×
Cellphones

Will The iPhone 8 Include Augmented Reality? (bgr.com) 55

Earlier this month Mashable wrote "it's now even more obvious what [Apple] is working to bring to the masses, and it's probably not, as some rumors have indicated, virtual reality." They cited CEO Tim Cook's recent predictions that augmented reality "is going to become really big" -- he said it again on Thursday -- and BuzzFeed noted that Apple "has quietly put into place the components of what could prove to be an AR ecosystem: The iPhone 7 Plus has...a two-camera system capable of gathering stereoscopic data and generating image depth maps... In Apple Watch, the company has a spatially-aware, wearable device outfitted with an accelerometer and GPS. In its new AirPod wireless earphones, Apple essentially has a pair of diminutive, spatially-aware microcomputers -- each one with an Apple W1 wireless chip (the company's first), two accelerometers, two optical sensors, beam-forming microphones, and an antenna... And sources tell BuzzFeed News that the company has recently been taking meetings with immersive content companies like Jaunt.
Their article also lists AR companies that Apple's bought over the last three years -- plus their patents for a "head-mounted display" and a "peripheral treatment for head-mounted displays." BGR adds that Tim Cook "likes to tease future products," and points out that Cook has even said Apple is working on AR features "behind the curtain". This casts a new light on those rumors of an all-glass case for next year's iPhone 8. Will the whole body of the phone become part of an Augmented Reality display system? (And could AR also explain Apple's aggressive push for wireless headphones?)
Cellphones

Smartphones Are 'Contaminating' Family Life, Study Suggests (theverge.com) 84

An anonymous reader quotes a report from CBS News: Mobile devices like smartphones and tablets can be distracting from child-rearing, upending family routines and fueling stress in the home, a small, new study finds. Incoming communication from work, friends and the world at large is "contaminating" family mealtime, bedtime and playtime, said study lead author Dr. Jenny Radesky. She's an assistant professor of developmental behavioral pediatrics at the University of Michigan Medical School. Her comments stem from her team's study involving interviews with 35 parents and caregivers of young children in the Boston area. "This tension, this stress, of trying to balance newly emerging technologies with the established patterns and rituals of our lives is extremely common, and was expressed by almost all of our participants," Radesky said. "We have to toggle between what might be stress-inducing or highly cognitively demanding mobile content and responding to our kids' behavior," she said. The result, said Radesky, is often a rise in parent-child tension and overall stress. Modern parents and caregivers interact with tablets, smartphones and other communication devices for about three hours a day, the study authors said in background notes. Radesky's team previously found that when parents used mobile devices during meals they interacted less with their children, and became stressed when children tried to grab their attention away from the device. The new study included 22 mothers, nine fathers and four grandmothers. Participants were between 23 and 55 years old (average age 36) and cared for toddlers or young children up to age 8. Roughly one-third were single parents, and nearly six in 10 were white. On the plus side, many parents said that mobile devices facilitated their ability to work from home. But that could fuel anxiety, too. Some said smartphones provided access to the outside world, and alleviated some of the boredom and stress of child-rearing. On the down side, caregivers described being caught in a tug-of-war between their devices and their children. The study findings were published in the Journal of Developmental and Behavioral Pediatrics.
Bug

Class Action Lawsuit Grows Over iPhone 6 Plus 'Touch Disease' (vice.com) 210

Nearly 10,000 people have joined a class action lawsuit against Apple over the screen-freezing "touch disease" afflicting many iPhone Six Plus phones. An anonymous Slashdot reader quotes Motherboard: Lawyers who filed a class action lawsuit against the company in California earlier this fall have signed on three additional law firms to support their case, and an additional class action lawsuit related to the issue has been filed against Apple in Utah... Apple will not perform logic board-level repairs for consumers, which require soldering and reseating of millimeter-size components. This means the only Apple-sanctioned "fix" for a touch diseased phone is to buy a new one... Apple has been replacing touch diseased iPhone 6 Pluses with $329 refurbished ones, some of which are showing symptoms of touch disease within days or weeks of being replaced.
Despite contacting Apple five separate times, the reporter has yet to receive any official response, although "I have gotten hundreds of emails from consumers who have had to buy new phones to replace their broken iPhone 6 Pluses."
China

Baidu's Voice Recognition Software Is More Accurate Than Typing (thestack.com) 55

The massive Chinese web services company Baidu has launched their sophisticated new TalkType 'keyboard' which defaults to voice recognition app. An anonymous reader quotes The Stack: Baidu claims that the app's speech recognition is more accurate than actual typing, having developed and tested the technology alongside speech software experts at Stanford University...The researchers concluded that Baidu's technology was three times faster than a typical user typing in English. The results showed that the TalkType error rate was 20.4% lower than an English texter hunting and tapping for letters. The accuracy was even greater for those typing in Mandarin, with the error rate dropping 63.4% when using TalkType.
Of course, last year Baidu was also accused of gaming the testing for their image-recognition software.
Iphone

iPhone 7 Finishes Last In New Test of Battery Life (betanews.com) 292

"Pitted against the Samsung Galaxy S7, HTC 10 and LG G5, Apple's latest handset came in last place... and by some distance," reports BetaNews. Here's the results of a new test from the U.K. consumer advocacy group, Which?: We compared the iPhone 7's battery life, when making calls and browsing the web, to those of three top Android competitors: the Samsung Galaxy S7, HTC 10 and LG G5, and the results were staggering. While the iPhone 7's 712 minutes of call time (nearly 12 hours) may sound acceptable, the rival Samsung Galaxy S7 lasted twice as long -- and it doesn't even have the longest lasting battery. The HTC 10 lasted an incredible 1,859 minutes (that's almost 31 hours).

When it comes to internet browsing time, arguably the more important measurement, the results were a lot closer...but the iPhone 7 still came bottom. The 615 minutes of battery life offered by the iPhone 7 is 25 minutes less than its nearest rival, the LG G5, and 175 minutes less than the top performing HTC 10.

The researchers point out that the iPhone 7 has a smaller battery -- but that's leaving critics unimpressed. The Guardian newspaper is asking, "How good can a phone be if the battery doesn't last even a day?"
United States

Fake Cellphone Emergency Alerts About Zombies and Nuclear Attacks Predicted (backchannel.com) 41

"No matter how solid the system is, history reveals that false alarms -- of zombies, nuclear attacks, missing children -- are inevitable," warns an essay at Medium. An anonymous Slashdot reader summarizes the article: New York's police department is hailing emergency alerts as "the future" of government communications to citizens. But could the same system be used by scammers directing millions of people to a malware-installing site, or "a terrorist intent on causing mass panic (i.e., 'Tsunami imminent, evacuate immediately')... If the government can reach us at any time, who else can?"

The article runs through great moments in the history of false alerts -- including a 1971 incident where the national warning system mistakenly sent out the pre-nuclear attack warning, "normal broadcasting will cease immediately," and warnings in 2013 about zombie attacks in Montana, New Mexico, and Michigan. "To tell anybody that an agency is immune to these attacks would be a grave injustice," said the IT overseer at Iowa's Department of Public Safety.

Cellphones

Verizon Technician Is Accused of Selling Customers' Call Records and Location Data To Private Investigator (ap.org) 50

A former Verizon technician who worked in Alabama is being accused of selling customers' private call records and location data to an unnamed private investigator. Authorities said the data was sold for more than four years, from 2009 to 2014. The Associated Press reports: [Daniel Eugene Traeger] logged into one Verizon computer system to gain access to customers' call records, authorities said. He used another company system known as Real Time Tool to "ping" cellphones on Verizon's network to get locations of the devices, according to the plea agreement. He then compiled the data in spreadsheets, which he sent to the private investigator for years, the court records show. "Between April 2009 and January 2014, the defendant was paid more than $10,000 in exchange for his provision of confidential customer information and cellular location data to the PL, an unauthorized third party," court records state. Though Traeger was based in the Birmingham area, the court records do not indicate whether the information that was sold involved Verizon Wireless customers in Alabama or elsewhere. He faces up to five years in prison, but prosecutors are recommending a lesser sentence since he accepted responsibility, according to terms of the plea agreement.
Open Source

Ask Slashdot: Who's Building The Open Source Version of Siri? (upon2020.com) 186

We're moving to a world of voice interactions processed by AI. Now Long-time Slashdot reader jernst asks, "Will we ever be able to do that without going through somebody's proprietary silo like Amazon's or Apple's?" A decade ago, we in the free and open-source community could build our own versions of pretty much any proprietary software system out there, and we did... But is this still true...? Where are the free and/or open-source versions of Siri, Alexa and so forth?

The trouble, of course, is not so much the code, but in the training. The best speech recognition code isn't going to be competitive unless it has been trained with about as many millions of hours of example speech as the closed engines from Apple, Google and so forth have been. How can we do that? The same problem exists with AI. There's plenty of open-source AI code, but how good is it unless it gets training and retraining with gigantic data sets?

And even with that data, Siri gets trained with a massive farm of GPUs running 24/7 -- but how can the open source community replicate that? "Who has a plan, and where can I sign up to it?" asks jernst. So leave your best answers in the comments. Who's building the open source version of Siri?
Transportation

Uber Accused of Cashing In On Bomb Explosion By Jacking Rates (thesun.co.uk) 428

After a bomb exploded in Manhattan, leaving 29 injured, people leaving the scene discovered Uber had doubled their fares. An anonymous Slashdot reader quotes The Sun: Traumatized families caught up in the New York bomb blast have accused Uber of cashing in on the tragedy by charging almost double to take them home. Furious passengers have taken to social media to slam the taxi firm in the wake of the blast... Uber reportedly charged between 1.4 and 3 times the standard fare with one city worker saying he had to pay twice as much as usual. Mortgage broker Nick Lalli said: "Just trying to get home from the city and Uber f****** doubled the surge price."
"Demand is off the charts!" the app informed its users, adding "Fares have increased to get more Ubers on the road." Uber soon tweeted that they'd deactivated their surge pricing algorithm for the affected area in Chelsea, "but passengers in other areas of Manhattan said they were still being charged higher than normal fares." One of the affected passengers was Michael Cohen, who is Donald Trump's lawyer, who tweeted that Uber was "taking total advantage of chaos and surcharging passengers 1.4 to 1.8 times." And another Uber user tweeted "I'm disgusted. People are trying to get home safe. Shame on you #DeleteApp."
Cellphones

Samsung to Customers: Stop Using Note 7, Then Wait For Replacements (samsung.com) 74

Samsung is now telling owners of their Galaxy Note 7 to "power down your device and return to using your previous phone. We will voluntarily replace your Galaxy Note7 device with a new one, beginning on September 19th... We acknowledge the inconvenience this may cause in the market but this is to ensure that Samsung continues to deliver the highest quality products to our customers." The BBC reports: Samsung has urged owners of its Galaxy Note 7 phones to stop using or exchange the devices as they risk exploding. A statement by Samsung, the world's biggest mobile phone maker, said "our customers' safety is an absolute priority..." Earlier on Saturday, aviation authorities in the United Arab Emirates banned use of the devices on the Emirates and Etihad airlines.
Three Australian airlines have already banned use of the phone, and by last week 35 incidents had been reported to Samsung, which believes that the exploding batteries affect 24 phones out of every million (or one phone out of every 41,666).
Intel

Intel Breaks Qualcomm's Hold On Apple's Baseband Chips (wsj.com) 84

Long-time Slashdot reader randomErr writes: In a big blow to Qualcomm, Apple plans to incorporate Intel baseband chips into at least some models of the new iPhone 7. The selection of Intel chip means that in newer iPhones Apple will no longer support CDMA technology popularized by Qualcomm. The Wall Street Journal states that many industry analysts believe Intel could be supplying as many as half of of baseband chips for Apple's handsets.
This was the last key iPhone component that didn't have two sources, and the Journal estimates that Intel's revenues could now increase by up to $700 million before the end of 2016.
Transportation

FTC Warns Consumers: Don't Sync To Your Rental Car! (securityledger.com) 67

Slashdot reader chicksdaddy quotes an article from Security Ledger: The Federal Trade Commission is warning consumers to beware of new 'connected car' features that allow rental car customers to connect their mobile phone or other devices to in-vehicle infotainment systems. "If you connect a mobile device, the car may also keep your mobile phone number, call and message logs, or even contacts and text messages," the FTC said in an advisory released on Tuesday. "Unless you delete that data before you return the car, other people may view it, including future renters and rental car employees or even hackers."

The Commission is advising renters to avoid syncing their mobile phones to their rental car, or to power devices via a USB port, where settings on your device may allow automatic syncing of data. Consumers who do connect their device should scrutinize any requests for permissions.

Security researchers have also discovered another car-related vulnerability. The software connecting smartphones to in-vehicle "infotainment" systems could also make cars vulnerable to remote attacks.
Communications

Cybercriminals Select Insiders To Attack Telecom Providers (helpnetsecurity.com) 24

An anonymous reader quotes a report from Help Net Security: Cybercriminals are using insiders to gain access to telecommunications networks and subscriber data, according to Kaspersky Lab. In addition, these criminals are also recruiting disillusioned employees through underground channels and blackmailing staff using compromising information gathered from open sources...

According to Kaspersky Lab researchers, if an attack on a cellular service provider is planned, criminals will seek out employees who can provide fast track access to subscriber and company data or SIM card duplication/illegal reissuing. If the target is an Internet service provider, the attackers will try to identify the employees who can enable network mapping and man-in-the-middle attacks.

Privacy

Eavesdropping On Tinder: Researcher Demonstrates Man-in-the-Middle Attacks (hert.org) 19

An anonymous Slashdot reader writes: Security expert Anthony Zboralski posted on HERT a social engineering attack for Tinder that lets you perform a man-in-the-middle attack against unsuspecting users. Zboralski says, "Not only we can eavesdrop on the conversation of two strangers, we can also change their reality." The attack can easily be extended to SMS, Whatsapp, iMessage and voice.
"At some point people exchange phone numbers and the Tinder convo stops. That's not a problem..." Zboralski explains, suggesting more ways to continue the man-in-the-middle exploits..

His article drew a response from Tinder, arguing they "employ several manual and automated mechanisms" to deter fake and duplicate profiles. But while they're looking for ways to improve, "ultimately, it is unrealistic for any company to positively validate the real-world identity of millions of users while maintaining the commonly expected level of usability."
Cellphones

IPv6 Achieves 50% Reach On Major US Carriers (worldipv6launch.org) 150

Long-time Slashdot reader dyork brings new from The Internet Society: IPv6 deployment hit a milestone this month related to the four major US providers (Verizon Wireless, T-Mobile USA, Sprint, AT&T): "IPv6 is the dominant protocol for traffic from those mobile networks to major IPv6-capable content providers."
A graph on their "World IPv6 Launch" site shows those carriers are now delivering close to 55% of their traffic over IPv6 to major IPv6-capable content providers -- up from just 37.59% in December. "This is really remarkable progress in the four years since World IPv6 Launch in 2012, and the growth of IPv6 deployment in 2016 is showing no signs of abating." In fact, the NTIA is now requesting feedback from organizations that have already implemented IPv6, noting that while we've used up all the 4.3 billion IPv4 addresses, IPv6 offers 340 undecillion IP addresses -- that is, 340 followed by 36 digits.
Cellphones

FCC Complaint: Baltimore Police Breaking Law With Use of Stingray Phone Trackers (baltimoresun.com) 108

An anonymous reader writes from a report via Baltimore Sun: Civil rights groups have complained to the FCC over the Baltimore Police Department's use of stingray phone tracking devices. They claim that "the way police use it interferes with emergency calls and is racially discriminatory." Baltimore Sun reports: "The complaint argues that the police department doesn't have a proper license to use the devices and is in violation of federal law. It calls on regulators at the Federal Communications Commission to step in and formally remind law enforcement agencies of the rules. 'The public is relying on the Commission to carry out its statutory obligation to do so, to fulfill its public commitment to do so, and to put an end to widespread network interference caused by rampant unlicensed transmissions made by BPD and other departments around the country,' the groups say in the complaint. Police in Baltimore acknowledged in court last year that they had used the devices thousands of times to investigate crimes ranging from violent attacks to the theft of cellphones. Investigators had been concealing the technology from judges and defense lawyers and after the revelations Maryland's second highest court ruled that police should get a warrant before using a Stingray. The groups argue that surveillance using the devices also undermines people's free speech rights and describe the use of Stingrays as an electronic form of the intrusive police practices described in the scathing Justice Department report on the police department's pattern of civil rights violations."
Government

Can We Avoid Government Surveillance By Leaving The Grid? (counterpunch.org) 264

Slashdot reader Nicola Hahn writes: While reporters clamor about the hacking of the Democratic National Committee, NSA whistleblower James Bamford offers an important reminder: American intelligence has been actively breaching email servers in foreign countries like Mexico and Germany for years. According to Bamford documents leaked by former NSA specialist Ed Snowden show that the agency is intent on "tracking virtually everyone connected to the Internet." This includes American citizens. So it might not be surprising that another NSA whistleblower, William Binney, has suggested that certain elements within the American intelligence community may actually be responsible for the DNC hack.

This raises an interesting question: facing down an intelligence service that is in a class by itself, what can the average person do? One researcher responds to this question using an approach that borrows a [strategy] from the movie THX 1138: "The T-H-X account is six percent over budget. The case is to be terminated."

To avoid surveillance, the article suggests "get off the grid entirely... Find alternate channels of communication, places where the coveted home-field advantage doesn't exist... this is about making surveillance expensive." The article also suggests "old school" technologies, for example a quick wireless ad-hoc network in a crowded food court. Any thoughts?
Canada

Local Canadian Police Station Admits To Owning Stingray Surveillance Device (vice.com) 43

The Edmonton Police Service has admitted to Motherboard that it owns a Stingray and that it used the [surveillance] device in the past during investigations. After Vancouver cops admitted to using the phone tracker to investigate an abduction in 2007, Motherboard called up other local police stations in Canada to ask if they had also previously used one. As you can imagine, the other stations kept mum. In the US, Stingrays are a regular part of government and law enforcement agencies' surveillance arsenal. But Vancouver's and Edmonton's police services are the first law enforcement offices in Canada to confirm that they've used the device. Motherboard adds: According an emailed statement from police spokesperson Anna Batchelor, Edmonton's cops have "used the device in the past during investigations," but would not release any additional details in order to "to protect [Edmonton Police Service] operations." Until now, the only law enforcement in the country known to use the devices was the Royal Canadian Mounted Police, the country's analogue to the US Federal Bureau of Investigation. These suitcase-sized surveillance tools have been used in the past by the Vancouver and Toronto police, but the Vancouver police have said they borrowed the Stingray from the RCMP, and in Toronto an RCMP technician was on hand, at least in that incident. The Edmonton police's comment to Motherboard is the first time a local police department in Canada has publicly admitted to owning a Stingray device.
Government

Is The US Social Security Site Still Vulnerable To Identity Theft? (krebsonsecurity.com) 46

Slashdot reader DERoss writes: Effective 1 August, the U.S. Social Security Administration (SSA) requires users who want to access their SSA accounts to use two-factor authentication. This involves receiving a "security" code via a cell phone text message. This creates two problems. First of all, many seniors who depend on the Social Security benefits to pay their living costs do not have cell phones [or] are not knowledgeable about texting.

More important, cell phone texting is NOT secure. Text messages can be hacked, intercepted, and spoofed. Seniors' accounts might easily be less secure now than they were before 1 August... This is not because of any law passed by Congress. This is a regulatory decision made by top administrators at SSA.

In addition, Krebs on Security reports that the new system "does not appear to provide any additional proof that the person creating an account at ssa.gov is who they say they are" and "does little to prevent identity thieves from fraudulently creating online accounts to siphon benefits from Americans who haven't yet created accounts for themselves." Users are only more secure after they create an account on the social security site -- and Krebs also notes that ironically, the National Institute for Standards and Technology already appears to be deprecating the use of SMS-based two-factor authentication.
United States

New Illinois Law Limits Police Use Of Cellphone-Tracking Stingray (go.com) 34

An anonymous Slashdot reader quotes a report from ABC News: A new Illinois law limits how police can use devices that cast a wide net in gathering cellphone data... [Stingray] gathers phone-usage data on targets of criminal investigations, but it also gathers data on other cellphones -- hundreds or even thousands of them -- in the area. The new law requires police to delete the phone information of anyone who wasn't an investigation target within 24 hours. It also prohibits police from accessing data for use in an investigation not authorized by a judge.

A dozen other states have adopted such regulations, and Congress is considering legislation that would strengthen federal guidelines already in place... Privacy advocates worry that without limits on how much data can be gathered or how long it can be stored, law enforcement could use the technology to build databases that track the behavior and movement of people who are not part of criminal investigations.

Earlier this month a U.S. judge threw out evidence gathered with Stingray for the first time, saying that without a search warrant, "the government may not turn a citizen's cell phone into a tracking device." The ACLU has identified 66 agencies in 24 states using Stingray technology, "but because many agencies continue to shroud their purchase and use of stingrays in secrecy, this map dramatically underrepresents the actual use of stingrays by law enforcement agencies nationwide."

Slashdot Top Deals