×
Robotics

Apple Unveils Liam, An iPhone Recycling Robot That Salvages Parts (inhabitat.com) 70

MikeChino writes from an article on Inhabitat: There are around one billion Apple devices in use, and with that comes "significant responsibility," according to Apple CEO Tim Cook. That's why Apple just unveiled Liam, a robot that quickly and efficiently disassembles old iPhones so that their components can be reused for other products (like solar panels).
According to the Inhabitat, "The robot takes apart old iPhones, removing each component and extracting metals like lithium, so that the parts can be reused and your phone 'can live on.'" TechCrunch notes that Liam specifically rescues cobalt and lithium from the battery, gold and copper from the camera, silver and platinum from the logic board and the aluminum enclosure, as well.
Iphone

Apple Unveils Smaller iPhone SE, Starting At $399 (techcrunch.com) 158

An anonymous reader writes: Apple has officially unveiled a smaller, cheaper iPhone designed to make a splash in the budget-friendly smartphone market. The new device, called the iPhone SE, looks nearly identical to the iPhone 5S but with a new rose gold color configuration. It's the internal specifications that differ significantly. The new iPhone SE will feature a NFC chip for Apple Pay, A9 processor and M9 motion co-processor, 12-megapixel camera sensor with the ability to capture 4K video, and a Touch ID fingerprint sensor. Unfortunately, it does not feature Apple's new 3D touch functionality. The iPhone SE will come in two models, 16GB and 64GB, priced at $399 and $499 respectively. You can buy the new iPhone starting March 31, and it will make its way to 100 countries by May.
Businesses

Apple Pay Has a Siri Problem (theverge.com) 223

An anonymous reader writes: Katherine Boehret of The Verge reports multiple issues -- systematic, as well as general unawareness among vendors -- with Apple Pay. Citing instances from her own experience, she noted issues when using Apple Pay at McDonald's, Pret A Manger, and New York City cabs. From her report, "If I buy something at one of the wrong registers, the cashier must log out of it and log on at the right register before re-entering my purchase so I can use Apple Pay. This has happened at least a dozen times." She adds, "When a tool like Apple Pay works, it's like magic. You lift your phone, use fingerprint recognition to confirm the purchase, and walk away. The Wallet app in iOS shows you a list of your recent transactions, and adding credit cards is a simple process. But if Apple Pay fails enough times or isn't accepted at enough places, people forget it exists or think it's not worth trying to use. It's a lot like Siri in that way: too many failed attempts and you'll never open it again -- at least not on purpose."
Security

iMessage Bug Allows Attackers to Decrypt Photos and Videos 27

Researchers at John Hopkins University have found a bug in the instant messaging client iMessage which, if exploited, could allow an attacker to decrypt photos and videos sent as secured messages. "Even Apple, with all their skills -- and they have terrific cryptographers -- wasn't able to quite get this right," said Matthew D. Green, whose team of graduate students at the aforementioned university found the bug. "So it scares me that we're having this conversation about adding back doors to encryption when we can't even get basic encryption right." Apple acknowledged the bug to The Washington Post, adding that it had "partially" fixed the glitch with iOS 9 software update last year. The company assures that it will be offering a complete patch for the bug with iOS 9.3, which will be released on Monday.
Cellphones

Ask Slashdot: Are You Excited About Upcoming 4-inch iPhone or 9.7-inch iPad Pro? 310

If rumors are to be believed, at its 'Let Us Loop You In' event on Monday, Apple will launch a new smartphone dubbed "iPhone SE," and a new tablet dubbed "iPad Pro." According to 9to5Mac's Mark Gurman, who has a reliable track record with Apple news, the iPhone SE will sport a 4-inch display and have the same processor, RAM and other innards as the iPhone 6s, which was launched last year. The new 9.7-inch iPad will reportedly have the same hardware specifications as the 12-inch iPad Pro, which was also unveiled last year. The Associated Press reports that the forthcoming event hasn't stirred "much passion." It adds, "So far, however, there have been no hints of any dramatic announcements, such as last year's highly anticipated Apple Watch debut, or major initiatives like the company's long-rumoured but yet-to-materialize streaming TV service." Are you looking forward to purchasing either of the devices?
Security

Apple Hires Corporate Security Chief Amid Legal Battle With FBI (fortune.com) 61

An anonymous reader writes: Apple has hired a new security executive to oversee its corporate digital defenses as a result of the ongoing battle with the U.S. government over law enforcement's desire to crack into the San Bernardino shooter's iPhone 5c. George Stathakopoulos, former vice president of information security at Amazon.com and before that Microsoft's general manager of product security, is the new appointee designated to be the vice president of corporate information security. Stathakopoulos will be responsible for protecting corporate assets, such as the computers used to design products and develop software, as well as data about customers. The new hire is a sign of increased focus on security issues at Apple.
Businesses

Rumor: Broadcom Phasing Out Wi-Fi Chip Business (digitimes.com) 65

jones_supa writes: According to sources in Taiwan at the heart of the electronics industry, Broadcom is looking to phase out its Wi-Fi chip business in a move to streamline its workforce and product offerings following its acquisition by Avago Technologies. In general, the Wi-Fi chip business yields relatively low gross margins compared to other product lines due to fierce price competition in the market for mass-market applications (such as notebooks, tablets, TVs and smartphones). Companies such as MediaTek, Realtek Semiconductor and RDA Microelectronics have already received a pull-in of short lead-time orders from Broadcom's customers in the Wi-Fi sector. Following its merger with Avago, Broadcom is expected to allocate more RD resources to solutions in the fiber-optic and server sectors. In addition, Broadcom has almost halved the workforce stationed at its office in Taipei.
IOS

More Devs Now Use OS X Than Linux, Says Survey (9to5mac.com) 532

An anonymous reader writes from an article on 9to5Mac: Stack Overflow reports that more developers now use OS X than Linux as their primary OS, and that if the trend continues, fewer than half of all developers will be using Windows next year. The site says it carried out "the most comprehensive developer survey ever conducted," with more than 56,000 coders across 173 countries taking part.
The survey also mentioned more were still developing for Android than iOS -- 61.9% versus 47.5%. However, almost a third of developers are using Swift, which was also the second most loved language after Rust.
Security

Pwn2Own 2016 Recap: Hackers Earn $460,000 For 21 Hacks (securityweek.com) 52

wiredmikey writes from an article on SecurityWeek: Pwn2Own 2016 has come to an end, with researchers earning a total of $460,000 in cash for disclosing 21 new vulnerabilities in Windows, OS X, Flash, Safari, Edge and Chrome. On the first day of the well-known hacking competition, contestants earned $282,500 for vulnerabilities in Safari, Flash Player, Chrome, Windows and OS X. On the second day, Tencent Security Team Sniper took the lead after demonstrating a successful root-level code execution exploit in Safari via a use-after-free flaw in Safari and an out-of-bounds issue in Mac OS X. The exploit earned them $40,000 and 10 Master of Pwn points. This year's contestants earned nearly $100,000 less for their exploits compared to Pwn2Own 2015, when researchers walked away with more than $550,000 for their exploits.
Android

US Government Pushed Many Tech Firms To Hand Over Source Code (zdnet.com) 151

An anonymous reader writes: Apple isn't the only company that has been asked to hand over the source code of its operating system. In an effort to find security flaws that could be used for surveillance or investigations, the U.S. government has made numerous attempts to obtain the source code from other tech companies. From the ZDNet report, "The government has demanded source code in civil cases filed under seal but also by seeking clandestine rulings authorized under the secretive Foreign Intelligence Surveillance Act (FISA), a person with direct knowledge of these demands told ZDNet. The Justice Department wanted to draw outrage, painting Apple as the criminal. With these hearings held in secret and away from the public gaze, the person said that the tech companies hit by these demands are losing 'most of the time.'"
Encryption

Apple Employees, If Ordered To Unlock iPhone, Might Quit (nytimes.com) 417

An anonymous reader quotes an NYTimes article: Apple employees are already discussing what they will do if ordered to help law enforcement authorities. Some say they may balk at the work, while others may even quit their high-paying jobs rather than undermine the security of the software they have already created, according to more than a half-dozen current and former Apple employees. [...] The employees' concerns also provide insight into a company culture that despite the trappings of Silicon Valley wealth still views the world through the decades-old, anti-establishment prism of its co-founders Steven P. Jobs and Steve Wozniak. [...] The fear of losing a paycheck may not have much of an impact on security engineers whose skills are in high demand. Indeed, hiring them could be a badge of honor among other tech companies that share Apple's skepticism of the government's intentions.
AI

Facebook's Messenger Bot Store Could Be Most Important Launch Since App Store (techcrunch.com) 60

An anonymous reader writes from an opinionated article on TechCrunch by Tom Hadfield: If Facebook announces the "Messenger Bot Store" at F8, as many predict, it would be arguably the most consequential event for the tech industry since Apple announced the App Store and iPhone SDK in March 2008. Today, Facebook Messenger has 800 million monthly active users -- more than 100 times the number of iPhone owners when Apple launched the App Store. In January, TechCrunch first reported rumors of Facebook's secret Chat SDK for building Messenger bots. If and when Facebook announces a Bot Store, it will mark the "end of the beginning" of a new era: messaging as a platform. Over the summer, The Information broke the news that AI-powered Facebook M would enable Messenger users to make purchases, restaurant reservations, and travel bookings within the messaging interface. A Messenger Bot Store would have far-reaching consequences not only for entrepreneurs and investors, but also developers and designers. Sam Lessin, the CEO of Fin, says the rise of chat-based user interfaces will mark "a fundamental shift that is going to change the types of applications that get developed and the style of service development." For a time, bots were perceived to be plain-text exchanges and as such were often described as "invisible apps." As Jonathan Libov at USV points out, "just because the container is a messenger doesn't mean that all the apps inside are text-based." Tomaz Stolfa says there is "unexplored potential in blending conversational interfaces with rich graphical UI elements." If 800 million Facebook users start discovering bots in Messenger after F8, it will vindicate those who have been saying bots are the new apps.
Cloud

Apple Stores iCloud Data With Google (crn.com) 49

An anonymous reader writes: Alphabet's Google has quietly scored a major coup in its campaign to become an enterprise cloud computing powerhouse, landing Apple as a customer for the Google Cloud Platform, multiple sources with knowledge of the matter told CRN this week. Previously, Apple had acknowledge using Amazon Web Services (AWS) and Microsoft Azure's rival cloud computing platforms in addition to its own data centers. None of the services would have access to iCloud users' records. "The iCloud information is not at risk of being breached or otherwise observed by the ultimate owners of the platforms it resides on because of the very heavy encryption and partitioning technologies used," commended Chris Green, a tech expert at the consultancy Lewis. CRN has mentioned the agreement between the two companies was done late last year.
Encryption

Tim Cook Talks About Encryption, Right to Privacy, Public Safety, and DOJ (time.com) 135

TIME reporters sat down with Apple CEO, Tim Cook, to talk about encryption, public safety, and right to privacy among other subjects. The wide-ranging interview captures Cook's discomfort with how his company has been treated by the Department of Justice. Following are some interesting excerpts from the interview: The thing that is different to me about Messages versus your banking institution is, the part of you doing business with the bank, they need to record what you deposited, what your withdrawals are, what your checks that have cleared. So they need all of this information. That content they need to possess, because they report it back to you. That's the business they're in. Take the message. My business is not reading your messages. I don't have a business doing that. And it's against my values to do that. I don't want to read your private stuff. So I'm just the guy toting your mail over. That's what I'm doing. So if I'm expected to keep your messages, and everybody else's, then there should be a law that says, you need to keep all of these. [...] Law enforcement should not be whining about iPhones; it should be rolling around in all the other free information that criminals and terrorists are spewing through social networks and Nest thermostats, surveillance cameras and Hello Barbies. [...] Going dark -- this is a crock. No one's going dark.
IOS

The Law Is Clear: the FBI Cannot Make Apple Rewrite Its OS (backchannel.com) 367

An anonymous reader cites a post by Susan Crawford, Harvard Law Professor and former Obama Special Assistant: From her column at Backchannel, "Barack Obama has a fine legal mind. But he may not have been using it when he talked about encryption last week. [...] The problem for the president is that when it comes to the specific battle going on right now between Apple and the FBI, the law is clear: twenty years ago, Congress passed a statute, the Communications Assistance for Law Enforcement Act (CALEA) that does not allow the government to tell manufacturers how to design or configure a phone or software used by that phone -- including security software used by that phone.
Security

Researchers Find iOS Malware That Infects Non-Jailbroken Devices (paloaltonetworks.com) 39

An anonymous reader writes: Researchers at Palo Alto Networks are reporting about a new iOS malware that could infect non-jailbroken devices without a user's consent. Dubbed "AceDeceiver," the iOS malware exploits a flaw in Apple's DRM software. The researchers claim that the iOS malware could technically infect any type of iOS device, provided a user downloads a third-party app. From the blog post on Palo Alto Networks' website, "AceDeceiver is the first iOS malware we've seen that abuses certain design flaws in Apple's DRM protection mechanism -- namely FairPlay -- to install malicious apps on iOS devices regardless of whether they are jailbroken. This technique is called "FairPlay Man-In-The-Middle (MITM)" and has been used since 2013 to spread pirated iOS apps, but this is the first time we've seen it used to spread malware." The aforementioned malware required users to download a compromised Windows application. Apple has removed three offending apps from the App Store, and it appears that only users in China were targetted.
Democrats

Apple Files Final Response In San Bernardino iPhone Case (reuters.com) 250

An anonymous reader writes: In its final briefing before a court showdown next week, Apple said, "The court must consider the national debate surrounding the issue of mandating a backdoor or the dangers to the security and privacy of millions of citizens. According to Apple, the government also believes the courts can order private parties "to do virtually anything the Justice Department and FBI can dream up. The Founders would be appalled." In response to the government, Apple said, "the catastrophic security implications of that threat only highlight the government's fundamental misunderstanding or reckless disregard of the technology at issue and the security risks implicated by its suggestion." According to TechCrunch, Apple made an interesting change in its strategy in the court on Tuesday. From its article, "The tone of today's filing and subsequent call was much more cold and precise. Apple got some time to consider the best way to respond and went with dissecting the FBI's technical arguments in a series of precise testimonies by its experts. Where the FBI filing last week relied on invective, Apple's this week relies on poking holes in critical sections of the FBI's technical narrative." Edward Snowden also made a remark about the hearing. He tweeted, "Today I learned that "#Apple has way better lawyers than the DOJ."
Blackberry

What Apple Can Learn From BlackBerry Not To Do (informationweek.com) 150

dkatana writes: There is no shortage of news about the fight between Apple and the Justice Department to unlock the iPhone of a suspect in the San Bernardino, Calif., terrorist case. Apple can take a page from the fight BlackBerry had back in 2010 with some governments in the Middle East and Asia. At that time -- afraid to lose a lucrative business -- RIM [gave] in and allowed those governments to access its secure BBM (BlackBerry Messenger) service. The rest is history. If Apple complies with the Justice Department request, according to Craig Federighi, senior VP of software engineering at Apple, "[This software -- which law enforcement has conceded it wants to apply to many iPhones --] would become a weakness that hackers and criminals could use to wreak havoc on the privacy and personal safety of us all."
IOS

DOJ Threatens To Seize iOS Source Code (idownloadblog.com) 596

An anonymous reader writes from an article posted on iDownloadBlog: The DoJ is demanding that Apple create a special version of iOS with removed security features that would permit the FBI to run brute-force passcode attempts on the San Bernardino shooter's iPhone 5c. Meanwhile, President Barack Obama has made public where he stands on the Apple vs. FBI case, which has quickly become a heated national debate. In the court papers, DoJ calls Apple's rhetoric in the San Bernardino standoff as "false" and "corrosive" because the Cupertino firm dared suggest that the FBI's court order could lead to a "police state." Footnote Nine of DoJ's filing reads:

"For the reasons discussed above, the FBI cannot itself modify the software on the San Bernardino shooter's iPhone without access to the source code and Apple's private electronic signature. The government did not seek to compel Apple to turn those over because it believed such a request would be less palatable to Apple. If Apple would prefer that course, however, that may provide an alternative that requires less labor by Apple programmers."

As Fortune's Philip-Elmer DeWitt rightfully pointed out, that's a classic police threat. "We can do this [the] easy way or the hard way. Give us the little thing we're asking for -- a way to bypass your security software -- or we'll take [the] whole thing: your crown jewels and the royal seal too," DeWitt wrote. "With Apple's source code, the FBI could, in theory, create its own version of iOS with the security features stripped out. Stamped with Apple's electronic signature, the Bureau's versions of iOS could pass for the real thing," he added.

Software

Major Browsers Add Experimental Support For WebAssembly (thestack.com) 118

An anonymous reader writes: Four major web browsers have announced support for the near-native compiling technology WebAssembly, and collaborated to bring an initial common game demo of Angry Bots, running via Unity and WebAssembly, to experimental builds of Chrome, Firefox, Microsoft Edge and, shortly, Safari. WebAssembly was launched last year in a joint project between Microsoft, Mozilla, Apple and Google as a potentially more efficient route to assembly-level performance than asm.js, which is in itself a low-level subset of JavaScript.

Slashdot Top Deals