Huawei will present a 5nm SoC in 2024, trusted source says

0
[ad_1]

According to a well-known tipster, Huawei will actually present its 5nm SoC in 2024. Huawei Central reported that Digital Chat Station said so. This chip will be manufactured by SMIC, of course.

As many of you know by now, Huawei has been heavily hit by the US sanctions. It has been that way for years, and the US has only been making things harder for Huawei as time went by.

Huawei is expected to announce its own 5nm Kirin SoC in 2024

Huawei had to be really creative along the way, and it decided to revive its Kirin chips in the process. The Kirin 9000S is the processor that the company announced last year. That is a 7nm processor manufactured by SMIC.

Now, we don’t know what the name will be for a new chip (though it could be the Kirin 9010), but it will be manufactured using a 5nm process node. Needless to say, that will attract even more attention from the US.

In any case, this new chip should be considerably more powerful than the 7nm one. Don’t expect it to fuel the Huawei P70 series, however. Chances are that this chip will arrive later in the year, and fuel the Huawei Mate 70 series.

It will be interesting to see whether the two companies can pull this off

Considering how limited Huawei and SMIC is, it will be interesting to see how will they pull this one off. SMIC does own deep ultraviolet lithography machines which are needed for something like this, though.

On top of this chip, Huawei is also allegedly working on a new advanced Neural Processing Unit (NPU). The company could opt to announce both its chip and NPU at the same time, of course.

One chip did surface on Geekbench not long ago. That processor managed to score 1,800 points in the single-core, and 4,800 points in the multi-core test. It also included a Maleoon 920 GPU. We’re not sure this is the rumored Kirin 9010, but it could be.


[ad_2]
Source link

YouTube announces “Read-Only” comments for young viewers in supervised accounts

0
[ad_1]
YouTube is a massive source of entertainment and education for everyone. For kids, it is also a place where they can find new passions, satisfy their curiosity, and connect with like-minded people around the world. One of the platform’s most interactive features is the commenting section, but as any experienced YouTube user knows, it can sometimes be a less-than-ideal place for younger viewers.
To address this, YouTube is making a shift designed to safeguard those using supervised accounts. In an email sent to parents who manage these types of accounts, YouTube announced that soon, kids using these accounts will have a new “read-only” option for comments. This change strikes a balance between fostering community and protecting younger users.

Email sent by YouTube team announcing the changes

What does “Read-Only” comments mean?

This means that for kids whose accounts are in the “Explore More” and “Most of YouTube” content setting will still see comments below videos, but won’t be able to write their own comments or participate in live chats. Parents who would prefer a completely comment-free experience for their children can switch to the “Explore” content tier in their child’s settings.


Parents will, of course, have full control of these settings and can adjust their child’s commenting experiencing by visiting the parent settings section on YouTube or by using the Family Link app. Furthermore, parents will be able to view their child’s viewing history by going to g.co/MyActivity from their device.

Remember, when kids are signed in to YouTube, Google may save data (like their searches) to their account. YouTube says that this data is used to help personalize their experience on all Google services, however, it is important to know that YouTube settings don’t extend to YouTube videos embedded on other sites.

This new approach with comments is a sign that YouTube wants to take meaningful steps to make its vast library of content safer for everyone, particularly the younger ones. If you supervise a child account, it’s worth it to revisit the settings you have chosen for their YouTube experience and make any necessary changes based on these new rules.


[ad_2]
Source link

Match Systems publishes report on the consequences of CBDC implementation

0
[ad_1]

Match Systems, a leading authority in crypto crimes investigations and crypto AML solutions provider, has published a comprehensive analytical report examining the potential implications of Central Bank Digital Currency (CBDC) implementation.

In a landscape where the debate between cryptocurrency proponents and CBDC advocates intensifies, Kutin’s report offers a balanced perspective on the advantages and drawbacks of transitioning to a digital currency framework. The report delves into the nuanced dynamics surrounding CBDC adoption, shedding light on its multifaceted impacts on financial systems, governments, businesses, and individuals.

Kutin’s insights come at a critical juncture, as the rise in crypto fraud and the sophistication of asset theft methods prompt a reevaluation of traditional stances. While crypto activists often oppose CBDC implementation, Kutin’s analysis highlights the shifting attitudes within the industry towards embracing regulatory measures for enhanced safety and accountability.

“The dichotomy between free cryptocurrencies and centralized CBDCs presents society with two extremes,” remarks Andrei Kutin. “The optimal solution likely lies in a middle ground, where governments establish unified global standards for cryptocurrency circulation, safeguarding individuals while preserving economic autonomy.”

The full analytical report, titled “Analyzing the Prospects for CBDC Implementation,” is now available for public access on the Match Systems website.

About Match Systems:

Match Systems is a company specializing in AML services, blockchain investigations, and implementation of compliance procedures for cryptocurrency projects around the world.

Contact
Joseph Anderson
Match Systems
[email protected]

[ad_2]
Source link

How to protect yourself from online harassment

0
[ad_1]

It takes a little to receive a lot of online hate today, from simply working as a school administrator to playing a role in a popular movie or video game.

But these moments of personal crisis have few, immediate solutions, as the current proposals to curb and stem online harassment zero in on the systemic—such as changes in data privacy laws to limit the personal information that can be weaponized online or calls for major social media platforms to better moderate hateful content and its spread.

Such structural shifts can take years (if they take place at all), which can leave today’s victims feeling helpless.

There are, however, a few steps that everyday people can take, starting now, to better protect themselves against online hate and harassment campaigns. And thankfully, none of them involve “just getting off the internet,” a suggestion that, according to Leigh Honeywell, is both ineffective and unwanted.

“The [idea that the] answer to being bullied is that you shouldn’t be able to participate in public life—I don’t think that’s okay,” said Honeywell, CEO and co-founder of the digital safety consultancy Tall Poppy.

Speaking to me on the Lock and Code podcast last month, Honeywell explained that Tall Poppy’s defense strategies to online harassment incorporate best practices from Honeywell’s prior industry—cybersecurity.

Here are a few steps that people can proactively take to limit online harassment before it happens.

Get good at Googling yourself

One of the first steps in protecting yourself from online harassment is finding out what information about you is already available online. This is because, as Honeywell said, much of that information can be weaponized for abuse.

Picture an angry diner posting a chef’s address on Yelp alongside a poor review, or a complete stranger sending in a fake bomb threat to a school address, or a real-life bully scraping the internet for embarrassing photos of someone they want to harass.  

All this information could be available online, and the best way to know if it exists is to do the searching yourself.

As for where to start?

“First name, last name, city name, or other characteristics about yourself,” Honeywell said, listing what, specifically, to search online.

It’s important to understand that the online search itself may not bring immediate results, but it will likely reveal active online profiles on platforms like LinkedIn, X (formerly Twitter), Facebook, and Instagram. If those profiles are public, an angry individual could scrape relevant information and use it to their advantage. Even a LinkedIn profile could be weaponized by someone who calls in fake complaints to a person’s employer, trying to have them fired from their position.

In combing through the data that you can find about yourself online, Honeywell said people should focus on what someone else could do with that data.

“If an adversary was trying to find out information about me, what would they find?” Honeywell said. “If they had that information, what would they do with it?”

Take down what you can

You’ve found what an adversary might use against you online. Now it’s time to take it down.

Admittedly, this can be difficult in the United States, as Americans are not protected by a national data privacy law that gives them the right to request their data be deleted from certain websites, platforms, and data brokers.

Where Americans could find some help, however, is from online resources and services that streamline the data removal process that is enshrined in some state laws. These tools, like the iOS app Permission Slip, released by Consumer Reports in 2022, show users what types of information companies are collecting about them, and give user the opportunity to request that such data be deleted.

Separately, Google released on online tool in 2023 where users can request that certain search results that contain their personal information be removed. You can learn more about the tool, called “Results about you,” here.

When all else fails, Honeywell said that people shouldn’t be afraid to escalate the situation to their state’s regulators. That could include filing an official complaint with a State Attorney General, or with the Consumer Financial Protection Bureau, or the Federal Trade Commission.

“It sounds like the big guns,” Honeywell said, “but I think it’s important that, as individuals, we do what we can to hold the companies that are creating this mess accountable.”

Lock down your accounts

If an adversary can’t find your information through an online search, they may try to steal that information by hacking into your accounts, Honeywell said.

“If I’m mad at David, I’m going to hack into David’s email and share personal information,” Honeywell said. “That’s a fairly standard way that we see some of the worst online harassment attacks escalate.”

While hackers may have plenty of novel tools at their disposal, the best defenses you can implement today are the use of unique passwords and multifactor authentication.

Let’s first talk about unique passwords.

Each and every single one of your online accounts—from your email, to your social media profiles, to your online banking—should have a strong, unique password. And because you likely have dozens upon dozens of online accounts to manage, you should keep track of all those passwords with a devoted password manager.

Using unique passwords is one of the best defenses to company data breaches that expose user login credentials. Once those credentials are available on the dark web, hackers will buy those credentials so they can attempt to use them to gain access to other online accounts. You can prevent those efforts going forward by refusing to repeat passwords across any of your online accounts.

Now, start using multifactor authentication, if you’re not already.

Multifactor authentication is offered by most major companies and services today, from your bank, to your email, to your medical provider. By using multifactor authentication, also called MFA or 2FA, you will be required to “authenticate” yourself with more than just your password. This means that when you enter your username and password onto a site or app, you will also be prompted with entering a separate code that is, in many cases, sent to your phone via text or an app.

MFA is one of the strongest protections to password abuse, ensuring that, even if a hacker has your username and password, they still can’t access your account because they will not have the additional authentication that is required to complete a login.

In the world of cybersecurity, these two defense practices are among the gold standard in stopping cyberattacks. In the world of online harassment, they’re much the same—they work to prevent the abuse of your online accounts.

Here to help

Online harassment is an isolating experience, but protecting yourself against it can be quite the opposite. Honeywell suggested that, for those who feel overwhelmed or who do not know where to start, they can find a friend to help.

“Buddy up,” Honeywell said. “If you’ve got a friend who’s good at Googling, work on each other’s profile, identify what information is out there about you.”

Honeywell also recommended going through data takedown requests together, as the processes can be “extremely tedious” and some of the services that promise to remove your information from the internet are really only trying to sell you a service.

If you’re still wondering what information about you is online and you aren’t comfortable with your way around Google, Malwarebytes has a new, free tool that reveals what information of yours is available on the dark web and across the internet at large. The Digital Footprint Portal, released in April, provides free, unlimited scans for everyone, and it can serve as a strong first step in understanding what information of yours needs to be locked down.

To learn what information about you has been exposed online, use our free scanner below.


[ad_2]
Source link

Moto G Power – 2024: Screenshots and other gestures

0
[ad_1]

Sometimes, what really makes the smartphone experience is the number of gestures you can use. These are quick and easy ways to perform different actions, activate functions, open apps, etc. Different versions of Android have different sets of functions, and some of these functions characterize an entire company’s lineup of phones. Motorola recently launched the Moto G Power – 2024, and this phone comes with a set of amazing gestures you can use to augment your experience. Here’s a rundown of these gestures.

This is a rundown of the gestures you can use for this phone, but it is not a list of exclusive gestures. Some can be performed using other devices from other manufacturers. However, they are a package deal with this phone, so they are worth a mention. If Motorola happens to deliver any software updates that will add any additional gestures, we will update this article to reflect that.

Before getting into this article, if you want to know more about the Motorola Moto G Power – 2024 (Review), you can check out our full review. We go through all the ins and outs of this phone, from the design to the software. So, if you have any questions about the phone, you can start there. Lastly, we have a handy how-to guide that will help you customize the theme of your Moto G Power – 2024. It’s extremely useful to help you personalize your device’s theme to suit your own personal style.

Moto G Power- 2024: Screenshots

If there’s something going on on your screen that you want to get a quick picture of, getting a screenshot is a very easy task. While it’s a simple thing to do, there are a few ways you can go about doing it.

Power + volume buttons

Firstly, there’s the oldest method. Simply press the power button and the volume down button at the same time. Traditionally, you would have to hold these buttons down for a second to take the screenshot. However, you don’t have to anymore. You can simply press the buttons once, and the screenshot will be taken. This is the quickest way of taking a screenshot.

Three-finger method

This is a method that’s more or less exclusive to Motorola phones. All you have to do is hold three fingers down on the screen for a second. The phone will then take the screenshot.

This is a simple method, but it may not be the best if there’s something on the screen that will be affected by your fingers. Say, you’re using a drawing app, and you want to take a screenshot of what you drew. Well, there’s a chance that your fingers could make a mark on the drawing before the screenshot.

Also, it does take a second for the phone to take the screenshot using this method so, if there’s something time-sensitive on your display, you may not want to use this method.

Google Assistant method

All you have to do is summon the Google Assistant by either holding down the home button (if you use three-button navigation), swiping up diagonally from one of the bottom corners of the phone (if you’re using gesture navigation), or using the “Hey Google” hotword.

When Google Assistant pops up, all you have to do is say “Take a screenshot”. After that, the assistant will instruct your phone to take the screenshot. Obviously, this is the slowest method, so, you will need to keep that in mind before you take the screenshots.

Moto G Power – 2024: Software gestures

Here are the gestures that you can do by interacting with the screen. They allow you to interact with certain functions of the phone by simple swipe gestures.

Moto G Power 2024 Gestures (2)

Navigation settings

First and foremost, you want to be sure that you can navigate the software comfortably. Android has two main modes of navigation. There is three-button navigation which has been around since the very early days of Android. You’ll see three buttons at the bottom of the screen (a triangle, square, and circle) used to navigate the software. These are all basic Android things.

Gesture navigation has been around for several years. It will allow you to navigate the software by swiping up from the bottom of the screen and swiping on the edge of the screen.

To switch between the two modes of navigation, go to your settings, head to the Gestures button, and tap on the Navigation mode button. Here, you will be able to choose your mode of navigation.

Summoning Google Assistant

To quickly summon the Google Assistant, all you have to do is perform a simple gesture. If you are on three-button navigation, simply hold your finger down on the home button. This will summon the assistant.

In order to use this method, you have to be sure to enable it. Go back to the navigation settings, tap on the little gear icon next to the Three-button navigation button, and flip the toggle.

If you want to summon the Assistant with gesture navigation on, go to the Gesture navigation button under the Navigation settings. There, you will flip the toggle saying “Swipe to invoke assistant.” Then, to summon the Google Assistant, swipe inward diagonally from one of the bottom corners of the screen.

One-handed mode

The Moto G Power – 2024 is a rather tall device. Thus, reaching the top of the screen can be a bit of a hassle, especially if you have smaller hands. This is why Android has a one-handed mode. When you activate this mode, half of the screen will be lowered so that you can reach the top of the screen.

If you want to use this gesture, you’ll have to have gesture navigation turned on. This is a weird omission because if you use three-button navigation, you’re going to be out of luck.

To bring the screen down, simply swipe down on the lowest portion of the screen. From that point, whenever you interact with the screen, it will go back to normal. So, if you summon the notification shade or open an app, it will go back to regular mode.

Swipe to split

Over the years, the implementation of split screen mode in Android has changed a few times. Now, if you want to put an app into split-screen mode using your Motorola phone, it’s pretty simple.

When you are using an app that uses split screen mode, put your finger on one side of the phone display, and swipe all the way across and back again. You will then be able to select another app to share the screen with. Just know that the app needs to be actively opened for you to put the phone in split-screen mode

Sidebar

If you want to quickly access some of your favorite apps, then you should look into the sidebar. The concept of this feature has been around for quite some time. Once activated, you will see a small bar appear on the very right-hand side of the screen. When you swipe inward from the bar, it will open a panel containing apps. You will be able to customize the panel to hold whatever apps you want to access quickly.

Physical button gestures

There are a few gestures you can do with the power and volume buttons. For starters, double-tapping the power button will summon the camera. This gesture will even work if your screen is off. You will just have to go to the gestures menu and enable it

You can set it to summon the Google Assistant if you press and hold the power button. If you select this option, then you will access your power menu by pressing the power and volume up button at the same time.

Lastly, when the screen is off, you have the option to use your volume buttons to skip music tracks.

Moto G Power 2024 Gestures (3)

Kinetic gestures

These require you to physically move your device. It might sound a bit odd, but they allow you to perform actions on your phone without needing to turn on the screen. Some of these gestures were actually around for several years.

Double-tapping the back of the phone will activate certain functions. Find the Double-tap option in the Gestures menu, and tap on it. You will see a page letting you choose what action happens when you tap the back. You have the option to open an app, switch back to the last app, go back to the home screen, screen record, take a screenshot, play/pause media, or open the audio recorder.

To quickly open the camera, you can simply twist your wrist quickly two times. This is for those times when you don’t feel like taking out your phone and opening the camera app.

To activate the flashlight, perform two chopping motions with your phone facing perpendicular to the ground. This is something that has been available on Motorola phones for years.

Next, you are able to lift your phone to wake the screen rather than pressing the button, pick up your phone while it’s ringing to silence it, and flip your phone over for Do Not Disturb mode.


[ad_2]
Source link

Kobo joins the color e-readers fray with two devices

0
[ad_1]

Rakuten Kobo has finally joined the club of color e-reader manufacturers. The company’s first devices in the segment include the Kobo Libra Colour and Kobo Clara Colour. Both products offer E-Ink color displays to provide a more personalized reading experience. However, they don’t provide many under-the-hood improvements over the company’s previous e-readers.

Kobo’s new e-readers flaunt E-Ink’s Kaleido 3 touch-enabled color displays

Kobo’s new Libra Colour and Clara Colour e-readers utilize E-Ink’s latest Kaleido color display technology. It is touted to offer a subtle and pastel-like hue display. The tech is capable of dropping the 300ppi grayscale resolution to a resolution of 150ppi when you want to view the content in color.

The new E-Ink screen offers 16-levels of grayscale, 30% higher color resolution, and 4,096 colors. Notably, the Kobo Libra Colour model also supports a stylus for e-book annotations and highlighting. The Kobo Stylus doesn’t come bundled with the package, however.

The new Kobo readers can carry up to 24,000 e-books or 150 audiobooks

As for the other features, the Kobo Libra Colour can carry up to 24,000 e-books or 150 Kobo Audiobooks. While the Libra Colour has 32GB of native storage, the Clara Colour offers 16GB of storage. The company claims that the new e-readers are capable of lasting up to 42 days on a single charge. However, this is one condition of just 30 minutes of reading per day with 30 percent screen brightness. Also, you will need to turn off the Wi-Fi and Bluetooth connectivity.

The Kobo Clara Colour is equipped with a 6-inch display, while the Libra Colour has a bigger 7-inch screen. Both are powered by an unspecified dual-core processor that has a clock speed of 2.0GHz. The connectivity features are also the same including dual-band Wi-Fi, Bluetooth, and USB Type-C ports. Notably, both are IPX8 certified and can last up to an hour under two minutes of water.

Kobo’s first e-readers with color displays will be available starting from $150

Coming to the pricing, the Kobo Clara Colour will retail for $149.99 USD/$179.99 CAD. Due to the bigger display and higher storage, the Kobo Libra Colour will be available for $219.99 USD/$249.000 CAD. The Kobo Stylus 2 will set you back by $69.99 USD/$89.99 CAD. They will be available to pre-order on April 10 and will go on sale on April 30.

Along with its first e-readers with color displays, the brand has also launched the Kobo Clara BW. The upgraded black and white e-reader will be available for $129.99 USD/159.99 CAD.


[ad_2]
Source link

Brute-Force SSH Attacks Rampant in the Wild

0
[ad_1]
Brute-Force SSH Attacks

A comprehensive four-year study of brute-force attacks against SSH servers has revealed an alarming increase in the frequency and sophistication of these cyber attacks on internet-connected systems.

The research by scientists at the University of Utah provides unprecedented insight into the evolving tactics used by attackers attempting to gain unauthorized access to servers, routers, IoT devices and more.

“SSH brute-force attacks are not only persistent, but are rapidly growing more aggressive,” said Sachin Kumar Singh, a PhD student who led the study. “Our data shows the daily number of attack attempts is skyrocketing, especially in recent years.”

The researchers analyzed over 427 million failed SSH login attempts across more than 500 servers on CloudLab, a public cloud platform used by academic researchers worldwide. Their findings paint a sobering picture of the modern cybersecurity landscape.

Shifting Targets

While attackers have historically focused on guessing common administrator usernames like “root” and “admin”, the study found a notable shift in recent years.

Cyber criminals now heavily target usernames associated with cloud service images, network devices, IoT products and specific software packages

“Attackers are going after usernames for everything from internet routers and database servers to gaming software and Linux distributions intended for cloud use,” explained Singh.

“They are trying to compromise a wide range of devices and services connected to the internet.”

The researchers identified spikes in attacks on certain usernames and devices immediately following public disclosures of related vulnerabilities, suggesting attackers rapidly operationalize new exploits.

Are you from the SOC and DFIR Teams? – Analyse linux Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

Persistent and Evolving Threats

Beyond changes in targeted usernames, the data revealed a wide diversity of attacker behaviors and persistence levels.

While over half of the attacks came from IP addresses that disappeared within 24 hours, some attackers persisted in their efforts for months or even years.

Certain attackers attempted just a handful of usernames, while others cycled through thousands of different combinations. The study also uncovered groups of attackers sharing identical lists of usernames across multiple IP addresses, indicating coordination.

“The brute-force attack landscape is highly dynamic,” said Robert Ricci, a research professor at the University of Utah who oversaw the study. “Attackers constantly adapt their tactics based on new intelligence and vulnerabilities. Defending against these threats requires advanced, evolving defensive measures.”

A Novel Defense

The researchers developed a defensive technique called Dictionary-Based Blocking (DBB) to counter the onslaught. By analyzing the username dictionaries used by attackers, DBB can block 99.5% of brute-force attacks while allowing legitimate user access.

When evaluated against the industry-standard Fail2ban tool, DBB achieved significantly higher blocking rates while reducing false positives by 83%. The researchers have deployed DBB on CloudLab, which prevents four out of five previously unblocked attacks.

“Dictionary-Based Blocking represents a new frontier in defending against brute-force attacks,” said Singh. “It could be a game changer for protecting critical infrastructure and internet services from these persistent threats.”

The research highlights the importance of secure practices like using key-based authentication and strong passwords. As attackers grow increasingly tenacious and innovative, novel defensive approaches will be essential to maintaining a safe internet ecosystem.

Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.


[ad_2]
Source link

Galaxy S21 series gets April update, One UI 6.1 may follow next

0
[ad_1]

Samsung‘s Galaxy S21 series has started getting the April update, including the Galaxy S21 FE. While it doesn’t contain One UI 6.1, the update secures your phone from dozens of security vulnerabilities. The company has already updated several other Galaxy devices to the new security patch.

April security update is available for the Galaxy S21 series

Samsung’s flagship smartphones and tablets launched in 2021 and beyond are eligible for four major Android OS updates and five years of security patches. The Galaxy S21, Galaxy S21+, and Galaxy S21 Ultra arrived with Android 11 and picked up updates to Android 12, Android 13, and Android 14. The Galaxy S21 FE ran Android 12 out of the box and has received two OS updates.

These phones will also get Android 15 (the FE model will get Android 16 too). But ahead of that, the company will roll out One UI 6.1 to them. Debuted with the Galaxy S24 series, One UI 6.1 is based on Android 14 and brings new AI features, camera improvements, and more. Samsung has already pushed the new version to the Galaxy S23 series, Galaxy Tab S9 series, Galaxy Z Fold 5, and Galaxy Z Flip 5.

Other eligible models will get it in the coming weeks, though the availability of features will vary. As Galaxy S21 users wait for One UI 6.1, Samsung is treating them with the April security update. The latest SMR (Security Maintenance Release) contains more than 40 vulnerability patches, including a critical Android OS patch. The update for the flagship trio is available in Europe with the firmware build number G99*BXXSAFXCL.

For the Galaxy S21 FE, the rollout has begun in Latin America. Users are getting the update with the build number G990EXXS7FXC5. A global rollout for all four models should begin soon. With One UI 6.1 on the horizon, it is no surprise that the latest update doesn’t contain anything more. “The security of your device has been improved,” the only entry on Samsung’s official release notes reads.

The new SMR will soon reach more Galaxy devices

The Galaxy S21 is just the second S series lineup to receive Samsung’s April update, after the Galaxy S24. The company will push the new SMR to more devices in the coming weeks. Some may get it with One UI 6.1, while others will have to wait longer for the feature update. We will let you know when the Korean firm pushes the latest security patch and One UI 6.1 to more Galaxy devices.


[ad_2]
Source link

The Supercut Vision Pro app provides Netflix and Prime Video

0
[ad_1]

Apple forayed into the world of mixed reality when it announced the Vision Pro last year. One of the best experiences of the Apple Vision Pro headset is watching videos. However, two of the popular streaming platforms including Netflix and Amazon Prime don’t even provide dedicated apps for it. However, an Australian developer has released a Supercut Netflix Vision Pro app to let you enjoy the content of these platforms.

The Supercut Netflix Vision Pro app is a workaround for the Vision Pro

The Supercut app provides a first-class experience for Netflix and Prime Video subscriptions on the Apple Vision Pro headset. It isn’t just the best way to enjoy the content of these platforms on Vision Pro. It is the only video to experience Netflix and Prime Video on the VR headset. The app works similarly to Apple’s own TV Plus app. However, instead of content from Apple’s platform, it provides content from Netflix and Prime Video.

Supercut provides comprehensive Netflix and Prime Video controls, including subtitles, audio output, and speed adjustment. In addition, it gives you an option to skip ahead or back in a video for a few seconds. If you have multiple user profiles on Netflix or Prime Video, then you can easily switch between them. Also, you will receive visual indicators for Dolby formats, apart from the streaming resolution.

Users can search for content by typing on the keyboard or by using the built-in microphone of the Vision Pro. The Supercut Netflix Vision Pro application also provides support for 4K streaming with Dolby Atmos and Dolby Vision. As of now, it’s unclear whether Netflix or Prime Video will have any problem with Supercut. That said, the unofficial app certainly enhances the content viewing experience on the Apple headset.

Supercut is available for a one-time payment of $4.99

Supercut is available for a one-time payment of just $4.99. The app has been designed by 19-year-old Australian developer Christian Privitelli. So far, the app has met with positive reviews on Reddit r/visionpro forums. He has been getting requests from several Vision Pro users to add Hulu and Peacock support to the Supercut app.


[ad_2]
Source link

Real-World Law Enforcement Hack of End-to-Encrypted Chat Messenger

0
[ad_1]

Law enforcement authorities successfully penetrated EncroChat, an encrypted chat program that is frequently used by criminals, in a ground-breaking operation that has shocked the world of organized crime.

This operation led to the arrest of hundreds of individuals involved in illegal activities across Europe and the seizure of substantial amounts of drugs, weapons, and cash.

The breach of EncroChat, once considered impenetrable, marks a significant victory in the ongoing battle against organized crime and raises important questions about privacy, security, and the limits of encryption technology.

This article discusses the successful efforts of the authorities to penetrate and gain control over the entire EncroChat instant messenger, which is commonly utilized by cybercriminals for communication.

The EncroChat Network

EncroChat offered encrypted phones at a high price, promising anonymity and security through end-to-end encrypted messaging (E2EE), with features designed to remove identifying information.

These devices, which cost around £900 each, with a subscription fee of £1,350 for six months, were tailored for privacy, with GPS, microphone, camera, and USB port all physically disconnected.

EncroChat’s services included encrypted messaging, ZRTP-based VOIP calls, and encrypted note-taking, operating on a dual-boot system with both EncroChat and Android OS.

The Breach

The operation to penetrate EncroChat began in December 2018 when a French court-authorized law enforcement to copy EncroChat’s virtual machines from a server in Roubaix, France. This led to legal maneuvers allowing authorities to install “computer data capture devices” on the server and intercept communications.

According to the presentation submitted at The Crypto Conference 2024, By March 2020, law enforcement had injected malware into EncroChat’s update servers, enabling them to collect both historical and live data from the devices.

This malware transmitted all stored data on the devices to the authorities and forwarded chat messages to French police servers in real-time without altering the encryption, thus maintaining the appearance of secure communication.

The breach resulted in more than 6,500 arrests and the seizure of over 900 million euros in assets. EncroChat, realizing the extent of the compromise, issued a warning and shut down its service in June 2020.

The operation revealed the scale of EncroChat’s use among criminals for coordinating illegal activities, including drug trafficking, violent attacks, and large-scale transports of illegal goods.

Are you from the SOC and DFIR Teams? – Analyse linux Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.

The EncroChat breach has sparked a debate on the ethical and legal implications of law enforcement’s use of hacking and malware to combat crime.

While the operation has been hailed as a significant success in disrupting organized crime, it also raises concerns about privacy, the security of communication technologies, and the potential for abuse of such surveillance capabilities.

The operation’s reliance on malware and the covert interception of communications without users’ knowledge challenge traditional notions of privacy and legal process.

The successful breach of EncroChat represents a turning point in law enforcement’s approach to tackling encrypted networks used by criminals.

It underscores the vulnerabilities inherent in even the most secure communication systems and highlights the ongoing tension between privacy rights and the needs of law enforcement.

As technology continues to evolve, the balance between these competing interests will remain a contentious and critical issue for society.

Secure your emails in a heartbeat! To find your ideal email security vendor, Take a Free 30-Second Assessment.


[ad_2]
Source link