An anonymous reader quotes a report from VentureBeat: Mozilla today released Firefox 9.0 for iOS and updated Firefox Focus for Android. The iOS browser is getting tracking protection, improved sync, and iOS 11 compatibility. The Android privacy browser is getting tabs. You can download the former from Apple's App Store and the latter from Google Play. This is the first time Firefox has offered tracking protection on iOS, and Nick Nguyen, vice president of product at Mozilla, notes that it's finally possible "thanks to changes by Apple to enable the option for 3rd party browsers." This essentially means iPhone and iPad users with Firefox and iOS 11 will have automatic ad and content blocking in Private Browsing mode, and the option to turn it on in regular browsing. This is the same feature that's available in Firefox for Android, Windows, Mac, and Linux, as well as the same ad blocking technology used in Firefox Focus for Android and iOS.
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test! ×
An anonymous reader shares a report: Security researchers from Adguard have issued a warning that the popular GO Keyboard app is spying on users. Produced by Chinese developers GOMO Dev Team, GO Keyboard was found to be transmitting personal information about users back to remote servers, as well as "using a prohibited technique to download dangerous executable code." Adguard made the discovery while conducting research into the traffic consumption and unwanted behavior of various Android keyboards. The AdGuard for Android app makes it possible to see exactly what traffic an app is generating, and it showed that GO Keyboard was making worrying connections, making use of trackers, and sharing personal information. Adguard notes that there are two versions of the keyboard in Google Play which it claims have more than 200 million users in total.
Adrianne Jeffries, a reporter at The Outline, writes on W3C's announcement from earlier this week: The trouble with DRM is that it's sort of ineffective. It tends to make things inconvenient for people who legitimately bought a song or movie while failing to stop piracy. Some rights holders, like Ubisoft, have come around to the idea that DRM is counterproductive. Steve Jobs famously wrote about the inanity of DRM in 2007. But other rights holders, like Netflix, are doubling down. The prevailing winds at the consortium concluded that DRM is now a fact of life, and so it would be be better to at least make the experience a bit smoother for users. If the consortium didn't work with companies like Netflix, Berners-Lee wrote in a blog post, those companies would just stop delivering video over the web and force people into their own proprietary apps. The idea that the best stuff on the internet will be hidden behind walls in apps rather than accessible through any browser is the mortal fear for open web lovers; it's like replacing one library with many stores that each only carry books for one publisher. "It is important to support EME as providing a relatively safe online environment in which to watch a movie, as well as the most convenient," Berners-Lee wrote, "and one which makes it a part of the interconnected discourse of humanity." Mozilla, the nonprofit that makes the browser Firefox, similarly held its nose and cooperated on the EME standard. "It doesn't strike the correct balance between protecting individual people and protecting digital content," it said in a blog post. "The content providers require that a key part of the system be closed source, something that goes against Mozilla's fundamental approach. We very much want to see a different system. Unfortunately, Mozilla alone cannot change the industry on DRM at this point."
An anonymous reader shares a report: Hundreds of thousands of computers getting penetrated by a corrupted version of an ultra-common piece of security software was never going to end well. But now it's becoming clear exactly how bad the results of the recent CCleaner malware outbreak may be. Researchers now believe that the hackers behind it were bent not only on mass infections, but on targeted espionage that tried to gain access to the networks of at least 20 tech firms. Earlier this week, security firms Morphisec and Cisco revealed that CCleaner, a piece of security software distributed by Czech company Avast, had been hijacked by hackers and loaded with a backdoor that evaded the company's security checks. It wound up installed on more than 700,000 computers. On Wednesday, researchers at Cisco's Talos security division revealed that they've now analyzed the hackers' "command-and-control" server to which those malicious versions of CCleaner connected. On that server, they found evidence that the hackers had attempted to filter their collection of backdoored victim machines to find computers inside the networks of 20 tech firms, including Intel, Google, Microsoft, Akamai, Samsung, Sony, VMware, HTC, Linksys, D-Link and Cisco itself. In about half of those cases, says Talos research manager Craig Williams, the hackers successfully found a machine they'd compromised within the company's network, and used their backdoor to infect it with another piece of malware intended to serve as a deeper foothold, one that Cisco now believes was likely intended for industrial espionage.
BrianFagioli shares a report from BetaNews: Today, a deal finally happens, but Google didn't buy HTC outright. Strangely, as the deal is laid out, the search giant has seemingly bought HTC employees. Yes, for $1.1 billion, the search giant has sort of purchased human beings -- plus it gets access to some intellectual property. HTC gets a much-needed big influx of cash. "Google and HTC Corporation today announced a definitive agreement under which certain HTC employees -- many of whom are already working with Google to develop Pixel smartphones -- will join Google. HTC will receive $1.1 billion in cash from Google as part of the transaction. Separately, Google will receive a non-exclusive license for HTC intellectual property (IP). The agreement is a testament to the decade-long strategic relationship between HTC and Google around the development of premium smartphones," says HTC.
An anonymous reader shares a report: With Google's user-generated content loophole firmly in lawmaker's sights, global music trade body IFPI has published new research looking at demand for music streaming. The research confirms YouTube's pre-eminence as the world's de facto jukebox. 46 percent of on-demand music streaming is from Google's video website. 75 percent of internet users use video streaming to hear music. The paid-for picture is bullish: 50 percent of internet users have paid for licensed music in the last six months, in one form or another, of which 53 per are 13- to 15-year-olds. Audio streaming is split between 39 percent who stream for free and 29 percent who pay. [...] So what's the problem? European policy makers have become convinced by the "value gap" argument: compensation doesn't reflect usage. Google finds itself with a unique advantage here, thanks to YouTube's "user-generated content" exception, as we explained last year.
According to the Financial Times (Warning: source paywalled), Amazon is working on building a pair of smart glasses to house its Alexa voice assistant. The report also mentions a home security camera that is in the works, capable of linking up to Amazon's existing Echo connected devices. TechCrunch reports: According to the FT, the smart glasses are intended to be purely an earbuds-free housing for Amazon's Alexa AI -- with a bone-conduction audio system that would enable the wearer to hear Alexa without the need to be wired in. The FT reports the glasses would wirelessly tether to a user's smartphone for connectivity. They are also apparently being designed to look like a regular pair of spectacles, so they could be worn comfortably and unobtrusively. The paper notes that Amazon hired Babak Parviz, founder of Google Glass, in 2014, and says he's been closely involved in the project. It also points to several other Glass researchers, engineers and designers having moved to Amazon's labs -- per analysis of their LinkedIn profiles.
BrianFagioli writes: The Librem 5 smartphone by Purism has a long and difficult road ahead of it. Competing against the likes of Apple and Google on the mobile market has proven to be a death sentence for many platforms -- including Microsoft with its failed Windows 10 Mobile. Luckily, Purism has found itself a new partner on this project -- one of the most important organizations in the Linux community -- The GNOME Foundation. The GNOME Foundation explains, 'The Librem 5 is a hardware platform the Foundation is interested in advancing as a GNOME/GTK phone device. The GNOME Foundation is committed to partnering with Purism to create hackfests, tools, emulators, and build awareness that surround moving GNOME/GTK onto the Librem 5 phone. As part of the collaboration, if the campaign is successful the GNOME Foundation plans to enhance GNOME shell and general performance of the system with Purism to enable features on the Librem 5.'
Rumor has it Google is planning to purchase HTC -- or at least a portion of it. The speculation of this has been doing rounds for weeks now, and it reached a new high today after HTC said its stock will stop trading from Thursday, as it prepares to make a "major announcement" tomorrow. Bloomberg reported today: Alphabet's Google is close to acquiring assets from Taiwan's HTC, according to a person familiar with the situation, in a bid to bolster the internet giant's nascent hardware business. HTC, once ranked among the world's top smartphone makers, is holding a town hall meeting Thursday, according to tech website Venture Beat, which cited a copy of an internal invitation. The shares will also be suspended from trading as of Sept. 21 due to a pending announcement, according to the Taiwan stock exchange. Of course Google has made similar moves in the past. It previously owned Motorola for a brief period of time, but that acquisition didn't materialize much. The company has however, since re-hired the Motorola chief it once had, Rick Osterloh, and founded a separate hardware team under his stewardship. Claude Zellweger, the one-time chief designer of HTC Vive, is also now at Google, working on that company's Daydream virtual reality system.
What reasons could Google have to purchase HTC? Share your thoughts in the comments section below.
What reasons could Google have to purchase HTC? Share your thoughts in the comments section below.
An anonymous reader shares a report: Amazon said on Wednesday that it was reviewing its website after a British television report said the online retail giant's algorithms were automatically suggesting bomb-making ingredients that were "Frequently bought together." The news is particularly timely in Britain, where the authorities are investigating a terrorist attack last week on London's Underground subway system. The attack involved a crude explosive in a bucket inside a plastic bag, and detonated on a train during the morning rush. The news report is the latest example of a technology company drawing criticism for an apparently faulty algorithm. Google and Facebook have come under fire for allowing advertisers to direct ads to users who searched for, or expressed interest in, racist sentiments and hate speech. Growing awareness of these automated systems has been accompanied by calls for tech firms to take more responsibility for the contents on their sites. Amazon customers buying products that were innocent enough on their own, like cooking ingredients, received "Frequently bought together" prompts for other items that would help them produce explosives, according to the Channel 4 News.
A new paper released on Monday via the National Bureau of Economic Research claims that retaining search log data doesn't do much for search quality. "Data retention has implications in the debate over Europe's right to be forgotten, the authors suggest, because retained data undermines that right," reports The Register. "It's also relevant to U.S. policy discussions about privacy regulations." From the report: To determine whether retention policies affected the accuracy of search results, Chiou and Tucker used data from metrics biz Hitwise to assess web traffic being driven by search sites. They looked at Microsoft Bing and Yahoo! Search during a period when Bing changed its search data retention period from 18 months to 6 months and when Yahoo! changed its retention period from 13 months to 3 months, as well as when Yahoo! had second thoughts and shifted to an 18-month retention period. According to Chiou and Tucker, data retention periods didn't affect the flow of traffic from search engines to downstream websites. "Our findings suggest that long periods of data storage do not confer advantages in search quality, which is an often-cited benefit of data retention by companies," their paper states. Chiou and Tucker observe that the supposed cost of privacy laws to consumers and to companies may be lower than perceived. They also contend that their findings weaken the claim that data retention affects search market dominance, which could make data retention less relevant in antitrust discussions of Google.
As AI space gets crowded, there are a slew of businesses -- new and old -- looking to market themselves as "AI companies." But according to Andrew Ng, a founder of the Google Brain team and a luminary in the space, there's more to being an AI company than just using a neural net. From a report: In his view, while it's possible to create a website for a shopping mall, that doesn't make it an internet company. In the same way, just implementing basic machine learning does not make a standard technology company (or any other business) an AI company. "You're not an AI company because there are a few people using a few neural networks somewhere," Ng said. "It's much deeper than that." First and foremost, AI companies are strategic about their acquisition of data, which is used as the fuel for machine learning systems. Once an AI company has acquired the data, Ng said that they tend to store it in centralized warehouses for processing. Most enterprises have their information spread across multiple different warehouses, and collating that data for machine learning can prove difficult. AI companies also implement modern development practices, like frequent deployments. That means it's possible to change the product and learn from the changes.
Mark Bergen, writing for Bloomberg: Elon Musk is the most-famous Cassandra of artificial intelligence. The Tesla chief routinely drums up the technology's risks in public and on Twitter, where he recently called the global race to develop AI the "most likely cause" of a third world war. Researchers at Google, Facebook and other AI-focused companies find this irritating. John Giannandrea, the head of search and AI at Alphabet's Google, took one of the clearest shots at Musk on Tuesday -- all while carefully leaving him unnamed. "There's a huge amount of unwarranted hype around AI right now," Giannandrea said at the TechCrunch Disrupt conference in San Francisco. "This leap into, 'Somebody is going to produce a superhuman intelligence and then there's going to be all these ethical issues' is unwarranted and borderline irresponsible."
Between Google Chrome, Microsoft Edge, and Internet Explorer, Chrome has been found to be the most resilient against attacks, an analysis by security researchers has found. Firefox, Safari, and Opera were not included in the test. From a report: "Modern web browsers such as Chrome or Edge improved security in recent years. Exploitation of vulnerabilities is certainly more complex today and requires a higher skill than in the past. However, the attack surface of modern web browsers is increasing due to new technologies and the increasing complexity of web browsers themselves," noted Markus Vervier, Managing Director of German IT security outfit X41 D-Sec (and one of the researchers involved in the analysis). The researchers' aim was to determine which browser provides the highest level of security in common enterprise usage scenarios.
An anonymous reader quotes a report from The Verge: A demonstration video posted by Positive Technologies (and first reported by Forbes) shows how easy it is to hack into a bitcoin wallet by intercepting text messages in transit. The group targeted a Coinbase account protected by two-factor authentication, which was registered to a Gmail account also protected by two-factor. By exploiting known flaws in the cell network, the group was able to intercept all text messages sent to the number for a set period of time. That was enough to reset the password to the Gmail account and then take control of the Coinbase wallet. All the group needed was the name, surname and phone number of the targeted Bitcoin user. These were security researchers rather than criminals, so they didn't actually steal anyone's bitcoin, although that would have been an easy step to take. At a glance, this looks like a Coinbase vulnerability, but the real weakness is in the cellular system itself. Positive Technologies was able to hijack the text messages using its own research tool, which exploits weaknesses in the cellular network to intercept text messages in transit. Known as the SS7 network, that network is shared by every telecom to manage calls and texts between phone numbers. There are a number of known SS7 vulnerabilities, and while access to the SS7 network is theoretically restricted to telecom companies, hijacking services are frequently available on criminal marketplaces. The report notes of several ways you can protect yourself from this sort of attack: "On some services, you can revoke the option for SMS two-factor and account recovery entirely, which you should do as soon as you've got a more secure app-based method established. Google, for instance, will let you manage two-factor and account recovery here and here; just set up Authenticator or a recovery code, then go to the SMS option for each and click 'Remove Phone.'"
A sapphire salesman is facing jail time for forging a judge's signature in a case involving Google. Kelly Weill from The Daily Beast reports: Michael Arnstein is the third-generation owner of the Natural Sapphire Company, a Manhattan-based jewelry business. After a falling-out with a former business partner, Arnstein's company amassed dozens of negative reviews, which featured prominently in the Natural Sapphire Company's Google search results. Arnstein sued the former business partner in 2011, accusing him of writing defamatory negative reviews, and a judge ordered the partner to delete 54 of the negative comments. But some negative reviews remained, even after the court order. So Arnstein copied the judge's signature and forged new court orders of his own, demanding that Google scrub negative reviews from his company's search results, Arnstein admitted in a guilty plea on Friday.
Google has offered to display rival comparison shopping sites via an auction, as it aims to stave off further EU antitrust fines, four people familiar with the matter told Reuters. From a report: Google is under pressure to come up with a big initiative to level the playing field in comparison shopping, but its proposal was roundly criticized by competitors as inadequate, the sources said. EU enforcers see the antitrust case as a benchmark for investigations into other areas dominated by the U.S. search giant such as travel and online mapping. Google has already been fined a record 2.4 billion euros ($2.9 bln) by the European Commission for favoring its own service, and could face millions of euros in fresh fines if it fails to treat rivals and its own service equally.
Artem Tashkinov writes: The World Wide Web Consortium (W3C), the industry body that oversees development of HTML and related Web standards, has today published the Encrypted Media Extensions (EME) specification as a Recommendation, marking its final blessing as an official Web standard. Final approval came after the W3C's members voted 58.4 percent to approve the spec, 30.8 percent to oppose, with 10.8 percent abstaining. EME provides a standard interface for DRM protection of media delivered through the browser. EME is not itself a DRM scheme; rather, it defines how Web content can work with third-party Content Decryption Modules (CDMs) that handle the proprietary decryption and rights-management portion. The principal groups favoring the development of EME have been streaming media companies such as Netflix and Microsoft, Google, and Apple, companies that both develop browsers and operate streaming media services. Following the announcement, EFF wrote a letter to W3C director, chief executive officer and team, in which it expressed its disappointment and said it was resignation from the W3C.
Pranav Dixit, writing for BuzzFeed News: Google's goal for the brand-new payments app it launched in India on Monday is simple yet ambitious: to get in on the action each time someone sends or receives money in its largest market outside the United States. The app is called Tez -- Hindi for "fast" -- and it lets users do three things: send money to people in their phones' address books, make payments to businesses (both online as well as in real-world mom-and-pop stores), and zap cash to anyone around them -- all without knowing bank account numbers or personal details. Tez is powered by UPI, short for Unified Payments Interface, a Indian government-backed payments standard that lets users transfer money directly into each other's bank accounts using just their mobile numbers, or a bank-issued payment ID that looks like an email address. It works a lot like Venmo does in the US, except that anyone can build their own payments app on top of UPI. Once you hit Pay or Receive, Tez detects other Tez users around you with a proprietary technology called Audio QR based on ultrasound, and pairs with their phones. Once a sender puts in the amount and authenticates with a preset PIN to confirm who they're sending money to, a transaction happens in seconds.