30 posts • joined 17 Jul 2012
In hackers I trust
We've got hackers that can make USB cables into keyloggers, and pwn millions of phones via binary SMS, I'm sure the hacking community will come up with a dummy local server.
More optimistically I predict that 6 months after release, after universe bugs and so on have been ironed out, Frontier themselves will offer some kind of offline server or data.
I think they admitted that it could go offline while recently placating fears of servers being turned off at some future point, apparently -then- everyone gets a snapshot of the universe.
Re: Well I never
Looks nice too, might get myself one instead of a Nexus 9. $249 for a Intel quad-2.3ghz Android 8" tablet with 4:3 many-pixel screen, intel so should have screaming performance. Only 2gb ram though.
Changed my mind, could be lovely
After AC mentioned Kindle's Whispernet, the Apple soft-sim thing does sound like a potential for consumer-friendlyness.
Whispernet-style global roaming access to say iTunes, iCloud services and a handful of whitelisted email and social media, perhaps included in the cost of an iTunes/iCloud subscription, could make the iPad an ideal traveller's companion.
Probably also be easier for Apple to deactivate stolen devices anywhere in the world.
Risky to go more lock-in and anti-consumer with SE Asia brands on the rise
Bit late I'd say, Apple should've done this while it had more control of the market, then relinquished after strong Chinese more consumer-friendly arose, this just smacks of desperation.
Google doesn't need lock-in, as people are flocking their way, and they can use Apple's new handcuffs as an additional selling point.
So Nexus 6 still 32-bit
Removable battery = extend your phone's usable life by years
Greener, more economical than replacing phones every year or two, cheaper phone contracts, battery life as great as the day you bought it.
Well that answers why Apple don't want to provide it.
Re: Better Than Z2
Probably the screen was chipped or cracked invisibly from an earlier severe knock/drop, and the soft fall just happened to be the straw that broke it's already microfractured back.
Saying that I have seen a few reports of this happening particularly to Z2 in xda-forums, like one that just spontaneously shattered while sitting flat on a shelf.
TWO-THIRDS not THREE-QUARTERS
If you exclude 4.4 it's three-quarters, but if you correctly exclude both 4.3 & 4.4, it's two-thirds.
Mind you, I'd be interested in whether Google plans to release a browser fix for 2.3 upwards (98.7%) via it's Google Play Services versions-are-irrelevant system updater launched late last year.
Re: Reminds me of something
or older than that, Centurions (power extreme!)
Re: re: Anne-Lise
"If you did use VPN to do all those like you said, you've violated most of those services' T&Cs and could in theory, get yourself banned."
Nothing in the Virgin T&Cs or Acceptable Use and traffic management policies -that I can see- forbidding VPN. You agree that they may shape/throttle traffic, but nothing states you can't use VPN for all your traffic.
Especially good idea to use VPNs the entire time when Virgin openly state in their T&Cs that they read your emails and internet comms:
" h. With your permission, we may monitor email and internet communications, including without limitation, any content or material transmitted over the services.
i. We also reserve the right to monitor and control data volume and/or types of traffic transmitted via the services."
Is it art? is the wrong question
All these definitions and debates are focusing on post-hoc artistic speculation and uniqueness / recreatability tests - that's an is it art question not a who does the picture belong to.
Previously these uniqueness / artness arguments are only really debated in rip-offs, derivative works cases (as in the london buses over westminster).
If copyright is automatic upon creating the image, then the person who can prove earliest provenance, and perhaps access to higher-quality/uncropped originals/raws, or documentary evidence, has the strong case. Simple as.
How copyrighted is CCTV footage?
How copyrighted are (good?) paintings by young children with artist had a low IQ or couldn't appreciate copyright law?
How about famous dead artists who couldn't appreciate copyright law because it didn't exist then?
Doesn't sound as useful as the bidirectional ultrasound handshaking incoming for Chromecast. Still, best to do all the sensors before Apple patent them ;)
With a billion users worldwide, I wonder why they even needed to do deliberate a/b testing for this, wasn't there sufficient data of people having bad news weeks and good news weeks in their usual non-experimented logs?
More likely - 90% of TOR traffic is P2P
That would make more sense.
Apple copying again! - Android's Pry-Fi
Android has had an excellent app by Chainfire for this for some time called Pry-Fi (free & pro).
Disclaimer, no way attached to Chainfire, just an admirer of his utils.
Hope Apple don't posthumously patent
The man who designed the famous Beats by Dre headphones?
Thought we already established that was the guys at Monster
typical response - why would crims want to read my boring emails
This is the most popular response I get from people I know. They don't want scare stories, and can't be bothered with changing passwords for something they don't care enough about.
What we need is more actual anecdotes involving normal boring people ("celebs phone hacking, well they're asking for it, doesn't affect me")
Browser settings: Advanced: Set Search Engine
Browser settings: Advanced: Set Search Engine. Done.
Was that hard?
But saying that, after a factory reset, I do usually have to reverse EVERY SINGLE Google suggested setting though.
i.e. default homepage, remember passwords, remember form data*, form autofill*, user location, do not track
*yes that's 2 settings
They don't phone you, they join databases
Phone numbers are a great join-key for merging massive databases from separate vendors (as are emails). Value's not in the phone number for phoning you, but in the info other companies sell who ALSO have your phone number.
Use Play Store, don't use Unknown Sources
Still lots of fear about this - you don't need to be on Android 4.3 to be safe:
- If you only install from the official Google Play Store, you're fine - Google can scan their store server-side.
- If you don't install any apps, you're fine.
- Stay clear from Allow Install from Unknown Sources, which by default isn't enabled anyway.
- Vulnerability that trojans are installing via is a phone-side weakness, which is only a problem if the app source you're using (pirate app store, spam email or mms containing installer) isn't vetting the apps before they reach your phone.
Re: stuck on Gingerbread are budget 512mb ram and/or 320x240 screens, they just don't have the grunt needed for the newer Android releases.
Lowest spec owned by my family members is a Galaxy Ace 2 and that's on an official Jellybean 4.1.2 now.
My almost 2 year old midrange Galaxy Nexus is running 4.3 like a pro.
Reputable app stores ++
Google Play, Amazon, et al can scan their stores with updated verification.
The flaw is in the phone's cert verification, but Google Play, Amazon etc can update their server-side verification to detect any dodgy packages.
From what I understand of this particular exploit, it's detectable now that it's understood.
Cyanogenmod users will be happy to know it looks like they're busily releasing new CM7 thru CM10's.
Android phones a factor?
Since most Android phones are linked up directly via credit card and account to gmail accounts, might just be a punters being a magnitude more password hygenic (cash and phone pwnership) vs Y! + MSN accounts which often are used just for mail, or even simply low grade instant messenger accounts.
Ubuntu Phone stayed on my Nexus for almost an hour, I wanted to feel it running on my phone even though I was well-aware it was going to be mostly mockup, similar to what was demoed at CES last month.
On a slightly related note, there was a nice analysis and comparison of upcoming phone OS contenders last week, covering the progress, teams, approaches, and industry support and tips for success for Ubuntu Phone, Tizen, Sailfish OS, Firefox OS, BB10
1.8bil for broken software, at least they're being honest
"pose an unacceptable risk to the ability of the UK to safeguard national security" and "disclosure of this could be used to avoid detection".
So that's 1.8 bil on a system that once finished, relies on security through obscurity, and is expected to have known exploits and be possible to avoid.
Thought green-minded data-centers in northern countries only need an extra 1% power for cooling these days? i.e. would only need about 290KW of cooling for 29MW of compute (Yahoo Chicken-coop claimed this percentage with a datacenter they did a couple of years ago in NY IIRC)
Leveson Inquiry is all a bit pointless then
If all the texts count as publication, there's no such thing as phone hacking (text snooping) any more, and all those who had their phones hacked should be jolly well happy with this judge.
OTOH, the press should start doing more phone hacking and exposing now - probably the only thing keeping t.h.e.m. straight, when the laws are so ripe for abuse^M^M^M^M^M^M^M^M^M.
Next up, MS v Samsung?
So will Microsoft now go after Samsung for copying it's Version-numbering-'N'-suffix-method-for-naming-near-identical-products-with-EU-ban-avoiding-modifications? (Windows XP N, 7 N, etc)
Not here yet? Aim for 4K surely
1080p Sounds like by the time it's released, they'll be plenty of people using 4K screens.
"We do not need Samsung's technology which works under a totally different display system."
And how would they know? I rest my case :)
- Hi-torque tank engines: EXTREME car hacking with The Register
- Review What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
- Product round-up Trousers down for six of the best affordable Androids
- Product round-up Ten excellent FREE PC apps to brighten your Windows
- Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...