Blog

Sonos’ leaked portable speaker automatically tunes its sound

[ad_1]

The biggest addition, however, might be its sound adjustment. The speaker will reportedly introduce an Auto Trueplay feature that uses the device’s microphones to automatically tune its output to the characteristics of the room. This isn’t new in the industry (the HomePod and Google Home Max perform similar functions), but it’s a first for Sonos and a novel concept for portable speakers.

Other details? The device would support Alexa and Google Assistant, but only while using WiFi. AirPlay 2 would also be available to stream audio from your Apple gear. And yes, there would be an integrated handle to help you lug the speaker to the beach. It’s not certain if this speaker is water-resistant, mind you, so you may want to keep it far from the water’s edge.

It’s not guaranteed this will be one of the products Sonos is introducing ahead of the IFA tech expo, although its recent appearance at the FCC suggests a launch is close. If and when it arrives, though, it’d break more ground for Sonos. The company only just ventured into the sub-$100 space through IKEA’s SYMFONISK line, and now it might compete in the crowded Bluetooth speaker arena. If so, it appears bent on conquering every last corner of the wireless speaker market.

[ad_2]

Source link

The best true wireless buds under $200

[ad_1]

And in other good news, Jaybird got rid of the Run’s gigantic case. Instead, the Vista ship with a compact charging case that easily fits into most pockets. It also holds an additional 10 hours of battery, on top of the six hours the buds get on their own. During my testing, which involved a combination of stereo and single-bud listening throughout my commute, and the occasional short run, I was usually able to go two to three days without recharging the case. One minor update I appreciated: the case opens up easily, but not too easily like the Run’s, which had a bad habit of popping open in my bag and automatically pairing with my phone.

If you’re into tinkering with equalizer settings, Jaybird’s app gives you plenty of freedom to tweak how the Vista sound. But best of all, you can also download setting profiles from other users. I’ve had better luck using those to improve the Vista’s audio quality, compared to Jaybird’s built-in offerings.

The only major downside I’ve come across with the Vista are the buttons on each earbud. They let you pause, skip and jump backwards — you can also configure them to control the volume by holding them down for a short time. But they require an uncomfortable amount of pressure to activate, a problem I also had with the Run. I ended up hitting them at an angle to avoid painfully pushing them into my ears. It’s strange to see Jaybird come across the same problem again, especially when other companies have figured out this issue over the years. Jabra’s Elite 65t earbuds and the the PowerBeats Pro both have soft touch buttons that don’t take much effort to activate, while the AirPods and Sony’s premium offerings rely on touch sensors.

Jaybird Vista

Usually, I’d recommend getting separate headphones for casual listening and exercise. As good as the Jaybird Vista sounds, Sony’s new WF-1000XM3 wireless earbuds are miles ahead in the audio department, but they’re also more expensive at $230. Those headphones also aren’t waterproof and sweatproof — they’re built primarily with quality in mind. The Vista’s biggest direct competition are Jabra’s Elite Active 65t ($190), which offer a similar level of audio quality and are also built to survive tough workouts.

If you can only get a single pair of new headphones, the Vista are a good bet. They sound better than the $159 AirPods, they’re tough and secure enough for workouts and they offer enough battery life to last you all day. They’re the best sort of gadget sequel: the Vista are an improvement on every level, and show that Jaybird has learned from some previous mistakes.

[ad_2]

Source link

How legendary hackers wound up working for the CIA

[ad_1]

Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
by Joseph Menn


Book cover

The internet as we know it today would not exist but for the Cult of the Dead Cow. The cDc is among America’s oldest and most venerated hacking collectives. They invented hackivism, helped develop Tor, forced Microsoft and other industry titans to take cybersecurity seriously and even built a few non-lethal digital weapons for the US government.

But the Dot Com bust in 2000, followed by the 9/11 attacks the following year shook the collective to its core. In the excerpt below from Cult of the Dead Cow, author Joseph Menn examines how these events impacted the hacking community and forced its members to take a hard look at their moral compasses.

The @stake story was a strange shotgun union of two powerful and growing forces: venture capital and hacking. In its short arc, @stake established an enormously important precedent for security: that outsiders could go into big companies and make the systems and products there safer. Perhaps more importantly, @stake hackers dispersed and founded many more companies in the next few years, and they became security executives at Microsoft, Apple, Google, and Facebook. But those same years revealed psychological fragmentation in the movement along with the physical diaspora. The cDc of Def Cons 1998 through 2001 had ridden the crest of a wave of hacker sensibility.

Each year the crowds grew in number, young, irreverent, and on the cusp of mass recognition, if not big money. That short period was as important for technology culture as the Summer of Love, in 1967 San Francisco, was for the hippies. Laird Brown’s hacktivism panel in the summer of 2001 set a high-water mark for that kind of enthusiasm, for open-source, idealistic efforts to protect people even from their own government.

But any youthful protest ethic faces a challenge when its adherents need to find jobs and pay their bills. That concern increased in 2001, one year into the great bust that followed the dot-com boom. Not everyone could get a job with @stake or other boutiques. But it was a second, more direct blow that scattered young hackers in different directions for many years: the terrorist attacks on the World Trade Center and the Pentagon.

Those driven primarily by money were already paying less attention to ethical quests, such as the fun and games in keeping Microsoft honest. Now, in the months after the 9/11 attacks, those driven largely by causes also had a strong contender for their attention: rallying against the worst attack on American soil since Pearl Harbor. This was true for rank-and-file hackers, who took assignments from the military or intelligence agencies, and even cDc’s top minds, including Mudge.

Mudge had instant credibility, since he had taught government agents and they used his tools. Government red team penetration-test leader Matt Devost, who had covered cDc in a report given to a presidential commission on infrastructure protection, used L0pht tools to break into government networks. Spies loved Back Orifice and BO2k because if they left traces behind, nothing would prove US government responsibility.

Two years before 9/11, an intelligence contractor I will call Rodriguez was in Beijing when NATO forces in the disintegrating state of Yugoslavia dropped five US bombs on the Chinese embassy in Belgrade, killing three. Washington rapidly apologized for what it said had been a mistake in targeting, but the Chinese were furious. In a nationally televised address, then Chinese vice president Hu Jintao condemned the bombing as “barbaric” and criminal. Tens of thousands of protestors flowed into the streets, throwing rocks and pressing up against the gates of the American embassy in Beijing and consulates in other cities.

The US needed to know what the angry crowds would do next, but the embassy staffers were trapped inside their buildings. Rodriguez, working in China as a private citizen, could still move around. He checked with a friend on the China desk of the CIA and asked how he could help. The analyst told Rodriguez to go find out what was happening and then get to an internet café to see if he could file a report from there. Once inside an internet café, Rodriguez called again for advice on transmitting something without it getting caught in China’s dragnet on international communications. The analyst asked for the street address of the café. When Rodriguez told him exactly where he was, the analyst laughed. “No problem, you don’t have to send anything,” he explained. “Back Orifice is on all of those machines.” To signal where he wanted Rodriguez to sit, he remotely ejected the CD tray from one machine. Then he read everything Rodriguez wrote as he typed out the best on-the-ground reporting from Beijing. Rodriguez erased what he had typed and walked out, leaving no record of the writing.

Even before 9/11, Mudge had been talking to Richard Clarke and others at the National Security Council. Often, Mudge argued for privacy. The government had wanted to put location tracking in every cell phone as part of Enhanced 911 services, for example. Mudge told the NSC that the privacy invasion was unnecessary, that information from cell phone towers would be good enough for any serious official need.

One day in February 2000, after a rash of denial-of-service attacks that bombarded big websites with garbage traffic so that regular users couldn’t connect, Richard Clarke brought Mudge into a White House meeting with President Bill Clinton and a bunch of CEOs. “It was, I think, the first meeting in history of a president meeting people over a cyber incident,” said Clarke, who had organized it to show White House responsibility on the issue and build the case internally for more government oversight. After answering Clinton’s questions on what was fixable and what wasn’t, the guests walked out of the office. The CEOs saw the reporters waiting and prepared their most quotable platitudes.

Instead, the press swarmed Mudge, as even those who didn’t know him assumed that the guy who resembled a Megadeth guitarist was a hacker meeting with the president for good reason. “Of course Mudge stole the show,” Clarke said.

But in order to be taken seriously, Mudge had to tell the truth. Once, an NSC staffer brought him in and asked what he knew about a long list of terrorists and other threats. What did he know about Osama bin Laden? About the group behind the sarin attack in the Japanese subway? About the Hong Kong Blondes?

At that one, the blood drained from Mudge’s face. “What do you mean?” he asked.

“We’ve been informed it’s a small, subversive group inside China that’s helping dissidents with encrypted communications,” the staffer replied.

“I’ve heard of them,” Mudge offered.

“What can you tell us?” the staffer persisted.

Mudge figured the government hadn’t put a lot of resources into the goose chase because signals intelligence and other sources would have turned up nothing and convinced seasoned professionals that it was a red herring. But he didn’t want the country to waste any energy that could go toward supporting real people in need.

He shrugged and looked straight at the staffer. “We made them up,” Mudge admitted.

adsf

Mudge and Vint Cerf meeting President Clinton, early 2000 – Image: The White House

After 9/11, Mudge went into overdrive. President Bush was warned that a cyberattack would have been worse than the planes, and he listened. Mudge then started exploring what a “lone wolf” terrorist hacker could do. “I’m finding ways to take down large swaths of critical infrastructure. The foundation was all sand. That rattled me,” Mudge said.

Looking into the abyss exacerbated Mudge’s severe anxiety, his tendencies toward escapist excess, and his post-traumatic stress disorder, which had its roots in a violent pre-L0pht mugging that had injured his brain. He went into a spiral and eventually broke down. “Ultimately, I just cracked a bit,” Mudge said. He spent days in a psychiatric ward. (Anxiety and burnout in the face of the near-impossible, high-stakes task of defending networks was not yet recognized as a major industry problem, as it would be a decade later.) Unfortunately, some of Mudge’s treatment compounded the situation. As is the case with a minority of patients, his antianxiety medications had the opposite of the intended effect. Eventually, Mudge fired his doctors, experimented with different medications and therapy, and worked his way back to strong functionality. But when he returned to @stake after many months, it was too fractious and uninspiring for him to be enthusiastic about reclaiming his post. The dot-com bust had forced layoffs of L0pht originals while managers were drawing huge salaries. The emphasis was on the wrong things.

Outside of @stake, hackers began disappearing from the scene for six months or more. When they came back, they said they couldn’t talk about what they had been doing. Those who went to work for the intelligence agencies or the Pentagon, temporarily or permanently, included many of the very best hackers around, including a few present or former cDc members and many of their friends in the Ninja Strike Force. They wanted to protect their country or to punish Al-Qaeda, and in many cases they got to work on interesting projects. But many of them would not have passed the background investigations required for top secret clearances. To get around that problem, a large number worked for contractors or subcontractors. One way or another, a lot of their work went into play in Afghanistan and Iraq.

Some hackers felt great fulfillment in government service. Serving the government in the wake of the terror attacks gave them a chance to fit in when they hadn’t before, united by a common cause. But for too many of this cohort, what started with moral clarity ended in the realization that morality can fall apart when governments battle governments.

That was the case with a cDc Ninja Strike Force member I will call Stevens. As Al-Qaeda gained notoriety and recruits from the destruction, the US Joint Special Operations Command, or JSOC, stepped up the hiring of American hackers like Stevens. Some operatives installed keyloggers in internet cafés in Iraq, allowing supervisors to see when a target signed in to monitored email accounts. Then the squad would track the target physically as he left and kill him.

After 9/11, the military flew Stevens to another country and assigned him to do everything geek, from setting up servers to breaking into the phones of captured terrorism suspects. Though he was a tech specialist, the small teams were close, and members would substitute for each other when needed. Sometimes things went wrong, and decisions made on the ground called for him to do things he had not been trained in or prepared for mentally. “We did bad things to people,” he said years later, still dealing with the trauma.

Others had similar experiences. A longtime presenter at hacking and intelligence community gatherings, former clergyman Richard Thieme, gave talks about the burdens of protecting secrets that should be known and about the guilt suffered by people made to carry out immoral orders. After he asked people to send in their stories, some listeners provided accounts like Stevens’s. “It occurs to me how severely the trajectory of my own career has taken me from idealistic anarchist, to corporate stooge, to ambitious entrepreneur, to military/intelligence/defense/law enforcement adviser,” wrote one. “Many cyber guys started out somewhere completely different and then somehow found themselves in the center of the military-industrial complex in ways they would never have been prepared for.” Once there, the difficulty in keeping secrets is “potentially more extreme because the psychological make-up and life-story of the cyber guy would not have prepared him for it.”

Wrote another:

When one joins an intelligence service at the start of one’s career, one is involved in low level, apprentice-like, tasks and assignments usually far removed from traumatic action or profound moral considerations, much less decisions. In the course of a career such actions/decisions slowly grow into being, almost imperceptibly for many people. One may suddenly “awake” to where one is and realize that he/she had not been prepared for this, and also realize that one is now deeply into the situation, perhaps well beyond a point that one would have stepped into if it had been presented from the start. If this is the case, it’s too late to turn back.

When you are on the ground, Thieme said, “the rules people think they live by are out the window.” People who score too high on morals tests are rejected by intelligence services, he said, because a conscientious whistle-blower is even more dangerous than an enemy mole.

Excerpted from Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, by Joseph Menn. Copyright © 2019. Available from PublicAffairs, an imprint of Hachette Book Group, Inc.

[ad_2]

Source link

Huawei unveils its Android backup plan

[ad_1]


Two sizes, but no headphone jack.
Samsung reveals the Galaxy Note 10 and Note 10+

Say hello to two new Galaxy Note phones. The Note 10 is a little smaller (6.3 inches) than last year’s model, while the Note 10+ is a little bigger (6.8 inches). However, both come with new gesture controls, lack of a headphone port and the usual sumptuous Samsung screen. In short, it’s more choice for your stylus-toting lifestyle. Preorders start August 8th, while the devices will be in stores on August 23rd, so you can go check them out before splurging that $950 (or $1,100 if you pick the bigger Note 10.

Samsung also gave a deep-dive tour of its upgraded S Pen stylus and its gesture controls, or Air Actions. These will let users activate shortcuts and perform specific actions by drawing shapes above the screen. The S Pen can also shrink, enlarge or change the color of text — and you’ll be able to export handwritten notes in different formats, including Microsoft Word and PDF.


Huge.
Instagram’s ‘huge booty’ problem keeps getting worse

Facebook says it is fully aware of spam/porn bots on Instagram, noting that it is investing more in research to better understand how these bad actors are evading its systems. But if you ever follow any of the major celebrities or accounts on there, a brief look at the comments show that it’s not really doing enough.

Seriously, take a look.


This is Huawei’s Android backup plan.
Huawei reveals HarmonyOS, its alternative to Android

Huawei’s long-rumored Android alternative was revealed early Friday morning.. At the Huawei Developer Conference, the company’s Consumer Business Group CEO Richard Yu surprised the audience by unveiling “HarmonyOS,” which he says is faster and safer than Android. That said, the software is primarily aimed at IoT products (such as smart displays, wearables, smart speakers and in-car devices) instead of smartphones. Yu says that when Huawei can no longer access Google’s Android ecosystem, the company can deploy HarmonyOS “at any time.” Until then, Huawei will continue to support Android.

Yu’s presentation was rather technical but in a nutshell, HarmonyOS is positioned as a future-proof, “microkernel-based, distributed OS for all scenarios.” The platform is open-source, and it’s actually more of a competitor to Google’s upcoming Fuchsia, given that both can be used on multiple types of devices at once. In his on-stage presentation, he said that Android isn’t as efficient due to its redundant codes, outdated scheduling mechanism and general fragmentation issues.


Metal cards for everyone.
Apple Card begins its rollout, and the company has a tutorial for everything

Apple’s latest foray into finance is rolling out to its first users, and it’s made a YouTube tutorial for pretty much every step of the application process. If you applied for a notification when the Apple Card first became available, you’ll be among the first to get access, but an expanded release to the wider public should happen later this month.


It helps the company save millions of dollars.SpaceX caught a piece of its rocket as it falls from space

Earlier this week, SpaceX successfully launched its Falcon 9 rocket from Cape Canaveral. This was the third flight for this particular Falcon 9, and its mission was to carry the AMOS-17 satellite for Spacecom. One of the most exciting parts of the event came as a tweet from Elon Musk, as he shared a quick video of a SpaceX ship catching the rocket’s fairing in a net as it fell from space. Why is that so important? It plans to reuse the fairings. Musk previously said the company essentially throws away $6 million every time a fairing crashes into the ocean.


Some models will pack Sharp IGZO displays.
Nintendo may have many, many more Switch consoles planned

Nintendo is definitely launching its $200 Switch Lite handheld on September 20th, and may, according to rumors, release a higher-end console soon. Its plans might even go farther, too. According to Wall Street Journal sources on the inside, the company is reportedly working on updates beyond those models “to make the platform’s lifecycle long.” Sharp VP Katsuaki Nomura has added that the company will supply its IGZO display panels to a videogame client assumed to be Nintendo, according to an earlier WSJ report. Expect the next Switch to have a better-looking, power-sipping screen, as well.

But wait, there’s more…


The Morning After is a new daily newsletter from Engadget designed to help you fight off FOMO. Who knows what you’ll miss if you don’t Subscribe.

Craving even more? Like us on Facebook or Follow us on Twitter.

Have a suggestion on how we can improve The Morning After? Send us a note.



[ad_2]

Source link

How can students score free A/V software?

[ad_1]


Steve Dent

Steve Dent
Associate Editor

You’ve come to the right place for help on content creation apps, as we’ve covered them pretty thoroughly over the last few years. It’s difficult to replace Photoshop with a free program, so don’t expect miracles.

That said, lots of folks use the open-source photo editor GIMP, which works on Windows, Mac and Linux, and has a lot of power for a free app. It’s not particularly streamlined, and you’ll need to download a RAW converter, but it can handle most jobs.

If you want to stick to the Adobe world and don’t mind taking a drastic drop in features, there’s Photoshop Express, which has the bonus of working on iOS and Android as well as Windows (but not macOS). Other options that favor simplicity over extensive features are Fotor and InPixio, both of which are free image editors with paid upgrades.

As far as audio editing software, many of us at Engadget use Audacity, which is versatile, surprisingly powerful, and works on both PCs and Macs. It’s especially handy and very widely used for podcasts and voice recording. Other good options are Ashampoo’s well-designed and easy-to-use Music Studio 7 and Ocenaudio, which has a streamlined interface and built-in filters.

You didn’t ask, but another key content creation category is video editing. I’m a big fan of Blackmagic’s Davinci Resolve 16, and have used it to edit multiple Engadget videos. It’s faster and better than Adobe Premiere Pro CC in many ways, though a bit harder to use, especially for color correction. If you can master it, though, the free version is fast and versatile, and you can upgrade to the full Studio version for just $300, no subscription needed.

[ad_2]

Source link

US government quietly kills autonomous vehicle committee

[ad_1]

However, the committee was formed at the end of Obama’s term and met only once in 2017 before President Trump’s inauguration. It has remained dormant since then and probably wasn’t able to carry out its duty as explained on DOT’s website:

“The Advisory Committee on Automation in Transportation (ACAT) was established to serve as a critical resource for the Department in framing federal policy for the continued development and deployment of automated transportation. ACAT will help determine how, when, and where automated technology will transform the way we move by looking outside the government for innovative and thoughtful leaders to uncover its full potential across all modes.”

Most of the members The Verge talked to said they weren’t informed of the group’s dissolution. One of the members, Duke University’s autonomy expert Missy Cummings, told the publication that the group’s shutdown was “egregious, because [the] board does not have a political leaning. If anything, the board has been pro industry.”

As for why the group was disbanded, a DOT spokesperson told The Verge that committees like ACAT tend to incur huge travel costs. Its Federal Advisory Committee Act database page said the group is no longer active, because:

“Based on USDOT’s development and publication of AV 3.0 policies and principles, active stakeholder engagement is already underway. Therefore the USDOT does have the ability to obtain broad stakeholder feedback on AV matters outside of the committee.”

[ad_2]

Source link

Ring rewarded users for reporting ‘suspicious activities’

[ad_1]

Apparently, the company encouraged users to form Watch teams and to post videos on social media to receive promo codes for future devices. It also promised free swag to anyone who recruits 10 new users and to those who blog about Ring “in a positive way,” as well as 50 percent discounts on Ring products to those who can solve a crime with the help of local cops. The slides didn’t elaborate on what those swag bags contained.

A spokesperson told Motherboard that the program “was not rolled out widely and was discontinued in 2017.” They added: “Some of these ideas become official programs, and many others never make it past the testing phase. [The company] is always exploring new ideas and initiatives.”

Ring has been in hot water over the past months due to various security concerns. Earlier this year, reports said it gave employees access to customer video feeds. More recently, it was revealed that the service teamed up with over 200 law enforcement agencies, giving those departments a way to request for footage from owners without a warrant.

This particular initiative existed and shut down way before Ring launched its neighborhood Watch app and before being acquired by Amazon, showing that the service encouraged community policing even way back then. Problem is, the project put persons of color and other marginalized groups at risk, especially since only Ring owners could participate. As Delores Jones-Brown, a professor of criminal justice at John Jay College of Criminal Justice, explained to Motherboard:

“It has a decidedly middle-class and conservative bent. It presupposes people have the resources to purchase and maintain the Ring products and monitoring system and presupposes that there is enough collective efficacy in the neighborhood to organize and maintain a watch program.”

It also didn’t help that Ring advised members to report on any suspicious activity and gave examples open to interpretation, such as “strange persons loitering around homes” and “any person walking down the street repeatedly staring into car windows.”

You can read the whole presentation right here, as uploaded by Motherboard.

[ad_2]

Source link

Visa Checkout to shut down in 2020

[ad_1]

The search giant confirmed to 9to5 Google that Visa is migrating to a new solution based on EMV SRC. Such a move would allow Visa customers to use a newly expanded Visa Token system, which secures sensitive user information (such as account numbers and credit card expiration dates) with a digital identifier. That way, customers would have an extra line of defense in the case of a data breach.

Visa will begin rolling out its new EMV SRC to customers in the next few months, but full migration won’t happen until next year. Until that time, Visa Checkout will proceed as normal — with the exception of its direct integration with Google Pay.

[ad_2]

Source link

ActionDash 4.0 lets you set a schedule for ‘focus mode’

[ad_1]

You can set a work morning schedule, for instance, to make sure focus mode is switched on during weekday mornings, preventing you from absent-mindedly scrolling social media feeds instead of being productive. If you’re having trouble sleeping, you could also schedule focus mode to switch on before bedtime.

When the mode is toggled on due to a schedule, the display will show a countdown-style screen to let you know how long you’ll have to wait before it’s turned off. While you can still manually deactivate the mode, the hope is to give you some time to think whether you actually need to access the apps you’ve blocked. Finally, if you’re also using the company’s home screen replacement app, Action Launcher, you’ll find that long-pressing a blocked app now shows why it’s restricted and when you can start using it again.

ActionDash



[ad_2]

Source link