×
Transportation

Google's Street View Cars Are Now Giant, Mobile 3D Scanners (arstechnica.com) 42

An anonymous reader quotes a report from Ars Technica: Google's got a hot new ride. The company has a new Street View car with updated cameras, and -- surprisingly -- a set of Lidar (Light, Detection and Ranging) cans! Google doesn't have anything up officially about this, but Wired has the scoop on the new vehicles. The camera system upgrade -- the first in eight years -- greatly improves the image quality while simplifying the rig. In the main ball, Google is down from 15 cameras to seven, making the whole package a lot smaller. These 20MP cameras are aimed all around the car, and the pictures they take are stitched together into a spherical image for Google Maps. There's more to the cars than just the ball though: there are also a pair of "HD" cameras that face directly left and right. These are dedicated to reading street signs, business names, and even posted store hours; those images are funneled to Google's cloud computers for visual processing. The end result of the new cameras will be prettier Street View shots, with higher resolution, better colors, and fewer stitching errors. The better images should also result in more data for Google's various visual feature-detection algorithms.

Wired's report focuses almost entirely on the new cameras, but I think the the most interesting additions are the two LIDAR pucks that hang just below the camera ball. These are the ubiquitous Velodyne VLP-16 "Puck" sensors, allowing the to car "see" in 3D in 360 degrees. These $8,000 Lidar sensors are most commonly used in autonomous car prototypes, so to see them on a Street View car is unexpected. Don't expect the Street View cars to start driving themselves anytime soon -- as Google Street View's Technical Program Manager Steve Silverman says in Wired's video, the Lidar sensors "are used to position us in the world."

AI

Hackers Can Take Control of Siri and Alexa By Whispering To Them in Frequencies Humans Can't Hear (fastcodesign.com) 116

Chinese researchers have discovered a vulnerability in voice assistants from Apple, Google, Amazon, Microsoft, Samsung, and Huawei. It affects every iPhone and Macbook running Siri, any Galaxy phone, any PC running Windows 10, and even Amazon's Alexa assistant. From a report: Using a technique called the DolphinAttack, a team from Zhejiang University translated typical vocal commands into ultrasonic frequencies that are too high for the human ear to hear, but perfectly decipherable by the microphones and software powering our always-on voice assistants. This relatively simple translation process lets them take control of gadgets with just a few words uttered in frequencies none of us can hear. The researchers didn't just activate basic commands like "Hey Siri" or "Okay Google," though. They could also tell an iPhone to "call 1234567890" or tell an iPad to FaceTime the number. They could force a Macbook or a Nexus 7 to open a malicious website. They could order an Amazon Echo to "open the backdoor." Even an Audi Q3 could have its navigation system redirected to a new location. "Inaudible voice commands question the common design assumption that adversaries may at most try to manipulate a [voice assistant] vocally and can be detected by an alert user," the research team writes in a paper just accepted to the ACM Conference on Computer and Communications Security.
Android

TrustZone Downgrade Attack Opens Android Devices To Old Vulnerabilities (bleepingcomputer.com) 45

An anonymous reader writes from a report via Bleeping Computer: An attacker can downgrade components of the Android TrustZone technology -- a secure section of smartphone CPUs -- to older versions that feature known vulnerabilities. The attacker can then use previously published exploit code to attack up-to-date Android OS versions. The research team proved their attack in tests on devices running the ARM TrustZone technology, such as Samsung Galaxy S7, Huawei Mate 9, Google Nexus 5, and Google Nexus 6. They replaced updated versions of the Widevine trustlet with an older version that was vulnerable to CVE-2015-6639, a vulnerability in Android's Qualcomm Secure Execution Environment (QSEE) -- Qualcomm's name for its ARM TrustZone version that runs on Qualcomm chips. This vulnerability allows attackers root level access to the TrustZone OS, which indirectly grants the attack control over the entire phone. The research paper is available here, and one of the researcher's authors explains the attack chain in an interview here.

Slashdot Top Deals