We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!
Molly McHugh writes When Apple launched the iPhone in 2007, and I owned a BlackBerry Curve. To me, my BlackBerry was close to being the absolute perfect smartphone. Today, BlackBerry revealed the Classic, a phone that is designed to make me—and everyone who owned a BlackBerry before the touchscreen revolution—remember how much we loved them.
42 comments | 4 hours ago
New submitter dubner writes Simply hand the law enforcement officer your mobile phone. That's what you can do in Iowa rather than "digging through clutter in your glove compartment for an insurance card." And soon your driver's license will be available on your phone too, according to a story in the (Des Moines Register). Iowans will soon be able to use a mobile app on their smartphones as their official driver's license issued by the Iowa Department of Transportation. Some marvelous quotes in TFA: "The new app should be highly secure ... People will use a pin number for verification." And "Branstad (Iowa governor)... noted that even Iowa children are now working on digital development projects." A raft of excuses ("battery's dead") and security problems come to mind; how would you implement such a system?
207 comments | about a week ago
An anonymous reader writes In a surprising decision, a split Supreme Court of Canada ruled this morning that police can search cellphones without a warrant incident to an arrest. The majority established some conditions, but ultimately ruled that it could navigate the privacy balance by establishing some safeguards with the practice. Michael Geist notes that a strongly worded dissent disagreed, emphasizing the privacy implications of access to cellphones and the need for judicial pre-authorization as the best method of addressing the privacy implications. The U.S. Supreme Court's June 2014 decision in Riley addressed similar issues and ruled that a warrant is needed to search a phone.
105 comments | about a week ago
hypnosec writes The Delhi High Court has banned Xiaomi and India online retailer Flipkart from selling any handsets that Ericsson claim are violating patents. The court has also asked Xiaomi and its agents to refrain from making, assembling, importing or selling any devices which infringe the patents in question. Xiaomi says: "We haven’t received an official note from the Delhi High Court. However, our legal team is currently evaluating the situation based on the information we have. India is a very important market for Xiaomi and we will respond promptly as needed and in full compliance with India laws. Moreover, we are open to working with Ericsson to resolve this matter amicably."
40 comments | about a week ago
An anonymous reader writes After two years of development, Google today released Android Studio 1.0, the first stable version of its Integrated Development Environment (IDE) aimed solely at Android developers. You can download the tool right now for Windows, Mac, and Linux from the Android Developer site. Google first announced Android Studio, built on the popular IntelliJ IDEA Java IDE, at its I/O Developer conference in May 2013. The company's pitch was very simple: this is the official Android IDE.
114 comments | about two weeks ago
An anonymous reader sends this report from The Verge: Senator Ron Wyden (D-OR) is trying to proactively block FBI head James Comey's request for new rules that make tapping into devices easier. The Secure Data Act would ban agencies from making manufacturers alter their products to allow easier surveillance or search, something Comey has said is necessary as encryption becomes more common and more sophisticated. "Strong encryption and sound computer security is the best way to keep Americans' data safe from hackers and foreign threats," said Wyden in a statement. "It is the best way to protect our constitutional rights at a time when a person's whole life can often be found on his or her smartphone."
109 comments | about two weeks ago
The Intercept has published today a story detailing documents that "reveal how the NSA plans to secretly introduce new flaws into communication systems so that they can be tapped into—a controversial tactic that security experts say could be exposing the general population to criminal hackers." The documents also describe a years-long effort, aimed at hostile and friendly regimes, from the point of view of the U.S. government, to break the security of various countries' communications networks. "Codenamed AURORAGOLD, the covert operation has monitored the content of messages sent and received by more than 1,200 email accounts associated with major cellphone network operators, intercepting confidential company planning papers that help the NSA hack into phone networks."
148 comments | about two weeks ago
As reported at SlashGear and Engadget, One Plus (which has been selling phones running Android-derived Cyanogen Mod rather than Android proper) won't be selling its phones with Cyanogen Mod to Indian consumers. Instead, according to Slashgear, "When OnePlus launches their device for the Indian market, Cyanogen won't be on it. Cyanogen has instead chosen to go with Micromax, an OEM more familiar to the Indian market. Cyanogen and Micromax also have an exclusive deal." ZDNet reports that One Plus's One, loaded with Android 5.0 after this kerfuffle, will be available to Indian buyers for a 72-hour period (already in progress), rather than by invitation only, which had previously been the only option.
69 comments | about three weeks ago
HughPickens.com writes Brian Fung writes in the Washington Post that Wikipedia has been a little hesitant to weigh in on net neutrality, the idea that all Web traffic should be treated equally by Internet service providers such as Comcast or Time Warner Cable. That's because the folks behind Wikipedia actually see a non-neutral Internet as one way to spread information cheaply to users in developing countries. With Wikipedia Zero, users in places like Pakistan and Malaysia can browse the site without it counting against the data caps on their cellphones or tablets. This preferential treatment for Wikipedia's site helps those who can't afford to pay for pricey data — but it sets the precedent for deals that cut against the net neutrality principle. "We believe in net neutrality in America," says Gayle Karen Young, adding that Wikipedia Zero requires a different perspective elsewhere. "Partnering with telecom companies in the near term, it blurs the net neutrality line in those areas. It fulfills our overall mission, though, which is providing free knowledge."
Facebook and Google also operate programs internationally that are exempted from users' data caps — a tactic known somewhat cryptically as "zero rating". Facebook in particular has made "Facebook Zero" not just a sales pitch in developing markets but also part of an Internet.org initiative to expand access "to the two thirds of the world's population that doesn't have it." But a surprising decision in Chile shows what happens when policies of neutrality are applied without nuance. Chile recently put an end to the practice, widespread in developing countries, of big companies "zero-rating" access to their services. "That might seem perverse," says Glyn Moody, "since it means that Chilean mobile users must now pay to access those services, but it is nonetheless exactly what governments that have mandated net neutrality need to do."
134 comments | about three weeks ago
New submitter lx76 writes:
The International Telecommunications Union does research on telecommunications in society worldwide, from cellphones to internet use. Since 2009, on a yearly basis, they've released their research findings in a report called the Measuring Information Society Report. This year's report is over 200 pages long, illustrated with abundant graphs and tables (PDF). It's not a light read. But one of the interesting numbers is an index showing the divide in global connectivity. From the report: "Over the past year, the world witnessed continued growth in the uptake of ICT [Information and
Communication Technology] and, by end 2014, almost 3 billion people will be using the Internet, up from 2.7 billion at end 2013..... Despite this encouraging progress, there are important digital divides that need to be addressed: 4.3 billion people are still not online, and 90 per cent of them live in the developing world."
The report continues, "As this report finds, ICT performance is better in countries with higher shares of the population living in urban areas, where access to ICT infrastructure, usage and skills is more favorable. Yet it is precisely in poor and rural areas where ICTs can make a particularly significant impact." Projects like Google's Project Loon have their work cut out for them."
45 comments | about three weeks ago
An anonymous reader writes "Corning introduced next-generation Gorilla Glass, which it said is ten times tougher than any competitive cover glass now in the market. The company says that the Gorilla Glass 4 so launched is to address the No.1 problem among the smartphones users- screen breakage due to everyday drops."
203 comments | about three weeks ago
Tyketto writes The US Department of Justice has been using fake communications towers installed in airplanes to acquire cellular phone data for tracking down criminals, reports The Wall Street Journal. Using fix-wing Cessnas outfitted with DRT boxes produced by Boeing, the devices mimic cellular towers, fooling cellphones into reporting "unique registration information" to track down "individuals under investigation." The program, used by the U.S. Marshals Service, has been in use since 2007 and deployed around at least five major metropolitan areas, with a flying range that can cover most of the US population. As cellphones are designed to connect to the strongest cell tower signal available, the devices identify themselves as the strongest signal, allowing for the gathering of information on thousands of phones during a single flight. Not even having encryption on one's phone, like found in Apple's iPhone 6, prevents this interception. While the Justice Department would not confirm or deny the existence of such a program, Verizon denies any involvement in this program, and DRT (a subsidiary of Boeing), AT&T, and Sprint have all declined to comment.
202 comments | about a month ago
wiredmikey writes Researchers have hacked several popular smartphones during the Mobile Pwn2Own 2014 competition that took place alongside the PacSec Applied Security Conference in Tokyo this week. The competition, organized by HP's Zero Day Initiative (ZDI) targeted the Amazon Fire Phone, iPhone 5s, iPad Mini, BlackBerry Z30, Google Nexus 5 and Nexus 7, Nokia Lumia 1520, and Samsung Galaxy S5. Using various attacks, some Mobile Pwn2Own 2014 Pwnage included: Apple's iPhone 5s (hacked via the Safari Web browser, achieving a full sandbox escape); Samsung's Galaxy S5 (hacked multiple times using near-field communications attacks); Amazon's Fire Phone (Web browser exploited); Windows Phone (partial hacks using a browser attack), andthe Nexus 5 (a Wi-Fi attack, which failed to elevate privileges). All the exploits were disclosed privately to the affected companies. HP promised to reveal details in the upcoming weeks.
52 comments | about a month ago
dkatana writes: NXP, having worked with Apple on Apple Pay, is now launching its PN66T module for secure NFC mobile transactions — for Android. It's intended to implement the same functionality of Apple Pay. While NXP claims the module is OS independent, the features clearly indicate that Android devices are the likely recipients of the SoC. The PN66T is Europay, MasterCard, and Visa (EMVCo) certified, and also supports American Express ExpressPay, thus fully covering the three big credit card companies, ensuring compatibility and interoperability with existing and future payment methods.
122 comments | about a month and a half ago
An anonymous reader writes: Over the past couple of years, Google has implemented some changes to how Android handles SD cards that aren't very beneficial to users or developers. After listening to many rounds of complaints, this seems to have changed in Android 5.0 Lollipop. Google's Jeff Sharkey wrote, "[I]n Lollipop we added the new ACTION_OPEN_DOCUMENT_TREE intent. Apps can launch this intent to pick and return a directory from any supported DocumentProvider, including any of the shared storage supported by the device. Apps can then create, update, and delete files and directories anywhere under the picked tree without any additional user interaction. Just like the other document intents, apps can persist this access across reboots." Android Police adds, "All put together, this should be enough to alleviate most of the stress related to SD cards after the release of KitKat. Power users will no longer have to deal with crippled file managers, media apps will have convenient access to everything they should regardless of storage location, and developers won't have to rely on messy hacks to work around the restrictions."
214 comments | about a month and a half ago
An anonymous reader writes Starwood Hotels and Resorts has became the first chain to let guests unlock doors with their phones at 10 Aloft, Element and W hotels. They hope to expand the program to 140 more properties in those brands by the middle of next year. From the article: "The technology's developer says that it uses its own encrypted secure channel to ensure thieves cannot abuse the innovation. But one expert had reservations. "Nothing is 100% secure, and once this technology is in widespread use it will make a very tasty target for hackers," said Prof Alan Woodward from the University of Surrey's department of computing.
150 comments | about a month and a half ago
SmartAboutThings (1951032) writes "LG Display has announced that it has developed a 5.3-inch Full HD LCD panel for smartphones with the world's narrowest bezel at 0.7mm. It's even thinner than a credit card, making the screen give you the impression that it 'overflows.' The company calls the construction Neo Edge technology; it uses an adhesive instead of double-sided tape to attach and seal the panel's circuit board and backlight unit.
63 comments | about a month and a half ago
schwit1 writes with news of a Circuit Court decision from Virginia where a judge has ruled that a criminal defendant cannot use Fifth Amendment protections to safeguard a phone that is locked using his or her fingerprint. According to Judge Steven C. Fucci, while a criminal defendant can't be compelled to hand over a passcode to police officers for the purpose of unlocking a cellular device, law enforcement officials can compel a defendant to give up a fingerprint. The Fifth Amendment states that "no person shall be compelled in any criminal case to be a witness against himself," which protects memorized information like passwords and passcodes, but it does not extend to fingerprints in the eyes of the law, as speculated by Wired last year. Frucci said that "giving police a fingerprint is akin to providing a DNA or handwriting sample or an actual key, which the law permits. A passcode, though, requires the defendant to divulge knowledge, which the law protects against, according to Frucci's written opinion."
328 comments | about a month and a half ago
An anonymous reader writes: Security researcher Mordechai Guri with the guidance of Prof. Yuval Elovici from the cyber security labs at Ben-Gurion University in Israel presented at MALCON 2014 a breakthrough method ("AirHopper") for leaking data from an isolated computer to a mobile phone without the presence of a network. In highly secure facilities the assumption today is that data can not leak outside of an isolated internal network. It is called air-gap security. AirHopper demonstrates how the computer display can be used for sending data from the air-gapped computer to a near by smartphone. The published paper and a demonstration video are at the link.
80 comments | about a month and a half ago
sciencehabit writes: If you want to figure out how many people live in a particular part of your country, you could spend years conducting home visits and mailing out questionnaires. But a new study describes a quicker way. Scientists have figured out how to map populations using cellphone records — an approach that doesn't just reveal who lives where, but also where they go every day. The researchers also compared their results to population density data gathered through remote sensing technologies, a widely-used method that relies on satellite imaging to gather detailed information on population settlement patterns and estimate population counts. They found that the two methods are comparable in accuracy when checked against actual survey-based census data, but estimates from mobile phone data can provide more timely information, down to the hours.
57 comments | about 2 months ago