19 posts • joined 17 Jul 2012
Doesn't sound as useful as the bidirectional ultrasound handshaking incoming for Chromecast. Still, best to do all the sensors before Apple patent them ;)
With a billion users worldwide, I wonder why they even needed to do deliberate a/b testing for this, wasn't there sufficient data of people having bad news weeks and good news weeks in their usual non-experimented logs?
More likely - 90% of TOR traffic is P2P
That would make more sense.
Apple copying again! - Android's Pry-Fi
Android has had an excellent app by Chainfire for this for some time called Pry-Fi (free & pro).
Disclaimer, no way attached to Chainfire, just an admirer of his utils.
Hope Apple don't posthumously patent
The man who designed the famous Beats by Dre headphones?
Thought we already established that was the guys at Monster
typical response - why would crims want to read my boring emails
This is the most popular response I get from people I know. They don't want scare stories, and can't be bothered with changing passwords for something they don't care enough about.
What we need is more actual anecdotes involving normal boring people ("celebs phone hacking, well they're asking for it, doesn't affect me")
Browser settings: Advanced: Set Search Engine
Browser settings: Advanced: Set Search Engine. Done.
Was that hard?
But saying that, after a factory reset, I do usually have to reverse EVERY SINGLE Google suggested setting though.
i.e. default homepage, remember passwords, remember form data*, form autofill*, user location, do not track
*yes that's 2 settings
They don't phone you, they join databases
Phone numbers are a great join-key for merging massive databases from separate vendors (as are emails). Value's not in the phone number for phoning you, but in the info other companies sell who ALSO have your phone number.
Use Play Store, don't use Unknown Sources
Still lots of fear about this - you don't need to be on Android 4.3 to be safe:
- If you only install from the official Google Play Store, you're fine - Google can scan their store server-side.
- If you don't install any apps, you're fine.
- Stay clear from Allow Install from Unknown Sources, which by default isn't enabled anyway.
- Vulnerability that trojans are installing via is a phone-side weakness, which is only a problem if the app source you're using (pirate app store, spam email or mms containing installer) isn't vetting the apps before they reach your phone.
Re: stuck on Gingerbread are budget 512mb ram and/or 320x240 screens, they just don't have the grunt needed for the newer Android releases.
Lowest spec owned by my family members is a Galaxy Ace 2 and that's on an official Jellybean 4.1.2 now.
My almost 2 year old midrange Galaxy Nexus is running 4.3 like a pro.
Reputable app stores ++
Google Play, Amazon, et al can scan their stores with updated verification.
The flaw is in the phone's cert verification, but Google Play, Amazon etc can update their server-side verification to detect any dodgy packages.
From what I understand of this particular exploit, it's detectable now that it's understood.
Cyanogenmod users will be happy to know it looks like they're busily releasing new CM7 thru CM10's.
Android phones a factor?
Since most Android phones are linked up directly via credit card and account to gmail accounts, might just be a punters being a magnitude more password hygenic (cash and phone pwnership) vs Y! + MSN accounts which often are used just for mail, or even simply low grade instant messenger accounts.
Ubuntu Phone stayed on my Nexus for almost an hour, I wanted to feel it running on my phone even though I was well-aware it was going to be mostly mockup, similar to what was demoed at CES last month.
On a slightly related note, there was a nice analysis and comparison of upcoming phone OS contenders last week, covering the progress, teams, approaches, and industry support and tips for success for Ubuntu Phone, Tizen, Sailfish OS, Firefox OS, BB10
1.8bil for broken software, at least they're being honest
"pose an unacceptable risk to the ability of the UK to safeguard national security" and "disclosure of this could be used to avoid detection".
So that's 1.8 bil on a system that once finished, relies on security through obscurity, and is expected to have known exploits and be possible to avoid.
Thought green-minded data-centers in northern countries only need an extra 1% power for cooling these days? i.e. would only need about 290KW of cooling for 29MW of compute (Yahoo Chicken-coop claimed this percentage with a datacenter they did a couple of years ago in NY IIRC)
Leveson Inquiry is all a bit pointless then
If all the texts count as publication, there's no such thing as phone hacking (text snooping) any more, and all those who had their phones hacked should be jolly well happy with this judge.
OTOH, the press should start doing more phone hacking and exposing now - probably the only thing keeping t.h.e.m. straight, when the laws are so ripe for abuse^M^M^M^M^M^M^M^M^M.
Next up, MS v Samsung?
So will Microsoft now go after Samsung for copying it's Version-numbering-'N'-suffix-method-for-naming-near-identical-products-with-EU-ban-avoiding-modifications? (Windows XP N, 7 N, etc)
Not here yet? Aim for 4K surely
1080p Sounds like by the time it's released, they'll be plenty of people using 4K screens.
"We do not need Samsung's technology which works under a totally different display system."
And how would they know? I rest my case :)
- Pic Mars rover 2020: Oxygen generation and 6 more amazing experiments
- Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
- Plug and PREY: Hackers reprogram USB drives to silently infect PCs
- Review Fiat Panda Cross: 'Interesting-looking' Multipla spawn hits UK
- Analysis PEAK LANDFILL: Why tablet gloom is good news for Windows users