Recent Posts

Pages: [1] 2 3 ... 10
1

Warning—you are being tracked.getty

If you’re worried your phone might be spying on you, sharing your data and location without you realizing, then a new report this week will make alarming reading.

“You can’t say no to Google’s surveillance,” the Cybernews research team warns, describing a secretive stream of data they say continually transmits from a new phone to Google’s servers. Even more “concerning,” they say, “the phone periodically attempts to download and run new code, potentially opening up security risks.”

The Cybernews team took a “brand-new [Pixel 9 pro XL] with a new Google account and default settings” and rooted it to enable a man-in-the-middle data interception. The team “proxied the inbound and outbound traffic and used a custom security certificate to decrypt and examine the communications,” albeit rooting the phone disabled some features and so the intercepted data was not complete.

Because the testing took place with a new, default account, the team did not test to see the effect that user changes to privacy and security settings might have. But just as we’ve seen with browsers and apps—given most users maintain broadly default settings, it’s imperative those offer a good degree of out of the box protection.

“Every 15 minutes,” they say, the “Pixel 9 Pro XL sends a data packet to Google. The device shares location, email address, phone number, network status, and other telemetry.” This data, they found, is sent “to various Google endpoints, including Device Management, Policy Enforcement, and Face Grouping.”

There are clear sensitivities with contact details, device and network details, and other telemetry. But location data is especially sensitive, given the intrusive nature of such tracking data and the inferences this can provide about our lives.


Google’s data captureCybernews

We saw this sensitivity play out in Google’s welcome move to stop collating user timelines from Google Maps and instead maintain data on-device only. Worse, Cybernews says, “location data is included in the request even when GPS is disabled – the phone then relies on nearby Wi-Fi networks to estimate the location.”

There are multiple reasons why the collection of this data might be required to enable certain features, with Cybernews giving the example of the “newly introduced Car Crash Detection,” as one of these. There are also the diagnostic and services streams that flow from a device, and it’s unclear how this phone was setup. But the watchword is transparency and what users can reasonably be expected to know is taking place.

Cybernews also raises the concern that communication takes place “with services the user didn’t explicitly consent to.” The example given is the Photos app, which they say they did not open nor take photos, but “the Pixel periodically contacted endpoints associated with Google Photos’ Face Grouping feature without asking for consent.”

Beyond the location and other data collection, Cybernews also claims the device reached out to Google for new code to execute, opening up security risks. This security risk is much more of a stretch than than the data capture, and there is no evidence of any vulnerability to third-party code, especially with Play Protect enabled on the device. That said, one can never rule out the more sophisticated adversaries hijacking such openings for their own purposes.

The data egress is more tangible. The data Cybernews says it captured off-device, and the frequency with which that was being sent, certainly warrants some transparency. That said, this is a Google device in the hands of a user with a Google account, and there’s no suggestion any of this data was transmitted to any third-party. But given Google’s mixed record on privacy and data harvesting, users will likely have concerns. I have asked Google for their comments on the new report and its findings.

Meanwhile, the researchers warn that “the deep integration of surveillance systems in [Google’s] ecosystem may leave users vulnerable to privacy violations.” And while this test was specifically for the new Pixel Pro devices, it’s clearly a wider issue.

In response to the Cybernews report, a Google spokesperson told me that “user security and privacy are top priorities for Pixel. You can manage data sharing, app permissions and more during device setup and in your settings. This report lacks crucial context, misinterprets technical details and doesn't fully explain that data transmissions are needed for legitimate services on all mobile devices regardless of the manufacturer, model or OS, such as software updates, on-demand features and personalized experiences.”

Updated on October 8 with Google’s response to the Cybernews report.

source
2
Users are reporting network connectivity issues after installing the Windows 11 24H2 update.


Image: Zulkarnieiev Denis/Shutterstock.com

The list of problems caused by the Windows 11 24H2 update just keeps getting longer and longer. Not only is it causing blue screen crashes and making mouse cursors disappear, but the update also leaves behind a massive cache of undeletable files in its wake.

And now, according to Windows Report, the annual 2024 update to Windows 11 is interrupting internet connections.

One affected user wrote the following in a Microsoft forum post:

Quote
“After updating to the new [Windows 11 24H2], some computers experienced network problems with both cable and Wi-Fi. They connect but do not get network access and get an IP address starting with 169… resulting in no internet or network connection. I have updated the drivers and firmware and reset the network settings. The MAC addresses of the devices have not changed. Does anyone know what could be causing this?”

Several other users promptly replied that they were experiencing the same. Updating drivers/firmware and resetting network settings both failed to resolve the problems. These internet connection issues occur on both private computers and on Windows 11 PCs connected to servers.

In addition, some users report that their Windows 11 systems were still able to connect to the internet without issue after the first restart following the installation of 24H2, but started experiencing internet connectivity issues after the next restart.

What you can do if you’re affected

If the Windows 11 2024 Update is causing you internet connectivity problems, there’s only one solution as of this writing: undo the update and roll back to Windows 11 23H2.

A rollback appears to solve the issue in most cases, but there’s also a chance this workaround won’t work. As one user said: “We tried rolling back to 23H2, but it didn’t work. So far we have ‘burnt’ several machines requiring a complete rebuild from scratch. We are blocking 24H2.”

How to roll back Windows 11 updates.

source
3
Windows updates are supposed to solve existing bugs, but they can also cause new problems. For this reason, Microsoft introduced the Known Issue Rollback (KIR) three years ago.


Image: Microsoft

In addition to closing security gaps, the monthly Windows updates are used in particular to solve errors and problems that have arisen in the meantime. In practice, however, it is not uncommon for the updates to cause new problems.

There are many reasons for this, ranging from errors in quality assurance to the fact that, unlike Apple computers, the software and hardware used in Windows systems is extremely heterogeneous.

This is why Microsoft introduced the so-called Known Issue Rollback (KIR) three years ago. If it turns out that an installed update is causing problems on a large number of computers, Microsoft sends a KIR update afterwards.

This either restores the affected Windows systems to the state they were in before the faulty update or distributes a corrected update version straight away. You don’t have to take any action, as the problem is automatically fixed via the Windows update. The KIR rollback is only used for non-security-related errors, not for updates to close security gaps.


Windows generally allows installed updates to be uninstalled manually in the event of problems. However, this does not apply to all updates. Microsoft

In principle, Windows updates can also be uninstalled manually via the Settings app: For Windows 10 via Update & Security > Windows Update > Show update history > Uninstall updates. For Windows 11, this is done via Windows Update > Update history > Uninstall updates. However, this option is not available for all updates.

There is also the basic option of not installing updates for the operating system immediately, but waiting a few days instead. This will at least prevent you from being affected by widespread update problems. In such cases, Microsoft would ideally have already rectified the error via a known issue rollback before you encounter it.

In Windows 10, the Windows update can be postponed by one week (“Update pause for 7 days”) or until a specific date via “Advanced options.” In Windows 11, the function is called “Suspend updates.” It is particularly useful to pause updates if you are urgently dependent on your computer in the following days and cannot afford any update problems.

source
4

A new and dangerous AI threat for all Gmail users is seen in the wild
SOPA Images/LightRocket via Getty Images


Update, Oct. 12, 2024: This story, originally published Oct. 11, includes details of a new anti-scam alliance initiative from Google to help users fight fraudsters.

Google has implemented increasingly sophisticated protections against those who would compromise your Gmail account—but hackers using AI-driven attacks are also evolving. According to Google’s own figures, there are currently more than 2.5 billion users of the Gmail service. No wonder, then, that it is such a target for hackers and scammers. Here’s what you need to know.

The Latest AI-Driven Gmail Attack Is Scary Good

Sam Mitrovic, a Microsoft solutions consultant, has issued a warning after almost falling victim to what is described as a “super realistic AI scam call” capable of tricking even the most experienced of users.

It all started a week before Mitrovic realized the sophistication of the attack that was targeting him. “I received a notification to approve a Gmail account recovery attempt,” Mitrovic recounts in a blog post warning other Gmail users of the threat in question. The need to confirm an account recovery, or a password reset, is a notorious phishing attack methodology intended to drive the user to a fake login portal where they need to enter their credentials to report the request as not initiated by them.

Unsurprisingly, then, Mitrovic wasn’t falling for this and ignored the notification that appeared to originate from the U.S. and a missed phone call, pertaining to be from Google in Sydney, Australia, some 40 minutes later. So far, so relatively straightforward and easy to avoid. Then, almost exactly a week later, the fun started in earnest—another notification request for account recovery approval followed by a telephone call 40 minutes later. This time, Mitrovic didn’t miss the call and instead picked up: an American voice, claiming to be from Google support, confirmed that there was suspicious activity on the Gmail account.

“He asks if I’m traveling,” Mitrovic said, “when I said no, he asks if I logged in from Germany, to which I reply no.” All of this to engender trust in the caller and fear in the recipient. This is when things turned dark fast and really rather clever in the overall scheme of phishing things. The so-called Google support person informed Mitrovic that an attacker had accessed his Gmail account for the past 7 days, and had already downloaded account data. This rang alarm bells as Mitrovic recalled the recovery notification and missed call from a week earlier.

Googling the phone number he was being called from while speaking, Mitrovic discovered that it did, indeed, lead to Google business pages. This alone is a clever tactic likely to fool plenty of unsuspecting users caught up in the panic of the moment, as it wasn’t a Google support number but rather about getting calls from Google Assistant. “At the start of the call, you'll hear the reason for the call and that the call is from Google. You can expect the call to come from an automated system or, in some cases, a manual operator,” the 100% genuine page helpfully informs the reader.

Lessons To Be Learned From This Gmail Hack Near Miss

Mitrovic did the right thing, or at least the next best thing to hanging up, and asked the supposed support guy to send an email confirmation—an email which arrived soon after, from a Google domain and looking for all intents and purposes genuine. AT this point he noticed the to field contained a cleverly disguised address that wasn’t actually a Google domain but could, once again, easily fool those not of a technical bent.

The real giveaway for Mitrovic, however, was when the caller said hello and after no response said hello again. “At this point I released it as an AI voice as the pronunciation and spacing were too perfect,” Mitrovic said.

It’s well worth reading the original blog from Mitrovic as it contains much more technical detail and detective work that I don’t have the space to cover in this report. Knowledge is everything, and the threat intelligence provided by this consultant is genuinely invaluable for anyone who might find themselves in a similar situation: forearmed is forewarned.

It’s almost a certainty that the attacker would have continued to a point where the so-called recovery process would be initiated, in truth this would be a cloned login portal capturing user credentials and likely the use of some kind of session cookie stealing malware to bypass two-factor authentication if that was in place.

Google Launches The Global Signal Exchange To Fight Scammers

Google has announced that it has joined forces with the Global Anti-Scam Alliance and the DNS Research Federation to form a new initiative in the battle against scammers. The Global Signal Exchange will act as an intelligence-sharing platform when it comes to scams and fraud, providing real-time insight into the cybercrime supply chain. As the first founding member of the Global Signal Exchange, Google hopes that the platform will become, in effect, a global clearinghouse for the kind of intelligence signals that are connected to bad actors and their attacks.

Amanda Storey, senior director of trust and safety at Google said that the collaboration “leverages the strengths of each partner.” With GASA having an extensive existing network of interested stakeholders and the DNS Research Foundation a data platform with more than 40 million existing signals, “GSE aims to improve the exchange of abuse signals, enabling faster identification and disruption of fraudulent activities across various sectors, platforms and services.”

The ultimate goal, Google confirmed, is to create a solution that not only operates at the almost unthinkable scale of the internet itself but does so in an efficient and, above all, user-friendly way. This means that qualifying organizations will be able to use it to hit back at scammers. Google already has plenty of experience in this field, with a long-established history of entering into partnerships to help fight fraud. Indeed, as part of the testing of the new Global Signal Exgcnage, Google shared more than 100,000 malicious URLs and consumed a staggering million scam signals for analysis. “We'll start by sharing Google Shopping URLs that we have actioned under our scams policies,” Nafis Zebarjadi, Google’s account security product manager said, “and as we gain experience from the pilot, we will look to add data soon from other relevant Google product areas.”

The Global Signal Exchange, or at least the engine that drives it, runs on the Google Cloud to enable all participants to share and consume intelligence signals while “benefiting from Google Cloud Platform's Al capabilities to find patterns and match signals smartly,” Storey concluded.

Staying Safe From The Most Advanced Of Gmail Scams

AI deepfakes are not just used for porn and politics, they are used to perpetrate seemingly straightforward account takeovers such as in this case. Stay calm if you are approached by someone claiming to be from Google support, they won’t phone you so there’s a massive red flag right away, and no harm will come to you if you hang up. Use the tools at your disposal, ironically Google search itself and your Gmail account, to make checks during the call if you are concerned its could be genuine and ignoring it could cause harm. Search for the phone number, see where it’s really coming from. Check your Gmail activity to see what, if any, devices other than your own have been using the account. Take note of what Google says about staying safe from attackers using Gmail phishing scams. Most importantly, never let yourself be rushed into making a knee-jerk reaction, no matter how much urgency is injected into a conversation. It’s that sense of urgency that the attackers rely upon to swerve your normal good judgement and click a link or give up credentials.

source
5


Hurricanes often leave a path of physical damage to impacted regions, power blackouts and cell service outages that could last for days after a storm hits.

As Florida residents prepared for impact from Hurricane Milton, several satellite connection options were made available for the latest iPhone and Android models to facilitate contact with loved ones and emergency personnel in the face of outages.

Here's how you would connect, if needed.

iPhone

With iPhone 14 or more recent models, users can connect devices to a satellite to text emergency services, request roadside assistance, message friends and family and share locations, even without cellular and Wi-Fi coverage, according to Apple.

However, because satellites are located hundreds of miles away from Earth and move rapidly the user experience may be impacted by the low bandwidth, according to the company.

"In ideal conditions with a direct view of the sky and the horizon, a message might take 30 seconds to send. It might take over a minute to send under trees with light or medium foliage," the company notes on its website.

Apple recommends being outside with a clear view of the horizon, moving away from obstructions such as trees, sending shorter messages and updating to the latest IOS for best results.

To connect to a satellite, swipe down from the top right corner of your iPhone to open Control Center, then tap the Cellular button on the right. Tap Satellite, then choose a satellite feature.

Ahead of a storm and for emergencies at large, Apple recommends having emergency contacts and important medical information added to your Medical ID within the Health app.

Android

For Android users hoping to connect to Google's satellite services, the models with the capability include the Pixel 9, Pixel 9 Pro, Pixel 9 Pro XL, and the Pixel 9 Pro Fold.

Called Satellite SOS, "This feature will be activated once all the necessary software and APIs are updated and the service is registered with the satellite network," according to Google.

The company says users will be notified once the feature is active but the status can be checked in the settings app.

On the Pixel models listed above, if you need to contact emergency services without a mobile or Wi-Fi network, dial 911 and you'll find an option to use Satellite SOS in the dialer.

Tap Satellite SOS and then press start, from there you'll fill out the emergency questionnaire.

To set up emergency contacts to receive updates on your location and status when using Satellite SOS, Android users should go to the phone's Personal Safety app.

Starlink

In a collaboration with T-Mobile, Elon Musk's Starlink is offering direct-to-cell service for areas impacted by the recent hurricanes.

"We have accelerated the rollout of Starlink direct to cell phone connectivity for areas affected by the hurricanes," Musk wrote on X early Wednesday morning. "This is being provided free of charge by SpaceX and TMobile to help those in need," he added.



New users can activate Starlink for free and the service will work for carriers outside of T-Mobile, according to Musk.

If a phone connects to a Starlink satellite, it will have one to two bars of signal and show "T-Mobile SpaceX" in the network name, according to SpaceX.



"Users may have to manually retry text messages if they don't go through at first, as this is being delivered on a best-effort basis," the company wrote on X.

"The service works best outdoors, and occasionally works indoors near a window," SpaceX added.

source
6
Force it to sell Chrome, Android which could change the tech landscape as we know it


(Image credit: Shutterstock)
Things could change for Google in a big way in the near future. Apparently, the U.S. Department of Justice might ask a federal judge to force Google to sell parts of its business, as reported by CBS News. While it's still early to make any kind of proclamation about the future of Google, if the company is forced to sell off portions of its business due to being too dominant, it could change the tech landscape as we know it.

Not only might the DOJ make Google sell off pieces, but federal prosecutors also said the judge could ask the court to open the data it uses to power its popular search engine and AI products to competitors. Google obviously has some key secrets that make its search engine work (secrets the company stays ahead of with consistent algorithm changes). Having these made public would cause a significant shift in how search rankings work.

Google also has very lucrative deals with companies like Apple and Samsung, which keep its search engine as the default option and allow it to further control the market. Google currently has deals with Samsung to share revenue from the Play Store and with Apple for search traffic on Safari.

The DOJ isn't happy about these deals and may squash them. It also aims to stop Google from using its products like Chrome, Google Play, and Android to give its Search and related services a competitive advantage. Whether that happens by forcing Google to sell those parts of its business or by limiting how the company can leverage its other products remains to be seen.

"For more than a decade, Google has controlled the most popular distribution channels, leaving rivals with little-to-no incentive to compete for users," the antitrust enforcers wrote. "Fully remedying these harms requires not only ending Google's control of distribution today, but also ensuring Google cannot control the distribution of tomorrow."

In a response, Google's vice president of regulatory affairs, Lee-Anne Mulholland said in response to the filing that the DOJ was "already signaling requests that go far beyond the specific legal issues."

As you might expect, the Google representative cited "Government overreach" and "negative unintended consequences for American innovation and America's consumers." Whether this is a case of overreaching will be determined as more filings and information come out, but it's certainly something for everyone in the tech industry to keep an eye on.

This is far from Google's first run-in with the U.S. government, as District Judge Amit Mehta ruled that Google's search engine has been illegally exploiting its dominance in August. Between that ruling and the potential for the DOJ to ask a federal judge to force Google to sell parts of its business, it appears that the search giant is in for a fight if it wants to keep operating the way it has been.

source
7
Linux, MacOS and Windows users: Ever longed for consistent file management across all desktop operating systems? Spacedrive is out of this world.


Jack Wallen/ZDNET

The file manager -- that ubiquitous app everyone takes for granted -- is usually the last thing on your device you ever think about, but one of the first things you use. File managers help us keep our files and folders organized, assist in locating documents, and make it easy to open files.

Imagine your digital life without a file manager.

But here's the thing: Most people stick with whatever file manager their operating system offers. In some cases, that's fine. The MacOS Finder, for example, is a pretty good file manager. But what if you could use the same file manager across all your desktop operating systems -- one that offers far more features than the file manager you're using now?

That would be out of this world, right?

Thanks to Spacedrive, this dream scenario is very much possible. I've installed Spacedrive on both Linux and MacOS and found it to be an absolute gem. Spacedrive is also available for Windows 10 and 11, which I have not tried.

One thing to keep in mind is that Spacedrive is very much in the alpha release stage (version .4.2 is what I have installed on my machines), so it's not 100% complete. Certain features are listed as "coming soon" -- such as Cloud Drives, key management, backups, and extensions -- but what you do get (even in the alpha stage) is quite impressive.

Here's a rundown of Spacedrive features:

   • Libraries: Combine different directories into Drives, so you can categorize those folders

   • Locations: Shortcuts to directories

   • Network file drop: Connect another machine to Spacedrive so you can easily send a file from one machine to another.

   • Themes

   • Favorites and recents

   • Dashboard overview: At-a-glance information about drive space on your machine

   • Tags

   • Trash

Spacedrive has a modern, user-friendly, and well-designed UI that looks and behaves the same, regardless of platform, so you don't have to switch gears when switching operating systems Using Spacedrive for a week convinced me that it's one of the best file managers I've encountered. It has all the features I need without feeling bloated. 

And the ability to easily send files between operating systems is a huge plus for me. (This is possible even without creating a network share via Samba.)

Let me show you a few of the tricks currently available in Spacedrive.

Peers

Peers simplifies the process of sharing files between computers. Once you've connected a peer, you can right-click (or two-finger tap) a file and click Share > PEER NAME (Where PEER NAME is the name of the peer you've created), and then -- once you accept the incoming file on the destination computer -- you can save the file to any location you want.

To add a peer (aka node), go to Settings > Network, scroll to the bottom, and you should see any instances of Spacedrive on your network. Click Connect on any instance and you should then see the new node listed under Peers in the sidebar.


Adding a new node to Spacedrive makes it easy to send files from
one machine to another. Screenshot by Jack Wallen/ZDNET


If you don't see a node listed, you can type the IP address of the machine in question and click Submit. As long as Spacedrive is installed on the node, it'll connect.

Libraries

Let's say you have specific folders all related to work, home, school, a hobby, music, pictures, or whatever. You can create a new library and then add as many folders to that library (called locations) as you need. You can create as many libraries as you need and associate as many folders to each library. When you switch to a different library, the folders you've added to it will be listed under Locations.

To create a library, open Settings > Libraries and click Add Library. When prompted, give the library a name and click "Create a Library."


Make sure to name your new library something that will indicate
clearly what it's for. Screenshot by Jack Wallen/ZDNET


To add a folder as a location to the library, click Add Location under Locations, navigate to the folder in question, and (when prompted) click Add.


If you click Advanced Settings, you can enable or disable features
like no system files, no hidden files, no git files, git ignore, and only
images. Screenshot by Jack Wallen/ZDNET


Adding libraries and locations makes it very easy to access all the folders and files associated with a particular project or subject. Do note that you can also encrypt libraries from within the settings section of the library in question.

As I mentioned, Spacedrive is very much in the alpha stage, so I don't recommend using it if you prefer your software to be bug-free and predictable. Eventually, however, Spacedrive will be available as a full release and you can bet it will become my default file manager on all my desktop operating systems.

source
8

Learn how to lock your Social Security number (SSN). Learn more about what a Social Security number lock is, how to put a lock on social security number and what else to do if your SSN is compromised.

Below I have listed the 3 nationwide credit reporting agencies.

Equifax ► monitors your Equifax credit report, provide you with alerts, and help you recover from ID theft so you can focus on living your financial best.

Experian ► is committed to helping you protect, understand, and improve your credit. Start with your free Experian credit report and FICO® score.

TransUnion ► offers total credit protection all in one place from credit score, credit report and credit alert. Check your credit score today from TransUnion!

source
9
Nintendo / Hands-On With Nintendo's Surprise Alarm Clock, Alarmo
« Last post by javajolt on October 11, 2024, 10:23:20 AM »
The $100 clock has motion sensors and wakes you up with Nintendo themes and sound effects. Here's how it works, and our initial thoughts on what the heck it all means.


Alarmo is a Nintendo alarm clock. Seriously.
Richard Peterson/CNET


Alarmo! Like a sudden ringtone, Nintendo's latest surprise product emerged out of nowhere. The Switch 2 isn't coming until 2025, but in the meantime, Nintendo has a novelty clock with musical themes and what looks like surprisingly advanced tech. Yes, it's an alarm clock. It's called Alarmo. It's available now, and we've tried one out.

Now... what is Alarmo again?

The round-display alarm clock is an internet-connected device that has different musical themes and graphics tied to Nintendo games. Zelda, Mario, Ring Fit Adventure… they're on here. But it gets stranger -- Alarmo also has motion sensors. As you toss and turn, Alarmo adds sound effects to go with its alarm. You might hear coins or Splatoon paintballs. Then you get up, and Alarmo celebrates.

It can be bought now at Nintendo Store locations, or ordered via Nintendo, but requires a Switch Online subscription. Nintendo says it'll come to other stores in early 2025.

There's more it can do, too: The clock will measure sleep movement and keep track of it; it has gentle or more intense alarm modes; and it can play wind-down music for going to bed. It sounds like a smart sleep clock meets a Nintendo immersive bedside friend.


Alarmo is a smart alarm clock with Nintendo themes and motion tracking. Seriously.
Nintendo


In a lot of ways, this clock almost sounds like the type of product Disney would sell. With Nintendo already having retail stores, movies and theme parks, maybe that's the point. $100 is a lot for a novelty gift, but this also looks like a smart device that will actually update over time. There are 35 scenes loaded in from five different games (Mario Odyssey, Zelda: Breath of the Wild, Splatoon 3, Pikmin 4 and, oddly, Ring Fit Adventure), but Nintendo's promising more will come over time.

It also feels like classic wild-card Nintendo. Mario Kart Live, Game & Watch and those mini consoles were surprise gift things, too. Alarmo feels even more unusual, but it's also aiming right at Nintendo fans and their wallets.


CNET's Bridget Carey gets ready to take a rest with Alarmo.
Richard Peterson/CNET


Hands-on impressions

Shortly after Alarmo was announced, CNET's Bridget Carey ran over to the Nintendo Store to pick one up and get some initial thoughts on video. Her thoughts are below:

As soon as you turn it on, Alarmo takes its time guiding users through understanding the motion sensor and positioning it correctly near your bed. Like a game tutorial, you practice setting off the game sounds by making motions and moving your body in front of Alarmo. It gathers info about how big your bed is, and where Alarmo is placed in relation to your head, and then it goes through another wake-up test. I appreciate how much time Nintendo spends in the setup process, considering you want to make sure it works well before needing to actually get up for the day.

The first moments were spent delighting in the immersive sounds from Zelda (you can choose to wake up to seven different audio environments for each game). For Zelda, there are some nice sweet environments, but if you're more motivated to get up with a stressful Bokoblin battle, you can do that — your movements in bed become sword swings. If you'd rather lie in bed dreaming of the Great Fairies, you can make them swoon and moan with your movements when it's time to get up (it's pretty funny).


Alarmo's many functions include, of course, alarm settings.
Richard Peterson/CNET


The alarm starts soft but gets louder the longer it goes off — we didn't have time to test this part out yet, but if you're sleeping through the alarm, it seems to indicate that other stressful sounds will start to play. The fun might be how much you have to move around and get out of bed for the alarm to stop. You could, also, use a button on top to turn off the alarm.

There are also wind-down bedtime sounds. Set the time you tend to go to bed, and when it detects you in bed, 10 minutes of calming game sounds will play. For Zelda, we heard a crackling fire, maybe from the place Link was camping deep in Hyrule.


If you want to keep yourself surprised in the morning, you can randomize it between one game's wake-up sounds or randomize it to switch to any of the alarms available.

There's also sleep tracking. All the motion sensors also help keep a record of how much you move around in your sleep, and the records are kept for one year.

We'll have deeper review impressions when we start using it in our homes. Oh yes, we're going to wake up to Alarmo.

source
10
General Discussion / Can police search your phone? Here are your legal rights
« Last post by javajolt on October 10, 2024, 08:53:44 PM »
Police generally need a warrant to search your phone. The details, though, are a legal and practical minefield.


(Illustration by Elena Lacey/The Washington Post; iStock)

Even for the law-abiding among us, it can be unnerving to imagine a police officer or other government personnel rifling through everything on your phone.

“Your phone is a window to your soul,” said Adam Schwartz, privacy litigation director of the Electronic Frontier Foundation, a consumer advocacy group.

That’s why the Supreme Court enshrined special constitutional protection for your phone. The details, though, are legally unsettled and complicated.

Tensions over phone data have flared in the criminal corruption case against New York Mayor Eric Adams. Prosecutors say Adams wouldn’t disclose the password to unlock his personal phone. Adams has pleaded not guilty and sought to dismiss parts of the case.

I’ll explain what the law says — and doesn’t — about when government authorities can search your phone, and suggest common-sense measures if you want to assert your rights.

Your legal rights

Government representatives, including police, in most cases need a warrant signed by a judge to seize your phone and search its contents.

Even if you’ve been arrested, law enforcement personnel can take your phone but still need a warrant to access what is on the device.

(If you hand over your phone and give permission for police to access its contents, they don’t need a warrant.)

U.S. Customs and Border Protection agents, including at airports, typically have more legal leeway to search your phone. Read more about that here.

But the law is murky about whether you can be compelled to unlock a phone seized by law enforcement.

Even when there is a search warrant for your phone, courts have been split about whether you can be legally forced to unlock it.

Some judges have said that being required to unlock your phone for authorities is analogous to being forced to testify against yourself, which is protected under the Fifth Amendment. Other courts have said there is no such protection for your locked phone, Schwartz said.

Still other courts have found you have Fifth Amendment protections if your phone is locked with a passcode, but not if it’s locked with a face or fingerprint scan.

If the police ask for your consent to search your phone without a warrant, what should you do?


Defense attorneys generally recommend that you politely refuse, but also consider whether it’s practical and safe to do so.

Jerome D. Greco, head of the digital forensics unit at the Legal Aid Society in New York, advised saying “I do not consent to a search of my phone” and asking to consult a lawyer. Schwartz said you can also say, “What’s inside my phone is private.”

Though law enforcement cannot search your phone or require you to unlock it without a warrant, they can make it uncomfortable to say no, said Brett Max Kaufman with the ACLU’s Center for Democracy.

For example, if you’re stopped for speeding and an officer asks to look at your phone, Schwartz said, refusing could make the traffic stop longer and confrontational. In extreme cases, he said, that could put you in physical danger.

Use your best judgment about the benefits and risks of asserting your legal right to keep your phone information private.

What are practical steps to enhance your legal protection from government searches?

Albert Fox Cahn with the Surveillance Technology Oversight Project advises people who are concerned about police accessing their devices to at least temporarily lock it only with passcode, partly because our legal rights are clearer when the phone is locked with a passcode.

Cahn suggested turning off the face or fingerprint unlock option in special situations, such as when you cross the border or attend a protest.

On iPhones, you can temporarily stop the Face ID scan from unlocking your phone. Press and hold the side button and one of the volume buttons at the same time for a couple of seconds. When you see an on-screen option to place an emergency call, press the side button again.

Your phone will lock, and you’ll need to type the passcode to unlock it.

Could police hold your phone to your face to unlock it without your permission?

“Most courts have held yes, they can,” Greco said, if law enforcement has a search warrant or your device is legally seized another way.

The face-unlocking move might not be legal without a warrant, but Cahn says he knows of cases in which police did it anyway.

Could the police grab your phone out of your hand while it’s unlocked?

That is also probably legal, Greco said, assuming they have a court order. (Not everyone agreed this would be legal.)

In 2013, when FBI agents arrested the person who was later convicted of operating the online drug bazaar Silk Road, they surprised him at a public library to seize his laptop before he could lock or delete its contents.

Can police search phones even without the owner’s permission?

Yes.

Law enforcement and prosecutors with court orders can use technology to break into locked phones. The FBI used such technology to access the content of a phone used by the man who tried to assassinate former president Donald Trump at a July campaign rally.

This phone-cracking technology can take time and cost a lot of money, and it might not work for all phones.

Prosecutors say they haven’t gotten into Adams’s locked personal phone, which they obtained with a court order nearly a year ago.

According to the indictment, the mayor said he forgot the passcode and couldn’t provide it to the FBI. Prosecutors suggested that was a bogus excuse. An attorney for Adams didn’t respond to a request for comment.

source
Pages: [1] 2 3 ... 10