![]() |
|
![]() |
#1 |
Infamous Member
How Do You Identify?:
Lesbian non-stone femme Preferred Pronoun?:
She, her Relationship Status:
Committed to being good to myself Join Date: Jun 2011
Location: West Coast
Posts: 8,258
Thanks: 39,306
Thanked 40,459 Times in 7,283 Posts
Rep Power: 21474858 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]()
Simgo takes the sting out of roaming charges
By Rich Trenholm Rich Trenholm is a Senior Editor at CNET, covering everything from phones to bionic implants. Based in London since 2007, he has travelled the world seeking out the latest and best consumer technology for your enjoyment. Anywhere I roam, where I lay my head is home. If only that was the case for the humble smart phone, which as soon as you board a boat, plane or dirigible magically transforms into a pocket-sized money-vampire, international roaming charges sucking money straight out of your wallet with every call, text or data connection. But to help you relax and enjoy your vacation, business trip or hot-footed flight to somewhere without an extradition treaty, Simgo turns your iPhone or Samsung Galaxy phone into a local native and dodges those shocking international costs. Simgo is a special iPhone or Samsung Galaxy case that cuts out wallet-melting international roaming bills. Off the beaten path I reign At present, to use your phone when you head for foreign climes, you need to either hunt for an elusive Wi-Fi hotspot; or you have to buy a SIM card when you arrive and tell everyone your temporary number; or you have to go through the wallet-melting expense of roaming on your home SIM, complete with the delightful surprise of a massive bill waiting on the mat when you return home. Basically, it's a big ol' rigmarole. Enter Simgo. Simgo is a case for your phone that takes over the job of your SIM card. You take out your SIM card and attach the special protective cover to your phone, which then acts as a virtual SIM card. So no matter where you go you're not stung with exorbitant international rates -- and best of all you're still on your own number. Simgo cases fit the Samsung Galaxy S2, S3 and S4, and the iPhone 4, 4S, iPhone 5 and 5S. It works with an app available from the Google Play or Apple App Store. I'm free to speak my mind anywhere Each time you travel you tell the app that you're going overseas and it assigns you a local number for local charges. But it also switches on call forwarding so your calls are made with your usual number, and people can still call you on your regular number. The service works on 3G and 4G networks in over 30 countries across North and South America, Europe, Africa and Asia. CNET Reviews Cell Phones Simgo Mobile ltd. cell phones Simgo Simgo takes the sting out of roaming charges CNET Editors' Take February 21, 2014 3:04 AM PST http://reviews.cnet.com/cell-phone-a...-35835221.html
__________________
~Anya~ ![]() Democracy Dies in Darkness ~Washington Post "...I'm deeply concerned by recently adopted policies which punish children for their parents’ actions ... The thought that any State would seek to deter parents by inflicting such abuse on children is unconscionable." UN Human Rights commissioner |
![]() |
![]() |
![]() |
#2 |
Infamous Member
How Do You Identify?:
Lesbian non-stone femme Preferred Pronoun?:
She, her Relationship Status:
Committed to being good to myself Join Date: Jun 2011
Location: West Coast
Posts: 8,258
Thanks: 39,306
Thanked 40,459 Times in 7,283 Posts
Rep Power: 21474858 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]()
Password 'treasure trove' found
Last updated 6 hours ago 2/26/14 By Kevin Rawlinson BBC News The batch could be used to launch email scams and crack into online accounts, experts said A "treasure trove" of stolen personal details has been found on sale on black market websites, a security firm says. About 360 million account credentials including email addresses and passwords were reportedly uncovered. Hide Security said it had also found 1.25 billion email addresses without passwords. It is unknown where the credentials, which were found in the past three weeks, came from - but the company said they included major email providers. Experts said that the batch was exceptionally large in size. "It is Godzilla-sized, it is a monster," said online security consultant Graham Cluley. He added: "There may be some duplicates but, even so, it sounds like a complete treasure trove for cybercriminals." Hide Security said that its findings were the result of "multiple breaches which we are independently investigating". 'Mind boggling' In a post on its website, it said: "In the first three weeks of February, we identified nearly 360 million stolen and abused credentials and 1.25 billion records containing only email addresses. According to Mr Cluley, the details could be used to access not only the accounts they are directly associated with, but potentially others. "What normally comes out is not only spam and phishing attacks, but also that the combination of email and password can be used in multiple places because people use the same ones across different sites," he said. Mr Cluley added: "If people have a big database of passwords, they use it to find out what the regular ones are. The next time they want to crack into an account, they can use the most common passwords." And Reuters reported concerns that the discovery could represent more of a risk to consumers and companies than stolen credit card data because of the chance the sets of user names and passwords could open the door to online bank accounts, corporate networks, health records and virtually any other type of computer system. Spamming and phishing Alex Holden, chief information security officer of Hold Security, told the agency: "The sheer volume is overwhelming." He said the credentials had been stolen in breaches yet to be publicly reported. The companies attacked could remain unaware until they were notified by third parties who found evidence of the hacking, he said. "We have staff working around the clock to identify the victims," he said. The batch also included email addresses not paired with passwords, which would be of use to people intending to launch spamming and phishing attacks. BBC © 2014
__________________
~Anya~ ![]() Democracy Dies in Darkness ~Washington Post "...I'm deeply concerned by recently adopted policies which punish children for their parents’ actions ... The thought that any State would seek to deter parents by inflicting such abuse on children is unconscionable." UN Human Rights commissioner |
![]() |
![]() |
![]() |
#3 |
Infamous Member
How Do You Identify?:
Lesbian non-stone femme Preferred Pronoun?:
She, her Relationship Status:
Committed to being good to myself Join Date: Jun 2011
Location: West Coast
Posts: 8,258
Thanks: 39,306
Thanked 40,459 Times in 7,283 Posts
Rep Power: 21474858 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]()
28 March 2014 Last updated at 08:53 ET
Facebook has ambitious plans to connect the two-thirds of the world that has no net access, using drones, satellites and lasers. By Jane Wakefield Technology reporter Solar-powered drones will deliver net access to remote places. The move was announced on the social media platform by founder Mark Zuckerberg. It will put it in direct competition with Google, which is planning to deliver net access via balloons. Both of the net giants want to extend their audiences, especially in the developing world. Details about Facebook's plan were scant but it will include a fleet of solar-powered drones as well as low-earth orbit and geosynchronous satellites. Invisible, infrared laser beams could also be used to boost the speed of the net connections. Last year Facebook and other technology companies launched internet.org to help bring net access to the huge swathes of the globe that are still not connected. Aerospace experts The social network has already teamed up with telecoms operators in the Philippines and Paraguay to double the number of people using the internet in that region. "We're going to continue building these partnerships, but connecting the whole world will require inventing new technology too," Mr Zuckerberg said in his post. To bring the project to fruition, Facebook has set up a Connectivity Lab that will include experts in aerospace and communication technology, from Nasa's jet propulsion lab and its Ames research centre. It has also hired a five-member team that worked at British firm Ascenta, which developed the Zephyr, which holds the record for the longest-flying solar-powered unmanned aircraft. Earlier this month there were rumours that the social network was interested in buying drone-maker Titan but there was no mention of this in the announcement. Altruistic? The plans form part of Facebook's ambitions to extend its reach beyond its 1.2 billion audience, thinks Ovum analyst Mark Little. "Zuckerberg is pushing this as an altruistic way of connecting more people in the world - the net as a basic human right - but by increasing the total of net connections it also increases Facebook's members and the amount of sharing done, which in turn creates more space for advertising and drives its revenues in a massive way." Last year Google announced similar plans to develop solar-powered balloons to deliver net access to remote areas of the world. Code-named Project Loon, 30 of the super-pressure balloons were launched in New Zealand in June. "It is perhaps aptly named," said Mr Little. "It is going to have a lot of political hoops to jump through. Some governments won't put up with having that fleet over their airspace." Mr Little thinks that for both Facebook and Google, the technology in their projects may prove to be "the easy bit" and that the real challenge will lie in persuading governments around the world that its alternative networks are viable. "Mobile operators are always under threat from alternative ways of delivering net services. This becomes a concern for governments when a nation's communications rest on an outside provider," he said. http://www.bbc.com/news/technology-26784438
__________________
~Anya~ ![]() Democracy Dies in Darkness ~Washington Post "...I'm deeply concerned by recently adopted policies which punish children for their parents’ actions ... The thought that any State would seek to deter parents by inflicting such abuse on children is unconscionable." UN Human Rights commissioner |
![]() |
![]() |
![]() |
#4 |
Infamous Member
How Do You Identify?:
Lesbian non-stone femme Preferred Pronoun?:
She, her Relationship Status:
Committed to being good to myself Join Date: Jun 2011
Location: West Coast
Posts: 8,258
Thanks: 39,306
Thanked 40,459 Times in 7,283 Posts
Rep Power: 21474858 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]()
Apple confirmed a longtime conspiracy theory — and gave regular customers a big reason to distrust it
Troy Wolverton December 20, 2017 Apple on Wednesday admitted it had been secretly throttling the performance of older iPhones. The admission outraged even some of the company’s biggest fans. Customers have good reason to be distrustful of the company and to suspect its motives. Apple has long inspired an almost religious devotion among customers and tech aficionados – but it just seriously undermined its fans’ faith and loyalty. The company on Wednesday acknowledged what some people have long suspected: that it has been secretly stifling the performance of older iPhones. Critics have accused the company in the past, based on anecdotal evidence, of purposely slowing phones to compel users to upgrade to the latest model. While Apple admitted to the practice on Wednesday, it sought to underscore that it had done so for a purely altruistic reason: to prevent older phones from shutting down unexpectedly. The justification hasn’t mollified Apple’s outraged fans. If anything, the company’s statement has stoked the conspiracy theories, and for good reason. Apple was caught red-handed: By the company’s own admission, it’s been throttling the performance of iPhones since last year. Apple hasn’t explained why it didn’t disclose the practice until now, after GeekBench released charts based on its data that showed how older iPhones were not performing as quickly as they had when they launched. Apple’s secrecy – a badge of honor when it comes to unveiling new products – is certain to encourage distrust in this situation. Apple comes across as an organization that was intentionally hiding something, something it acknowledged only when it was caught red-handed. If Apple didn’t acknowledge that it was throttling older phones until one year after it started doing so, what else is the company not telling customers? Why should iPhone users believe the company’s explanation for why it’s throttling phones? And why should they believe that it only started doing that a year ago? Such questions might sound like the ravings of conspiracy theorists. But in this case, the conspiracy mongers were proved right: Apple was slowing down their phones. And there are rational reasons to think the company may not be offering a full explanation for why. The iPhone maker has a big reason to push customers to upgrade The fact is that Apple has an incentive to push users to upgrade; it makes money selling new devices, after all. And the company has a history of artificially making older devices look inferior to new ones. The iPhone 4, for example was perfectly capable of running Siri, but Apple reserved that feature for the model that replaced it, the iPhone 4s. Likewise, the camera in the iPhone 3G was capable of shooting video, but Apple didn’t turn that feature on and instead made video recording the signature capability of its next device, the iPhone 3GS. Planned obsolescence is a long-standing practice in the tech and broader manufacturing industries. Apple may well be honest in explaining its motives for throttling phones and about the time frame when it started doing so. But many folks just aren’t going to believe that. “For years, we’ve reassured people that no, Apple doesn’t secretly slow down their older iPhones to make them buy new ones,” the blogger and iPhone developer Marco Arment said in a tweet on Wednesday. He added in a follow-up Twitter post: “The reputation damage from secretly slowing down old iPhones, regardless of the reason, will likely linger for a decade.” Whatever the company’s motives for throttling iPhones, it should have made clear long ago what it was doing, if only for public-relations reasons. If it had told users what it was doing when it introduced the throttling feature – or heck, even better, when it first started seriously considering building the feature into the iPhone’s operating system – it would have been able to shape the discussion and maybe even improve how the feature works. Instead, it’s now drawing customers’ criticism, distrust, and ire. And it has no one to blame but itself. https://www.businessinsider.nl/apple...onal=true&r=US
__________________
~Anya~ ![]() Democracy Dies in Darkness ~Washington Post "...I'm deeply concerned by recently adopted policies which punish children for their parents’ actions ... The thought that any State would seek to deter parents by inflicting such abuse on children is unconscionable." UN Human Rights commissioner |
![]() |
![]() |
The Following User Says Thank You to *Anya* For This Useful Post: |
![]() |
#5 | |
Practically Lives Here
How Do You Identify?:
Butch Relationship Status:
..... Join Date: Nov 2009
Location: 30 minute ferry ride from Seattle
Posts: 38,565
Thanks: 20,811
Thanked 33,558 Times in 14,919 Posts
Rep Power: 21474890 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]() Quote:
|
|
![]() |
![]() |
The Following 2 Users Say Thank You to homoe For This Useful Post: |
![]() |
#6 |
Member
How Do You Identify?:
Femme, Human Preferred Pronoun?:
She, Her Join Date: Jul 2017
Location: Canada
Posts: 1,148
Thanks: 966
Thanked 2,410 Times in 888 Posts
Rep Power: 21474846 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]()
I have known this for quite some time now. I was one of the first iPhone users and after 2 years was forced to upgrade. I could no longer use my phone because I couldn't update to the latest OS. I was missing phone calls and text messages were being significantly delayed and anything I did on my phone took a considerable amount of time until finally I couldn't do anything without receiving a constant pesky message that I had to upgrade to the latest OS. Frustrated and stressed to the max I went to the mall and the mobile guys told me all about how so many other iPhone users came in and gave them grief. I upgraded and went team android and never regretted my decision. I love that I have so much control over my phone. I am due for an upgrade which will be to another Android phone.
As for conspiracies I won't get into conspiracy theories in this post...... I think people need to start opening their eyes to how this world really works..... ![]() Team Android. ![]() |
![]() |
![]() |
![]() |
#7 |
Infamous Member
How Do You Identify?:
Lesbian non-stone femme Preferred Pronoun?:
She, her Relationship Status:
Committed to being good to myself Join Date: Jun 2011
Location: West Coast
Posts: 8,258
Thanks: 39,306
Thanked 40,459 Times in 7,283 Posts
Rep Power: 21474858 ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
![]()
TECHNOLOGY
Researchers Discover Two Major Flaws in the World’s Computers By CADE METZ and NICOLE PERLROTH JAN. 3, 2018 SAN FRANCISCO — Computer security experts have discovered two major security flaws in the microprocessors inside nearly all of the world’s computers. The two problems, called Meltdown and Spectre, could allow hackers to steal the entire memory contents of computers, including mobile devices, personal computers, servers running in so-called cloud computer networks. There is no easy fix for Spectre, which could require redesigning the processors, according to researchers. As for Meltdown, the software patch needed to fix the issue could slow down computers by as much as 30 percent — an ugly situation for people used to fast downloads from their favorite online services. “What actually happens with these flaws is different and what you do about them is different,” said Paul Kocher, a researcher who was an integral member of a team of researchers at big tech companies like Google and Rambus and in academia that discovered the flaws. Meltdown is a particular problem for the cloud computing services run by the likes of Amazon, Google and Microsoft. By Wednesday evening, Google and Microsoft said they had updated their systems to deal with the flaw. Amazon told customers of its Amazon Web Services cloud service that the vulnerability “has existed for more than 20 years in modern processor architectures.” It said that it had already protected nearly all instances of A.W.S. and that customers must update their own software running atop the service as well. To take advantage of Meltdown, hackers could rent space on a cloud service, just like any other business customer. Once they were on the service, the flaw would allow them to grab information like passwords from other customers. That is a major threat to the way cloud-computing systems operate. Cloud services often share machines among many customers — and it is uncommon for, say, a single server to be dedicated to a single customer. Though security tools and protocols are intended to separate customers’ data, the recently discovered chip flaws would allow bad actors to circumvent these protections. The personal computers used by consumers are also vulnerable, but hackers would have to first find a way to run software on a personal computer before they could gain access to information elsewhere on the machine. There are various ways that could happen: Attackers could fool consumers into downloading software in an email, from an app store or visiting an infected website. According to the researchers, the Meltdown flaw affects virtually every microprocessor made by Intel, which makes chips used in more than 90 percent of the computer servers that underpin the internet and private business operations. Customers of Microsoft, the maker of the Windows operating system, will need to install an update from the company to fix the problem. The worldwide community of coders that oversees the open-source Linux operating system, which runs about 30 percent of computer servers worldwide, has already posted a patch for that operating system. Apple had a partial fix for the problem and is expected to have an additional update. The software patches could slow the performance of affected machines by 20 to 30 percent, said Andres Freund, an independent software developer who has tested the new Linux code. The researchers who discovered the flaws voiced similar concerns. This could become a significant issue for any business running websites and other software through cloud systems. There is no evidence that hackers have taken advantage of the vulnerability — at least not yet. But once a security problem becomes public, computer users take a big risk if they do not install a patch to fix the issue. A so-called ransomware attack that hit computers around the world last year took advantage of machines that had not received a patch for a flaw in Windows software. The other flaw, Spectre, affects most processors now in use, though the researchers believe this flaw is more difficult to exploit. There is no known fix for it, and it is not clear what chip makers like Intel will do to address the problem. It is not certain what the disclosure of the chip issues will do to Intel’s business, and on Wednesday, the Silicon Valley giant played down the problem. “Intel and other technology companies have been made aware of new security research describing software analysis methods that, when used for malicious purposes, have the potential to improperly gather sensitive data from computing devices that are operating as designed,” the company said in a statement. “Intel believes these exploits do not have the potential to corrupt, modify or delete data.” The researchers who discovered the flaws notified various affected companies. And as is common practice when such problems are identified, they tried to keep the news from the public so hackers could not take advantage of the flaws before they were fixed. But on Tuesday, news of the Meltdown flaw began to leak through various news websites, including The Register, a science and technology site based in Britain. So the researchers released papers describing the flaws on Wednesday, much earlier than they had planned. For now, computer security experts are using a patch, called Kaiser, that was originally discovered by researchers at the Graz University of Technology in Austria to respond to a separate issue last year. Spectre will be much more difficult to deal with than issuing a software patch. The Meltdown flaw is specific to Intel, but Spectre is a flaw in design that has been used by many processor manufacturers for decades. It affects virtually all microprocessors on the market, including chips made by AMD that share Intel’s design and the many chips based on designs from ARM in Britain. Spectre is a problem in the fundamental way processors are designed, and the threat from Spectre is “going to live with us for decades,” said Mr. Kocher, the president and chief scientist at Cryptography Research, a division of Rambus. “Whereas Meltdown is an urgent crisis, Spectre affects virtually all fast microprocessors,” Mr. Kocher said. An emphasis on speed while designing new chips has left them vulnerable to security issues, he said. “We’ve really screwed up,” Mr. Kocher said. “There’s been this desire from the industry to be as fast as possible and secure at the same time. Spectre shows that you cannot have both.” The Meltdown flaw was discovered by Jann Horn, a security analyst at a Google-run security research group called Google Project Zero, last June. Mr. Horn was the first to alert Intel. The chip giant then heard from other researchers who had also discovered the flaw, including Werner Haas and Thomas Prescher, at Cyberus Technology; and Daniel Gruss, Moritz Lipp, Stefan Mangard and Michael Schwarz at the Graz University of Technology. The researchers had been working through the Christmas holiday on a patch, and coordinating with companies like Microsoft and Amazon to roll out the fix. The second flaw, Spectre, was also discovered by Mr. Horn at Google and separately by Mr. Kocher, in coordination with Mike Hamburg at Rambus, Mr. Lipp at Graz University and Yuval Yarom at the University of Adelaide in Australia. A fix may not be available for Spectre until a new generation of chips hit the market. “This will be a festering problem over hardware life cycles. It’s not going to change tomorrow or the day after,” Mr. Kocher said. “It’s going to take a while.” A version of this article appears in print on January 4, 2018, on Page B1 of the New York edition with the headline: 2 Big Flaws Discovered In Nearly All Computers. https://www.nytimes.com/2018/01/03/b...pgtype=article
__________________
~Anya~ ![]() Democracy Dies in Darkness ~Washington Post "...I'm deeply concerned by recently adopted policies which punish children for their parents’ actions ... The thought that any State would seek to deter parents by inflicting such abuse on children is unconscionable." UN Human Rights commissioner |
![]() |
![]() |
The Following User Says Thank You to *Anya* For This Useful Post: |
![]() |
Tags |
internet, internet privacy, tech, technology |
|
|