwords and encryption offer little help against Pegasus, which can attack phones without any warning to users. It can read anything on a device that a user can, while also stealing photos, recordings, location records, communications, passwords, call logs and social media posts. Spyware also can activate cameras and microphones for real-time surveillance.
Cellphones

Right-wing Activist's $500 'Freedom Phone' Actually Cheap Rebranded Android Model Made in China (gizmodo.com) 226

"This week, a 22-year-old self-described Bitcoin millionaire introduced the Freedom Phone, a $499 device meant to be completely free from 'Big Tech's' censorship and influence," reports PC Magazine.

"But it turns out the same smartphone is actually from China, and probably just a cheap knock-off." The Freedom Phone comes from Erik Finman, who unveiled the device earlier this week. He claims the product has everything Trump supporters could dream of, including an "uncensorable" app store, preinstalled conservative-friendly apps including Parler and Rumble, and even its own anti-surveillance operating system called FreedomOS... However, The Daily Beast noticed the Freedom Phone looks strikingly similar to a budget smartphone device from a Chinese vendor called Umidigi. The device is called the Umidigi A9 pro, and you can actually buy it over on the Chinese e-commerce site AliExpress starting at $119. Finman later told The Daily Beast that the Freedom Phone was indeed sourced from Umidigi, a company that's based in Shenzhen, China...

An uncensorable app store opens the door for hackers and shady developers to circulate malware and data-collecting programs to users. We're also doubtful Freedom Phone has its own operating system if it can run apps such as Parler and Rumble, in addition to Signal, Telegram and Brave

The Daily Beast adds this anecdote: The Freedom Phone's "Freedom OS" operating system is based on Google's Android operating system, according to Finman. But during a livestream video promoting the phone, right-wing activist Anna Khait was confused by her fans' basic questions about the phone. "Is it an Android?" Khait said. "I'm not really sure. No, it's a Freedom Phone."
Gizmodo calls the phone's web site "radically vague on the details." There is no information about the phone's operating system, storage, camera, CPU, or RAM capabilities. It has a list of features, but there are no actual details about them. Instead, under each feature, there's merely a "Buy it now" button which redirects you to the site's shopping cart. The phone's hefty price, combined with the company's total lack of transparency, is ridiculous — essentially asking the buyer to cough up half a grand in exchange for, uh, something...!
But Gizmodo also shares a philosophical thought: Before we get into the specifics of why this device probably sucks, let me just say that the desire to have a phone that is dedicated to protecting your autonomy and privacy is a reasonable one — and should be encouraged. That said, I don't think the Freedom Phone provides that. Actually, aside from its overt partisan bent, it's impossible to tell what kind of device this is because Finman and his acolytes haven't provided any information about it...

The funny thing is, if Trump voters are looking for a way to get off the "Big Tech" grid, there's no need for them to buy this sketchy shit. There are actually entire subcultures within the phone industry dedicated to escaping the Android/iOS paradigm. You can wade into the de-Googled phone sector, for instance — where Android phones are sold that have ostensibly been refurbished to rid the devices of code that will "send your personal data" back to the tech giant. There's also the Linux-based Pinephone, which sells at a fraction of the Freedom Phone's cost (between $150 and $200), and is a favorite of those in the privacy community. All of these come with caveats, obviously, but the point is that there are much more transparent and affordable options than the Freedom Phone...

It'd be nice if Americans could actually come together around the issue of privacy since it's an area where — regardless of political party — we're all collectively getting screwed.

Cellphones

China's Xiaomi Overtakes Apple In the Global Smartphone Market (cnbc.com) 26

Chinese smartphone maker Xiaomi was the second-largest smartphone maker in the second quarter, overtaking Apple, according to analyst firm Canalys. CNBC reports: Xiaomi had a 17% share of global smartphone shipments, ahead of Apple's 14% and behind Samsung's 19%. "Xiaomi is growing its overseas business rapidly," Canalys research manager Ben Stanton said in a press release, noting shipments increased 300% year on year in Latin America and 50% in Western Europe. The Chinese smartphone maker posted year-on-year smartphone shipment growth of 83% versus 15% for Samsung and 1% for Apple. Stanton noted, however, that Xiaomi phones are still skewed toward the mass market, with the average selling price of its handsets 75% cheaper than Apple's.
Cellphones

Ask Slashdot: How Secure Is a Cellphone's eSIM? (pcmag.com) 41

A few months ago PC Magazine explained eSIMs: You almost certainly have a SIM card: a thumbnail-sized chip that sits in your mobile phone, telling it which carrier and what phone number you use. Now those SIMs are going digital (or "e") and moving your information to a reprogrammable, embedded chip.

A SIM card is a "subscriber identity module." Required in all GSM, LTE, and 5G devices, it's a chip that holds your customer ID and details of how your phone can connect to its mobile network... An eSIM takes the circuitry of a SIM, solders it directly to a device's board, and makes it remotely reprogrammable through software... There are some minor consumer downsides, though. With eSIMs, it's harder to switch one plan between devices — you can't just swap the physical card around — and they can make it harder for you to temporarily remove your SIM if you don't want to be tracked by a carrier.

Google's Pixels have had eSIMs since 2017, and Apple's iPhones have had them since 2018...

Now let's see how long-time Slashdot reader shanen feels about them: Shopping for a new smartphone due to premature battery swelling of a cheapie, but surprised to find out I can't just plug the SIM into a new phone. There ain't no SIM here, but rather the dying phone has an eSIM.... Quick research indicated it's only software, so my obvious question is "How secure can an eSIM be?" (The obvious search results also fail to produce "fresh" results.)

But the black hats have already had a couple of years to work on the problem, and it seems intrinsically difficult to do anything securely if you're only using software. My probably obsolete understanding is that part of the basis of SIM security is that you'd have to destroy the SIM to save its data, but is there an actual security expert in the house?

Related question based on my surprise. How would you even know if you're using an eSIM? Especially since it appears to be possible to use an eSIM on a phone with a SIM.

Share your own thoughts and opinions in the comments.

How secure is an eSIM?
Cellphones

'We Got the Phone the FBI Secretly Sold to Criminals' (vice.com) 70

Motherboard bought an FBI "Anom" phone that the agency secretly sells to criminals to monitor their communications. Joseph Cox reports: The sleek, black phone seems perfectly normal. Unlocking the Google Pixel 4a with a PIN code reveals some common apps: Tinder, Instagram, Facebook, Netflix, and even Candy Crush. But none of those apps work, and tapping their icons doesn't do anything. Resetting the phone and typing in another PIN opens up an entirely different section of the device, with a new background and new apps. Now in place of the old apps sit a clock, a calculator, and the device's settings. Clicking the calculator doesn't open a calculator -- it opens a login screen.

"Enter Anom ID" and a password, the screen reads. Hidden in the calculator is a concealed messaging app called Anom, which last month we learned was an FBI honeypot. On Anom, criminals believed they could communicate securely, with the app encrypting their messages. They were wrong: an international group of law enforcement agencies including the FBI were monitoring their messages and announced hundreds of arrests last month. International authorities have held press conferences to tout the operation's success, but have provided few details on how the phones actually functioned.

Motherboard has obtained and analyzed an Anom phone from a source who unknowingly bought one on a classified ads site. On that site, the phone was advertised as just a cheap Android device. But when the person received it, they realized it wasn't an ordinary phone, and after being contacted by Motherboard, found that it contained the secret Anom app. When booting up the phone, it displays a logo for an operating system called "ArcaneOS." Very little information is publicly available on ArcaneOS. It's this detail that has helped lead several people who have ended up with Anom phones to realize something was unusual about their device. Most posts online discussing the operating system appear to be written by people who have recently inadvertently bought an Anom device, and found it doesn't work like an ordinary phone. After the FBI announced the Anom operation, some Anom users have scrambled to get rid of their device, including selling it to unsuspecting people online. The person Motherboard obtained the phone from was in Australia, where authorities initially spread the Anom devices as a pilot before expanding into other countries.

Wireless Networking

More Cellphone Data Use Is Negatively Affecting Wi-Fi Performance, Study Finds (uchicago.edu) 46

An anonymous reader shares the findings of a new study from the University of Chicago. From a report: If service becomes slow when you're trying to send a quick email on your smartphone, you might scroll through your network options and discover how many Wi-Fi networks there are. In fact, this plethora of options is itself the problem. These networks are in competition with one another, limiting the speed at which each can operate. University of Chicago researchers have demonstrated how this increased network competition could negatively impact internet service for everyday users.

When a cellular provider, such as T-Mobile or AT&T, licenses a spectrum band from the FCC, they reserve its exclusive use. As a result, networks operating on licensed bands experience little interference. This allows providers to establish fast and reliable service, but it comes at a cost. To improve bandwidth [to accommodate] more users] without breaking the bank, these providers have begun to also use the unlicensed spectrum via cellular networks using a mode called licensed assisted access (LAA), which operates on the same bands used for Wi-Fi. [The researchers] set out to examine how this shared use of the unlicensed spectrum, called coexistence, impacted both Wi-Fi and cellular users.

"We actually found an LAA station located on the UChicago campus, on a pole in front of the bookstore, and in this outside space campus Wi-Fi is also in use," [Monisha Ghosh, associate member in the Department of Computer Science at the University of Chicago and research professor in the Pritzker School of Molecular Engineering] said. "That provided an experimental platform in our backyard, so we started taking measurements." [...] By accessing multiple networks simultaneously, the group found that competition decreased performance -- reducing the amount of data transmitted, the speed of transmission, and the signal quality. This competition was particularly detrimental to Wi-Fi. When LAA was also in active use, data transmitted by Wi-Fi users decreased up to 97%. Conversely, LAA data only exhibited a 35% decrease when Wi-FI was also in use. Ghosh explained that the incompatibility between Wi-Fi and LAA owes in part to the different protocols each employs to deal with heavy internet traffic.
The researchers presented their findings in a paper via arXiv.
Cellphones

OnePlus 9 Benchmarks Deleted From Geekbench Over Cheating Allegations (androidauthority.com) 27

Popular benchmark site Geekbench has removed OnePlus 9 benchmarks from its charts due to allegations that the company designed Oxygen OS optimization tools in such a way that they could be viewed as cheating. Android Authority reports: Yesterday, AnandTech posted some information about "weird behavior" it spotted with the OnePlus 9 Pro. According to the team's research, Oxygen OS apparently limits the performance of some popular Android apps -- but none of those apps are benchmark suites. Geekbench, one of the more popular benchmarking sites, took these allegations seriously. After conducting its own investigation, Geekbench recently announced that it has removed all OnePlus 9 benchmarks from its charts. Geekbench, one of the more popular benchmarking sites, took these allegations seriously. After conducting its own investigation, Geekbench recently announced that it has removed all OnePlus 9 benchmarks from its charts. Geekbench called Oxygen OS's behavior a form of "benchmark manipulation." OnePlus has yet to issue a statement on the matter. In some of our own testing, we found that AnandTech's data is on the mark. We found that the OnePlus 9 series limits the performance of Google Chrome while older OnePlus phones do not. OnePlus issued a statement to Android Authority addressing the matter: "Our top priority is always delivering a great user experience with our products, based in part on acting quickly on important user feedback. Following the launch of the OnePlus 9 and 9 Pro in March, some users told us about some areas where we could improve the devices' battery life and heat management. As a result of this feedback, our R&D team has been working over the past few months to optimize the devices' performance when using many of the most popular apps, including Chrome, by matching the app's processor requirements with the most appropriate power. This has helped to provide a smooth experience while reducing power consumption. While this may impact the devices' performance in some benchmarking apps, our focus as always is to do what we can to improve the performance of the device for our users."

This is reminiscent of when the company was caught pushing the OnePlus 5's performance capabilities when the OS detected a benchmark app. This resulted in artificially inflated scores that users would not see during real-world usage.
Android

OnePlus Commits To 3 Years of Android Updates By Merging OxygenOS With Oppo's ColorOS (theverge.com) 35

Last month, it was revealed that OnePlus will become an Oppo sub-brand. Now, the company announced that it's also merging OxygenOS with Oppo's ColorOS operating system. 9to5Google reports: In a forum post today, OnePlus explains that the sub-brand of Oppo is "working on integrating the codebase of OxygenOS and ColorOS." Apparently, the change will go unnoticed because it is happening behind the scenes: "This is a change that you will likely not even notice since it's happening behind the scenes. We now have a larger and even more capable team of developers, more advanced R&D resources, and a more streamlined development process all coming together to improve the OxygenOS experience."

OnePlus also further reiterates that OxygenOS will remain the "global" operating system for OnePlus-branded devices rather than ColorOS, which runs on Oppo devices and OnePlus devices in China, too. It's not mentioned if OxygenOS will change visually, but it's fairly clear that will happen based on early looks at the Android 12 Beta which is available for OnePlus 9 devices. The bright side of this change, however, is that OnePlus will be committing to a stronger Android update schedule that delivers at least three years of support to the company's entire portfolio.

Advertising

Carrier Caught Injecting 'SMS AD' Into Google Verification Code Message (9to5google.com) 63

An anonymous reader quotes a report from 9to5Google: SMS is widely regarded as an insecure form of two-factor authentication, and another example of this has just emerged. A carrier looks to be injecting ads into the Google verification code used to sign in to services like Gmail. Action Launcher developer Chris Lacy today tweeted how his Google verification code -- which starts with "G-" -- featured an "SMS AD." The advertisement -- for a VPN -- includes a quick message and short URL. For those that immediately suspect this is just a phishing attempt, the verification code is legitimate and was requested by Lacy to successfully verify a login attempt. Google Messages even flagged the link/message as spam. As such, Googlers responding to the thread suspect this is an occurrence of a carrier appending an ad -- note the extra spaces -- into a real text message. It's very unlikely that Google's security teams would allow advertising into a very crucial part of the login process where end user trust is paramount.

Google issued the following statement to us today: "These are not our ads and we are currently working with the wireless carrier to understand why this happened." Google confirms that the "SMS AD" did not originate from its own advertising network. Meanwhile, it's working with the wireless carrier in question to find out what occurred. Lacy has decided "not to state the carrier for privacy reasons," and Google did not share that information either.

Wireless Networking

United's Latest Jets Will Offer Bluetooth For In-Flight Entertainment (theverge.com) 117

An anonymous reader quotes a report from The Verge: United Airlines is adding a long-awaited feature to the in-flight entertainment seatback screens of its new Boeing 737 Max 8 jets -- support for Bluetooth headphones. The company is making the upgrade as part of "United Next," a new plan to expand and modernize its fleet with what it says are larger, fuel-efficient jets and a more comfortable in-flight experience. Adding seatback screens made a huge difference in how tolerable flying is, but it's been held up by lagging audio support that The Verge has even written a guide to getting around. And this isn't a problem unique to United. Other airlines like Delta or JetBlue have been offering seatback screens for years, but have also saddled flyers with analog audio. United just might be one of the first airlines to start the next wave of inflight entertainment improvements (hopefully).

However, there's room for things to go a bit sideways. As part of its upgrades, United's new 737 Max 8 jets offer 10 or 13-inch inflight entertainment screens on the backs of all seats, which might mean a lot of people trying to connect to Bluetooth at once. That could cause interference, and might also make the process of connecting your headphones more of a chore if you're having to hunt through multiple devices trying to pair in the same menu. United currently only offers Bluetooth on its Max 8 jets which it says should start flying this summer. The company didn't share how it plans to address issues with Bluetooth, but said it's still "studying the technology."

Electronic Frontier Foundation

'Golden Age of Surveillance', as Police Make 112,000 Data Requests in 6 Months (newportri.com) 98

"When U.S. law enforcement officials need to cast a wide net for information, they're increasingly turning to the vast digital ponds of personal data created by Big Tech companies via the devices and online services that have hooked billions of people around the world," reports the Associated Press: Data compiled by four of the biggest tech companies shows that law enforcement requests for user information — phone calls, emails, texts, photos, shopping histories, driving routes and more — have more than tripled in the U.S. since 2015. Police are also increasingly savvy about covering their tracks so as not to alert suspects of their interest... In just the first half of 2020 — the most recent data available — Apple, Google, Facebook and Microsoft together fielded more than 112,000 data requests from local, state and federal officials. The companies agreed to hand over some data in 85% of those cases. Facebook, including its Instagram service, accounted for the largest number of disclosures.

Consider Newport, a coastal city of 24,000 residents that attracts a flood of summer tourists. Fewer than 100 officers patrol the city — but they make multiple requests a week for online data from tech companies. That's because most crimes — from larceny and financial scams to a recent fatal house party stabbing at a vacation rental booked online — can be at least partly traced on the internet. Tech providers, especially social media platforms, offer a "treasure trove of information" that can help solve them, said Lt. Robert Salter, a supervising police detective in Newport.

"Everything happens on Facebook," Salter said. "The amount of information you can get from people's conversations online — it's insane."

As ordinary people have become increasingly dependent on Big Tech services to help manage their lives, American law enforcement officials have grown far more savvy about technology than they were five or six years ago, said Cindy Cohn, executive director of the Electronic Frontier Foundation, a digital rights group. That's created what Cohn calls "the golden age of government surveillance." Not only has it become far easier for police to trace the online trails left by suspects, they can also frequently hide their requests by obtaining gag orders from judges and magistrates. Those orders block Big Tech companies from notifying the target of a subpoena or warrant of law enforcement's interest in their information — contrary to the companies' stated policies...

Nearly all big tech companies — from Amazon to rental sites like Airbnb, ride-hailing services like Uber and Lyft and service providers like Verizon — now have teams to respond...

Cohn says American law is still premised on the outdated idea that valuable data is stored at home — and can thus be protected by precluding home searches without a warrant. At the very least, Cohn suggests more tech companies should be using encryption technology to protect data access without the user's key.

But Newport supervising police detective Lt. Robert Salter supplied his own answer for people worried about how police officers are requesting more and more data. "Don't commit crimes and don't use your computer and phones to do it."
Technology

Half the World Now Owns a Smartphone (strategyanalytics.com) 43

According to new research from Strategy Analytics, half the world's entire population now owns a smartphone in June 2021. Some 4 billion people use a smartphone today. It has taken 27 years to reach this historic milestone. From a report: Yiwen Wu, Senior Analyst at Strategy Analytics, said, "We estimate the global smartphone user base has risen dramatically from just 30k people in 1994 to 1.00 billion in 2012, and a record 3.95 billion today in June 2021. With an estimated 7.90 billion people in total on the planet in June 2021, it means 50% of the whole world now owns a smartphone. It has taken 27 years to reach this historic milestone."
Wireless Networking

London Underground To Gain Full Mobile Phone Coverage By 2024 (macrumors.com) 42

London Underground passengers will be able to get mobile coverage across the rail network by the end of 2024, it has been announced. MacRumors reports: In a press release, Transport for London (TfL) said the capital's Oxford Circus, Tottenham Court Road and Bank stations would be among the first fully connected stations by the end of the year, followed by Tottenham Court Road, Euston, and Camden Town by the end of 2022. Mobile reception was introduced on the eastern half of the Jubilee line in March last year. TfL says the additional infrastructure will support 5G as well as 4G, but that it will be the responsibility of mobile operators to offer support for the fastest network speeds.

TfL is partnering with BAI Communications (BAI), a global provider of 4G and 5G connected infrastructure, to plug so-called coverage "not-spots" in the underground network. The over 1,242 miles of fibre cabling installed in London Underground tunnels will also benefit above-ground coverage for buildings and other infrastructure by allowing more mobile transmitters to be installed.

Medicine

Pakistan Province May Block SIM Cards of Citizens Who Didn't Get Covid-19 Vaccines (msn.com) 70

The government in Pakistan's largest province, Punjab, has decided to block SIM cards of unvaccinated citizens, reports the Hindustan Times (one of the largest newspapers in India), citing reports from news agency ANI.
Dr. Rashid, the provincial health minister in Pakistan's Punjab, said that there has been a "considerable decrease" in Covid-19 cases in the province due to mass vaccinations. However, a report compiled by the Punjab primary health department shows that the province still failed to achieve its set target for Covid-19 vaccination, reports ARY News, adding that around 300,000 recipients of the first dose of the vaccine never returned for the second dose since the start of Pakistan's mass inoculation drive on February 2.
Iphone

Apple Repair Tech Posted Woman's Explicit iPhone Photos to Facebook (msn.com) 157

"Apple paid a multimillion dollar settlement to a woman after iPhone repair techs posted risque pictures from her phone to Facebook," reports the Washington Post, citing legal documents obtained by the Telegraph.

An unnamed Oregon college student "sent her phone to Apple for repairs after it stopped working" in 2016, and the iPhone ended up at Apple-approved repair contractor Pegatron... Two iPhone repair technicians in Sacramento, uploaded "10 photos of her in various stages of undress and a sex video" to her Facebook account, resulting in "severe emotional distress" for the young woman, according to the Telegraph's review of legal records. Pegatron, a major Apple manufacturer with facilities across the globe, had to reimburse Apple for the settlement and face insurers who didn't want to pay for it, according to the news outlet...

The settlement isn't the first time Apple has had to handle the misdeeds of employees. In 2019, a California woman alleged that an Apple store employee had texted a private picture on her phone to himself. That employee was no longer working for the company after Apple conducted its investigation. Apple store employees at a Brisbane, Australia, location were fired in 2016 for taking candid pictures of female employees and customers' bodies and stealing photos from consumers' phones to rank their bodies.

"Apple keeps a firm grip on the repair of its devices, arguing that allowing only approved retailers and vendors to repair its products ensures the privacy of its customers," the article points out.

"The revelation of the lawsuit pokes holes in the company's stance that only authorized retailers can keep customer information secure."
IOS

Apple Admits It Ranked Its Files App Ahead of Competitor Dropbox (theverge.com) 68

During the Epic v. Apple trial, an email chain surfaced that reveals Apple seemingly admitted "it manually boosted the ranking of its own Files app ahead of the competition for 11 entire months," reports The Verge. This comes after two monstrous reports by The Wall Street Journal and The New York Times showed Apple's App Store clearly and consistently ranking its own apps ahead of competitors. Apple claimed it had done nothing wrong. The Verge reports: "We are removing the manual boost and the search results should be more relevant now," wrote Apple app search lead Debankur Naskar, after the company was confronted by Epic Games CEO Tim Sweeney over Apple's Files app showing up first when searching for Dropbox. "Dropbox wasn't even visible on the first page [of search results]," Sweeney wrote. As you'll see, Naskar suggested that Files had been intentionally boosted for that exact search result during the "last WWDC." That would have been WWDC 2017, nearly a year earlier, when the Files apps first debuted. The email chain actually reflects fairly well on Apple overall. Apple's Matt Fischer (VP of the App Store) clearly objects to the idea at first. "[W]ho green lit putting the Files app above Dropbox in organic search results? I didn't know we did that, and I don't think we should," he says. But he does end the conversation with "In the future, I want any similar requests to come to me for review/approval," suggesting that he's not entirely ruling out manual overrides.

But Apple tells The Verge that what we think we're seeing in these emails isn't quite accurate. While Apple didn't challenge the idea that Files was unfairly ranked over Dropbox, the company says the reality was a simple mistake: the Files app had a Dropbox integration, so Apple put "Dropbox" into the app's metadata, and it was automatically ranked higher for "Dropbox" searches as a result. I'm slightly skeptical of that explanation -- partially because it doesn't line up with what Naskar suggests in the email, partially because Apple also told me it immediately fixed the error (despite it apparently continuing to exist for 11 months, hardly immediate), and partially because the company repeatedly ignored my questions about whether this has ever happened with other apps before. The most Apple would tell me is that it didn't manually boost Files over competitors, and that "we do not advantage our apps over those of any developer or competitor" as a general rule.

Privacy

Apple Wallet Will Support IDs and Driver's Licenses In iOS 15 (appleinsider.com) 64

At WWDC today, Apple announced an update to its Wallet app that will let you add information from an ID card in certain supported U.S. states. One of the first partners to support the digital identities will be the U.S. Transportation Security Administration. AppleInsider reports: All of the information in Wallet will be stored in a secure and encrypted fashion. Like an actual ID, it will include a person's legal name, date of birth, photo, and Real ID status. In addition to the support for IDs, Apple is also expanding the types of keys that users can add to Wallet. That includes keys to a smart home lock, keys to hotel rooms, and work badges that can be scanned to gain entry to a workplace. For example, Hyatt is rolling out its support for digital keys in Wallet to more than 1,000 properties later in 2021. The company says your license or state ID will be encrypted and stored in the iPhone's secure enclave. It's also working on adding features for unlocking cars from various manufacturers using their ultra-wideband chip (UWB) found in the new iPhones and Apple Watches.
Iphone

Is Apple's App Store Teeming With Scams? (adn.com) 130

"Apple's tightly controlled App Store is teeming with scams," argues a 3,000-word exposé in Sunday's Washington Post

"Among the 1.8 million apps on the App Store, scams are hiding in plain sight. Customers for several VPN apps, which allegedly protect users' data, complained in Apple App Store reviews that the apps told users their devices have been infected by a virus to dupe them into downloading and paying for software they don't need. A QR code reader app that remains on the store tricks customers into paying $4.99 a week for a service that is now included in the camera app of the iPhone. Some apps fraudulently present themselves as being from major brands such as Amazon and Samsung. Of the highest 1,000 grossing apps on the App Store, nearly two percent are scams, according to an analysis by The Washington Post. And those apps have bilked consumers out of an estimated $48 million during the time they've been on the App Store, according to market research firm Appfigures.

The scale of the problem has never before been reported. What's more, Apple profits from these apps because it takes a cut of up to a 30 percent of all revenue generated through the App Store.

Even more common, according to The Post's analysis, are "fleeceware" apps that use inauthentic customer reviews to move up in the App Store rankings and give apps a sense of legitimacy to convince customers to pay higher prices for a service usually offered elsewhere with higher legitimate customer reviews...

Apple has long maintained that its exclusive control of the App Store is essential to protecting customers, and it only lets the best apps on its system. But Apple's monopoly over how consumers access apps on iPhones can actually create an environment that gives customers a false sense of safety, according to experts... Apple isn't the only company that struggles with this issue: They're also on Google's Play Store, which is available on its Android mobile operating system. But unlike Apple, Google doesn't claim that its Play Store is curated. Consumers can download apps from different stores on Android phones, creating competition between app stores...

When it comes to one type of scam, there's evidence that Apple's store is no safer than Google's. Avast analyzed both the Apple and Google app stores in March, looking for fleeceware apps. The company found 134 in the App Store and 70 on the Play Store, with over a billion downloads, about half on Android and half on iOS, and revenue of $365 million on Apple and $38.5 million on Android. Most the victims were in the United States.

Cellphones

Walmart Will Give 740,000 Employees a Free Smartphone (cbsnews.com) 116

"Walmart will give 740,000 employees free Samsung smartphones by the end of the year," reports CBS News, "so they can use a new app to manage schedules, the company announced Thursday." The phone, the Samsung Galaxy XCover Pro, can also be used for personal use, and the company will provide free cases and protection plans. The phone's retail price is currently $499... Up until now, associates at Walmart stores used handheld devices they shared to communicate, but an initial test with employee smartphones was received well and will now be expanded upon, Walmart said...

The company promised that it would not have access to any employee's personal data and can "use the smartphone as their own personal device if they want, with all the features and privacy they're used to." The test will be expanded by the end of the year, Walmart said.

Earlier this year, Walmart announced pay increases for nearly a third of its U.S. workforce of 1.6 million. In February, digital and store workers saw their starting hourly rates increase from $13 to $19 depending on their location and market.

Cellphones

Apple's MagSafe Devices May Affect Pacemakers (appleinsider.com) 15

The American Heart Association is a research-funding nonprofit. One of its publications, The Journal of the American Heart Association, "has concurred with a previous report by the Heart Rhythm Journal which said close contact with an iPhone 12 affected certain implantable cardiac devices," writes Apple Insider. As with that report, the American Heart Association says the effect are solely when the iPhone is on or very near the implant... "Our study demonstrates that magnet reversion mode may be triggered when the iPhone 12 Pro Max is placed directly on the skin over an implantable cardiac device and thus has the potential to inhibit lifesaving therapies," say the report writers in the Journal of the American Heart Association. The testing involved placing the iPhone 12 Pro Max in very close proximity to a series of 11 different pacemakers and defibrillators... The degree of interference did vary across the testing, but all devices were affected. The report says that "the iPhone 12 Pro Max was able to trigger magnetic reversion mode at a distance up to 1.5cm [0.6 inches]."

"Apple Inc, has an advisory stating that the newer generation iPhone 12 does not pose a greater risk for magnet interference when compared to the older generation iPhones," notes the report. "However, our study suggests otherwise as magnet response was demonstrated in 3/3 cases in vivo..."

In January 2021, Apple updated its MagSafe support document to recommend that users keep the iPhone 12 six inches away from any medical implants.

Iphone

How Steve Jobs Wrote 'the Most Important Email in the History of Business' (inc.com) 88

A new column in Inc. argues that 14 years ago, Steve Jobs sent the most important email in the history of business — a one-sentence email to Bertrand Serlet, the company's senior vice president of Software Engineering, that's just recently been made public (through Apple's trial with Epic): It reveals a conversation about the things Apple needs to be able to accomplish in order to allow third-party apps on the iPhone. Until that point, the iPhone only ran 16 apps pre-installed on every device. Jobs had famously said told developers that if they wanted to create apps for the iPhone, they could make web apps that ran in Safari... Except web apps aren't the same as native apps, and users immediately set about finding ways to jailbreak their devices in order to get apps on them.

Apple had really no choice but to find a way to make it possible to develop apps through some kind of official SDK. Serlet lays out a series of considerations about protecting users, creating a development platform, and ensuring that the APIs needed are sustainable and documented. The list only has 4 things, but the point Serlet is trying to make is that it is important to Apple to "do it right this time, rather than rush a half-cooked story with no real support."

Steve Jobs' reply was only one sentence long: "Sure, as long as we can roll it all out at Macworld on Jan 15, 2008."

That's it. That's the entire response.

Serlet's email is dated October 2, 2007. That means Jobs was giving him just over three months... Three months to do what the software engineer no doubt believed were critical steps if Apple was going to support apps on a platform that would eventually grow to over 1 billion devices worldwide and become one of the most valuable businesses of all time. As if that wasn't enough pressure, two weeks later, on October 17, Jobs publicly told developers that there would be an SDK available by February of 2008. It turns out it would actually be made available in March, and the App Store would launch later in July of that year.

At the time, Apple's market cap was around $150 billion. Today, it's more than $2 trillion, largely based on the success of the iPhone, which is based — at least in part — on the success of the App Store. For that reason alone, I think it's fair to say — in hindsight — that one-sentence reply has no doubt proven to be the most important email in the history of business.

Cellphones

Carriers Agree To Start Sharing Vertical Location Data For 911 Calls (xda-developers.com) 23

The three major carriers in the U.S. have now agreed to start providing vertical location data for 911 calls, which will help first responders quickly locate 911 callers in multi-story buildings. XDA Developers reports: The FCC wrote in its announcement, "FCC Acting Chairwoman Jessica Rosenworcel today announced breakthrough agreements with America's three largest mobile phone providers to start delivering vertical location information in connection with 911 calls nationwide in the coming days. This information will help first responders quickly locate 911 callers in multi-story buildings, which will reduce response times and ultimately save lives."

The FCC first announced in 2015 that carriers would be required to start sharing vertical location data. The original deadline was June 2nd, 2021, but AT&T, T-Mobile, and Verizon wanted an 18-month extension (allegedly due to issues testing the functionality during the COVID-19 pandemic). With the deadline rapidly approaching, the FCC began an investigation in April to find out what was taking carriers so long. All three major carriers have now agreed to start providing vertical location data to 911 call centers within the next seven days, and each company will pay a $100,000 settlement. The agreement also increases the scope of the vertical location data; instead of the data only being provided in select areas, vertical location information will be provided by carriers across the entire United States. However, it will likely take longer than a week for the vertical data to be used in most 9-1-1 call centers, as the change will require updated software and (possibly) additional training for emergency dispatchers.

Wireless Networking

Samsung Will Shut Down the v1 SmartThings Hub This Month (arstechnica.com) 86

Samsung is killing the first-generation SmartThings Hub at the end of the month, kicking off phase two of its plan to shut down the SmartThings ecosystem and force users over to in-house Samsung infrastructure. "Phase one was in October, when Samsung killed the Classic SmartThings app and replaced it with a byzantine disaster of an app that it developed in house," writes Ars Technica's Ron Amadeo. "Phase three will see the shutdown of the SmartThings Groovy IDE, an excellent feature that lets members of the community develop SmartThings device handlers and complicated automation apps." From the report: The SmartThings Hub is basically a Wi-Fi access point -- but for your smart home stuff instead of your phones and laptops. Instead of Wi-Fi, SmartThings is the access point for a Zigbee and Z-Wave network, two ultra low-power mesh networks used by smart home devices. [...] The Hub connects your smart home network to the Internet, giving you access to a control app and connecting to other services like your favorite voice assistant. You might think that killing the old Hub could be a ploy to sell more hardware, but Samsung -- a hardware company -- is actually no longer interested in making SmartThings hardware. The company passed manufacturing for the latest "SmartThings Hub (v3)" to German Internet-of-things company Aeotec. The new Hub is normally $125, but Samsung is offering existing users a dirt-cheat $35 upgrade price.

For users who have to buy a new hub, migrating between hubs in the SmartThings ecosystem is a nightmare. Samsung doesn't provide any kind of migration program, so you have to unpair every single individual smart device from your old hub to pair it to the new one. This means you'll need to perform some kind of task on every light switch, bulb, outlet, and sensor, and you'll have to do the same for any other smart thing you've bought over the years. Doing this on each device is a hassle that usually involves finding the manual to look up the secret "exclusion" input, which is often some arcane Konami code. Picture holding the top button on a paddle light for seven seconds until a status light starts blinking and then opening up the SmartThings app to unpair it. Samsung is also killing the "SmartThings Link for Nvidia Shield" dongle, which let users turn Android TV devices into SmartThings Hubs.

Iphone

New Study Backs Up Finding That MagSafe Can Interfere With Medical Devices (gizmodo.com) 63

Back in January, researchers warned that the iPhone 12 lineup and MagSafe accessories could potentially deactivate implanted medical devices. Now, the American Heart Association has released a study that corroborates these findings on a larger scale, noting that several devices from three major companies were "found to have magnetic susceptibility." Gizmodo reports: The initial study published in HeartRhythm was done on a single patient with a Medtronic implantable cardioverter-defibrillator (ICD). It was an important finding in terms of awareness, but raised questions as to whether this would impact ICDs from all device makers if the iPhone 12 lineup posed a greater risk than other magnetized devices, and what the impact on pacemakers might be. The AHA's study offers a few preliminary insights into what those answers might be. In the study, researchers observed the impact of an iPhone 12 Pro Max on both ICDs and pacemakers from multiple device makers, as well as conducted both in vivo and ex vivo tests. In vivo refers to tests done on actual patients with an implanted medical device, while the ex vivo tests were done on 11 unboxed devices. The devices tested came from Medtronic, Abbot, and Boston Scientific. (You can see exactly which ICDs and pacemakers were tested in the study itself.)

In 100% of the three in vivo tests, the iPhone 12 Pro Max triggered the devices' magnet reversion mode. That said, the Boston Scientific pacemaker was found to be less susceptible as it only triggered a temporary response. In ex vivo testing, magnetic interference was detected in 8 out of 11 devices, or 72.7%. There are a few things to note here. How seriously a device is impacted may depend on the sensors or components used. The study notes that magnetic interference can occur when medical devices are exposed to magnetic fields as little as 10G. According to the researchers, the iPhone 12 Pro Max has a magnetic field strength of over 50G. However, the ex vivo devices tested didn't respond uniformly. Some were only temporarily disrupted, others had sustained asynchronous pacing, and three weren't impacted at all. The researchers suggest that in the case of a Boston Scientific Accolade MRI pacemaker, the device may not have been affected because it requires a magnet stronger than 70G.
After the HeartRhythm study was published, Apple issued additional guidance urging consumers with implanted medical devices to keep iPhone 12 devices more than 6 inches away, or more than 12 inches if wirelessly charging. It also recommended those people consult with both their physician and device manufacturer.
Cellphones

Man Dies Inside Spanish Dinosaur Statue After Trying To Retrieve His Phone (theguardian.com) 215

According to The Guardian, a man in Catalonia died after becoming trapped inside a large dinosaur statue while trying to retrieve his smartphone. From the report: Officers were called to the statue in Santa Coloma de Gramenet, a satellite town of Barcelona, after a man and his son noticed something inside the papier-mache stegosaurus on Saturday afternoon. A spokeswoman for the regional police force, the Mossos d'Esquadra, said the death of the 39-year-old man was not being treated as suspicious.

"A father and son noticed that there was something inside and raised the alarm," she said. "We found the body of a man inside the leg of this dinosaur statue. It's an accidental death; there was no violence. This person got inside the statue's leg and got trapped. It looks as though he was trying to retrieve a mobile phone, which he'd dropped. It looks like he entered the statue head first and couldn't get out." "We're still waiting for the autopsy results, so we don't know how long he was in there, but it seems he was there for a couple of days," she added.
Slashdot reader shanen submitted this story with the following commentary: Not sure what the technology link is. Smartphones make people stupid? Dinosaurs are scientific, but this is ridiculous? It would be funny, but it's too gruesome. But I guess I'll go ahead and submit it in the Darwin Awards category. Maybe a better title is man kills himself with dinosaur and smartphone? Death by paper mache?
Cellphones

How Samsung 'Ruined' iFixit's Upcycling Program (arstechnica.com) 24

Last week, Kevin Purdy of iFixit published a blog post telling the story of "how Samsung announced a 'revolutionary' upcycling program in 2017, delayed it for years, and eventually gutted it before shipping a pale imitation of the original idea," reports Ars Technica. "iFixit was actually involved in the initial 2017 announcement, and the repair outfit says that after endorsing the original idea with its brand and stamp of approval, Samsung never delivered on its promises." From the report: Despite the 2017 announcement of an upcycling program, the code didn't ship until April 2021, when Samsung finally launched a beta version of "Galaxy Upcycling at Home." This program lets users turn end-of-life Samsung phones into smart home sensors that could be paired with Samsung's SmartThings ecosystem. iFixit was initially given an inside look at the project back in 2017, liking it so much that it endorsed the project and lent its name to the marketing materials. To hear iFixit tell the story, bootloader unlocking was actually the original plan. Samsung was going to let users replace the shipping Android OS with whatever they wanted, like builds of LineageOS or some other custom OS. Samsung was also going to launch an open source marketplace where users could submit ideas and software for repurposing old Galaxy devices. iFixit called the original plan "novel" and "revolutionary."

"We were so excited," iFixit writes, "that when Samsung asked us to help launch the product in the fall of 2017, we jumped at the chance. You'll see iFixit's name and logo all over Samsung's original Galaxy Upcycling materials." iFixit went to Samsung HQ in South Korea to see prototypes of the project, and after testing working software, iFixit CEO Kyle Wiens actually helped announce the project on stage at Samsung's developer conference in 2017. Despite all the pomp and circumstance, iFixit says, "The actual software was never posted. The Samsung team eventually stopped returning our emails. Friends inside the company told us that leadership wasn't excited about a project that didn't have a clear product tie-in or revenue plan."

iFixit calls the version of the program that launched in April "nearly unrecognizable" to what it originally endorsed. What used to be an ambitious plan now barely makes any sense financially. iFixit rightfully points out that if you really want something as simple as a light sensor or sound monitor, at this point you're better off selling the phone and buying a purpose-built sensor. Samsung's on-rails functionality is so simple that it can be replicated by a $30 sensor, and you're sure to get more than that from a working device on the secondary market, especially due to another limitation of the program: it only extends back to the 3-year-old Galaxy S9.

Communications

US-Backed Consortium Beats China's for Massive 5G Contract Blanketing Ethiopia (livemint.com) 87

"A U.S.-backed consortium beat out one financed by China in a closely watched telecommunications auction in Ethiopia — handing Washington a victory in its push to challenge Beijing's economic influence around the world," reports the Wall Street Journal: The East African country said Saturday it tapped a group of telecommunications companies led by the U.K.'s Vodafone Group PLC to build a nationwide, 5G-capable wireless network.

The group had won financial backing for the multibillion-dollar project from a newly created U.S. foreign-aid agency. The agency offers low-interest loans, but the financing comes with a condition: the money won't be used to buy telecom equipment from China's Huawei Technologies Co. and ZTE Corp. Washington considers both a spying threat, an accusation the companies deny...

The telecom license auction in Ethiopia took on wider geopolitical significance amid heightened competition between the U.S. and China over key technological pursuits, from the rollout of 5G to chip manufacturing. "The U.S. and China are fighting a proxy war in Ethiopia for influence," said Zemedeneh Negatu, chairman of Fairfax Africa Fund LLC, a U.S.-based investment firm that focuses on Africa. After all but shutting out Huawei in the U.S., Washington has become more assertive about challenging Beijing's economic footprint overseas. It is using new financial tools to win influence and ensure that strategic assets in foreign countries stay in friendly hands...

Backing the Vodafone bid was the International Development Finance Corp., or DFC. The U.S. government-funded agency was created in December 2019 with a goal of offering alternatives to cheap, Chinese financing for foreign infrastructure projects... U.S. law also prohibits its loan from being used to buy Huawei or ZTE equipment, though one person familiar with the matter said it is possible the Vodafone-led bid could still buy some Chinese gear because of the project's size and cost.

Wireless Networking

Weak Wi-Fi Password May Have Led UK Police to Bust an Innocent Couple (bbc.co.uk) 109

Slashdot reader esm88 shares the BBC's story about a couple who experienced "a knock on the door from the police" investigating child abuse images posted online. "The couple insisted they had nothing to do with it. But the next few months were 'utter hell' as they attempted to clear their names," before their case was finally dropped in March: In February, a conversation with a friend who worked in cyber-security alerted them to the possibility that their router, supplied by their broadband provider Vodafone, might hold clues to what had happened. They had not changed the default passwords for either the router itself or the admin webpage, leaving it susceptible to brute force attacks. "We think of ourselves as competent users but we are not IT experts," said Matthew. "No-one told us to change the password and the setting up of the router didn't require us to go on to the admin menu, so we didn't.

"It came with a password, so we plugged it in and didn't touch anything."

Ken Munro, a security consultant with Pen Test Partners, told the BBC that it can take "a matter of minutes" for criminals to piggyback on insecure wireless connections... "So what I guess has happened here, is that the hacker has cracked the wi-fi password and then made changes to the router configuration, so their illicit activities on the internet appear to be coming from the innocent party." In March, when the couple's devices were returned and the case closed, the police officer assigned to liaise with them seemed to corroborate that unauthorised use of their wi-fi was to blame. But it couldn't be proved... The problem is industry-wide, points out Mr Munro.

"Internet service providers have started to improve matters to make these attacks harder, by putting unique passwords on each router. However, it will take years for all of the offending routers to be replaced," he said.

Operating Systems

Google and Samsung Are Merging Wear OS and Tizen (theverge.com) 44

Today, Google and Samsung announced that they are merging Wear OS and Tizen in an effort to better compete against Apple's watchOS. "The resulting platform is currently being referred to simply as 'Wear,' though that might not be the final name," notes The Verge. From the report: Benefits of the joint effort include significant improvements to battery life, 30 percent faster loading times for apps, and smoother animations. It also simplifies life for developers and will create one central smartwatch OS for the Android platform. Google is also promising a greater selection of apps and watch faces than ever before. "All device makers will be able to add a customized user experience on top of the platform, and developers will be able to use the Android tools they already know and love to build for one platform and ecosystem," Google's Bjorn Kilburn wrote in a blog post.

Wired has more details on what's to come, including the tidbit that Samsung will stick with its popular rotating bezel on future devices -- but it's finished making Tizen-only smartwatches. There will also be a version of Google Maps that works standalone (meaning without your phone nearby) and a YouTube Music app that supports offline downloads. Oh, and Spotify will support offline downloads on Wear smartwatches, as well. Samsung confirmed that its next Galaxy Watch will run on this unified platform. And future "premium" Fitbit devices will also run the software.

The Internet

NBN Replaces 10,000 Modems After Lightning 'Fries' Devices Across Blue Mountains (theguardian.com) 72

An anonymous reader writes: NBN Co has been forced to replace 10,000 faulty broadband devices in homes across the Blue Mountains west of Sydney after residents reported the technology was frequently struck by lightning and in one instance led to blue sparks flying out of a modem in a family's home. About 20,000 of the more than 32,000 homes in the Blue Mountains and Emu Plains have been connected to the national broadband network via fibre-to-the-curb (FttC) technology, which was set up under the Coalition government's multi-technology mixed model. That means fibre runs all the way to the edge of the property and connects to the home via the existing copper wire lead-ins from the curb.

Electrical storms in the Blue Mountains have wreaked havoc on the boxes that link the fibre to the copper. When lightning strikes the distribution boxes outside the house, sparks are sent flying up the copper lines, in turn frying the modems in people's homes. Guardian Australia understands the company has replaced 10,000 -- or half -- of devices inside the home that the company has identified as being prone to be affected by lightning. A spokesman for NBN Co confirmed that the company had found issues with the devices in areas of hard ground like sandstone. Sandstone is more resistant to electrical conduction than other soft earths. He said the devices fail in a safe way but the company nevertheless is issuing replacement devices people can install themselves. "We are now deploying a strengthened [device] that is much less likely to fail in these conditions.

Businesses

Alexa/Echo Owners Become Part of Amazon's Massive 'Sidewalk' Mesh Network By Default (inc.com) 168

A tech columnist for Inc. noticed that on June 8th Amazon will finally power up its massive "Sidewalk" mesh network (which uses Bluetooth and 900MHz radio signals to communicate between devices). And millions and millions of Amazon customers are all already "opted in" by default: The idea behind it is actually really smart — make it possible for smart home devices to serve as a sort of bridge between your WiFi connection and one another. That way, if your Ring doorbell, for example, isn't located close to your WiFi router, but it happens to be near an Echo Dot, it can use Sidewalk to stay connected.

The same is true if your internet connection is down. Your smart devices can connect to other smart devices, even if they aren't in your home. The big news on this front is that Tile is joining the Sidewalk network on June 14. That means that if you lose a Tile tracker, it can connect to any of the millions of Echo or Ring devices in your neighborhood and send its location back to you.

That's definitely a nice benefit, but it's also where things get a little murky from a privacy standpoint. That's because other people's devices, like your neighbor's, can also connect to your network. Amazon is pretty clear that Sidewalk uses three layers of encryption so that no data is shared between say, someone's Tile tracker and your network. The signal from the Tile is encrypted all the way back to the Tile app on your iPhone or Android smartphone... [But] whether or not you want your device connecting to other devices, or want your neighbors connecting to your WiFi, Amazon went ahead and made Sidewalk opt-out.

Opt out (for all your devices) using Alexa app's More tab (at the bottom): Settings > Account Settings > Amazon Sidewalk > Enabled.
Businesses

Peter Thiel Helps Fund an App That Tells You What to Do (bbc.com) 152

"How would you feel about being able to pay to control multiple aspects of another person's life?" asks the BBC.

"A new app is offering you the chance to do just that." When writer Brandon Wong recently couldn't decide what takeaway to order one evening, he asked his followers on social media app NewNew to choose for him. Those that wanted to get involved in the 24-year-old's dinner dilemma paid $5 (£3.50) to vote in a poll, and the majority verdict was that he should go for Korean food, so that was what he bought...

NewNew is the brainchild of Los Angeles-based entrepreneur Courtne Smith. The app, which is still in its "beta" or pre-full release stage, describes itself as "a human stock market where you buy shares in the lives of real people, in order to control their decisions and watch the outcome". For many of us that sounds a bit ominous, but the reality is actually far less alarming. It is aimed at what it calls "creators" — writers, painters, musicians, fashion designers, bloggers etc. It is designed as a way for them to connect far more closely with their fans or followers than on other social media services and, importantly, monetise that connection...

Whenever a vote is cast the creator gets the money minus NewNew's undisclosed commission... In addition to voting, followers can also pay extra — from $20 — to ask a NewNew creator to do something of their choosing, such as naming a character in a book after them. But the creator can reject all of these "bids", and if they do so then the follower doesn't have to part with the money...

Co-founder and chief executive Ms Smith, a 33-year-old Canadian, has big plans for NewNew, and has some heavyweight backers. Investors include Peter Thiel, the billionaire co-founder of PayPal, and the first outside person to put money into Facebook. Others with a stake in the business include leading US tech investment fund Andreessen Horowitz, and Hollywood actor Will Smith (no relation to Courtne). Snapchat has also given technical support.

Cellphones

Huawei Could Eavesdrop on 6.5 Million Dutch Cellphone Users Without their Knowledge (theconversation.com) 100

"Chinese technology provider Huawei was recently accused of being able to monitor all calls made using Dutch mobile operator KPN," writes the Conversation. Long-time Slashdot reader schwit1 shares their report: The revelations are from a secret 2010 report made by consultancy firm Capgemini, which KPN commissioned to evaluate the risks of working with Huawei infrastructure. While the full report on the issue has not been made public, journalists reporting on the story have outlined specific concerns that Huawei personnel in the Netherlands and China had access to security-essential parts of KPN's network - including the call data of millions of Dutch citizens - and that a lack of records meant KPN couldn't establish how often this happened... KPN essentially granted Huawei "administrator rights" to its mobile network by outsourcing work to the Chinese firm.

Legislation is only now catching up to prevent similar vulnerabilities in telecoms security...

Lower revenues force operators to carefully manage costs. This means that operators have been keen to outsource parts of their businesses to third parties, especially since the late 2000s. Large numbers of highly skilled engineers are an expensive liability to have on the balance sheet, and can often appear underused when things are running smoothly... , outsourcing by mobile operators is widespread. And firms in the UK and across Europe have often turned to Huawei to provide IT services and to help build core networks.

In 2010, Huawei was managing security-critical functions of KPN's core network.

Cellphones

Wealthy Install Location-Tracking Apps to Establish Proof-of-Residency for Tax Purposes (nytimes.com) 193

The New York Times shares the dilemma of Jeff Sheu, managing director of a private equity firm, who is "exactly the type of high earner California does not want to lose. When people in his tax bracket leave, the state is likely to audit them to make sure they really have left."

But fortunately, there's an app for that: With the May 17 tax filing deadline approaching, people who have moved to another state or are working more remotely need to be extra vigilant with their tax documents. For Mr. Sheu, that involves an app on his smartphone that uses location services to track him all the time. What he is sacrificing in privacy, he is gaining in peace of mind, knowing he will be able to show exactly when and where he was in a particular state, should California's tax authority come after him... "I'm never apart from my phone," Mr. Sheu said... "It feels to me like a pretty undebatable way to track where I am...."

Tax apps like TaxBird — which Mr. Sheu uses — and TaxDay and Monaeo were created years ago... "We've seen a fourfold increase in our app without any advertising in the past year," said Jonathan Mariner, founder and president of TaxDay, who was himself audited when he worked for Major League Baseball in New York but lived in Florida. "When people are concerned about privacy, I say you probably have a dozen apps on your phone that are tracking you, and you don't even know it...." Monaeo makes a point of describing how the data is cataloged — city, state and country, but without specific locations. It also says upfront that it does not share any data. (All three of the apps are vigilant about that.) While each tax app has different levels of precision and features to upload supporting documents, they all fulfill the basic need to prove your location to a tax authority. When it comes time to file taxes, users download reports detailing where they worked with varying degrees of specificity, from a simple day count to more detailed location information...

With hundreds of millions of dollars at stake, states in need of revenue are not going to let the money go without a fight. "This has the potential to become as messy as you can envision it," said Dustin Grizzle, a tax partner at MGO, an accounting firm. "States are going to say, 'Hey you're just using Covid to give you the ability to work remotely.'"

Science

Exxon Uses Big Tobacco's Playbook To Downplay the Climate Crisis, Says Study (cnn.com) 134

An anonymous reader quotes a report from CNN Business: For decades, ExxonMobil has deployed Big Tobacco-like propaganda to downplay the gravity of the climate crisis, shift blame onto consumers and protect its own interests, according to a Harvard University study published Thursday. The peer-reviewed study found that Exxon (XOM) publicly equates demand for energy to an indefinite need for fossil fuels, casting the company as merely a passive supplier working to meet that demand. The study used machine learning and algorithms to uncover trends in more than 200 public and internal Exxon documents between 1972 and 2019. "These patterns mimic the tobacco industry's documented strategy of shifting responsibility away from corporations -- which knowingly sold a deadly product while denying its harms -- and onto consumers," the study concludes. "ExxonMobil has used language to subtly yet systematically frame public discourse."

The Harvard study described "propaganda tactics of the fossil fuels industry" aimed at downplaying the climate crisis. For example, the authors said that after the 1999 merger of Exxon and Mobil, the companies began saying in public documents such as paid "advertorials" that "climate change was a 'risk,' rather than a reality." Prior to the merger, "risk" of climate change was only mentioned once in Exxon's public communications, the study said. From 2000 and beyond, it appeared 46 times, the study found, adding that no other term was more associated with climate change in the company's public statements. The study notes that "this scientific hedging strategy" was repeatedly used by the tobacco industry in the 1990s.

Moreover, the study found that Exxon has framed the debate around consumer energy "demand" to build a "fossil fuel savior" framework that "downplays the reality and seriousness of climate change, normalizes fossil fuel lock-in and individualizes responsibility." [Geoffrey Supran, a Harvard research associate and one of the study's authors] told CNN Business this strategy is "effectively gaslighting the public into thinking there is no alternative, making the blame pill that Exxon is feeding the public easier to swallow." Supran said it's "certainly true" that modern society continues to rely mostly on fossil fuels, but added that Exxon's decades-long "disinformation" campaign is a central reason why it still does. "We are passively guilty, born into a fossil fuel society," he said. "But companies like Exxon are actively guilty for working to keep society the way it is."

Power

Researchers Have Developed a Way To Wirelessly Charge Vehicles On the Road (jalopnik.com) 146

An anonymous reader quotes a report from Jalopnik: [R]esearchers at Cornell University, led by Associate Professor of Electrical and Computer Engineering Khurram Afridi, have developed technology that would allow vehicles to be charged on the road while in motion. It would essentially turn U.S. roadways into wireless chargers. Afrindi says he has been working on the tech for the last seven years. Here's how it would work, according to Afrindi via Business Insider: "'Highways would have a charging lane, sort of like a high occupancy lane,' Afridi told Insider. 'If you were running out of battery you would move into the charging lane. It would be able to identify which car went into the lane and it would later send you a bill.' The science behind Afridi's project goes back over 100 years to Nikola Tesla, the inventor who used alternating electric fields to power lights without plugging them in. Afridi's technology would embed special metal plates in the road that are connected to a powerline and a high frequency inverter. The plates will create alternating electric fields that attract and repel a pair of matching plates attached to the bottom of the EV.No need to worry about stopping to charge unless you're down for the night. They have run into a problem, however. They can't seem to find the parts that can handle the high levels of power needed to charge vehicles enough while they are in motion. It would have to be a material that's not only weatherproof but able to withstand high voltage and heat from the passing vehicles."
Wireless Networking

Tech Industry Quietly Patches FragAttacks Wi-Fi Flaws That Leak Data, Weaken Security (theregister.com) 37

An anonymous reader quotes a report from The Register: A dozen Wi-Fi design and implementation flaws make it possible for miscreants to steal transmitted data and bypass firewalls to attack devices on home networks, according to security researcher Mathy Vanhoef. On Tuesday, Vanhoef, a postdoctoral researcher in computer security at New York University Abu Dhabi, released a paper titled, "Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation" [PDF]. Scheduled to be presented later this year at the Usenix Security conference, the paper describes a set of wireless networking vulnerabilities, including three Wi-Fi design flaws and nine implementation flaws. Vanhoef, who in 2017 along with co-author Frank Piessens identified key reinstallation attacks (KRACKs) on the WPA2 protocol (used to secure Wi-Fi communication), has dubbed his latest research project FragAttacks, which stands for fragmentation and aggregation attacks.

The dozen vulnerabilities affect all Wi-Fi security protocols since the wireless networking technology debuted in 1997, from WEP up through WPA3. [...] In total, 75 devices -- network card and operating system combinations (Windows, Linux, Android, macOS, and iOS) -- were tested and all were affected by one or more of the attacks. NetBSD and OpenBSD were not affected because they don't support the reception of A-MSDUs (aggregate MAC service data units). [...]

Patches for many affected devices and software have already been deployed, thanks to a nine-month-long coordinated responsible disclosure overseen by the Wi-Fi Alliance and the Industry Consortium for Advancement of Security on the Internet (ICASI). Linux patches have been applied and the kernel mailing list note mentions that Intel has addressed the flaws in a recent firmware update without mentioning it. Microsoft released its patches on March 9, 2021 when disclosure was delayed tho Redmond had already committed to publication. Vanhoef advises checking with the vendor(s) of Wi-Fi devices about whether the FragAttacks have been addressed. "[F]or some devices the impact is minor, while for others it's disastrous," he said.

Privacy

Can Apple's AirTags Be Used to Track Another Person? (cnn.com) 38

As Mother's Day approached, CNN Business Editor Samantha Murphy Kelly clipped a keychain with one of Apple's tiny new "AirTag" Bluetooth trackers onto her son's book bag, in an experiment that "highlighted how easily these trackers could be used to track another person." Location trackers aren't new — there are similar products from Samsung, Sony and Tile — but AirTags' powerful Ultra Wideband technology chip allows it to more accurately determine the location and enables precise augmented reality directional arrows that populate on the iPhone or iPad's screen. While AirTags are explicitly intended for items only, Apple has added safeguards to cut down on unwanted tracking. For example, the company does not store location data, and it will send an alert to an iOS device user if an AirTag appears to be following them when its owner is not around. If the AirTag doesn't re-tether to the owner's iOS device after three days, the tracker will start to make a noise.

"We take customer safety very seriously and are committed to AirTag's privacy and security," the company said in a statement to CNN Business. "AirTag is designed with a set of proactive features to discourage unwanted tracking — a first in the industry — and the Find My network includes a smart, tunable system with deterrents...." The safeguards are a work in progress as the software rolls out and users begin interacting with the devices. When my babysitter recently took my son to an appointment, using my set of keys with an AirTag attached, she was not informed that she was carrying an AirTag — separated from my phone. (She hadn't yet updated her phone's software to iOS 14.5.) Non-iPhone users can hold their phones close to the AirTags and, via short-range wireless technology, information pops up on how to disable the tracker, but that's if the person knows they're being tracked and locates it. In addition, three days is a long time for an AirTag to keep quiet before making a noise....

Apple said one of the main reasons it spent so much time developing safeguards was the sheer size of its Find My app network. But it's the AirTags' reliance on that broader network that creates much of the need for the safeguards in the first place, said Albert Fox Cahn, founder and executive director of the Surveillance Technology Oversight Project and a fellow at the NYU School of Law. "That's because Apple is turning more than a billion iOS devices into a network for tracking AirTags, while Tile will only operate when in range of the small number of people using the Tile app.... The benefits of finding our keys a bit quicker isn't worth the danger of creating a new global tracking network."

United States

Capitol Rioters Identified Using Facial Recognition Software, Cellphone Records - and Social Media Posts (nbcnews.com) 352

NBC News reports more than 440 Americans have now been charged with storming the U.S. Capitol building on January 6th, with charges now filed against people from 44 of America's 50 states. They describe it as "one of the largest criminal investigations in American history." The largest number come from Texas, Pennsylvania, and Florida, in that order. Men outnumber women among those arrested by 7 to 1, with an average age of 39, according to figures compiled by the Program on Extremism at George Washington University in Washington, D.C. A total of 44 are military veterans.
Hundreds of arrests happened because rioters later bragged online: In nearly 90 percent of the cases, charges have been based at least in part on a person's own social media accounts.

A New York man, Robert Chapman, bragged on the dating app Bumble that he'd been in the Capitol during the riot. The person he was seeking to date responded, "We are not a match," and notified the FBI.

In fact, the investigative agency has now received "hundreds of thousands" of tips from the public, and has even posted photos of people who participated in the riots online asking for the public's help to identify them.

But NBC also reports that technology is being used to identify participants:
  • "Investigators have also used facial recognition software, comparing images from surveillance cameras and an outpouring of social media and news agency videos against photo databases of the FBI and at least one other federal agency, Customs and Border Protection, according to court documents."
  • Investigators "have also subpoenaed records from companies providing cellphone service, allowing agents to tell whether a specific person's phone was inside the Capitol during the siege."

China

How China Turned a Prize-Winning iPhone Hack Against the Uyghurs (technologyreview.com) 38

An attack that targeted Apple devices was used to spy on China's Muslim minority -- and US officials claim it was developed at the country's top hacking competition. An anonymous reader shares an excerpt from an MIT Technology Review article: The Tianfu Cup offered prizes that added up to over a million dollars. [It was held in November 2018, shortly after the Chinese banned cybersecurity researchers from attending overseas hacking competitions.] The $200,000 top prize went to Qihoo 360 researcher Qixun Zhao, who showed off a remarkable chain of exploits that allowed him to easily and reliably take control of even the newest and most up-to-date iPhones. From a starting point within the Safari web browser, he found a weakness in the core of the iPhones operating system, its kernel. The result? A remote attacker could take over any iPhone that visited a web page containing Qixun's malicious code. It's the kind of hack that can potentially be sold for millions of dollars on the open market to give criminals or governments the ability to spy on large numbers of people. Qixun named it "Chaos."

Two months later, in January 2019, Apple issued an update that fixed the flaw. There was little fanfare—just a quick note of thanks to those who discovered it. But in August of that year, Google published an extraordinary analysis into a hacking campaign it said was "exploiting iPhones en masse." Researchers dissected five distinct exploit chains they'd spotted "in the wild." These included the exploit that won Qixun the top prize at Tianfu, which they said had also been discovered by an unnamed "attacker." The Google researchers pointed out similarities between the attacks they caught being used in the real world and Chaos. What their deep dive omitted, however, were the identities of the victims and the attackers: Uyghur Muslims and the Chinese government.

Shortly after Google's researchers noted the attacks, media reports connected the dots: the targets of the campaign that used the Chaos exploit were the Uyghur people, and the hackers were linked to the Chinese government. Apple published a rare blog post that confirmed the attack had taken place over two months: that is, the period beginning immediately after Qixun won the Tianfu Cup and stretching until Apple issued the fix. MIT Technology Review has learned that United States government surveillance independently spotted the Chaos exploit being used against Uyghurs, and informed Apple. (Both Apple and Google declined to comment on this story.) The Americans concluded that the Chinese essentially followed the "strategic value" plan laid out by Qihoo's Zhou Hongyi; that the Tianfu Cup had generated an important hack; and that the exploit had been quickly handed over to Chinese intelligence, which then used it to spy on Uyghurs. The US collected the full details of the exploit used to hack the Uyghurs, and it matched Tianfu's Chaos hack, MIT Technology Review has learned. (Google's in-depth examination later noted how structurally similar the exploits are.) The US quietly informed Apple, which had already been tracking the attack on its own and reached the same conclusion: the Tianfu hack and the Uyghur hack were one and the same. The company prioritized a difficult fix.

Iphone

Apple is Reportedly Working on a Foldable iPhone for 2023 (engadget.com) 30

Rumors about a foldable iPhone have bubbled up before, but a new one has more credibility. From a report: Reliable analyst Ming-Chi Kuo told investors that Apple plans to launch an 8-inch foldable iPhone by 2023, according to documents seen by Engadget. The report, based on an "industry survey," predicts that Apple plans to sell 15-20 million units in 2023. Kuo said already revealed the possibility of a folding iPhone in March, but his latest report has more detail on suppliers. It predicts that the QHD+ flexible OLED will be supplied by Samsung Display, while the DDI display controller will come from Samsung Foundry. It also notes that Apple will use silver nanowire touch tech supplied by TPK, "because of its several advantages over [Samsung's] Y-Octa technology."
GNU is Not Unix

The FSF Says ThinkPenguin's Wireless-N Mini Router 'Respects Your Freedom' (fsf.org) 36

Friday the Free Software Foundation awarded their coveted "Respects Your Freedom" (RYF) certification to another new product: the Free Software Wireless-N Mini Router v3 (TPE-R1300) from ThinkPenguin, Inc.

Just 45 products currently hold the FSF's certification "that these products meet the FSF's standards in regard to users' freedom, control over the product, and privacy." (That is to say, they run on 100% free software, allow the installation of modified software, and are free from DRM, spyware and tracking.) The FSF writes: As with previous routers from ThinkPenguin, the Free Software Wireless-N Mini Router v3 ships with an FSF-endorsed fully free embedded GNU/Linux distribution called libreCMC. It also comes with a custom flavor of the U-Boot boot loader, assembled by Robert Call, who is the maintainer of libreCMC and a former FSF intern.

The router enables users to run multiple devices on a network through a VPN service, helping to simplify the process of keeping their communications secure and private. While ThinkPenguin offers a VPN service, users are not required to purchase a subscription to their service in order to use the router, and the device comes with detailed instructions on how to use the router with a wide variety of VPN providers...

"ThinkPenguin once again demonstrates a long-standing commitment to protecting the rights of their users. With the latest iteration of the Wireless-N Mini Router, users know that they'll have up to date hardware they can trust for years to come," said the FSF's licensing and compliance manager, Donald Robertson, III.

Phoronix points its readers to the device's page at ThinkPenguin.com "should you be looking to build out your wireless network using the decade old 802.11n standard."
United Kingdom

Boris Johnson's Personal Mobile Phone Number Available Online For 15 Years (bbc.com) 37

Boris Johnson's personal mobile phone number has been freely available on the internet for the past 15 years, it has been revealed. The BBC reports: It was published in a think tank press release in 2006, but never deleted -- and appears to be the one the PM uses. Labour leader Sir Keir Starmer said it was "a serious situation [that] carries a security risk." But Chancellor Rishi Sunak said that, as far as he was aware, "all security protocols have been followed." It appears the number has been switched off but Downing Street still has not confirmed if the number will now be changed.

The think tank press release with the PM's number on it was related to Mr Johnson's then-job as a shadow higher education minister - and MP for Henley - and invited journalists to contact him for further comment. Two years later, he successfully stood to become mayor of London. Former national security adviser Lord Ricketts warned hostile states with "sophisticated cyber capabilities" or criminal gangs could now have access to Mr Johnson's digits. The crossbench peer also told BBC Radio 4's Today program that he would have thought changing your mobile number when becoming PM would be an "elementary security precaution these days."

Android

Eddy Cue Wanted To Bring iMessage To Android In 2013 (theverge.com) 102

According to The Verge, citing a new deposition made public as part of the Epic case, Apple's senior VP of software and services, Eddy Cue, pushed to bring iMessage to Android as early as 2013. "[...] Cue wanted to devote a full team to iMessage support on Android, only to be overruled by other executives," adds The Verge. From the report: The latest deposition cites a specific email exchange between Cue and Craig Federighi, currently Apple's SVP of software engineering, beginning on April 7th and 8th, 2013. The exchange came after news circulated that Google had attempted to purchase WhatsApp for $1 billion. According to the exchange, Cue took the rumors as a sign that iMessage should expand to Android to cement Apple's hold on messaging apps:

Cue: We really need to bring iMessage to Android. I have had a couple of people investigating this but we should go full speed and make this an official project.... Do we want to lose one of the most important apps in a mobile environment to Google? They have search, mail, free video, and growing quickly in browsers. We have the best messaging app and we should make it the industry standard. I don't know what ways we can monetize it but it doesn't cost us a lot to run.

Federighi: Do you have any thoughts on how we would make switching to iMessage (from WhatsApp) compelling to masses of Android users who don't have a bunch of iOS friends? iMessage is a nice app/service, but to get users to switch social networks we'd need more than a marginally better app. (This is why Google is willing to pay $1 billion -- for the network, not for the app.)...In the absence of a strategy to become the primary messaging service for [the] bulk of cell phone users, I am concerned [that] iMessage on Android would simply serve to remove an obstacle to iPhone families giving their kids Android phones.

Elsewhere in the deposition, Cue says, "I remember the time of wanting to do an iMessage app on Android ourselves." "Would there have been cross-compatibility with the iOS platform so that users of both platforms would have been able to exchange messages?" the questioner responds. "That was certainly the discussion and the view that I had," Cue says. [...] The line of questioning is likely to play a significant role in Epic's antitrust lawsuit, which argues that iOS app store exclusivity represents an illegal use of market power. Epic has made clear in previous filings that it plans to make iMessage exclusivity part of that argument, citing a 2016 email from Phil Schiller that argues iMessage expansion "will hurt us more than help us."

Iphone

Man Sues Apple For Terminating Apple ID With $24K Worth of Content (appleinsider.com) 156

According to a complaint filed on Tuesday, Apple user Matthew Price spent nearly $25,000 on content attached to his Apple ID, which was terminated by the company for unknown reasons. The lawsuit targets a clause in Apple's media services terms and conditions, which states a user with a terminated Apple ID cannot access media content that they've purchased. AppleInsider reports: "Apple's unlawful and unconscionable clause as a prohibited de facto liquidated damages provision which is triggered when Apple suspects its customers have breached its Terms and Conditions," the lawsuit reads. Additionally, the complaint claims that users with Apple devices will find their products "substantially diminished in value" if their Apple IDs are terminated, since they won't be able to access Apple services or purchased content.

According to the complaint, the $25,000 worth of media included apps, in-app purchases, programs and platform extensions, and related services. The plaintiff also alleges that Apple prevents users from accessing unused funds attached to an Apple account. Price, for example, had about $7 in iTunes credit. The lawsuit doesn't specify why Price's account was terminated. However, it does claim that Apple shut down the Apple ID "without notice, explanation, policy or process." It goes on to claim that Apple's conduct -- specifically, the clause and resulting terminations -- are "unfair, unlawful, fraudulent, and illegal," and alleges that Apple is in violation of several consumer regulations in California. The lawsuit is seeking class action status, with a Nationwide Class consisting of people in the U.S. who have had their Apple IDs terminated.

Android

Samsung's New Upcycling Program Allows You To Turn An Old Galaxy Phone Into a New IoT Device (gizmodo.com) 22

An anonymous reader quotes a report from Gizmodo: Today, with the expansion of its Galaxy Upcycling at Home service (which is still in beta), users in the U.S., U.K., and South Korea will get access to an experimental feature in the SmartThings app designed to give an old Galaxy handset new life as a useful smart home accessory. By using the app to reconfigure the device's battery usage and optimization, Samsung says even older devices will still be able to deliver good longevity, while the phone's usual assortment of wireless connectivity features makes it easy to pair the phone with other devices in your home.

In the SmartThings app, Samsung provides a range of functions that an old smartphone can perform, including serving as a light sensor that can automatically turn on your smart lights or even your TV when it gets dark. Alternatively, you can also convert an old Galaxy phone into a sound sensor, with the phone using AI to detect common household noises like a barking dog, crying baby, or a knock on the door. In this way, you can also repurpose an old Samsung phone as a baby monitor of sorts [...]. And of course, even without much fiddling, upcycled Samsung phones can also be used as universal remotes, providing an easy way to control your streaming video box, play music on your smart speakers, control your lights, and more.

Slashdot Top Deals