Digital

Choosing to Skip the Upgrade and Care for the Gadget You've Got (nytimes.com) 183

The New York Times has run a piece on its "Tech Fix" section, in which it argues, citing a user's experience, why skipping an upgrade might not be a bad idea, and how you could hold on to your existing device for a little longer. The story revolves around Vincent Lai, who dug up a Palm Treo, a smartphone that was disconnected last decade, and found that with little tweaks, the phone still had some life in it. From the article: Mr. Lai's behavior might be extreme, but his experience with the Palm Treo illustrates there is another way: If you simply put some maintenance into electronics as you would a car, you can stay happy with your gadgets for years. It is part of a movement of anti-consumerism, or the notion of cherishing what you have rather than incessantly buying new stuff. Signs of this philosophy are spreading: Industry data suggests that consumers are waiting longer to upgrade to new phones than they have in the past. [...] When smartphones and tablets were fairly sluggish and limited in abilities compared with computers, there was a compelling reason to buy a new mobile device every few years. But now the mobile gadgets have become so fast and capable that you can easily keep them much longer. "A five-year-old computer is still completely fine now," Mr. Wiens said. "We're starting to hit that same plateau with phones now."The article also shares some tips such as clearing up storage and getting your device's battery replaced -- which costs roughly $20 to $40 -- that can help you get the max out of your phone and tablet. There's one more aspect, which the aforementioned article doesn't talk about. If you have an old iDevice -- iPhone or iPad -- upgrading to the latest available version of the operating system could substantially slow it up. Not upgrading, however, exposes your device to a range of security attacks. It's a tough choice.
Businesses

Almost Nothing About the 'Apple Harvests Gold From iPhones' Story Is True (vice.com) 45

Jason Koebler, reporting for Motherboard: You may have seen a viral headline floating around over the last few days: Apple recycled $40 million worth of gold last year, which was extracted from iPhones. Almost none of what was reported is true. [...] Here is the truth: Apple paid independent recyclers to recycle old electronics -- which were almost never Apple products, by the way -- because it's required by law to do so. Far from banking $40 million on the prospect, Apple likely ended up taking an overall monetary loss. This is not because Apple is a bad actor or is hiding anything, it's simply how the industry works. All electronics manufacturers that sell products in the United States are required to do e-waste recycling under laws enacted in 25 states. The laws are different in each state, but none of them require Apple to recycle Apple products. Instead, they usually require manufacturers to recycle a certain amount of pounds of e-waste, which is linked to either their market share or to the overall weight of products they sell. That's why you see Apple noting that it recycled "71 percent of the total weight of products we sold seven years earlier."
Privacy

Can Switzerland Become a Safe Haven For the World's Data? (dailydot.com) 103

An anonymous reader shares an interesting article on Daily Dot which lists a number of reasons why Switzerland should be deemed as the nation for storing all of your data. The article reads: As United States and European Union regulators debate a sweeping new data-privacy agreement, Switzerland is presenting itself as a viable neutral location for storing the world's data thanks to strict privacy laws and ideal infrastructure. The Swiss constitution guarantees data privacy under Article 13. The country's laws protecting privacy are similar to those enacted by the E.U. Swiss data protections are also, in some cases, much stricter than those of the E.U., according to Nicola Benz, attorney at Swiss law firm Froriep. And since Switzerland is not part of the E.U., data stored there remains outside the reach of the union's authorities. [...] The country's tight privacy laws could make the small nation more attractive to privacy-focused start-ups. And it already has that momentum. After the former NSA contractor Edward Snowden 2013 revelations about the National Security Agency's secret surveillance activities, Switzerland witnessed something of a boom in its data-center business. Phil Zimmermann, creator of the popular PGP encryption protocol and founder of Silent Circle, even left the U.S. for Switzerland last year, citing the overreach of American authorities. Andy Yen, CEO of Swiss-based encrypted email service Protonmail, said that the country has robust processes in how it carries out data requests from authorities. Data requests have to go through a court like in most countries, said Yen, but "the person that's having their data requested needs to be notified eventually about the request happening and there's an opportunity to fight it in an open court. This is quite different than the U.S., where things can go through a so-called FISA court."
Encryption

FBI Tells Congress It Needs Hackers To Keep Up With Tech Company Encryption (buzzfeed.com) 103

An anonymous reader quotes a report from BuzzFeed: A high ranking technology official with the FBI told members of Congress Tuesday that the agency is incapable of cracking locked phones and devices on its own, even with additional resources. Amy Hess, the agency's executive assistant director for science and technology told a panel of the House Energy and Commerce Committee that encrypted communications continue to pose a challenge to the American law enforcement, and to the safety of the American public. But when asked by lawmakers to provide a practical solution beyond the FBI's talking points, she said that the cooperation of technology companies would be necessary. According to the New York Times, "The FBI defended its hiring of a third-party company to break into an iPhone used by a gunman in last year's San Bernardino, Calif., mass shooting, telling some lawmakers on Tuesday that it needed to join with partners in the rarefied world of for-profit hackers as technology companies increasingly resist their demands for consumer information." They are stressing the importance of cooperation with tech companies and "third parties" to help fight terrorism, claiming they do not have the capabilities and resources available to crack encrypted devices. Congress is currently debating potential legislation on encryption.
Encryption

Apple Refused China Request For Source Code In Last Two Years: Lawyer (reuters.com) 57

Dustin Volz, reporting for Reuters: Apple has been asked by Chinese authorities within the last two years to hand over its source code but refused to do so, the company's top lawyer told U.S. lawmakers at a hearing on Tuesday. Apple general counsel Bruce Sewell made the statement in response to a line of attack from law enforcement officials who have attempted to portray Apple as complicit in handing over information to Chinese authorities for business reasons while refusing to cooperate with U.S. requests for access to private data in criminal investigations. Apple and the FBI returned to Washington to testify before lawmakers about their heated disagreement over law enforcement access to encrypted devices, highlighted in the case of a locked iPhone linked to a gunman in last December's Islamist militant-inspired shootings in San Bernardino, California. Earlier in the hearing before a House Energy and Commerce subcommittee, Captain Charles Cohen, commander in the Indiana State Police, repeated the suggestion that Apple has quietly cooperated with Beijing. But when pressed by Representative Anna Eshoo, a California Democrat, for the source of that claim, Cohen only cited news reports. "That takes my breath away," a visibly frustrated Eshoo said. "That is a huge allegation."In some other Apple news, the Cupertino-based company complied with 80% of U.S. law enforcement requests in the second half of 2015, its just released transparency report shows. U.S. law enforcement asked Apple for information 4,000 times, covering 16,112 devices in the second half of 2015.
Portables (Apple)

Apple Launches MacBook 2016 With Intel Skylake Processor, Longer Battery Life 179

Apple, on Tuesday, announced a refresh for its 12-inch MacBook laptop. The 2016 MacBook comes with an Intel Skylake processor -- sixth-generation dual-core Intel Core M model, offering up to 1.3 GHz clock speed with Turbo Boost speeds of up to 3.1 GHz, faster 1866 MHz memory, and a 'rose gold' color variant. Apple assures 10 hours of wireless Web browsing time, or 11 hours of movie playback on a single charge. The new model will hit retail stores on Wednesday. It starts at $1,299 for the 256GB SSD and 8GB (up from 4GB) version, and goes all the way up to $1,599 for the top-of-the-line model which offers 512GB SSD.

A couple of points: the first-generation MacBook didn't fare well with reviewers and plenty of users alike. Second, today's announcement also hints that the MacBook Air and the MacBook Pro lineups won't be getting the Intel Skylake upgrade for at least a few more months -- which is really sad, because, at present, they come equipped with almost three-year-old processor and graphics chips. No wonder, Oculus executive made fun of Apple's computers.
Desktops (Apple)

Rogue Source Code Repos Can Compromise Mac Security Due To Old Git Version (softpedia.com) 184

An anonymous reader writes: Recent Mac versions come bundled with a very old version of Git (2.6.4) that is vulnerable to two security flaws that allow attackers to execute code on the device when the user forks a Git repo holding "malicious" code. The problem is that users can't upgrade this Git repo, they can't change its runtime permissions, nor can they remove it because Apple blocks even root users from twiddling with some system-level programs. "If you rely on machines like this, I am truly sorry. I feel for you," the researcher wrote on her blog. "I wrote this post in an attempt to goad them [Apple] into action because this is affecting lots of people who are important to me. They are basically screwed until Apple deigns to deliver a patched git unto them."
Encryption

BlackBerry Comments on Canadian Police Eavesdropping Report (blackberry.com) 61

Last week, a report, citing court documents, claimed that Canadian police have had BlackBerry's global decryption key since 2010. Today BlackBerry CEO John Chen officially commented on the report. In a blog post, Chen reiterated that his company remains committed to doing what is "right for the citizenry," without confirming if the Candian police have the "global encryption key." "I have stated before that we are indeed in a dark place when companies put their reputations above the greater good," Chen wrote, adding that the company's cooperation with the Canadian police resulted in shutting down a criminal organization. He adds: Regarding BlackBerry's assistance, I can reaffirm that we stood by our lawful access principles. Furthermore, at no point was BlackBerry's BES server involved. Our BES continues to be impenetrable -- also without the ability for backdoor access -- and is the most secure mobile platform for managing all mobile devices. That's why we are the gold standard in government and enterprise-grade security. For BlackBerry, there is a balance between doing what's right, such as helping to apprehend criminals, and preventing government abuse of invading citizen's privacy, including when we refused to give Pakistan access to our servers. (Update). We have been able to find this balance even as governments have pressured us to change our ethical grounds. Despite these pressures, our position has been unwavering and our actions are proof we commit to these principles. To recall, Chen criticized Apple last year when the iPhone maker refused to unlock a terrorist's iPhone. At the time, he said, Apple was "putting reputation above the greater good."
Technology

Silicon Valley's Legendary 'Coach' Bill Campbell Has Died (recode.net) 18

Kara Swisher, reporting for Recode: Bill Campbell, who garnered the name "The Coach" for the sage advice and counsel he gave numerous tech leaders from Apple's Steve Jobs to Google's Larry Page to Amazon's Jeff Bezos, has died. He was battling with cancer. News of his passing popped up on Facebook early this morning and many prominent tech players also confirmed the death to me, which came after a long battle with cancer. It is a big loss for Silicon Valley, given the impact a man who said he did not even know how to do HTML had by virtue of wisdom alone. But he was not without tech chops. Campbell ran companies like Intuit and worked in key jobs at Apple, Claris and Go, and also served on a plethora of boards, including Columbia University, Intuit and Apple. He has been a longtime adviser to Google execs including Page and Eric Schmidt -- and really just about every major tech executive you could think of at some point.VentureBeat interviewed Campbell in 2011, in which he shared coaching tips.
Cloud

Music Industry Sees First Big Gains in 20 Years Thanks to Streaming Services 134

Thanks to subscription-based music streaming services, the music industry is seeing a significant growth for the first time in nearly two decades. According to International Federation of the Phonographic Industry (IFPI), an industry trade group, the global music sales rose 3.2 percent last year, also surpassing those from all physical music formats. The important tipping point in 2015 saw digital services account for 45 percent of recorded music revenue. According to the report, Spotify, Apple Music and other music streaming services brought in about $2.9 billion in revenue. The findings are in line with Recording Industry Association of America (RIAA)'s estimates from last month. IFPI also noted that music on free streaming services such as YouTube has also grown quickly, creating a panic among record labels and artists alike. Billboard elaborates that aspect: In criticizing ad-supported services, the IFPI joined a growing list of trade bodies and music company executives to criticize YouTube for paying royalties that are relatively low when considering its popularity. The report argues YouTube distorts its negotiations with labels by hiding behind the DMCA "safe harbor" rules that limit the liability of online intermediaries from the infringing actions of their users. The result, the IFPI argues, is YouTube can use an "act first, negotiate later" that "fundamentally distort[s] the negotiation process."
Android

Google's Android N OS Will Support Pressure-Sensitive Screens (theverge.com) 68

An anonymous reader writes: In the latest Developer Preview 2 of Android N, Google introduced new "Launcher shortcuts" to the beta OS. It allows developers to "define shortcuts which users can expose in the launcher to help them perform actions quicker." It's reminiscent of Apple's "3D Touch" feature found in the iPhone 6s and iPhone 6s Plus, which can allow for specific parts of an app to be displayed in a pop-up menu when users forcefully press on an icon or other miscellaneous piece of information developed with the feature.

As mentioned in Phandroid's report testing the "setDynamicShortcuts(List)" feature, Google offered four different scenarios where Launcher Shortcuts make sense: Navigating users to a particular location in a mapping app, sending messages to a friend in a communication app, playing the next episode of a TV show in a media app, or loading the last save point in a gaming app.

"Google says that the manufacturers who build Android devices wanted this use case addressed by the OS itself," according to The Verge, so that developers "can code for all Android devices instead of reinventing the pressure-sensitive wheel for each OEM."
Government

Snowden Predicts Global iPhone Hack, Records Song (popsci.com) 71

Edward Snowden criticized the FBI for leaving open security holes found in the iPhone, predicting the hack will now become globally available by the end of 2016. "Personally, I think we'll see it by the end of August," he wrote to his two million followers on Twitter, where one British newspaper reports Snowden was also "recently invited into a Twitter private group chat with a lot of teenage girls who didn't know who he was." (Snowden asked them to call him "Ed," and warned them that if they messaged him, the NSA would read their messages.)

Friday Snowden also tweeted a 2013 article about the U.C. Davis police officer who used pepper spray on protesters, writing that the officer was later awarded $38,000 "for his 'pain and suffering'." But Snowden has also been collaborating with French electronic musician Jean-Michel Jarre, contributing samples of his voice to a six-minute track to be included on an upcoming album. "Technology can actually increase privacy," Snowden says on the track, which is available on YouTube. "The question is: Why are our private details that are transmitted online, why are your private details that are stored on our personal devices, any different than the details and private records of our lives that are stored in our private journals?"
Businesses

Apple Expects Users To Replace Their iPhone, Apple Watch After Three Years 175

Apple says it expects its users to replace their iPhone and Apple Watch after (more like, every) three years. The company adds that it expects a Mac user to replace their computer after four years. The iPhone maker shared the expectations in a recently released document as part of its latest environmental push. In the document, Apple underscores how much its products contribute to the greenhouse gas lifecycle. The Guardian reports: Within a new question and answer section Apple said: "Years of use, which are based on first owners, are assumed to be four years for OS X and tvOS devices and three years for iOS and watchOS devices." That assessment doesn't take into account the recycling of devices, their reconditioning and their resale, of course, but when you buy a new iPhone 6S for $649 (starting price, off-contract), Apple expects it to last three years, something many suspected. Apple has been accused of intentionally slowing down iPhones every time a new one is released, although there is little evidence to support the theory.Also see: Apple's Recycling Initiatives Recover $40 Million In Gold
The Almighty Buck

Apple's Recycling Initiatives Recover $40 Million In Gold (macrumors.com) 138

An anonymous reader writes: Apple released its latest annual environmental report yesterday with numbers detailing how much the company has been able to recover from old devices. Business Insider notes that Apple was able to recover over 61 million pounds of steel, aluminum, glass, and other materials from its computers and iPhones. This includes a total of 2,204 pounds of gold worth $40 million at current prices ($1,229.80 per troy ounce of gold). Cult of Mac ran the figures quoted by Apple through today's metal prices, and came up with individual figures for copper ($6.4 million), aluminum ($3.2 million), silver ($1.6 million), nickel ($160,426), zinc ($109,503), and lead ($33,999). Last month, Apple unveiled an iPhone recycling robot, named Liam, that salvages old parts.
Censorship

Apple's iTunes Movies and iBooks Stores Mysteriously Go Down In China (appleinsider.com) 14

tedlistens writes: China-based customers of the iTunes movies and books stores reported network errors beginning on Thursday. Apple did not comment, but Apple Insider offers an unverified report that the storefronts have been closed "due to a pending government investigation into Apple's business practices." Apple first opened its doors to its movie and e-book online stores in China last September, which included the activation of Apple Music services. While the music streaming services remain operational, the movie and e-book stores are not. China's censorship laws and strict regulations in general have been tough for U.S. companies like Apple to navigate. Last year, Apple was actively disabling its iOS News app for its Chinese customers, a move many believe to be in adherence of China's censorship policies. Eddy Cue, SVP of Internet Software and Services, denied those claims.
IOS

Apple Considering Google-Like 'Paid Search' On App Store (bloomberg.com) 49

Apple is considering big changes to the App Store, according to a Bloomberg report. The publication claims that the iPhone maker has a team working on "paid searches" -- something similar to Google's model. Under this, the company will charge its developers for showing their apps among top search results. Apple critic John Gruber writes: This sounds like a terrible idea. The one and only thing Apple should do with App Store search is make it more accurate. They don't need to squeeze any more money from it. More accurate, reliable App Store search would help users and help good developers. It's downright embarrassing that App Store search is still so bad. Google web search is better for searching Apple's App Store than the App Store's built-in search. That's the problem Apple needs to address.
Media

Apple Deprecating Quicktime For Windows, Micro Trends Urges Users To Uninstall (trendmicro.com) 212

harryjohnston writes: Usually when a vendor deprecates a software product and stops releasing security updates, they provide some sort of advance notice that they're intending to do so. The least we would expect is for them to announce an unexpected end-of-life themselves. However, Trend Micro released a security advisory today describing two zero-day vulnerabilities for Quicktime for Windows, and according to them, Apple told Trend Micro -- but apparently nobody else -- that they have deprecated Quicktime for Windows and will not be releasing a patch. The Register has an article on the announcement. Apple did not respond to their request for comment.
Encryption

FBI Tried To Defeat Encryption 10 Years Ago, Files Show (nytimes.com) 72

An anonymous reader shares a NYTimes article: In early 2003, F.B.I. agents hit a roadblock in a secret investigation, called Operation Trail Mix. For months, agents had been intercepting phone calls and emails belonging to members of an animal welfare group that was believed to be sabotaging operations of a company that was using animals to test drugs. But encryption software had made the emails unreadable. So investigators tried something new. They persuaded a judge to let them remotely, and secretly, install software on the group's computers to help get around the encryption. That effort, revealed in newly declassified and released records, shows in new detail how F.B.I. hackers worked to defeat encryption more than a decade before the agency's recent fight with Apple over access to a locked iPhone. The Trail Mix case was, in some ways, a precursor to the Apple dispute. In both cases, the agents could not decode the data themselves, but found a clever workaround. The Trail Mix records also reveal what is believed to be the first example of the F.B.I. remotely installing surveillance software, known as spyware or malware, as part of a criminal wiretap. 'This was the first time that the Department of Justice had ever approved such an intercept of this type,' an F.B.I. agent wrote in a 2005 document summing up the case.
Security

iOS 1970 Bug Is Back, Can Be Exploited Via Rogue WiFi Networks (softpedia.com) 106

An anonymous reader writes: Back in February iOS users noted that setting your phone/tablet's date to January 1, 1970 would permanently brick their devices. After Apple fixed the issue in iOS 9.3.1, two security researchers have now uploaded a video on YouTube showing how to exploit this bug from a remote location, with no access to the user's phone. The setup involves attackers putting up a Wi-Fi network on which they're running a rogue NTP server. This server tells iOS devices syncing their time that it's December 31, 1969, 23:59:00. Twenty minutes later, if the battery didn't catch fire (which is possible with this new exploit), the iPad or iPhone device is permanently and irreversibly bricked.
Communications

FBI Couldn't Tell Apple What Hack It Used, Even If It Wanted To (qz.com) 99

An anonymous reader writes: The US Federal Bureau of Investigation doesn't own the technique used to unlock the San Bernardino iPhone, so it can't reveal the method to Apple even if it wanted to, Reuters reported, citing unnamed White House sources. The Washington Post reported yesterday, citing unnamed sources, that the FBI had paid a hacker a one-time fee to use a piece of hardware that allowed it to access the iPhone 5c belonging to one of the San Bernardino, California assailants. The vendor that supplied the hack is a non-US company, according to Reuters. But according to the Post report, it is not the Israeli firm Cellebrite, which had previously been named. The FBI would require the vendor's cooperation in order to submit the technique it used to Vulnerabilities Equities Process, a mechanism that allows the government to consider whether it should disclose security flaws to manufacturers. It's a move that mirrors Apple's own efforts to create security systems on its phones that even it wouldn't be able to crack, meaning it can't comply with a government order to hand over user data even if it wanted to.

Slashdot Top Deals