AI

Former Siri Chief Is Leaving Apple To Join Microsoft's AI Division (theverge.com) 15

Bill Stasior, the former head of Apple's Siri division, is leaving the company after nearly a decade to join Microsoft's artificial intelligence division, reports The Information. "Although Stasior left Apple in May, he's only joining Microsoft later this month as a corporate vice president, reporting to Chief Technology Officer Kevin Scott," reports The Verge. "Stasior worked at Apple for more than seven years, joining back in 2012." From the report: After Giannandrea took a more hands-on role in the Siri division upon being hired last summer, he was subsequently promoted to a senior vice president role at Apple in December. That meant he was reporting directly to CEO Tim Cook, and he was also responsible for all machine learning and general AI projects at Apple. According to The Information, that promotion resulted in Stasior walking away from day-to-day duties running the Siri team.

Prior to Giannandrea joining, Stasior had the responsibility of running Siri, who was vice president of the division for more than seven years. But Apple effectively tossed executive leadership of the product around like a hot potato. It was initially former iOS software chief Scott Forstall's job to oversee Siri, but after he left the company unceremoniously over the controversial Apple Maps fiasco, the role went to services chief Eddy Cue and then eventually VP of software engineering Craig Federighi. Finally, when Giannandrea joined, Siri had a proper executive to oversee it, but that seems to have resulted in Stasior's departure for reasons unknown.
The Information notes that Stasior will not be working on Cortana. Instead, he'll be leading up an AI group, although it's unclear what exactly he'll be working on.
IOS

Hacker Releases First Public Jailbreak for Up-to-Date iPhones in Years (vice.com) 12

Apple has mistakenly made it a bit easier to hack iPhone users who are on the latest version of its mobile operating system iOS by unpatching a vulnerability it had already fixed. From a report: Hackers quickly jumped on this over the weekend, and publicly released a jailbreak for current, up-to-date iPhones -- the first free public jailbreak for a fully updated iPhone that's been released in years. Security researchers found this weekend that iOS 12.4, the latest version released in June, reintroduced a bug found by a Google hacker that was fixed in iOS 12.3. That means it's currently relatively easy to not only jailbreak up to date iPhones, but also hack iPhone users, according to people who have studied the issue.

"Due to 12.4 being the latest version of iOS currently available and the only one which Apple allows upgrading to, for the next couple of days (till 12.4.1 comes out), all devices of this version (or any 11.x and 12.x below 12.3) are jail breakable -- which means they are also vulnerable to what is effectively a 100+ day exploit," said Jonathan Levin, a security researcher and trainer who specializes in iOS, referring to the fact that this vulnerability can be exploited with code that was found more than 100 days ago. Pwn20wnd, a security researcher who develops iPhone jailbreaks, published a jailbreak for iOS 12.4 on Monday.

Privacy

Developers Accuse Apple of Anti-Competitive Behavior With Its Privacy Changes in iOS 13 (techcrunch.com) 77

A group of app developers have penned a letter to Apple CEO Tim Cook, arguing that certain privacy-focused changes to Apple's iOS 13 operating system will hurt their business. From a report: In a report by The Information, the developers were said to have accused Apple of anti-competitive behavior when it comes to how apps can access user location data. With iOS 13, Apple aims to curtail apps' abuse of its location-tracking features as part of its larger privacy focus as a company. Today, many apps ask users upon first launch to give their app the "Always Allow" location-tracking permission. Users can confirm this with a tap, unwittingly giving apps far more access to their location data than is actually necessary, in many cases. In iOS 13, however, Apple has tweaked the way apps can request location data. There will now be a new option upon launch presented to users, "Allow Once," which allows users to first explore the app to see if it fits their needs before granting the app developer the ability to continually access location data. This option will be presented alongside existing options, "Allow While Using App" and "Don't Allow." The "Always" option is still available, but users will have to head to iOS Settings to manually enable it. The app developers argue that this change may confuse less technical users, who will assume the app isn't functioning properly unless they figure out how to change their iOS Settings to ensure the app has the proper permissions.
Bitcoin

'Mining Bitcoin On a 1983 Apple II: a Highly Impractical Guide' (retroconnector.com) 42

option8 ((Slashdot reader #16,509) writes: TL;DR: Mining Bitcoin on a 1MHz 8-bit processor will cost you more than the world's combined economies, and take roughly 256 trillion years.
"But it could happen tomorrow. It's a lottery, after all," explains the blog post (describing this mad scientist as a hardware hacker and "self-taught maker", determined to mine bitcoin "in what must be the slowest possible way. I call it 8BITCOIN....")

There's also a Twitch.TV stream, with some appropriate 8-bit music, and the blog post ends by including his own bitcoin address, "If you feel like you absolutely must throw some money at me and this project."

"Upon doing some research, I found that, not only were other 8-bit platforms being put to the task, but other, even more obscure and outdated hardware. An IBM 1401 from the 1960s, a rebuilt Apollo Guidance Computer, and even one deranged individual who demonstrated the hashing algorithm by hand. It turns out, those examples all come from the same deranged individual, Ken Shirriff."
IOS

Apple Files Lawsuit Against Corellium For iOS Emulation (bloomberg.com) 60

Apple has filed a lawsuit against Corellium, accusing the software company of illegally selling virtual copies of iOS under the guise of helping discover security flaws. "Apple said the software company Corellium has copied the operating system, graphical user interface and other aspects of the devices without permission, and wants a federal judge to stop the violations," reports Bloomberg. From the report: Apple said it supports "good-faith security research," offering a $1 million "bug bounty" for anyone who discovers flaws in its system and gives custom versions of the iPhone to "legitimate" researchers. Corellium, the iPhone maker said, goes further than that. "Although Corellium paints itself as providing a research tool for those trying to discover security vulnerabilities and other flaws in Apple's software, Corellium's true goal is profiting off its blatant infringement," Apple said in the complaint. "Far from assisting in fixing vulnerabilities, Corellium encourages its users to sell any discovered information on the open market to the highest bidder."

Corellium creates copies of the Apple iOS, and says that it's all to help white-hat hackers discover security flaws. Instead, according to Apple, any information is sold to people who can then exploit those flaws. Corellium, in a posting dated July 4 on its website, said it "respects the intellectual property rights of others and expects its users to do the same." Corellium's products allow the creation of a virtual Apple device, according to the suit. It copies new versions of Apple works as soon as they are announced, and doesn't require users to disclose flaws to Apple, the Cupertino, California-based company said in the complaint.
Apple also wants a court order forcing Corellium to notify its customers that they are in violation of Apple's rights, destruction of any products using Apple copyrights, and cash compensation.
Portables (Apple)

Slashdot Asks: Do You Use Your Laptop's Headphone Jack? 283

The headphone jack is increasingly being omitted from smartphones and tablets, but what about laptops? When Apple launched the redesigned MacBook Pro in 2016, it decided to remove the SD card slot, full-sized USB Type A ports, and Thunderbolt 2 ports -- but keep the 3.5mm headphone jack, even though it axed the headphone jack in the 2016 iPhone 7. The reason, Apple said, had to do with the lack of wireless solutions for pro audio gear that many users use with their MacBooks. "If it was just about headphones then it doesn't need to be there," said Apple marketing chief Phil Schiller. "We believe that wireless is a great solution for headphones." He added: "But many users have set-ups with studio monitors, amps and other pro audio gear that do not have wireless solutions and need the 3.5mm jack."

While most laptops today still retain the headphone jack, that trend doesn't seem like it'll last for too much longer as the industry moves to embrace wireless audio. Laptop alternatives like Apple's iPad Pro and Samsung's Galaxy Tab S5e have both ditched the 3.5mm port, meaning it's only a matter of time until laptops themselves lose the port. Our question to you is: do you use the headphone jack on your laptop? Would you mind if a manufacturer removed the port to make room for a bigger battery or make the device slimmer and more portable? Let us know your thoughts below.
Businesses

Apple, Spotify Discuss Siri Truce, as Antitrust Battle Looms (theverge.com) 9

Apple and Spotify are in talks about potentially enabling Siri to play songs, albums, and playlists from the leading subscription music service. The Verge: A new report from The Information confirms that Spotify would be taking advantage of new capabilities that Apple is introducing in iOS 13 and iPadOS 13, which allow other apps to be on equal footing with Apple Music when making music requests through the company's Siri voice assistant. If Spotify takes advantage of the new tools, you'll be able to play music without having to open the app on your iPhone or iPad. The integration could be a sign of progress between two companies that have butted heads to a more heated degree than ever before over the last year. In March, Spotify filed an antitrust complaint with the EU that accused Apple of disadvantaging third-party services that compete with its own apps. Among other gripes (such as Apple's subscription tax), Spotify pointed to hands-free Siri compatibility as one convenient feature that Apple was reserving for its own Apple Music service. Further reading: Apple Says Spotify Wants 'the Benefits of a Free App Without Being Free'; and Apple Cites Irrelevant Spotify Subscription Stats In New Antitrust Defense.
Portables (Apple)

FAA Bans Recalled MacBook Pros From Flights (bloomberg.com) 39

The U.S. Federal Aviation Administration has banned select MacBook Pro laptops on flights after Apple recently said that some units had batteries that posed a fire risk. In a statement, the FAA said it was "aware of the recalled batteries that are used in some Apple MacBook Pro laptops" and stated that it alerted major U.S. airlines about the recall. Bloomberg reports: The watchdog also reminded airlines to follow 2016 safety instructions for goods with recalled batteries, which means that the affected Apple laptops should not be taken on flights as cargo or in carry-on baggage by passengers. The Apple laptops in question are some 15-inch MacBook Pros sold between September 2015 and February 2017. Apple issued the recall in June, saying it had "determined that, in a limited number of older generation 15-inch MacBook Pro units, the battery may overheat and pose a fire safety risk."

This week, four airlines with cargo operations managed by Total Cargo Expertise -- TUI Group Airlines, Thomas Cook Airlines, Air Italy, and Air Transat -- implemented a ban, barring the laptops from being brought onto the carriers' planes as cargo, according to an internal notice obtained by Bloomberg News. A spokesperson for TUI Group Airlines said airport staff and flight attendants will start making announcements about these MacBook Pros at the gate and before takeoff. Laptops that have replaced batteries won't be impacted, the spokesperson said. The company also posted a notice on its website banning the recalled computers on board, in both cargo and passenger areas of its planes. It's unclear what efforts will, if any, be made at U.S. airports.

Iphone

Researcher Makes Legit-Looking iPhone Lightning Cables That Will Hijack Your Computer (vice.com) 42

A researcher known as MG has modified Lightning cables with extra components to let him remotely connect to the computers that the cables are connected to. "It looks like a legitimate cable and works just like one. Not even your computer will notice a difference. Until I, as an attacker, wirelessly take control of the cable," MG said. Motherboard reports: One idea is to take this malicious tool, dubbed O.MG Cable, and swap it for a target's legitimate one. MG suggested you may even give the malicious version as a gift to the target -- the cables even come with some of the correct little pieces of packaging holding them together. MG typed in the IP address of the fake cable on his own phone's browser, and was presented with a list of options, such as opening a terminal on my Mac. From here, a hacker can run all sorts of tools on the victim's computer.

The cable comes with various payloads, or scripts and commands that an attacker can run on the victim's machine. A hacker can also remotely "kill" the USB implant, hopefully hiding some evidence of its use or existence. MG made the cables by hand, painstakingly modifying real Apple cables to include the implant. "In the end, I was able to create 100 percent of the implant in my kitchen and then integrate it into a cable. And these prototypes at Def con were mostly done the same way," he said. MG did point to other researchers who worked on the implant and graphical user interface. He is selling the cables for $200 each.

Desktops (Apple)

Vintage 30-Year-Old Mac Resurrected As a Web Server (rhyal.com) 66

Long-time Slashdot reader Huxley_Dunsany writes: After much work rebuilding and upgrading it, my Macintosh SE/30 from 1989 is now connected via Ethernet to the Web, and is hosting a simple website and old-style "guestbook." The site has been online for a few days (other than semi-frequent reboots of the system when it gets overloaded with requests), and has served nearly 20,000 visitors. For a machine with a 16MHz CPU and 68 megabytes of ram, it's held up remarkably well!

I'm basically inviting a "Slashdotting" of my old Mac, but I thought this project might bring a few smiles here. Enjoy!

"Awesome," wrote one visitor in the guestbook, adding "You should join a webring!"
Privacy

Researchers Bypass Apple FaceID Using Biometrics 'Achilles Heel' (threatpost.com) 53

Vulnerabilities have been uncovered in the authentication process of biometrics technology that could allow bad actors to bypass various facial recognition applications -- including Apple's FaceID. But there is a catch. Doing so requires the victim to be out cold. From a report: Researchers on Wednesday during Black Hat USA 2019 demonstrated an attack that allowed them to bypass a victim's FaceID and log into their phone simply by putting a pair of modified glasses on their face. By merely placing tape carefully over the lenses of a pair glasses and placing them on the victim's face the researchers demonstrated how they could bypass Apple's FaceID in a specific scenario. The attack itself is difficult, given the bad actor would need to figure out how to put the glasses on an unconscious victim without waking them up.

To launch the attack, researchers with Tencent tapped into a feature behind biometrics called "liveness" detection, which is part of the biometric authentication process that sifts through "real" versus "fake" features on people. It works by detecting background noise, response distortion or focus blur. One such biometrics tool that utilizes liveness detection is FaceID, which is designed and utilized by Apple for the iPhone and iPad Pro. "With the leakage of biometric data and the enhancement of AI fraud ability, liveness detection has become the Achilles' heel of biometric authentication security as it is to verify if the biometric being captured is an actual measurement from the authorized live person who is present at the time of capture," researchers said during the Black Hat USA 2019 session.

Businesses

Goldman Sachs, Bank of the Rich and Powerful, is Dipping Into Subprime Lending With Apple Card (cnbc.com) 105

Goldman Sachs is casting a wide net for customers of its new credit card with Apple, approving some subprime borrowers for the product. CNBC: The bank, which is in charge of deciding who gets the Apple Card, is accepting some applications from users with less-than-stellar credit scores, according to people with knowledge of the matter. Goldman began to make the card available to some Apple customers this week ahead of a broader rollout later this month. From the start, Apple wanted its bank partner to create a technology platform that would approve as many of its 100 million-plus U.S. iPhone users as possible, within the bounds of regulations and responsible lending, according to the people. That's in line with the tech giant's desire to provide a good user experience for its customers.
Iphone

Apple Confirms $1 Million Reward For Anyone Who Can Hack An iPhone (forbes.com) 65

Apple says it will offer up to $1 million for hackers who can find vulnerabilities in iPhones and Macs. "That's up from $200,000, and in the fall the program will be open to all researchers," reports Forbes. "Previously only those on the company's invite-only bug bounty program were eligible to receive rewards." From the report: As Forbes reported on Monday, Apple is also launching a Mac bug bounty, which was confirmed Thursday, but it's also extending it to watchOS and its Apple TV operating system. The announcements came in Las Vegas at the Black Hat conference, where Apple's head of security engineering Ivan Krstic gave a talk on iOS and macOS security. Forbes also revealed on Monday that Apple was to give bug bounty participants "developer devices" -- iPhones that let hackers dive further into iOS. They can, for instance, pause the processor to look at what's happening with data in memory. Krstic confirmed the iOS Security Research Device program would be by application only. It will arrive next year.

The full $1 million will go to researchers who can find a hack of the kernel -- the core of iOS -- with zero clicks required by the iPhone owner. Another $500,000 will be given to those who can find a "network attack requiring no user interaction." There's also a 50% bonus for hackers who can find weaknesses in software before it's released. Apple is increasing those rewards in the face of an increasingly profitable private market where hackers sell the same information to governments for vast sums.

Iphone

Apple Is Locking Batteries To Specific iPhones, a Nightmare for DIY Repair (vice.com) 281

A longtime nightmare scenario for independent iPhone repair companies has come true: Apple has tied batteries to specific iPhones, meaning that only it has the ability to perform an authorized battery replacement on the newest versions of iPhones, two independent experiments have found. From a report: Battery replacements are among the most common repairs done by Apple and by independent repair companies. This is because lithium ion batteries eventually lose their ability to hold a charge, which will eventually make the phone unusable. Replacing the battery greatly extends the life of the phone: Apple CEO Tim Cook acknowledged earlier this year that battery replacements are resulting in fewer people buying new iPhones, which has affected Apple's bottom line. It's concerning on many levels, then, that on the iPhone XS, XS Plus, and XR, that any battery swap not performed by Apple will result in the phone's settings saying that the new battery needs "Service." An iPhone will still turn on and function with an aftermarket battery, but several important features are unavailable, and the iPhone warns users that they should seek service, presumably from an Apple Store.
Facebook

iOS 13 Privacy Feature Will Force Total Overhaul For Facebook Apps (arstechnica.com) 68

Privacy has been a renewed focus with Apple's next operating system update. One new feature in iOS 13 that seems centered on user privacy could have sweeping consequences for messaging and online call apps. From a report: In iOS 13, Apple will not allow apps to run voice over Internet protocol (VoIP) in the background when the programs are not actively in use. Many apps that offer VoIP services currently run in the background, and they will need to be rewritten to adjust to Apple's upcoming rules. The change is slated to roll out when iOS 13 is released in September. However, app developers will get a grace period, and they have until April 2020 to comply. VoIP services ostensibly stay running in the background so they can connect calls quickly, but they also let those apps collect information about what users are doing on their devices. Restricting the programs that can simply be open at any time on its mobile hardware fits the narrative Apple is crafting about being a trusted place for customer privacy in an increasingly untrustworthy industry.
Google

Alphabet Overtakes Apple To Become Most Cash-Rich Company (theverge.com) 81

According to The Financial Times, Google's parent company Alphabet has overtaken Apple to become the most cash-rich company in the world. As of the second quarter of this year, Alphabet holds $117 billion in liquid reserves, compared to $102 billion net of debt, for Apple. The Verge reports: Despite the obvious benefits of hoarding so much cash, earning the title of "Cash Kings" might not give much cause for celebration. As the FT notes, such a conspicuous display of wealth could increase pressure from shareholders who'd like to see the company spend more of its money on share buybacks or dividends, and could lead to increased scrutiny from regulators concerned with Google's dominance. Google and its parent company have been hit with around $9.05 billion in antitrust fines by the EU in the past two years, and the company is also facing heavy scrutiny by U..S lawmakers.
AI

Apple Stops Letting Contractors Listen To Siri Voice Recordings, Will Offer Opt-Out Later (theverge.com) 55

Apple says it will temporarily suspend its practice of using human contractors to grade snippets of Siri voice recordings for accuracy. The move follows a report in The Guardian where a former worker detailed the program, claiming that contractors "regularly hear confidential medical information, drug deals, and recordings of couples having sex" as part of their job. The Verge reports: "We are committed to delivering a great Siri experience while protecting user privacy," an Apple spokesperson says in a statement to The Verge. "While we conduct a thorough review, we are suspending Siri grading globally. Additionally, as part of a future software update, users will have the ability to choose to participate in grading." Apple did not comment on whether, in addition to pausing the program where contractors listen to Siri voice recordings, it would also stop actually saving those recordings on its servers. Currently the company says it keeps recordings for six months before removing identifying information from a copy that it could keep for two years or more.
Businesses

Spotify Keeps Big Lead Over Apple Music But Disappoints With 108M Subscribers (cnet.com) 37

In its second-quarter report, Spotify said its subscribers rose 31% year over year to hit 108 million subscribers at the end of June. "That figure was weaker than Spotify expected but keeps it well above its closest competitor, Apple Music, which had 60 million subscribers as of June," reports CNET. From the report: Spotify also said Wednesday that 232 million people now use its service at least once a month, up 29% from a year earlier. Spotify, unlike Apple, has a free tier that lets anyone listen to music with advertising. Apple has never disclosed a monthly-active-user stat; almost all people who use Apple Music are subscribers. Spotify's growth in monthly active users beat the best-case prediction the company made in April, coming in 4 million above the 228 million high end of guidance. But its subscribers -- who make Spotify way more money than ad-supported free listeners -- were at the low end of its expectations. Its 108 million figure scraped into its guidance range of 107 million to 110 million.

Its subscriber growth was relatively weaker because fewer people signed up for its heavily discounted student plan. Spotify also said it would make up for the latest quarter's shortfall by the end of the year. Looking ahead, Spotify predicted that it will have 110 million to 114 million paid subscribers by the end of September and that its monthly active users will increase to between 240 million and 245 million. By the end of the year, it expects to cross the milestone of a quarter of a billion monthly listeners.

China

Your Next iPhone Might Be Made in Vietnam. Thank the Trade War. (nytimes.com) 173

No country on earth has benefited from President Trump's trade fight with China more than Vietnam. From a report: The country's factories have swelled with orders as American tariffs cause companies to reconsider making their products in China. Now, more big technology firms are looking to bulk up their manufacturing operations in Vietnam, lifting the ambitions of a nation already well on its way to becoming a powerhouse maker of smartphones and other high-end gadgets. First, though, Vietnam needs to get better at making the little plastic casings on your earbuds.

Vu Huu Thang's company in the northern city of Bac Ninh, Bac Viet Technology, produces small plastic parts for Canon printers, Korg musical instruments, and Samsung cellphones and phone accessories, including earbuds. He said it would be hard for his firm to compete against Chinese suppliers as long as he had to buy 70 to 100 tons of imported plastic material every month, most of it made in China. "Vietnam cannot compare with China," Mr. Thang said. "When we buy materials, it's 5, 10 percent more expensive than China already." And the Vietnamese market is too small, he said, to entice plastic producers to set up plants here.

Security

iPhone Bluetooth Traffic Leaks Phone Numbers -- in Certain Scenarios (zdnet.com) 51

Security researchers say they can extract a user's phone number from the Bluetooth traffic coming from an iPhone smartphone during certain operations. From a report: The attack works because, when Bluetooth is enabled on an Apple device, the device sends BLE (Bluetooth Low Energy) packets in all directions, broadcasting the device's position and various details. This behavior is part of the Apple Wireless Direct Link (AWDL), a protocol that can work either via WiFi or BLE to interconnect and allow data transfers between nearby devices. Previous academic research has revealed that AWDL BLE traffic contains device identification details such as the phone status, Wi-Fi status, OS version, buffer availability, and others. However, in new research published last week, security researchers from Hexway said that during certain operations these BLE packets can also contain a SHA256 hash of the device's phone number.

Slashdot Top Deals