×
Iphone

LG Might Sell iPhones In Its Stores After Quitting Android Devices (androidauthority.com) 20

LG will reportedly start selling iPhones and iPads in its South Korean stores this August -- mere months after the company quit making Android devices. Android Authority reports: According to MacRumors, the Herald Economic Daily claims LG has struck a deal with Apple to sell the iPhone and iPad in 400 stores across South Korea starting in August. LG may have to overcome some hurdles to make this happen. The company reportedly signed a "win-win" agreement with the country's National Mobile Communication Distribution Association that bars it from selling a direct competitor's phones in its stores. That deal was made in 2018, however, or well before LG signaled that it would quit making phones and tablets. LG is supposedly planning to renegotiate the agreement once it officially sells the iPhone and iPad in its shops. The deal unsurprisingly wouldn't include Macs, as systems like the MacBook Air compete directly with the Gram series and other LG computers where the iPhone and iPad are relatively safe.
Cellphones

Scientists Create the World's Toughest Self-Healing Material (interestingengineering.com) 19

An anonymous reader quotes a report from Interesting Engineering: [Researchers at the Indian Institute of Science Education and Research (IISER), Kolkata] along with those at the Indian Institute of Technology (IIT), Kharagpur decided to focus on developing something that is harder than conventional self-healing material, as reported by The Telegraph India. The researchers used a piezoelectric organic material, which converts mechanical energy to electrical energy and vice versa, to make needle-shaped crystals that aren't more than 2 mm long or 0.2 mm wide, according to the experimental results which were published in the journal Science. Due to their molecular arrangement in the specially designed crystals, a strong attractive force developed between two surfaces. Every time a fracture occurred, the attractive forces joined the pieces back again, without needing an external stimulus such as heat or others that most self-healing materials would need.

"Our self-healing material is 10 times harder than others, and it has a well-ordered internal crystalline structure, that is favored in most electronics and optical applications," lead researcher Professor Chilla Malla Reddy of IISER said. "I can imagine applications for an everyday device," said Bhanu Bhushan Khatua, a member of the team from IIT Kharagpur." Such materials could be used for mobile phone screens that will repair themselves if they fall and develop cracks."

Cellphones

iOS and Android Activations Now Split Evenly In the US, Research Shows (macrumors.com) 113

Activations of iOS and Android devices are now evenly split in the United States, with little sign of movement toward either platform dominating over the past two years, according to data sourced by Consumer Research Intelligence Partners (CIRP). MacRumors reports: CIRP estimates that iOS and Android each had 50 percent of new smartphone activations in the year ending this quarter. iOS's share of new smartphone activations climbed from 2017 to 2020, but has now remained at its peak level for a second consecutive year. CIRP Partner and Co-Founder Josh Lowitz said that the finding is significant because for several years, Android smartphones "had a significant edge, with over 60 percent of customers opting for an Android phone in most quarters. In the past couple of years, though, iOS has closed the gap, and now splits the market with Android."

Both Android and iOS users have had a high level of loyalty historically. Android loyalty has varied very slightly, in a narrow range of 90 to 93 percent in the past four years. iOS loyalty, on the other hand, has gradually increased over the past four years, from a low of 86 percent in early 2018 to 93 percent in the most recent quarter ending in June 2021. Loyalty and tendency to switch platforms may explain some of the change in the share of new smartphone activations, where iOS has gained loyalty in a market with a limited amount of switching.

Cellphones

Investigation Reveals Widespread Cellphone Surveillance of the Innocent (theguardian.com) 184

Cellphones "can be transformed into surveillance devices," writes the Guardian, reporting startling new details about which innocent people are still being surveilled (as part of a collaborative reporting project with 16 other media outlets led by the French nonprofit Forbidden Stories).

Long-time Slashdot reader shanen shared the newspaper's critique of a "privatised government surveillance industry" that's made NSO a billion-dollar company, thanks to its phone-penetrating spy software Pegaus: [NSO] insists only carefully vetted government intelligence and law enforcement agencies can use Pegasus, and only to penetrate the phones of "legitimate criminal or terror group targets". Yet in the coming days the Guardian will be revealing the identities of many innocent people who have been identified as candidates for possible surveillance by NSO clients in a massive leak of data... The presence of their names on this list indicates the lengths to which governments may go to spy on critics, rivals and opponents.

First we reveal how journalists across the world were selected as potential targets by these clients prior to a possible hack using NSO surveillance tools. Over the coming week we will be revealing the identities of more people whose phone numbers appear in the leak. They include lawyers, human rights defenders, religious figures, academics, businesspeople, diplomats, senior government officials and heads of state. Our reporting is rooted in the public interest. We believe the public should know that NSO's technology is being abused by the governments who license and operate its spyware.

But we also believe it is in the public interest to reveal how governments look to spy on their citizens and how seemingly benign processes such as HLR lookups [which track the general locations of cellphone users] can be exploited in this environment.

It is not possible to know without forensic analysis whether the phone of someone whose number appears in the data was actually targeted by a government or whether it was successfully hacked with NSO's spyware. But when our technical partner, Amnesty International's Security Lab, conducted forensic analysis on dozens of iPhones that belonged to potential targets at the time they were selected, they found evidence of Pegasus activity in more than half.

The investigators say that potential targets included nearly 200 journalists around the world, including numerous reporters from CNN, the Associated Press, Voice of America, the New York Times, the Wall Street Journal, Bloomberg News, Le Monde in France, and even the editor of the Financial Times.

In addition, the investigators say they found evidence the Pegasus software had been installed on the phone of the fiancée of murdered Saudi journalist Jamal Khashoggi. NSO denies this to the Washington Post. But they also insist that they're simply licensing their software to clients, and their company "has no insight" into those clients' specific intelligence activities.

The Washington Post reports that Amnesty's Security Lab found evidence of Pegasus attacks on 37 of 67 smartphones from the list which they tested. But beyond that "for the remaining 30, the tests were inconclusive, in several cases because the phones had been replaced. Fifteen of the phones were Android devices, none of which showed evidence of successful infection. However, unlike iPhones, Androids do not log the kinds of information required for Amnesty's detective work."

Familiar privacy measures like strong passwords and encryption offer little help against Pegasus, which can attack phones without any warning to users. It can read anything on a device that a user can, while also stealing photos, recordings, location records, communications, passwords, call logs and social media posts. Spyware also can activate cameras and microphones for real-time surveillance.
Cellphones

China's Xiaomi Overtakes Apple In the Global Smartphone Market (cnbc.com) 26

Chinese smartphone maker Xiaomi was the second-largest smartphone maker in the second quarter, overtaking Apple, according to analyst firm Canalys. CNBC reports: Xiaomi had a 17% share of global smartphone shipments, ahead of Apple's 14% and behind Samsung's 19%. "Xiaomi is growing its overseas business rapidly," Canalys research manager Ben Stanton said in a press release, noting shipments increased 300% year on year in Latin America and 50% in Western Europe. The Chinese smartphone maker posted year-on-year smartphone shipment growth of 83% versus 15% for Samsung and 1% for Apple. Stanton noted, however, that Xiaomi phones are still skewed toward the mass market, with the average selling price of its handsets 75% cheaper than Apple's.
Cellphones

Ask Slashdot: How Secure Is a Cellphone's eSIM? (pcmag.com) 41

A few months ago PC Magazine explained eSIMs: You almost certainly have a SIM card: a thumbnail-sized chip that sits in your mobile phone, telling it which carrier and what phone number you use. Now those SIMs are going digital (or "e") and moving your information to a reprogrammable, embedded chip.

A SIM card is a "subscriber identity module." Required in all GSM, LTE, and 5G devices, it's a chip that holds your customer ID and details of how your phone can connect to its mobile network... An eSIM takes the circuitry of a SIM, solders it directly to a device's board, and makes it remotely reprogrammable through software... There are some minor consumer downsides, though. With eSIMs, it's harder to switch one plan between devices — you can't just swap the physical card around — and they can make it harder for you to temporarily remove your SIM if you don't want to be tracked by a carrier.

Google's Pixels have had eSIMs since 2017, and Apple's iPhones have had them since 2018...

Now let's see how long-time Slashdot reader shanen feels about them: Shopping for a new smartphone due to premature battery swelling of a cheapie, but surprised to find out I can't just plug the SIM into a new phone. There ain't no SIM here, but rather the dying phone has an eSIM.... Quick research indicated it's only software, so my obvious question is "How secure can an eSIM be?" (The obvious search results also fail to produce "fresh" results.)

But the black hats have already had a couple of years to work on the problem, and it seems intrinsically difficult to do anything securely if you're only using software. My probably obsolete understanding is that part of the basis of SIM security is that you'd have to destroy the SIM to save its data, but is there an actual security expert in the house?

Related question based on my surprise. How would you even know if you're using an eSIM? Especially since it appears to be possible to use an eSIM on a phone with a SIM.

Share your own thoughts and opinions in the comments.

How secure is an eSIM?
Cellphones

'We Got the Phone the FBI Secretly Sold to Criminals' (vice.com) 70

Motherboard bought an FBI "Anom" phone that the agency secretly sells to criminals to monitor their communications. Joseph Cox reports: The sleek, black phone seems perfectly normal. Unlocking the Google Pixel 4a with a PIN code reveals some common apps: Tinder, Instagram, Facebook, Netflix, and even Candy Crush. But none of those apps work, and tapping their icons doesn't do anything. Resetting the phone and typing in another PIN opens up an entirely different section of the device, with a new background and new apps. Now in place of the old apps sit a clock, a calculator, and the device's settings. Clicking the calculator doesn't open a calculator -- it opens a login screen.

"Enter Anom ID" and a password, the screen reads. Hidden in the calculator is a concealed messaging app called Anom, which last month we learned was an FBI honeypot. On Anom, criminals believed they could communicate securely, with the app encrypting their messages. They were wrong: an international group of law enforcement agencies including the FBI were monitoring their messages and announced hundreds of arrests last month. International authorities have held press conferences to tout the operation's success, but have provided few details on how the phones actually functioned.

Motherboard has obtained and analyzed an Anom phone from a source who unknowingly bought one on a classified ads site. On that site, the phone was advertised as just a cheap Android device. But when the person received it, they realized it wasn't an ordinary phone, and after being contacted by Motherboard, found that it contained the secret Anom app. When booting up the phone, it displays a logo for an operating system called "ArcaneOS." Very little information is publicly available on ArcaneOS. It's this detail that has helped lead several people who have ended up with Anom phones to realize something was unusual about their device. Most posts online discussing the operating system appear to be written by people who have recently inadvertently bought an Anom device, and found it doesn't work like an ordinary phone. After the FBI announced the Anom operation, some Anom users have scrambled to get rid of their device, including selling it to unsuspecting people online. The person Motherboard obtained the phone from was in Australia, where authorities initially spread the Anom devices as a pilot before expanding into other countries.

Cellphones

OnePlus 9 Benchmarks Deleted From Geekbench Over Cheating Allegations (androidauthority.com) 27

Popular benchmark site Geekbench has removed OnePlus 9 benchmarks from its charts due to allegations that the company designed Oxygen OS optimization tools in such a way that they could be viewed as cheating. Android Authority reports: Yesterday, AnandTech posted some information about "weird behavior" it spotted with the OnePlus 9 Pro. According to the team's research, Oxygen OS apparently limits the performance of some popular Android apps -- but none of those apps are benchmark suites. Geekbench, one of the more popular benchmarking sites, took these allegations seriously. After conducting its own investigation, Geekbench recently announced that it has removed all OnePlus 9 benchmarks from its charts. Geekbench, one of the more popular benchmarking sites, took these allegations seriously. After conducting its own investigation, Geekbench recently announced that it has removed all OnePlus 9 benchmarks from its charts. Geekbench called Oxygen OS's behavior a form of "benchmark manipulation." OnePlus has yet to issue a statement on the matter. In some of our own testing, we found that AnandTech's data is on the mark. We found that the OnePlus 9 series limits the performance of Google Chrome while older OnePlus phones do not. OnePlus issued a statement to Android Authority addressing the matter: "Our top priority is always delivering a great user experience with our products, based in part on acting quickly on important user feedback. Following the launch of the OnePlus 9 and 9 Pro in March, some users told us about some areas where we could improve the devices' battery life and heat management. As a result of this feedback, our R&D team has been working over the past few months to optimize the devices' performance when using many of the most popular apps, including Chrome, by matching the app's processor requirements with the most appropriate power. This has helped to provide a smooth experience while reducing power consumption. While this may impact the devices' performance in some benchmarking apps, our focus as always is to do what we can to improve the performance of the device for our users."

This is reminiscent of when the company was caught pushing the OnePlus 5's performance capabilities when the OS detected a benchmark app. This resulted in artificially inflated scores that users would not see during real-world usage.
China

YouTube Criticized For Removing Videos Documenting China's Persecution of Uighur Muslims (reuters.com) 130

"A human rights group that attracted millions of views on YouTube to testimonies from people who say their families have disappeared in China's Xinjiang region is moving its videos to little-known service Odysee after some were taken down by the Google-owned streaming giant, two sources told Reuters."

Long-time Slashdot reader sinij shares their report: Atajurt Kazakh Human Rights' channel has published nearly 11,000 videos on YouTube totaling over 120 million views since 2017, thousands of which feature people speaking to camera about relatives they say have disappeared without a trace in China's Xinjiang region, where UN experts and rights groups estimate over a million people have been detained in recent years. On June 15, the channel was blocked for violating YouTube's guidelines, according to a screenshot seen by Reuters, after twelve of its videos had been reported for breaching its 'cyberbullying and harassment' policy. The channel's administrators had appealed the blocking of all twelve videos between April and June, with some reinstated — but YouTube did not provide an explanation as to why others were kept out of public view, the administrators told Reuters.

Following inquiries from Reuters as to why the channel was removed, YouTube restored it on June 18, explaining that it had received multiple so-called 'strikes' for videos which contained people holding up ID cards to prove they were related to the missing, violating a YouTube policy which prohibits personally identifiable information from appearing in its content... YouTube asked Atajurt to blur the IDs. But Atajurt is hesitant to comply, the channel's administrator said, concerned that doing so would jeopardize the trustworthiness of the videos. Fearing further blocking by YouTube, they decided to back up content to Odysee, a website built on a blockchain protocol called LBRY, designed to give creators more control. About 975 videos have been moved so far.

Even as administrators were moving content, they received another series of automated messages from YouTube stating that the videos in question had been removed from public view, this time because of concerns that they may promote violent criminal organizations... Atajurt representatives fear pro-China groups who deny that human rights abuses exist in Xinjiang are using YouTube's reporting features to remove their content by reporting it en masse, triggering an automatic block. Representatives shared videos on WhatsApp and Telegram with Reuters which they said described how to report Atajurt's YouTube videos.

An activist working with the group told Reuters he's also faced offline challenges — including having his hard disks and cellphones confiscated multiple times in Kazakhstan.

This meant that the only place where they'd stored their entire video collection was YouTube.
Android

OnePlus Commits To 3 Years of Android Updates By Merging OxygenOS With Oppo's ColorOS (theverge.com) 35

Last month, it was revealed that OnePlus will become an Oppo sub-brand. Now, the company announced that it's also merging OxygenOS with Oppo's ColorOS operating system. 9to5Google reports: In a forum post today, OnePlus explains that the sub-brand of Oppo is "working on integrating the codebase of OxygenOS and ColorOS." Apparently, the change will go unnoticed because it is happening behind the scenes: "This is a change that you will likely not even notice since it's happening behind the scenes. We now have a larger and even more capable team of developers, more advanced R&D resources, and a more streamlined development process all coming together to improve the OxygenOS experience."

OnePlus also further reiterates that OxygenOS will remain the "global" operating system for OnePlus-branded devices rather than ColorOS, which runs on Oppo devices and OnePlus devices in China, too. It's not mentioned if OxygenOS will change visually, but it's fairly clear that will happen based on early looks at the Android 12 Beta which is available for OnePlus 9 devices. The bright side of this change, however, is that OnePlus will be committing to a stronger Android update schedule that delivers at least three years of support to the company's entire portfolio.

Electronic Frontier Foundation

'Golden Age of Surveillance', as Police Make 112,000 Data Requests in 6 Months (newportri.com) 98

"When U.S. law enforcement officials need to cast a wide net for information, they're increasingly turning to the vast digital ponds of personal data created by Big Tech companies via the devices and online services that have hooked billions of people around the world," reports the Associated Press: Data compiled by four of the biggest tech companies shows that law enforcement requests for user information — phone calls, emails, texts, photos, shopping histories, driving routes and more — have more than tripled in the U.S. since 2015. Police are also increasingly savvy about covering their tracks so as not to alert suspects of their interest... In just the first half of 2020 — the most recent data available — Apple, Google, Facebook and Microsoft together fielded more than 112,000 data requests from local, state and federal officials. The companies agreed to hand over some data in 85% of those cases. Facebook, including its Instagram service, accounted for the largest number of disclosures.

Consider Newport, a coastal city of 24,000 residents that attracts a flood of summer tourists. Fewer than 100 officers patrol the city — but they make multiple requests a week for online data from tech companies. That's because most crimes — from larceny and financial scams to a recent fatal house party stabbing at a vacation rental booked online — can be at least partly traced on the internet. Tech providers, especially social media platforms, offer a "treasure trove of information" that can help solve them, said Lt. Robert Salter, a supervising police detective in Newport.

"Everything happens on Facebook," Salter said. "The amount of information you can get from people's conversations online — it's insane."

As ordinary people have become increasingly dependent on Big Tech services to help manage their lives, American law enforcement officials have grown far more savvy about technology than they were five or six years ago, said Cindy Cohn, executive director of the Electronic Frontier Foundation, a digital rights group. That's created what Cohn calls "the golden age of government surveillance." Not only has it become far easier for police to trace the online trails left by suspects, they can also frequently hide their requests by obtaining gag orders from judges and magistrates. Those orders block Big Tech companies from notifying the target of a subpoena or warrant of law enforcement's interest in their information — contrary to the companies' stated policies...

Nearly all big tech companies — from Amazon to rental sites like Airbnb, ride-hailing services like Uber and Lyft and service providers like Verizon — now have teams to respond...

Cohn says American law is still premised on the outdated idea that valuable data is stored at home — and can thus be protected by precluding home searches without a warrant. At the very least, Cohn suggests more tech companies should be using encryption technology to protect data access without the user's key.

But Newport supervising police detective Lt. Robert Salter supplied his own answer for people worried about how police officers are requesting more and more data. "Don't commit crimes and don't use your computer and phones to do it."
Robotics

Do Security Robots Reduce Crime? (nbcnews.com) 50

Westland Real Estate Group patrols its 1,000-unit apartment complex in Las Vegas with "a conical, bulky, artificial intelligence-powered robot" standing just over 5 feet tall, according to NBC News. Manufactured by Knightscope, the robot is equipped with four internal cameras capturing a constant 360-degree view, and can also scan and record license plates (as well as the MAC addresses of cellphones). But is it doing any good? As more government agencies and private sector companies resort to robots to help fight crime, the verdict is out about how effective they are in actually reducing it. Knightscope, which experts say is the dominant player in this market, has cited little public evidence that its robots have reduced crime as the company deploys them everywhere from a Georgia shopping mall to an Arizona development to a Nevada casino. Knightscope's clients also don't know how much these security robots help. "Are we seeing dramatic changes since we deployed the robot in January?" Dena Lerner, the Westland spokesperson said. "No. But I do believe it is a great tool to keep a community as large as this, to keep it safer, to keep it controlled."

For its part, Knightscope maintains on its website that the robots "predict and prevent crime," without much evidence that they do so. Experts say this is a bold claim. "It would be difficult to introduce a single thing and it causes crime to go down," said Ryan Calo, a law professor at the University of Washington, comparing the Knightscope robots to a "roving scarecrow." Additionally, the company does not provide specific, detailed examples of crimes that have been thwarted due to the robots.

The robots are expensive — they're rented out at about $70,000-$80,000 a year — but growth has stalled for the two years since 2018, and over four years Knightscope's total clients actually dropped from 30 to just 23. (Expenses have now risen — partly because the company is now doubling its marketing budget.)

There's also a thermal scanning feature, but Andrew Ferguson, a law professor at American University, still called these robots an "expensive version of security theater." And NBC News adds that KnightScope's been involved "in both tragic and comical episodes." In 2016, a K5 roaming around Stanford Shopping Center in Palo Alto, California, hit a 16-month-old toddler, bruising his leg and running over his foot. The company apologized, calling it a "freakish accident," and invited the family to visit the company's nearby headquarters in Mountain View, which the family declined. The following year, another K5 robot slipped on steps adjacent to a fountain at the Washington Harbour development in Washington, D.C., falling into the water. In October 2019, a Huntington Park woman, Cogo Guebara, told NBC News that she tried reporting a fistfight by pressing an emergency alert button on the HP RoboCop itself, but to no avail. She learned later the emergency button was not yet connected to the police department itself... [The northern California city] Hayward dispatched its robot in a city parking garage in 2018. The following year, a man attacked and knocked over the robot. Despite having clear video and photographic evidence of the alleged crime, no one was arrested, according to Adam Kostrzak, the city's chief information officer.
The city didn't renew its contract "due to the financial impact of Covid-19 in early 2020," the city's CIO tells NBC News. But the city had already spent over $137,000 on the robot over two years.
Wireless Networking

London Underground To Gain Full Mobile Phone Coverage By 2024 (macrumors.com) 42

London Underground passengers will be able to get mobile coverage across the rail network by the end of 2024, it has been announced. MacRumors reports: In a press release, Transport for London (TfL) said the capital's Oxford Circus, Tottenham Court Road and Bank stations would be among the first fully connected stations by the end of the year, followed by Tottenham Court Road, Euston, and Camden Town by the end of 2022. Mobile reception was introduced on the eastern half of the Jubilee line in March last year. TfL says the additional infrastructure will support 5G as well as 4G, but that it will be the responsibility of mobile operators to offer support for the fastest network speeds.

TfL is partnering with BAI Communications (BAI), a global provider of 4G and 5G connected infrastructure, to plug so-called coverage "not-spots" in the underground network. The over 1,242 miles of fibre cabling installed in London Underground tunnels will also benefit above-ground coverage for buildings and other infrastructure by allowing more mobile transmitters to be installed.

Businesses

Hawaii's Remote Workers Discover Challenges and Rewards (wsj.com) 48

For many professionals, Hawaii seems a dream spot for remote work. But pulling off remote work in the Aloha state takes more than a plane ticket and a laptop. From a report: The pandemic devastated the state's economy. According to the Hawaii Tourism Authority, visitor arrivals fell 97.6% between August 2019 and August the following year. Employment in the state's leisure and hospitality sector, which accounts for nearly one in five jobs, fell 53% between February and August 2020, according to the Pew Center. Thanks in part to state initiatives -- including pre-arrival coronavirus testing for visitors and marketing campaigns wooing remote workers -- tourism is on the rebound. In April, visitors reached nearly 500,000, compared with roughly 4,500 in April 2020. One program, called Movers and Shakas (named after the friendly Y-shaped hand gesture with extended thumb and pinkie that means "hang loose"), was launched in December with local business leaders. It offers free airfare to remote workers who commit to staying at least a month and participate in volunteer activities. The program's 50 spots attracted 90,000 applications. Applications for the second round will open this month.

As it is elsewhere, reliable Wi-Fi is the litmus test for many. Some areas of the Hawaiian islands, especially rural regions, lack robust broadband or cellular infrastructure. Tomasz Janczuk, a 45-year-old based in the Seattle area who owns and operates a software-development firm, chose the three Big Island hotels that he and his family lived in for a month based on Wi-Fi strength. During an off-road excursion, Mr. Janczuk got a call from an employee about a service outage at his company. He pulled over and had to climb on top of his Jeep for sufficient reception to help troubleshoot the problem. "If there's no Wi-Fi, you have to fall back on cellphones, and that is quite spotty out there," said Mr. Janczuk, who also carried a hot spot. Some workers find that Hawaii's spectacular surroundings -- which drew them in the first place -- can be a distraction. Jasmyn Franks, a social-media strategist for an advertising agency in Kansas City, Mo., began working in mid-May from the palm-tree-filled backyard of her aunt's house in Mililani, a mountainous city on Oahu. Ms. Franks, 30, said initially, the first five to 10 minutes of every conference call were taken up with colleagues admiring her background. "So, there was a point where I was just like, 'OK, let's just take this to the corner or something where it kind of looks like I'm at the house.'"

Encryption

Report Finds Phone Network Encryption Was Deliberately Weakened (vice.com) 83

A weakness in the algorithm used to encrypt cellphone data in the 1990s and 2000s allowed hackers to spy on some internet traffic, according to a new research paper. Motherboard: The paper has sent shockwaves through the encryption community because of what it implies: The researchers believe that the mathematical probability of the weakness being introduced on accident is extremely low. Thus, they speculate that a weakness was intentionally put into the algorithm. After the paper was published, the group that designed the algorithm confirmed this was the case. Researchers from several universities in Europe found that the encryption algorithm GEA-1, which was used in cellphones when the industry adopted GPRS standards in 2G networks, was intentionally designed to include a weakness that at least one cryptography expert sees as a backdoor. The researchers said they obtained two encryption algorithms, GEA-1 and GEA-2, which are proprietary and thus not public, "from a source." They then analyzed them and realized they were vulnerable to attacks that allowed for decryption of all traffic.

When trying to reverse-engineer the algorithm, the researchers wrote that (to simplify), they tried to design a similar encryption algorithm using a random number generator often used in cryptography and never came close to creating an encryption scheme as weak as the one actually used: "In a million tries we never even got close to such a weak instance," they wrote. "This implies that the weakness in GEA-1 is unlikely to occur by chance, indicating that the security level of 40 bits is due to export regulations." Researchers dubbed the attack "divide-and-conquer," and said it was "rather straightforward." In short, the attack allows someone who can intercept cellphone data traffic to recover the key used to encrypt the data and then decrypt all traffic. The weakness in GEA-1, the oldest algorithm developed in 1998, is that it provides only 40-bit security. That's what allows an attacker to get the key and decrypt all traffic, according to the researchers.

Medicine

Pakistan Province May Block SIM Cards of Citizens Who Didn't Get Covid-19 Vaccines (msn.com) 70

The government in Pakistan's largest province, Punjab, has decided to block SIM cards of unvaccinated citizens, reports the Hindustan Times (one of the largest newspapers in India), citing reports from news agency ANI.
Dr. Rashid, the provincial health minister in Pakistan's Punjab, said that there has been a "considerable decrease" in Covid-19 cases in the province due to mass vaccinations. However, a report compiled by the Punjab primary health department shows that the province still failed to achieve its set target for Covid-19 vaccination, reports ARY News, adding that around 300,000 recipients of the first dose of the vaccine never returned for the second dose since the start of Pakistan's mass inoculation drive on February 2.
Cellphones

Walmart Will Give 740,000 Employees a Free Smartphone (cbsnews.com) 116

"Walmart will give 740,000 employees free Samsung smartphones by the end of the year," reports CBS News, "so they can use a new app to manage schedules, the company announced Thursday." The phone, the Samsung Galaxy XCover Pro, can also be used for personal use, and the company will provide free cases and protection plans. The phone's retail price is currently $499... Up until now, associates at Walmart stores used handheld devices they shared to communicate, but an initial test with employee smartphones was received well and will now be expanded upon, Walmart said...

The company promised that it would not have access to any employee's personal data and can "use the smartphone as their own personal device if they want, with all the features and privacy they're used to." The test will be expanded by the end of the year, Walmart said.

Earlier this year, Walmart announced pay increases for nearly a third of its U.S. workforce of 1.6 million. In February, digital and store workers saw their starting hourly rates increase from $13 to $19 depending on their location and market.

Cellphones

Apple's MagSafe Devices May Affect Pacemakers (appleinsider.com) 15

The American Heart Association is a research-funding nonprofit. One of its publications, The Journal of the American Heart Association, "has concurred with a previous report by the Heart Rhythm Journal which said close contact with an iPhone 12 affected certain implantable cardiac devices," writes Apple Insider. As with that report, the American Heart Association says the effect are solely when the iPhone is on or very near the implant... "Our study demonstrates that magnet reversion mode may be triggered when the iPhone 12 Pro Max is placed directly on the skin over an implantable cardiac device and thus has the potential to inhibit lifesaving therapies," say the report writers in the Journal of the American Heart Association. The testing involved placing the iPhone 12 Pro Max in very close proximity to a series of 11 different pacemakers and defibrillators... The degree of interference did vary across the testing, but all devices were affected. The report says that "the iPhone 12 Pro Max was able to trigger magnetic reversion mode at a distance up to 1.5cm [0.6 inches]."

"Apple Inc, has an advisory stating that the newer generation iPhone 12 does not pose a greater risk for magnet interference when compared to the older generation iPhones," notes the report. "However, our study suggests otherwise as magnet response was demonstrated in 3/3 cases in vivo..."

In January 2021, Apple updated its MagSafe support document to recommend that users keep the iPhone 12 six inches away from any medical implants.

Cellphones

Carriers Agree To Start Sharing Vertical Location Data For 911 Calls (xda-developers.com) 23

The three major carriers in the U.S. have now agreed to start providing vertical location data for 911 calls, which will help first responders quickly locate 911 callers in multi-story buildings. XDA Developers reports: The FCC wrote in its announcement, "FCC Acting Chairwoman Jessica Rosenworcel today announced breakthrough agreements with America's three largest mobile phone providers to start delivering vertical location information in connection with 911 calls nationwide in the coming days. This information will help first responders quickly locate 911 callers in multi-story buildings, which will reduce response times and ultimately save lives."

The FCC first announced in 2015 that carriers would be required to start sharing vertical location data. The original deadline was June 2nd, 2021, but AT&T, T-Mobile, and Verizon wanted an 18-month extension (allegedly due to issues testing the functionality during the COVID-19 pandemic). With the deadline rapidly approaching, the FCC began an investigation in April to find out what was taking carriers so long. All three major carriers have now agreed to start providing vertical location data to 911 call centers within the next seven days, and each company will pay a $100,000 settlement. The agreement also increases the scope of the vertical location data; instead of the data only being provided in select areas, vertical location information will be provided by carriers across the entire United States. However, it will likely take longer than a week for the vertical data to be used in most 9-1-1 call centers, as the change will require updated software and (possibly) additional training for emergency dispatchers.

Cellphones

Man Dies Inside Spanish Dinosaur Statue After Trying To Retrieve His Phone (theguardian.com) 215

According to The Guardian, a man in Catalonia died after becoming trapped inside a large dinosaur statue while trying to retrieve his smartphone. From the report: Officers were called to the statue in Santa Coloma de Gramenet, a satellite town of Barcelona, after a man and his son noticed something inside the papier-mache stegosaurus on Saturday afternoon. A spokeswoman for the regional police force, the Mossos d'Esquadra, said the death of the 39-year-old man was not being treated as suspicious.

"A father and son noticed that there was something inside and raised the alarm," she said. "We found the body of a man inside the leg of this dinosaur statue. It's an accidental death; there was no violence. This person got inside the statue's leg and got trapped. It looks as though he was trying to retrieve a mobile phone, which he'd dropped. It looks like he entered the statue head first and couldn't get out." "We're still waiting for the autopsy results, so we don't know how long he was in there, but it seems he was there for a couple of days," she added.
Slashdot reader shanen submitted this story with the following commentary: Not sure what the technology link is. Smartphones make people stupid? Dinosaurs are scientific, but this is ridiculous? It would be funny, but it's too gruesome. But I guess I'll go ahead and submit it in the Darwin Awards category. Maybe a better title is man kills himself with dinosaur and smartphone? Death by paper mache?

Slashdot Top Deals