Vysk QS1 phone case brings encrypted calls to paranoid Samsung and Apple users

encryption_case_thumb

Phones hit the headlines for lots of reasons -- the biggest, the most expensive, the shiniest, or just the newest. We live in times in which security and privacy are major concerns for people in all walks of life. The activities of the NSA, as revealed by Edward Snowden, served only to heighten paranoia -- the prospect of having one's phone calls and text messages intercepted is something that fills few people with joy. Enter Vysk communicastions' Vysk QS1 phone case which can be used with an iPhone 5 or 5s, and a Samsung Galaxy S5 or S4. The selling point here is that it's not just your phone that's protected, but also your privacy.

The privacy features come in mechanical and software forms. On the mechanical front there are "shutters" that can be used to obscure your phone's front and rear cameras, and there's also a jamming system for microphones. This is described by Vysk as "Lockdown Mode", but you can take things a step further. For $9.95 you can subscribe to "Private Call Mode". This introduces encryption to your texts and phone calls, with an onboard processor taking care of encryption on the fly and sent via the Vysk encrypted network. As Vysk puts it: "No one -- not even Vysk -- will know the identity of the caller or the recipient. No data is collected -- no phone numbers, call times or content - so there is no data to record. Because nothing is recorded, nothing is at risk."

Continue reading

Google reveals workaround for paid Android Wear apps

Fix repair computer solution keyboard

Even though Android can run paid apps without any problems whatsoever, the same cannot be said about Android Wear. Google's new operating system for wearables fails to install anything but free offerings, effectively preventing developers from making money.

That is not much of a problem now, as most Android Wear-designed apps are free. But, as the platform gains more traction, this could severely impact developers' interest. Google, however, has decided to reveal a workaround.

Continue reading

PopcornTime brings Netflix-like torrents to Chromecast

chromecast

PopcornTime has been in and out of the news. The program uses BitTorrent to grab movies and TVs shows and allows you to stream them right away. The service was initially taken down, but has found a way to come back, and claims those problems are in the past, stating "This PopcornTime service will never be taken down".

Now, in an even bolder move, the service has announced support for Chromecast, Google's tiny TV dongle. "This is the alpha version, so handle with care and let us know what works, what doesn’t, and if you do find something that’s not working properly (hopefully not!!) let us know in our forum and be as specific as possible (also tell us which Windows version you’re running, etc.)", the service announces.

Continue reading

I am Microsoft All-In

road cloud

Sixth in a series. On July 1, I officially started my "Microsoft All-In" summer sojourn. Surface Pro 3 is my PC and Nokia Lumia Icon my smartphone for the next couple of months. Google gets the boot -- at least for awhile. I now largely use Microsoft products and services and third-party apps available for the company's platforms. Many commenters wonder why, so let me explain.

I last used Windows as my primary platform in 2010 -- never for Windows Phone. Like other BetaNews reporters, I tend to write about products used regularly. Writing is more authoritative from experience, and often only long-time use reveals hidden problems or benefits. The reality, and it's something obviously seen in comments: Microsoft platform users largely make up BetaNews readership.

Continue reading

Do Android users really need malware protection?

virus malware infection mobile

Adrian Ludwig, lead engineer for Android security at Google, spoke to journalists prior to Google's I/O developers' conference and said that Android users who install antivirus and other security apps on their devices are no better off than those who don’t. The risk of potentially harmful applications is "significantly overstated" he believes, and there’s no need for anyone to install any form of third party protection.

"I think ... paying for a product that you will probably never actually receive protection from is not a rational reduction of risk -- but people buy things for lots of reasons", he said. Security expert Graham Cluley, who worked for Sophos for 14 years, disagrees. In a blog post he says Ludwig is "wrong, wrong, wrong". Two very opposing views. So who’s right?

Continue reading

Innocent victims: NSA gathered data about more ordinary web users than targets

lingerie

We already knew that the dragnet style of data collection employed by the NSA resulted in a huge level of collateral damage. As revealed by whistle-blower Edward Snowden the agency had been intercepting huge amounts of web traffic -- often with the assistance of web firms -- on an almost unbelievable scale. The NSA has tried to improve its public image by playing the national security card, as well as releasing a "transparency report" but there's no getting away from the fact that countless innocent web users got caught up in the net. But an investigation by the Washington Post reveals the true extent of the impact on the average internet users -- and it's far worse than many thought.

A four-month investigation by the newspaper found that the number of average internet users who had their data intercepted far outweighs the data of targeted individuals. And not just by a bit -- by a factor of nine. Data provided to the Washington Post by Edward Snowden shows that an astonishing 900 percent more innocent users than intended targets fell victim to the NSA's surveillance. (For the purposes of accuracy the exact figures are closer to an 11 to 89 percent split). These are staggering revelations. There has already been very vocal opposition to the NSA's activities but these were essentially "blind" complaints. Without knowing the scale of operations, it was difficult to know just how upset to be. Nine out of ten people who had their data collected were nothing more than collateral damage caught in the extremely wide net cast by the agency.

Continue reading

Is Russia on the verge of creating its own controlled, closed internet?

moscow

The idea of a closed internet is hardly new; turn your eyes to East Asia, and the Great Firewall of China looms large. The Chinese government is well known for the control it likes to exert over the levels of access its citizens have to the internet, and there have been numerous well-publicized cases of censorship and access being restricted to pages that refer to certain events in the county's history. The country is highly defensive of its image, and goes to great lengths to fight off western influence -- including going as far as banning Windows 8 on government computers lest machines furnished with Microsoft's most recent operating system be used for spying on the People's Republic of China. Now it looks as though Russia could be going down a similar route.

Russian parliament has just passed a law that requires internet companies to store data about Russian citizens within the county's boundaries. The move can be viewed in a couple of ways. It is no secret that the Russian government, and Vladimir Putin in particular, is no fan of social media -- social networks were used by Russians to voice their disapproval at Putin's activities. It is thought that the move to contain citizen's data without Russia is a bid to create a Russian version of China's closed internet.

Continue reading

The most popular stories on BetaNews this past week: June 29 -- July 5

July calendar

Something of a quieter week this week -- perhaps because of Independence Day and preparations there for. Still, there was plenty of news to keep us busy, including the NSA releasing a transparency report -- for what it's worth. Facebook found itself in the firing line after it transpired that the social network had been conducting psychological experiments by meddling with users' newsfeeds. Security is an on-going concern in technology, but it's something we have tendency to think about only in relation to computers and smartphones. One of the latest targets for malware and attacks is the power grid, and it's hard to tell what sort of havoc could be wreaked.

Microsoft tried to do its bit for security -- arguably in a misguided fashion -- by taking control of dynamic DNS service No-IP, and accidentally taking out a number of legitimate sites in addition to those malware-related ones -- the intended targets. In more positive Microsoft news, enhancements were made to Office 365's collaboration options. Windows Phone is still struggling in the smartphone market, but Microsoft will be hoping that this month's launch of Windows Phone 8.1 will help to improve things -- will the addition of folder support be enough? Looking further into the future, Joe pondered what Microsoft should do with Nokia. He also decided to give Windows another chance, helped along by his new Surface Pro 3.

Continue reading

Samsung Galaxy S5 -- the whole Android package [Review]

AdobePhotoshopExpress_44c1a42fbde545b284e573fd3a83c166

It is hard to get excited about an Android smartphone nowadays. There are simply too many similar devices on the market. Slightly faster processor? Slightly larger screen? Yawn. At this point, Android is simply evolution rather than revolution. Hell, Google I/O 2014 was rather boring. While the proposed changes to Android "L" are nice, it is hardly anything to get excited about.

Instead, it seems that true innovation is coming from the manufacturers, rather than Google. There have been many cool additions to Android by Samsung, LG and HTC to name a few. Samsung in particular has enhanced the OS immensely with its tweaks and features. Sadly, many critics have lambasted that manufacturer for cluttering the user experience with too many features. While I understand the "less is more" philosophy, I refuse to fault any company for being too ambitious. For the past couple weeks, I have been testing Samsung's ambitions with the Samsung Galaxy S5 (Verizon) and I would like to share that with you.

Continue reading

I declare independence from Google

Monopoly-game

Fifth in a series. Two years ago today, I stepped away from Apple, following a boycott later abandoned. My problems were philosophical, regarding the company's aggressive patent litigation that thwarts innovation. This July Fourth I seek freedom from Google, and not for the first time. I don't oppose the search and information giant, nor like fanboy rally for it. I declare independence as a practical exercise; an experiment. Can you -- OK, I -- do without Big G's expansive portfolio of products and services? I want to know.

In many regards, Google is the Internet gatekeeper U.S. trustbusters asserted Microsoft would be, in their late-1990s court case. Big G is unquestionably a monopoly that integrates features and products for competitive gain. In the United States, Google's search share is about 67 percent (3.5 times greater than second-ranked Microsoft), according to ComScore, and as much as 90 percent in some countries. Android's worldwide smartphone share is about 80 percent, according to IDC.

Continue reading

Google bans porn ads from search results

porn

Google has made changes to its ad network by banning the promotion of pornographic websites.

The ban specifically concerns sites that feature "graphic sexual acts with intent to arouse including sex acts such as masturbation."

Continue reading

Big Google Play Services update rolls out

Android celebrating

Google gains some control over the distribution of Android updates by pushing new features and changes directly through Google Play, quickly reaching a significant part of the user base without getting manufacturers and mobile operators involved in the process.

This is how Google Play Services 5.0, announced late last month at the I/O 2014 conference, is also making its way to Android users. The upgrade, which is rolling out now, targets both end users and developers, introducing new tools, features and APIs.

Continue reading

Google launches Android Wear companion app

android Wear

Last month, at its yearly I/O developer conference, Google introduced Android Wear, a version of the popular open-source operating system designed for wearables, like the LG G Watch and Samsung Gear Live smartwatches. Connecting such devices to Android handsets is, as usual, a companion app, that Google just launched.

The app, called Android Wear, gives users the ability to manage their wearables, allowing them to adjust the preferences for voice commands (which play a key role in the Android Wear user experience), tweak notification settings (which, again, is an important feature for the platform), and of course configure the devices from the comfort of their Android handsets.

Continue reading

No CyanogenMod 12 until Android L is ready for prime time

Now Later

After making factory images available for Nexus 5 and Nexus 7, Google releases the source code for the Android L preview through AOSP (Android Open Source Project) for most of its compatible Nexus devices. And for many enthusiasts this means development for the next CyanogenMod version should kick off shortly.

The team behind the popular custom distribution, however, announces that CyanogenMod 12 development will not start until the final bits of code are available. "'So let's get the flood-gates started on CM 12!' -- right? No", says the team in a new blog post, aptly named The "L" is for Later.

Continue reading

HyperCat protocol will make or break the Internet of Things

IOT

The idea of connected devices means far more than wireless webcams and televisions that are connected to the internet. The Internet of Things is a buzzword, but it’s also a real, tangible thing. Consumers and businesses alike are looking to the ways in which connected devices can help to make life easier, more efficient, and more profitable. In many ways, this is Internet 2.0 -- we've had Web 2.0, now the Internet is being taken to the next level -- as the benefits of getting ever more devices not only online, but also communicating with each other, are realized. But just as with the web, the IoT needs protocols to ensure compatibility between devices, and this is what HyperCat hopes to bring about.

A collaboration between dozens of UK technology firms, HyperCat is… well… let's allow it to introduce itself. "HyperCat is a media type for the web allowing servers to list catalogs of resources. It is designed to make discovery of IoT services and assets easier". It's a protocol, a specification, a standard. It's an attempt to define the semantics of the Internet of Things, helping to level the playing field and start everyone off on an even footing. As we saw with the VHS and Betamax battle, and the Blu-ray vs HD-DVD format wars, there are just no winners when there are two or more competing formats. It makes perfect sense to pin down how the IoT should work as early as possible, and this is precisely what HyperCat aims to do.

Continue reading

Load More Articles