Wednesday, May 19, 2010

New iPod Touch with camera leaked - reposted by Andre Di Cioccio

Tinhte, a site based in Vietnam has posted pics today of a leaked iPod Touch with a camera.

The device has the DVT-1 stamp, meaning it is an early design of a future final product.

Apple is likely to officially launch the new device on June 7th, at their annual conference.

The serial number reveals a "late 2009 third generation Touch," and from the pics and video it all seems pretty legitimate.

The label indicates a 64GB model, and the camera seems to be a 2MP sensor from Omnivision.






Video Daily: Nvidia-powered Android tablet in action - reposted by Andre Di Cioccio

Engadget managed to do a hands-on with the newNvidia Tegra 2-powered Android tablet today, and it looks very nice, so far.

The powerful Tegra 2 set has dual-core ARM Cortex A9 processors, a chip that is a full generation ahead of the iPad's A4 chip.

Additionally, the tablet has two USB ports (the iPad has none), 1GB of RAM (iPad has 256MB) and a front-facing camera for video conferencing.

The WSVGA screen is 8.9-inches.

There is still no word on when the tablet will be available, or at what price, but for now, it is fun to look at.

Monday, May 17, 2010

Dating site coming for Apple fans - reposted by Andre DiCioccio

You can’t make this stuff up.

A new dating site, the aptly named Cupidtino, is being prepped exclusively for fans of Apple Inc. and its products.

Why? According to the site:

Diehard Mac & Apple fans often have a lot in common – personalities, creative professions, a similar sense of style and aesthetics, taste, and of course a love for technology. We believe these are enough reasons for two people to meet and fall in love, and so we created the first Mac-inspired dating site to help you find other Machearts around you.

Purportedly the brainchild of three San Francisco-based geeks (2 developers and a designer) with backgrounds at Google, Microsoft and Yahoo! they claim to be obsessed with Apple gadgets and privately funded.

As someone married to an Apple fan, I admire the concept, I’m just not sure if I’d use it. There’s no indication that you have to pass an Apple quiz to join, meaning that it’s rife for abuse by Windows users looking to pick up Mac hotties.

The site is optimized for, you guessed it, Safari and will launch exclusively on Apple platforms with iPhone and iPad apps. If Apple approves, that is.

Cupidtino will launch in June 2010, but you can request a beta invite in the mean time.

Post your funny slogan for the new site in the TalkBack.

Privacy Commissioner meets with Google - reposted by Andre Di Cioccio

The Office of the Australian Privacy Commissioner said that the Commissioner was meeting with representatives from Google this afternoon to discuss Google revelations that it had inadvertently been recording Wi-Fi data.

In a blog over the weekend, Google revealed the company would stop it's Street View cars for the time being after it discovered that the cars had been collecting data from unsecured wireless networks in over 30 countries over the past four years. The Office of the Australian Privacy Commissioner told ZDNet Australia in a statement that the Office could not state its position on the latest revelation until after a meeting with Google representatives this afternoon.

Last week, Electronic Frontiers Australia (EFA) and the Australian Privacy Foundation (APF) sent a joint letter in an email to Google Australia's head of policy Iarla Flynn, asking what Wi-Fi information Google's Street View cars were capturing as they roamed the streets of Australia.

EFA vice-chair Geordie Guy said the weekend's revelations went "a long way" to answering the questions in the letter and said the EFA and APF would now be pushing for an investigation by the Australian Privacy Commissioner.

"Our primary concern is that any information that has been captured that is private information about Australians is destroyed and is verifiably destroyed. It's our belief that the organisation that should be responsible for that is the Australian Privacy Commissioner," he added.

Guy said he would watch Australian Privacy Commissioner Karen Curtis' response with great interest.

"The Privacy Commissioner, when this first came to light, said nothing Google had said had led her to believe anything was amiss," he said.

"We would like to see if the Australian Privacy Commissioner sticks by her original suggestions that nothing is out of the ordinary or if she's now going to jump in there and do something where she was hesitant before."

Guy said Google Australia had not yet responded to the original letter but suggested that he had received an 'out of office' auto-reply indicating that Flynn's silence might be due to being absent.

Car hacking and security Q&A - reposted by Andre Di Cioccio

With computers firmly in control of our cars and connectivity on the rise, car hacking could be the next big security issue. We speak with two researchers behind a paper on automobile and computer security.

A group of researchers from two universities tested their hacking skills on two cars and found that they could remotely lock the brakes, the engine and windows on a car; turn on the radio, heat and windshield wipers; honk the horn; and change the speedometer display.

They were able to do all of that in tests on two cars of unnamed make and model — a Chevrolet Impala is pictured in the paper — by connecting a laptop to the electronic control system and controlling that computer wirelessly using a second laptop in a separate car.

The paper will be presented by researchers at the University of Washington and the University of California at San Diego (USCD) at the IEEE Symposium on Security and Privacy being held in Oakland, California, on Wednesday.

"Over a range of experiments, both in the lab and in road tests, we demonstrate the ability to adversarially control a wide range of automotive functions and completely ignore driver input," the paper says.

We interviewed two of the researchers — Stefan Savage of UCSD and Tadayoshi Kohno of the University of Washington — and talked with them about the tests and what their findings mean for drivers today.

CNET: We'd like to know more about what you did for the research. Did you need to have physical access to the car, or is there a way this could be done remotely?

Stefan Savage: In the paper we didn't focus on the different ways that one could do it. The paper focuses on the question of if someone were able to gain access to the car, how resilient would it be in our scenario? We connected our computer to the on-board diagnostics port — it's standard and is located under the dashboard on the driver's side.

Tadayoshi Kohno: This paper is not focusing on the specific threats. We are focusing on understanding the evolution of cars in the hopes that the industry can protect against adverse things happening in the future.

Savage: If you look at PCs in the early 1990's, they had all kinds of latent software vulnerabilities. It didn't matter so much because PCs were at home and not connected to everything else. Then they were connected to the internet and the latent vulnerabilities were exposed to outside attack. We see cars moving in much the same direction. There is a strong trend to provide pervasive connectivity in cars going forward. It would be good to start working on hardening these systems and providing defences before it becomes a real problem.

Can you give me a scenario where a car would be compromised?

Savage: You could have an adversarial mechanic, or a jealous boyfriend or girlfriend who temporarily has access to the car. They could connect to this component, download onto the car, disconnect and the code could do their bidding. I think at this point these attacks are much more fantastic than a real thing people need to be concerned about today.

Kohno: Today everyone is focusing on web security and botnets. We want to make sure that in five or 10 years we don't add cars to that list.

You have written a tool that enables this type of attack, called CarShark, right?

Kohno: The tool captures a lot of what we did. It's a software tool we wrote. It runs on a computer that plugs into the OBD-II (On-Board Diagnostics II) port and it can sniff (and inject) packets on the network.

Couldn't someone use that tool to compromise a car?

Savage: We're not releasing it.

But there are ways to do this remotely, right?

Savage: We're trying to find a balance in the research. We're not interested in taking an alarmist tone. We purposely are not focusing on that aspect here. Can I imagine it's doable? Yes. In the end it's all software, and software on your car is not fundamentally different from software on your PC.

Do you think anyone is actually doing anything like this, other than for legitimate research purposes?

Kohno: We have no reason to believe this is an issue today. One of our goals is to stay ahead of the bad guys before the threats really do manifest.

Chevy Impala jacked up

A Chevy Impala is jacked up, ready for some electronic control unit (ECU) hacking.
(Credit: Experimental Security Analysis of a Modern Automobile)

Have you talked to the car manufacturers about this?

Savage: We talked with the appropriate parties, which we can't name.

Did they take this seriously or dismiss it?

Savage: Everyone we've talked to has taken it seriously and been very positive.

Anything else you would like to add?

Kohno: It's a changing world of technology. Often when people hear the word "computer" they associate it with the meaning of laptop or desktop. And one of the things we'll see in the future is computer devices integrating themselves both literally and figuratively into our world. There will be computers integrated into cars, medical devices, homes and the smart grid. And I think that we need to be proactively thinking about security issues, not just on the desktops with botnets and web browsing, but think about where our computers will be in the future and what we can do today to protect them. This research on cars is part of that.


How secure is Flash? Here's what Adobe won't tell you - reposted by Andre Di Cioccio

Yesterday, I called Adobe’s Flash “the new Vista” and asked the company to start talking seriously about how they’re addressing problems with their products instead of pretending those problems don’t exist. In talking to Adobe representatives, reading interviews with Adobe executives, and reading Adobe’s public statements, I’ve found a steady stream of denial where there should be transparency.

One of the key issues in this discussion is security. Yesterday, I rattled off some disturbing statistics about vulnerabilities in Flash Player and asked Adobe, “So, how are you planning to convince us that you’ve gotten serious about security? No one from Adobe has gotten back to me on that one. But John Paczkowski of Digital Daily interviewed Adobe co-founder Chuck Geschke yesterday and published a transcription of the conversation this morning. Here’s an excerpt that perfectly illustrates my concerns with Adobe’s record.

JP: Both Apple and Microsoft have said publicly now that Flash has issues with reliability, security, and performance. Do you think those complaints are legitimate?

CG: I think they’re old news. Go to our Web site and read the actual facts about Flash. We enumerate the facts about Flash there as we see them. [Microsoft and Apple] may have a different set of facts that they believe are accurate. It’s up to you to decide.

“Old news”? Obi-Wan Kenobi can get away with that kind of hand-waving. The CEO of a public company with a market cap of $18 billion can’t. I intend no criticism of Paczkowski, who did an excellent job under the circumstances, but Geschke’s statement demands some serious fact-checking.

I followed the link to Adobe’s new “Setting the record straight” page, emphatically titled The truth about Flash. Here is the first of two paragraphs that appears under the Security heading:

Security is one of the highest priorities for the Flash Player team. The Symantec Global Internet Threat Report for 2009 found that Flash had the second fewest number of vulnerabilities of all Internet technologies listed (which included both web plug-ins and browsers). This is significant when you consider that Flash Player is among the most widely distributed and used pieces of software in the world. [emphasis added]

That is, charitably speaking, a gross distortion of the facts. And I find it interesting that Adobe’s rebuttal does not include a link to the Symantec report they cite. That makes it more difficult for readers (and reporters) to fact-check their claim. So here, allow me to help. Symantec’s Internet Security Threat Report page includes links to the full report (PDF), which was published in April 2010 and covers the year 2009. There’s also an executive summary (PDF) and a link to archived reports from previous years. You’re welcome to read along with me. Tell me if you think that assertion from Adobe is accurate.

First, a quote from page 40 of the full 2009 report:

In 2009, Symantec documented 321 vulnerabilities affecting plug-ins for Web browsers (figure 9). ActiveX technologies were affected by 134 vulnerabilities, which was the highest among the plug-in technologies examined. Of the remaining technologies, Java SE had 84 vulnerabilities, Adobe Reader had 49 vulnerabilities, QuickTime had 27 vulnerabilities, and Adobe Flash Player was subject to 23 vulnerabilities. The remaining four vulnerabilities affected extensions for Firefox.

I suppose there’s some schadenfreude for Adobe in seeing four more vulnerabilities for QuickTime than for Flash Player. But really, is the discovery of 23 vulnerabilities in a single year really something to brag about? Is it somehow an endorsement of Flash Player’s security? Well, to answer those questions you would need to assess the seriousness of those vulnerabilities and determine which ones were attacked. For some reason, Adobe made no mention of this paragraph, which appears in the Symantec report a mere two pages later:

Among the vulnerabilities discovered in 2009, a vulnerability affecting both Adobe Reader and Flash Player was the second most attacked vulnerability. This was also one of four zero-day vulnerabilities affecting Adobe plug-ins during 2009. Two of the vulnerabilities were in the top five attacked vulnerabilities for 2009. Additionally, Adobe vulnerabilities have been associated with malicious code attacks such as the Pidief.E Trojan.

Perhaps Adobe’s performance in 2009 was an improvement over previous years? Uh, no. The 2008 edition of Symantec’s annual report found only 16 vulnerabilities in the Flash Player, and the 2007 edition (published in two parts) found no Flash-related vulnerabilities in the first half of the year and 11 in the second half. From 11 to 16 to 23? That is not a trend line that Adobe should be proud of.

In fact, there is nothing in the Symantec report that is flattering toward Adobe and its security record. On page 37, Symantec offers this advice for organizations:

In order to reduce the threat of successful exploitation of Web browsers, administrators should maintain a restrictive policy regarding which applications are allowed within the organization. […] Browser security features and add-ons should be employed wherever possible todisable JavaScript™, Adobe Flash Player, and other content that may present a risk to the user when visiting untrusted sites.[emphasis added]

What the CEO should be saying right now goes something like this: “Yes, we know there are security issues with Flash Player, as there are with all Internet-based programs. We think our adversaries are exaggerating their impact, but we take them very seriously.” At that point, he should turn the floor over to whoever is in charge of security development for Adobe, who can explain, in detail, what sort of processes are in place today to turn that trend line back downward.

Instead, the co-founder and co-chairman waves his hand and dismisses serious security issues as “old news.”

It’s clear that Adobe’s sheer stubbornness in refusing to address these issues starts at the top.

Ed Bott is an award-winning technology writer with more than two decades' experience writing for mainstream media outlets and online publications.

Steve Jobs Offers World 'Freedom From Porn' - reposted by Andre Di Cioccio

For more news like this, make sure to check out my other blogs also:


http://andredicioccio1977.wordpress.com/







I didn't plan to pick a fight with Steve Jobs last night. It just sort of happened: An iPad advertisement ticked me off; I sent the Apple CEO an angry email; he told me about "freedom from porn."

The electronic debate proceeded from there.

Of course, there was a bit more to it than that. There's the context: Jobs'legal fight with my employer Gawker Media, over the handling of an iPhone prototype; mylong-simmering worries about Apple's growingpower to limit self expression through its lockdown on iPad apps; and the fact that my wife, who might normally (and quite sensibly) veto the idea of spending Friday night sending email flames, was out of town.

So in retrospect I was primed to lash out. But there was some serendipity too: Watching a new episode of 30 Rock on my digital video recorder, I somehow failed to skip over an Apple ad I'd never seen before, one that billed the iPad as nothing less than "a revolution." You can see an excerpt of the ad at the bottom of this post.

With a Stinger cocktail at my side, I dashed off a short, pointed question to Jobs' well-known email address.

A few hours later—after midnight here in California—he got back to me. And I got back to him. And so on.

I didn't identify myself as a writer for Gawker in my initial email, sent from myryantate.com email address. But, as you'll see in the exchange below, I eventually made my affiliation clear, and Jobs didn't seem bothered. Between that and the fact that Jobs regularly uses emails to disclose new information to the public, knowing full well recipients now regularly make the exchanges public, I feel fine reproducing the thread below.

It's a feisty discussion, as you'll see. And heated, especially on my part.

Rare is the CEO who will spar one-on-one with customers and bloggers like this. Jobs deserves big credit for breaking the mold of the typical American executive, and not just because his company makes such hugely superior products: Jobs not only built and then rebuilt his company around some very strong opinions about digital life, but he's willing to defend them in public. Vigorously. Bluntly. At two in the morning on a weekend.

As much as Jobs and his actions anger me, and as harsh as I was to him, I came away from the exchange impressed with his willingness to engage.

Some notes on the actual content follow after the emails. Click any message to enlarge:


Steve Jobs Offers World 'Freedom From Porn'


Steve Jobs Offers World 'Freedom From Porn'


Steve Jobs Offers World 'Freedom From Porn'


Steve Jobs Offers World 'Freedom From Porn'


Steve Jobs Offers World 'Freedom From Porn'

A few notes on the emails:

  • There's something absurdly Orwellian about Jobs' line that the iPad provides "freedom from porn." It's a statement I suspect will haunt him.
  • My line about Flash and my MacBook Pro is silly; Flash as a Web plugin is, as I myself have written, a resource hog, no matter how well the miraculous battery in my Apple laptop handles that hoggery. There's no telling how Flash might hobble my iPad''s A4 processor. But cross-compiled Flash apps are an entirely different matter: They run as native Objective C code, and Apple has a chance to review them for performance. Apple has never tried to argue that cross-compiled Flash wears batteries down any more quickly than other Objective C code, and in fact approved more than two dozen such apps before changing its policies.
  • Speaking of regrettable lines: Why the heck did I bring up my wife in connection with "freedom from porn?" I was trying to say it's a canard that porn somehow harms families, or something terrible and shameful, so I mentioned the other half of my family.
  • I was a little unfair summarizing my contact with Time Inc.; the company has not "crowed" about its iPad bridge software, and in fact has plans to iteratively improve its iPad product. That line was based on email exchange that I had with a Time Inc. executive who was speaking off the record and not on behalf of the company. As such, I've blurred a name that I had no business dropping. But I do think, as I said, that a native Objective C app that merely contains magazine content, like Time's, is a lot less exciting than an app that has some real interactivity, even if it's been cross compiled from Flash.

And here is the end of the iPad commercial that set me off:



Send an email to Ryan Tate, the author of this post, at ryan@gawker.com.