Welcome to nsane.forums

Welcome to nsane.forums, like most online communities you need to register to view parts of our community or to make contributions, but don't worry: this is a free and simple process that requires minimal information. Be a part of nsane.forums by signing in or creating an account.

  • Access special members only forums
  • Start new topics and reply to others
  • Subscribe to topics and forums to get automatic updates

Search the Community

Showing results for tags 'Phone'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Site Related
    • News & Updates
    • Site / Forum Feedback
    • Member Introduction
  • News
    • General News
    • FileSharing News
    • Mobile News
    • Software News
    • Security & Privacy News
    • Technology News
  • Downloads
    • nsane.down
  • General Discussions & Support
    • Filesharing Chat
    • Security & Privacy Center
    • Software Chat
    • Mobile Mania
    • Technology Talk
    • Entertainment Exchange
    • Guides & Tutorials
  • Off-Topic Chat
    • The Chat Bar
    • Jokes & Funny Stuff
    • Polling Station

Found 63 results

  1. The man who developed a bot that frustrates and annoys robocallers is planning to take on the infamous Windows support scam callers head-on. Roger Anderson last year debuted his Jolly Roger bot, a system that intercepts robocalls and puts the caller into a never-ending loop of pre-recorded phrases designed to waste their time. Anderson built the system as a way to protect his own landlines from annoying telemarketers and it worked so well that he later expanded it into a service for both consumers and businesses. Users can send telemarketing calls to the Jolly Roger bot and listen in while it chats inanely with the caller. Now, Anderson is targeting the huge business that is the Windows fake support scam. This one takes a variety of forms, often with a pre-recorded message informing the victim that technicians have detected that his computer has a virus and that he will be connected to a Windows support specialist to help fix it. The callers have no affiliation with Microsoft and no way of detecting any malware on a target’s machine. It’s just a scare tactic to intimidate victims into paying a fee to remove the nonexistent malware, and sometimes the scammers get victims to install other unwanted apps on their PCs, as well. “I’m calling it a ‘Broadside’ campaign against Windows Support and the fake IRS.” Anderson plans to turn the tables on these scammers and unleash his bots on their call centers. “I’m getting ready for a major initiative to shut down Windows Support. It’s like wack-a-mole, but I’m getting close to going nuclear on them. As fast as you can report fake ‘you have a virus call this number now’ messages to me, I will be able to hit them with thousands of calls from bots,” Anderson said in a post Tuesday. “It’s like when the pirate ship turns ‘broadside’ on an enemy in order to attack with all cannons simultaneously. I’m calling it a ‘Broadside’ campaign against Windows Support and the fake IRS.” The Windows support scam is an old one, much like the fake IRS phone scams that have been victimizing consumers for several years. They typically involve large call centers and multiple layers of workers making the calls, transferring victims, and setting up new schemes. Anderson has posted several example recordings of the Windows scammers hitting his Jolly Roger bot and becoming increasingly agitated. Anderson said he’s still working out the details of how the operation will work and is hesitant to reveal too much about it. He said he did a test run recently and called a specific scammer’s number several hundred times via 20 separate lines and the scammers turned off the target number quickly. “I do not want to expose too much about what I’m doing because obviously it can be used for mischief or malice. This is likely why Microsoft or Apple don’t do anything about this. It will take a pirate,” Anderson said via email. Article source
  2. A couple years ago there was a promo giveaway. This one is different. By giving them a five star rating on Google Play and sending them a screenshot, they will get you a Pro license free. Just go to the following page and look for the following. It is easy to find. How to get free registration code? 1.Go to Google Play to rate Apowersoft Phone Manager 5 stars. 2.Take a screenshot of your 5 star review and send it to us via Online Form, we will send you free registration code soon. https://www.apowersoft.com/store/phone-manager.html
  3. This is new giveaway & expire in 16 hours from now. https://www.apowersoft.com/phone-manager Just share & get your key from below link https://www.apowersoft.com/promotion NO NEED TO GIVE 5 STAR RATING & SEND SCREEN SHOT
  4. Hacker Steals 900 GB of Cellebrite Data This is part of an ongoing Motherboard series on the proliferation of phone cracking technology, the people behind it, and who is buying it. Follow along here. The hackers have been hacked. Motherboard has obtained 900 GB of data related to Cellebrite, one of the most popular companies in the mobile phone hacking industry. The cache includes customer information, databases, and a vast amount of technical data regarding Cellebrite's products. The breach is the latest chapter in a growing trend of hackers taking matters into their own hands, and stealing information from companies that specialize in surveillance or hacking technologies. Cellebrite is an Israeli company whose main product, a typically laptop-sized device called the Universal Forensic Extraction Device (UFED), can rip data from thousands of different models of mobile phones. That data can include SMS messages, emails, call logs, and much more, as long as the UFED user is in physical possession of the phone. Cellebrite is popular with US federal and state law enforcement, and, according to the hacked data, possibly also with authoritarian regimes such as Russia, the United Arab Emirates, and Turkey. The data appears to have been taken, at least in part, from servers related to Cellebrite's website. The cache includes alleged usernames and passwords for logging into Cellebrite databases connected to the company's my.cellebrite domain. This section of the site is used by customers to, among other things, access new software versions. Motherboard verified the email addresses in the cache by attempting to create accounts on Cellebrite's customer login portal. In the majority of cases, this was not possible because the email address was already in use. A customer included in the data confirmed some of their details. The dump also contains what appears to be evidence files from seized mobile phones, and logs from Cellebrite devices. According to the hacker, and judging by timestamps on some of the files, some of the data may have been pulled from Cellebrite servers last year. “Cellebrite recently experienced unauthorized access to an external web server,” the company said in a statement on Thursday after Motherboard informed it of the breach. “The company is conducting an investigation to determine the extent of the breach. The impacted server included a legacy database backup of my.Cellebrite, the company’s end user license management system. The company had previously migrated to a new user accounts system. Presently, it is known that the information accessed includes basic contact information of users registered for alerts or notifications on Cellebrite products and hashed passwords for users who have not yet migrated to the new system,” the statement continues. Cellebrite advised customers to change their passwords as a precaution, and added that it is working with relevant authorities to assist in their investigation. Access to Cellebrite's systems has been traded among a select few in IRC chat rooms, according to the hacker. “To be honest, had it not been for the recent stance taken by Western governments no one would have known but us,” the hacker told Motherboard. The hacker expressed disdain for recent changes in surveillance legislation. In 2014 a hacker calling themselves “PhineasFisher” publicly released 40GB of data from surveillance company Gamma International. Gamma makes intrusion software that can remotely switch on a target's webcam, siphon off their emails, and much more. The following year, PhineasFisher targeted Italian company Hacking Team, and published a trove of emails and other internal documents from the company. Although the terms of this Cellebrite breach are somewhat different—the hacker has not dumped the files online for anyone to download—similarities seem to remain, especially in the hacker's vigilante motivation. The hacker, however, remained vague as to the true extent of what they had done to Cellebrite's systems. “I can't say too much about what has been done,” the hacker told Motherboard. “It's one thing to slap them, it's a very different thing to take pictures of [their] balls hanging out.” Source
  5. Oh Wow, Okay: A Phone Peripheral For Sending Realistic Feeling Kisses The Kissenger is an iPhone peripheral that two people can use to send kisses to one another. How? Let me copy/paste that for you while I practice kissing my teddy bear. What? One day there's going to be a frog that needs me to turn her back into a princess and I plan on becoming king. High precision force sensors are embedded under the silicon lip to measure the dynamic forces at different parts of your lips during a kiss. The device sends this data to your phone, which transmits it to your partner over the Internet in real time. Miniature linear actuators are used to reproduce these forces on your partner's lips, creating a realistic kissing sensation. Kissenger provides a two-way interaction just like in a real kiss. You can also feel your partner's kiss on your lips when they kiss you back. Man, I can't wait to use one of these in public. I am going to send everybody I know the most sensual, sloppiest kisses I can muster. "Um, is that guy licking his phone?" THIS IS HOW THE FRENCH DO IT. "Now he's putting it down his pants." Don't act like that's not why they made this in the first place. "This checkout line is taking forever." Listen -- I'll be with you just as soon as I finish ringing this gentleman up. Source
  6. I recently got a Huawei Y6 Pro phone (Android 5.1.1) and decided to root it but I couldn't root it. tried more than 10 rooting programs on Computer (Kingo Root, iroot, Vroot, one-click root, wondershare mobile manager, Root genius, framaroot etc etc.) using APK on phone (Kingo root, Vroot, iroot etc etc.) ALL of them failed to root this phone! TWRP doesn't support it as well, the device not listed on their support page. there is also no custom rom for it but that's not the case here since i just wanna root it not replace the rom. most of the error messages i got are: this device not supported, this device is not vulnerable to the exploits in this app etc. any thoughts?
  7. 50 Phone Wallpapers (all 1440x2560, no watermarks) DOWNLOAD : https://imgur.com/gallery/C3pQs
  8. In a major decision back in 2014, the Supreme Court finally ruled that police need a warrant to search someone’s cellphone when making an arrest. That case, Riley v. California, was a major privacy victory. Now, it's being interpreted by a federal court in Illinois to mean that even opening a phone to look at the screen qualifies as a “search” and requires a warrant. The Illinois case involves a sting operation that ensnared Demontae Bell, an alleged drug dealer accused of illegal possession of an AK-47 assault rifle. An officer testified that while interrogating Bell he pulled out a confiscated flip phone and opened it, revealing a picture of the rifle, which Bell had set as his home screen's wallpaper. That was then used as grounds for a warrant to search Bell's phone for metadata about when and where the photo was taken. The officer claimed he opened the phone in order to turn it off. But on Wednesday, the judge ruled police have no right to open a suspect's phone and look at the screen without first getting a warrant, even if it's just to turn it off, since the Riley case clearly established doing so is a “search” under the Fourth Amendment. “Officer Sinks' opening of Bell's cell phone exceeded a 'cursory inspection' because he exposed to view concealed portions of the object—i.e., the screen,” wrote Judge James E. Shahid. “Because Officer Sinks had to manipulate the phone to view the picture on the screen, that picture was by definition not in 'plain view'.” That suggests that even if your device isn't locked with a passcode, a cop wouldn't be allowed to turn on the screen and look for incriminating notifications or messages without a search warrant. The Supreme Court did say there are “exigent circumstances” for allowing warrantless searches, however, including imminent threats to officer safety (checking if there's a razor blade concealed in the phone's case, for example) and preventing destruction of evidence (preventing the phone from receiving a remote wiping command). “Yet neither the government's response, nor the warrant affidavit, asserted that the officer in this case opened Bell's cell phone out of concern for officer safety or preservation of evidence,” Judge Shahid wrote. Thus, “The search of Bell's cell phone violated the Fourth Amendment prohibition against unreasonable searches and seizures.” Nevertheless, the judge denied Bell's motion to suppress evidence from the illegal search, reasoning that based on other testimony given about Bell's illegal rifle, “the photo would have ultimately been discovered.” source
  9. DroidCamX Wireless Webcam Pro v6.3 Patched Requirements: Android 2.1 and up Overview: Use your phone as a webcam on your PC over WiFi, USB or Bluetooth. You can also use DroidCamX as an "IP/Surveillance Camera" via your Internet browser virtually on all networks. PC Client (and some setup) REQUIRED. Windows or Linux clients available. Follow in-app messages. It is recommended that you try the FREE version of Droidcam first to make sure everything works (PC client is same for both versions). DroidCamX features: - Chat using "DroidCam Webcam" on your computer (Skype/Yahoo/MSN/etc.) - Various video formats and resolutions - Audio support* ("DroidCam Microphone", experimental) - IP/Surveillance Camera via your Internet Browser (No computer client required, Will work on almost all networks/computers) - MJPEG feed accessible by other apps and programs - Turn on Camera Flash LED light, Zoom ** The latest versions of Skype (6.xx) may not detect DroidCam, please check the Help section at dev47apps.com. ** If the Market fails to download the app, log on to your Google Checkout/Wallet account, Cancel the order and try again. ** Some of the features are only available if your phone is running Android 2.2+ * Audio support is experimental: - Available on Windows XP - 7 only, as an optional install - 64-bit Windows will block the audio driver by default - Not available via Bluetooth - On Android 2.3 (Gingerbread) audio recording is delayed delivered in larger chunks, not allowing DroidCam to stream and play-back smoothly. This seems to be fixed as of Android 4.0. What's New v6.3 Bug fix: Hide action bar when dimming screen. Feature: Streaming is now done from a background service, and if supported by your device, you can put DroidCam into background and use other apps in parallel. Note that turning the screen off may still put Wifi to sleep and drop the connection. This feature introduces a new permission for the app. http://www.datafilehost.com/d/cac93b48
  10. Privacy advocates warn feds about surreptitious cross-device tracking 1939, back when ads used to be safe. Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including phones, TVs, tablets, and computers. The ultrasonic pitches are embedded into TV commercials or are played when a user encounters an ad displayed in a computer browser. While the sound can't be heard by the human ear, nearby tablets and smartphones can detect it. When they do, browser cookies can now pair a single user to multiple devices and keep track of what TV commercials the person sees, how long the person watches the ads, and whether the person acts on the ads by doing a Web search or buying a product. Cross-device tracking raises important privacy concerns, the Center for Democracy and Technology wrote in recently filed comments to the Federal Trade Commission. The FTC has scheduled a workshop on Monday to discuss the technology. Often, people use as many as five connected devices throughout a given day—a phone, computer, tablet, wearable health device, and an RFID-enabled access fob. Until now, there hasn't been an easy way to track activity on one and tie it to another. "As a person goes about her business, her activity on each device generates different data streams about her preferences and behavior that are siloed in these devices and services that mediate them," CDT officials wrote. "Cross-device tracking allows marketers to combine these streams by linking them to the same individual, enhancing the granularity of what they know about that person." The officials said that companies with names including SilverPush, Drawbridge, and Flurry are working on ways to pair a given user to specific devices. Adobe is developing similar technologies. Without a doubt, the most concerning of the companies the CDT mentioned is San Francisco-based SilverPush. CDT officials wrote: SilverPush's ultrasonic cross-device tracking was publicly reported as long ago as July 2014. More recently, the company received a new round of publicity when it obtained $1.25 million in venture capital. The CDT letter appears to be the first time the privacy-invading potential of the company's product has been discussed in detail. SilverPush officials didn't respond to e-mail seeking comment for this article. Cross-device tracking already in use The CDT letter went on to cite articles reporting that cross-device tracking has been put to use by more than a dozen marketing companies. The technology, which is typically not disclosed and can't be opted out of, makes it possible for marketers to assemble a shockingly detailed snapshot of the person being tracked. "For example, a company could see that a user searched for sexually transmitted disease (STD) symptoms on her personal computer, looked up directions to a Planned Parenthood on her phone, visits a pharmacy, then returned to her apartment," the letter stated. "While previously the various components of this journey would be scattered among several services, cross-device tracking allows companies to infer that the user received treatment for an STD. The combination of information across devices not only creates serious privacy concerns, but also allows for companies to make incorrect and possibly harmful assumptions about individuals." Use of ultrasonic sounds to track users has some resemblance to badBIOS, a piece of malware that a security researcher said used inaudible sounds to bridge air-gapped computers. No one has ever proven badBIOS exists, but the use of the high-frequency sounds to track users underscores the viability of the concept. Now that SilverPush and others are using the technology, it's probably inevitable that it will remain in use in some form. But right now, there are no easy ways for average people to know if they're being tracked by it and to opt out if they object. Federal officials should strongly consider changing that. News source
  11. Cortana can have your phone send a text reply via your PC Last week, we exclusively showcased a new feature in Windows 10 that allows Cortana to send SMS messages and showcase missed call alerts. Windows 10 desktop build 10565 includes an option to alert you when you miss a phone call, and now works seamlessly with Windows 10 Mobile build 10572. With the latest Windows 10 Mobile build (10572), you can now use Cortana to notify you on your PC if you missed a call on your phone. When you miss that call, you can easily reply with a text right from your PC — and Cortana will have your phone send that message! How cool is that? You can even open Cortana and say “text” along with the name of your contact. Cortana will then take your message and send it from your phone. You need Windows 10 Mobile build 10572 and Windows 10 desktop build 10565 (or higher) to utilize this new feature. Source
  12. The end of apps like Lumia Storyteller and Lumia Beamer is a 'streamlining' of those available Microsoft announced Friday that it will cease development of several apps Nokia developed for Windows Phone as the company streamlines the photo experience on Windows 10 Mobile. In a post to Microsoft's Lumia Conversations blog, Editor-in-Chief Tiina Jaatinen said that Lumia Storyteller, Lumia Beamer, Photobeamer and Lumia Refocus will have their online services shut down after October 30, and the apps will no longer be available. The Lumia Panorama and Video Uploader will continue to function, but Microsoft won't be updating those apps any more. All of the apps have been pulled from the Windows Store, but those people who already have them installed on their devices will be able to keep them. After Oct. 30, those apps that rely on online services to work will cease to function. It's bad news for people who rely on software like Lumia Beamer, which allows users to display a still from a phone's screen on another device, but it's not clear exactly how many people will be affected by the change. The post said that it's ceasing work on those apps to focus on the Photos and Camera apps for Windows 10 Mobile, the next version of the company's operating system for phones that's supposed to be released sometime this fall. According to Jaatinen, many of the features of these apps are already included in the Photos and Camera apps on Windows 10 Mobile, but not everything will be making the trip. Case in point: the Lumia Storyteller app, which uses information about when and where a photo was captured to create a video collage of images doesn't have an analog in the current system apps for Windows 10 Mobile. It's hard to say what will come of that app after the shutdown of its online service, which is used for sharing the videos with other people over the web. Some of the shutdowns make a degree of sense because of new functionality included in Windows 10 Mobile. One of the operating system's marquee features is Phone Continuum, which will allow users to mirror the contents of certain phones to external displays. It's a higher-fidelity experience than what Lumia Beamer currently offers, but will require a dock and new phone hardware in order to work. The culling of these apps is in line with Microsoft's mobile strategy of late. In July, the company announced that it was cutting 7,800 jobs, primarily in the mobile phone business that it acquired from Nokia. CEO Satya Nadella said at the time that the company would have a tighter focus on creating a smaller number of phones for particular markets, rather than producing a full line of handsets like it used to following the Nokia acquisition. Source
  13. Microsoft Lumia DENIM​ Update Last night I decided to do an update to my Lumia 630, to my surprise the long awaited DENIM Update was finally here in preparation for the Windows 10 Upgrade... Many details are covered at the link mentioned above but one which I am quite happy about is the fact that now on Windows Phones.. We have the ability to create a personal WiFi Hotspot. This interests me a great deal as I will no longer have to buy another SIM Card and pay a data plan for my tablet.. Owning the phone for the first few months made me quite jealous and perturbed at the fact that iPhone users had this capability right on the phone natively and yet Microsoft did not. Many attempts at ​connecting virtual Wifi Routers.. Proxy connections and fake apps which did not do as advertised later I gave up with no hope.. Now I am a happy Wind​ows Phone owner.
  14. Canadian teen shot to death after tracking down missing cell phone A Canadian teen was shot and killed Sunday morning after using a mobile-tracking app to find his cell phone, a June 16 article from CBC News reports. The app lead 18-year-old Brampton, Ontario native Jeremy Cook to a strip mall in London, Ontario, where he got into a confrontation with three men in a car. After Cook asked the men about his cell phone, they tried to drive away, police say. Cook then held onto the driver-side door of the moving car and shots were fired. Now, Ontario police are on a manhunt for three black males between the ages of 18 and 21 who are believed to be involved in the shooting. The car witnesses saw at the strip mall, a Mazda sedan, was found wrecked and abandoned near the crime scene. Police also recovered Cook’s phone and are reviewing surveillance footage from the mall’s parking lot. In light of this case, Ontario police are trying to warn smartphone users about the dangers of tracking down their missing cell phones. While they say a mobile-tracking app can be a useful tool, users must practice common sense and caution when searching for their lost devices. Cook’s desire to track down his cell stems from nearly unbreakable relationship with technology, analyst Sanjay Khanna told CBC. Not only are phones expensive to replace, but they can contain private personal data. Otherwise, they are generally the main way a person, especially an 18 year old, stays connected to the world at large. http://www.examiner.com/article/canadian-teen-jeremy-cook-shot-to-death-after-tracking-down-missing-cell-phone
  15. The iPhone, the Galaxy S6, and a few other high price smartphones have fingerprint sensors for extra security, and authorization of payments; but the tech is expensive, and therefore hasn’t reached mainstream, lower cost devices yet. A team of researchers at Yahoo Labs have developed Bodyprint, a biometric authentication system which uses your phone’s touchscreen as the scanner. Only it’s not for fingerprints, it’s for ears. Bodyprint uses the touchscreen’s capacitive sensor in place of a dedicated fingerprint sensor, and doesn’t need any additional hardware, or special sensors to work. This means it could be easily integrated into any phone with a capacitive screen — and that’s almost every phone sold today. Why can’t Bodyprint be used to scan fingerprints? This is the downside of using the screen — the image sensor just doesn’t have the resolution to capture enough detail to be used for fingerprint identification. The large area makes up for the loss in overall image quality, and in addition to recognizing ears, Bodyprint also looks at palm and finger grip position, a fist, and the phalanges of a hand. The team demonstrates Bodyprint using a Nexus 5 smartphone. In the accompanying video, holding the phone up to answer a call will activate Bodyprint, which will unlock and connect only if the ear print matches the phone’s owner. Additionally, a dual fist unlock procedure is shown for securing files — meaning secret documents can only be opened and viewed when both parties are present. How about accuracy? Over the course of 864 individual trials, Bodyprint returned a 99.5 percent precision rate, and a low 7.8 percent rejection rate for ear prints. Other body parts had a slightly higher rejection rate of 26.8 percent. The rejection rates will fall when the image resolution on capacitive sensors increases, and Bodyprint’s special algorithms can be tweaked to lower the rejection rate, but at the expense of precision — something which could be used for accessing less sensitive data. At the moment, Bodyprint is a research project, and not something ready to be integrated into our smartphones. However, it proves the potential is there for the future, and biometric scanning doesn’t have to be limited to the most expensive devices. http://www.digitaltrends.com/mobile/bodyprint-biometric-capacitive-screen-scanner-news/
  16. Turing Robotic Industries (TRI) has announced a new device called the Turing Phone that promises to provide end-to-end encryption and a more sustainable production process than a regular smartphone. Announced today, the device uses decentralized authentication to encrypt any communications and comes with its master public key and unique private key pre-installed with the phone. Additionally, if you’re communicating with another Turing Phone, the two devices can directly verify their idendity, side-stepping the need to route it via a Key Distribution Center. And what’s the end result of all this encryption and security? “A protected communications network that is entirely insulated from cyber-threats and privacy intrusions. Within this circle of trust, users can exchange sensitive data such as social security numbers or bank wiring instructions and know that the information will reach only the device intended,” the company says. In addition to the Turing UI, the device will run Android 5.0 as standard. Other key specs include a 5.5-inch full HD display, 13-megapixel rear-facing camera, an 8-megapixel selfie snapper and a 3,000mAh battery. As well as being robust in terms of security, the chassis of the device is also stronger than the average phone, according to the team. It’s made from a material called ‘Liquidmorphium’, which a spokesperson described as an “unbendable” metal that’s stronger than titanium or steel and more resistant to shock and screen breakages. Whether or not you think there’s a need for full end-to-end encryption could be up for debate, but given ongoing reports of governmental snooping and increasing requests for personal data, no one could call you paranoid for supporting the idea. Or perhaps you just want a device that stands out from the crowd that’s made out of Liquidmorpheum. A spokesperson said the SIM-free 64GB version of the handset should arrive with buyers before the end of August and costs around $740, while the 128GB model will cost about $870. ➤ Turing Robotic Industries thenextweb
  17. Apple is unstoppable. It is the most valuable company ever, selling record numbers of devices around the world. But for the first time, I’ve held a phone in my hands that I think should give Apple pause. And here’s the funny thing: You can’t even get it here. During a press event not long ago, where it introduced itself to US journalists, Chinese smartphone upstart Xiaomi gave away phones to the reporters in the crowd. Yes, the company’s flagship handset, the Mi Note, has been out for a few weeks. But holding one still felt like a big deal. When the phones went on sale in China last month, they reportedly sold out in three minutes. Here in the US, you can’t get a Mi Note or any other Xiaomi phone at all. I’m an Apple user, though not out of any great devotion to the company. I use Apple stuff because it works for me. It does everything I need, when I need it, without the slightest trouble. But after a few weeks of playing with the Mi Note, I could easily ditch my iPhone for one. Not because it’s a big revelation, or anything radically different. Quite the opposite: I could switch because it doesn’t feel that different. And at half the price of a comparable iPhone, that similarity makes all the difference. A Phone for the Rest of the World This isn’t a review, because I’m not a gadget geek. Which is the point. I’m like most people with an iPhone. I like things that work, that make my life better, and when I find something that does both, I stick with it. As such, I’d argue that converting me is a bigger deal than getting some hardcore Apple partisan to switch. Presidential candidates don’t try to sway the other party’s base; it’s the swing voters who make all the difference. And like mushy moderates, my tech preferences are based more on the experience than the specs. Of course, my preferences don’t matter in this brewing rivalry, at least not yet, since Xiaomi doesn’t sell its phones in the US. But even as Apple reported its best quarter yet in “greater China,” Xiaomi became China’s bestselling smartphone maker. And if Xiaomi can, in theory, anyway, get me on an Android phone, then it’s not so surprising that a larger share of the surging Chinese smartphone market—more than 420 million units shipped in 2014—is opting for Xiaomi instead of Apple. I could switch because it doesn’t feel that different. And at half the price of an iPhone, that similarity makes all the difference. Xiaomi’s answer to the iPhone 6 Plus feels very much like its rival. Its screen is a bit bigger. It’s a bit thinner, too, and weighs nearly a half-ounce less. The Mi Note’s screen is comparably gorgeous at an identical 1080p. It has a higher-resolution camera that takes beautiful pictures, and a slightly bigger battery. I was able to get all my favorite apps from Google Play. The hardware and software are smooth, snappy, and, above all, elegant, an advantage Apple has long had over most of its Android rivals. And all this for $370 without a contract. I will say I missed Touch ID, but that’s exactly the kind of picayune feature geekery that will have little influence on which company dominates the market in China and India. Xiaomi sells its phones for so little because it’s decided it’s not a hardware company; instead, it likes to say it’s an Internet company, a maker of online services onto which the phones merely serve as windows. Because I was using the Mi Note in the US, I wasn’t able to do much with MiUI, the online platform that Xiaomi has leveraged to capture 100 million users so far. But again, I’m not the one who matters to Xiaomi anyway. American consumers like myself look at MiUI and say, “that looks like iOS or Google or Amazon.” But for Chinese consumers, MiUI isn’t something that was designed for the US market and adapted to suit China. Xiaomi clearly has looked at the US market and said, “Apple’s got that locked down. Let’s build a phone for the rest of the world.” And the world has responded. Future Fans One more thing. The Mi Note is the first thing ever that has made my kid forget about the iPad. For anyone without children under 10, the iPad is to that age group as raw meat to a lion: Try to take it away and you might get bitten. That all changed when the Mi Note came home. When I finally thought to ask today, no one could even say where the iPad was, because I realized we had always relied on the kid to keep track. His quick adoption of what he calls “the Chinese phone” speaks to the ease of transition from iOS onto Xiaomi’s take on Android. It also speaks to what should be Apple’s other great cause for concern. Yes, Xiaomi could fizzle out as quickly as it flared up if its gamble on internet services doesn’t make up for the money it’s not making selling handsets for so little. But if its business model works, it could well have landed in the US by the time my kid reaches the age where he is starting to buy his own devices. For his generation, Xiaomi could be as viable a choice as Apple. Ironically, my experience with the Mi Note probably means one more sale for Apple. I still have a puny iPhone 5S, but I’ve become a big-screen convert thanks to the Mi Note. Because I can’t get one here, I’ll probably end up getting a 6 Plus. http://www.wired.com/2015/02/xiaomis-great-new-phone-lot-like-iphone-apple-take-note/
  18. IDC has released its latest numbers for smartphone OS market share, and unfortunately, it means we can likely close the book on Windows Phone. Windows Phone has a tech journalist problem. A lot of tech journalists, myself included, like Windows Phone. It’s stylish and attractive, and its UI makes sense — at least at the top level, and in a way Windows 8 never did on the desktop. But the way tech journalists get excited about an OS is to have a flagship device, and we haven’t had a really good one since the Nokia Lumia Icon, which Verizon never marketed, and the Lumia 1020 and HTC 8X before it. Microsoft has countered that Windows Phone is the phone for everyone, and as a result, we’ve seen nothing but low-end to midrange devices here in the US like the Lumia 830, and low-end phones in other countries. That strategy hasn’t worked either, though. The way consumers get excited about a phone is to be able to buy it, in stores, with employees that care about selling them, and with tons of apps people want to run that their friends are already running. Microsoft has had the opposite of that experience. IDC’s latest research data is disturbing if you’re a Microsoft fan. Essentially, almost the entire world market (96.3 percent) is stabilizing around Android and iOS. While global shipments of Windows Phones increased 4.2 percent, from 33.5 to 34.9 million units, its market share actually fell back down below three percent, which is a horrible sign. (BlackBerry has completely flatlined, but we knew that already, and the company itself is clearly repositioning for the enterprise market.) I’ve owned, used, and written both positive and critical columns about Windows Mobile devices for years. I’ve been a pretty strong proponent of Windows Phone since its inception, because it was both so beautiful and streamlined compared with what came before, and because it was fundamentally different, yet equally as useful and valid as the way iOS and Android are designed. Up until now, Windows Phone has struggled, because only its owners love it. Not developers, not wireless carriers, and not the device manufacturers necessary to create a robust ecosystem around it. When popular apps finally appeared, they’re crippled compared with the Android and iOS versions. Microsoft never had a good browser or even a real version of Office for far too long with Windows Phone. And for some reason, Microsoft never figured out how to leverage the awesome Xbox 360 to create some kind of killer mobile gaming experience. Some people are still bullish that the new Windows Phone 10 will change things. It’s finally going to realize the “one state, multiple devices” paradigm. It’s Microsoft’s first shot at branding a new series of devices on its own, instead of with Nokia’s name on them. And the OS certainly looks good on its own, if still way unfinished. I love the new notification bar, and the new photo app and OneDrive integration look great. (I’m not big on voice activation, so I’ll leave the Cortana analysis to others; I never use Google Now or Siri, either.) But if Microsoft is targeting a fall release — and that looks highly optimistic, given that the company will still have to build phones and then get them approved on U.S. carriers — the outlook for Microsoft is dim. They have tremendous cash reserves, so this isn’t about Microsoft going out of business or anything sensationalist like that. The desktop is going nowhere, and Windows 10 could be a smash success like Windows 7 was, from what I’m seeing. I can’t wait to build a new PC running Windows 10 when the opportunity arrives. (I had less kind things to say about Windows 8.1.) But Windows Phone 10 is a different, and much sadder story. http://www.extremetech.com/mobile/199817-windows-phone-10-is-dead-before-it-even-arrives
  19. Smartphone users might balk at letting a random app like Candy Crush or Shazam track their every move via GPS. But researchers have found that Android phones reveal information about your location to every app on your device through a different, unlikely data leak: the phone’s power consumption. Researchers at Stanford University and Israel’s defense research group Rafael have created a technique they call PowerSpy, which they say can gather information about an Android phone’s geolocation merely by tracking its power use over time. That data, unlike GPS or Wi-Fi location tracking, is freely available to any installed app without a requirement to ask the user’s permission. That means it could represent a new method of stealthily determining a user’s movements with as much as 90 percent accuracy—though for now the method only really works when trying to differentiate between a certain number of pre-measured routes. Spies might trick a surveillance target into downloading a specific app that uses the PowerSpy technique, or less malicious app makers could use its location tracking for advertising purposes, says Yan Michalevski, one of the Stanford researchers. “You could install an application like Angry Birds that communicates over the network but doesn’t ask for any location permissions,” says Michalevski. “It gathers information and sends it back to me to track you in real time, to understand what routes you’ve taken when you drove your car or to know exactly where you are on the route. And it does it all just by reading power consumption.” PowerSpy takes advantage of the fact that a phone’s cellular transmissions use more power to reach a given cell tower the farther it travels from that tower, or when obstacles like buildings or mountains block its signal. That correlation between battery use and variables like environmental conditions and cell tower distance is strong enough that momentary power drains like a phone conversation or the use of another power-hungry app can be filtered out, Michalevsky says. One of the machine-learning tricks the researchers used to detect that “noise” is a focus on longer-term trends in the phone’s power use rather than those than last just a few seconds or minutes. “A sufficiently long power measurement (several minutes) enables the learning algorithm to ‘see’ through the noise,” the researchers write. “We show that measuring the phone’s aggregate power consumption over time completely reveals the phone’s location and movement.” Even so, PowerSpy has a major limitation: It requires that the snooper pre-measure how a phone’s power use behaves as it travels along defined routes. This means you can’t snoop on a place you or a cohort has never been, as you need to have actually walked or driven along the route your subject’s phone takes in order to draw any location conclusions. The Stanford and Israeli researchers collected power data from phones as they drove around California’s Bay Area and the Israeli city of Haifa. Then they compared their dataset with the power consumption of an LG Nexus 4 handset as it repeatedly traveled through one of those routes, using a different, unknown choice of route with each test. They found that among seven possible routes, they could identify the correct one with 90 percent accuracy. “If you take the same ride a couple of times, you’ll see a very clear signal profile and power profile,” says Michalevsky. “We show that those similarities are enough to recognize among several possible routes that you’re taking this route or that one, that you drove from Uptown to Downtown, for instance, and not from Uptown to Queens.” Michalevsky says the group hopes to improve its analysis to apply that same level of accuracy to tracking phones through many more possible paths and with a variety of phones—they already believe that a Nexus 5 would work just as well, for instance. The researchers also are working on detecting more precisely where in a known route a phone is at any given time. Currently the precision of that measurement varies from a few meters to hundreds of meters depending upon how long the phone has been traveling. The researchers have attempted to detect phones’ locations even as they travel routes the snooper has never fully seen before. That extra feat is accomplished by piecing together their measurements of small portions of the routes whose power profiles have already been pre-measured. For a phone with just a few apps like Gmail, a corporate email inbox, and Google Calendar, the researchers were able determine a device’s exact path about two out of three times. For phones with half a dozen additional apps that suck power unpredictably and add noise to the measurements, they could determine a portion of the path about 60 percent of the time, and the exact path just 20 percent of the time. Even with its relative imprecision and the need for earlier measurements of power use along possible routes, Michalevsky argues that PowerSpy represents a privacy problem that Google hasn’t fully considered. Android makes power consumption data available to all apps for the purpose of debugging. But that means the data easily could have been restricted to developers, nixing any chance for it to become a backdoor method of pinpointing a user’s position. Google didn’t respond to WIRED’s request for comment. This isn’t the first time that Michalevsky and his colleagues have used unexpected phone components to determine a user’s sensitive information. Last year the same researchers’ group, led by renowned cryptographer Dan Boneh, found that they could exploit the gyroscopes in a phone as crude microphones. That “gyrophone” trick was able to to pick up digits spoken aloud into the phone, or even to determine the speaker’s gender. “Whenever you grant anyone access to sensors on a device, you’re going to have unintended consequences,” Stanford professor Boneh told WIRED in August when that research was unveiled. Stanford’s Michalevsky says that PowerSpy is another reminder of the danger of giving untrusted apps access to a sensor that picks up more information than it’s meant to. “We can abuse attack surfaces in unexpected ways,” he says, “to leak information in ways that it’s not supposed to leak.” Read the full PowerSpy paper below. https://www.scribd.com/doc/256304846/PowerSpy-Location-Tracking-using-Mobile-Device-Power-Analysis http://www.wired.com/2015/02/powerspy-phone-tracking/
  20. Robert Hannigan's mobile number was given out by a member of staff at GCHQ in an earlier high-security breachDavid Cameron chatted to a hoax caller who was posing as GCHQ spy chief Robert Hannigan. And Mr Hannigan’s mobile number was given out by a member of staff at the Cheltenham eavesdropping centre in an earlier high-security breach. Protection procedures for the Prime Minister and GCHQ were both under review last night. Mr Cameron ended the call as soon as it became clear it was a crank. No sensitive information was disclosed, according to a government official. A Government spokeswoman said: "Following two hoax calls to Government departments today, a notice has gone out to all departments to be on the alert for such calls. "In the first instance, a call was made to GCHQ which resulted in the disclosure of a mobile phone number for the director. "The mobile number provided is never used for calls involving classified information. "In the second instance, a hoax caller claiming to be the GCHQ director was connected to the Prime Minister. "The Prime Minister ended the call when it became clear it was a hoax. "In neither instance was sensitive information disclosed. "Both GCHQ and Number 10 take security seriously and both are currently reviewing procedures following these hoax calls to ensure that the Government learns any lessons from this incident." The number given out was not a high-security line. The PM received the call on an official mobile but the conversation was “quite brief”. It was reported the hoaxer was a man in his 20s who claimed to be drunk and high on cocaine and cannabis when he carried out the prank. He claimed he also called Mr Hannigan claiming to be an ITN journalist who quickly ended the call. It is thought the caller got the spy boss's Blackberry number by calling the GCHQ switchboard in the early hours yesterday pretending to be a Downing Street aide. The alleged hoaxer said: “I’ve just made complete monkeys out of GCHQ. I’ve got the mobile number of the director. “What’s more, I am off my face on booze and cocaine. I had some spliffs too. “I’ve been up all night. I’m utterly wasted. Hilarious.” Source And More News Here David Cameron hoax caller 'drunk and high on cocaine
  21. Rice University researcher: "It's this insatiable desire for (smartphone) memory that's driving all this." (CNN) - A big selling point of smartphones is their ability to hold much of your data -- photos, videos, your entire music library -- on a little device. But over the years, their storage capabilities, usually no more than 64 GB, haven't kept pace with all the movies, games, apps and other memory-hogging minutiae of modern digital life. Many people keep stuff in the cloud, but that requires Wi-Fi access. It's frustrating to have to delete music or videos every time you want to store something new on your phone. But thanks to some advances in memory design and construction, we may be about to expand our devices in a big way. At Rice University, a team led by chemist James Tour has developed a breakthrough in RRAM (resistive random-access memory) technology. Their RRAM uses silicon oxide, one of the most studied and abundant substances on Earth, the stuff of sand and glass. "Because it's this amazing material, the industry understands it," Tour said, noting that the key to the scalability of the design is industrial availability. Indeed, Rice's RRAM can be manufactured at room temperature and relatively lower voltages compared with other versions. RRAM is the next step for an industry that's finding the limits to flash memory. Like flash, RRAM doesn't need continuous power. But it's also much faster, since it can be built into more versatile arrays and stacked into bigger pieces. "You've got to get into the third dimension to pack up enough density in the memory" in order to keep the capabilities growing, Tour said. Flash memory has kept up with Moore's Law -- the ever-increasing power of microchips -- by giving more functionality to the devices on the chips, he says. But RRAM does a better and more efficient job. "It's this insatiable desire for memory that's driving all this," he said. Tour's team is one of many working on the problem, though he believes his approach has an edge because of its use of silicon oxide instead of more exotic materials. Licensing is under way, he says, and prototypes will be further test the concept's viability. But if everything pans out, phones with a terabyte of memory -- that's 1,000 GB, enough to hold hundreds of feature-length movies -- are just the beginning, Tour says. "Because silicon oxide is glass and it's transparent, we've built these on glass, we've built this on top of plastic, so it can even be part of the coating you're looking at through the screen," he said. Tour believes it'll be a world like that portrayed in the movie "Minority Report," with flexible, rollable digital "newspapers" and writable smart windows. Talk about expandable. Source: CNN.com
  22. By Jonathan Amos Science correspondent, BBC News, Darmstadt 20 January 2014 Last updated at 18:19 GMT Delight in the control room as Rosetta sends back a signal confirming it is "awake" Rosetta, Europe's comet-chasing spacecraft, has woken from its slumber. A signal confirming its alert status was received by controllers in Darmstadt, Germany, at 18:17 GMT. Rosetta has spent the past 31 months in hibernation to conserve power as it arced beyond the orbit of Jupiter on a path that should take it to Comet 67P/Churyumov-Gerasimenko in August. Engineers will now finesse the probe's trajectory and prepare its instruments for the daring encounter. One of the highlights of the mission will be the attempt to put a small robotic lander, Philae, on the surface of the 4.5km-wide comet. This will occur in November. There were nail-biting moments in the Darmstadt control room as scientists waited for the signal to come through. Three quarters of the way through the hour-long window of opportunity, they got what they were waiting for. Gerhard Schwehm, mission manager for Rosetta, said: "After 31 months in hibernation, what is 45 minutes to wait?" Andrea Accomazzo, the spacecraft operations manager, said: "I think it was the longest hour of my life, but also one of the most rewarding." Monday's message, when it arrived, was a simple one - just a spike on the screens here at the European Space Agency's operations centre. It was picked up in California by a 70m dish belonging to the US space agency, and then routed to Germany. The signal contained no spacecraft telemetry, but its mere receipt from 800 million km away confirmed to controllers that Rosetta's automated systems were operating as expected. In the coming hours and days, the Darmstadt team will talk to Rosetta to establish the full status of its systems. It will be a slow process. The huge distances between the probe and Earth mean telecommands have a one-way travel time of 45 minutes. Rosetta was put into hibernation in June 2011 because its trajectory through the Solar System was about to take it so far from the Sun that its solar panels would harvest minimal energy. The decision was therefore taken to put the spacecraft in a deep sleep. Now that it is arcing back towards the Sun, more power is becoming available to operate the probe. "From now until mid-March, we have planned virtually no activities on the spacecraft. We can afford to run only some basic check-outs," explained Andrea Accomazzo. "But from mid-March to the end of April, we will be switching on the instruments one by one. We'll check them out and in a few cases even update their software." From May, Rosetta will begin firing its thrusters to begin zeroing in on Comet 67P. Today, the separation is nine million km away. By mid-September, it will have been reduced to just 10km. Launched back in 2004, Rosetta has taken a rather circuitous route out to its target. This has involved making a number of flybys of the inner planets, using their gravity to pick up sufficient speed for the eventual encounter. It has already delivered some fascinating science, particularly from the close passes it made to two asteroids - the rocks Steins, in 2008, and Lutetia, in 2010. The plan is for Rosetta to escort the comet as it moves closer towards the Sun, monitoring the changes that take place on the body. The Philae lander will report changes that occur at the surface. Control room The simple signal tells the European Space Agency that the great endeavour remains on course Comets - giant "dirty snowballs", as some have called them - are believed to contain materials that have remained largely unchanged since the formation of the Solar System 4.6bn years ago. Rosetta's data should act therefore as a kind of time machine, to enable researchers to study how our local space environment has changed over time. "We will sample the physical and chemical composition of the comet," said Matt Taylor, Esa's Rosetta project scientist. "This will give us knowledge on how and where the comet was formed, and about its subsequent journey through the evolution of the Solar System. "We can connect that as well to the formation of the planets themselves. And, in addition, the elemental make-up of the comet can be considered 'star stuff' - it will provide us knowledge of the formation processes with the Sun itself." Rosetta is being billed as the big space event of 2014, and it is clear from the general and social media reaction to Monday's wake-up that interest in the mission is considerable. "Science in general catches the public's imagination," said Thomas Reiter, Esa's director of human spaceflight and operations. "In general, we try to find answers to fundamental questions, such as where do we come from, what will be our destiny and will we have to stick to this planet? "The knowledge we get from missions like Rosetta - which is now moving into a very interesting stage - gets us closer to answering those types of questions." http://www.bbc.co.uk/news/science-environment-25814454 http://www.esa.int/Our_Activities/Space_Science/Rosetta/ESA_s_sleeping_beauty_wakes_up_from_deep_space_hibernation
  23. Anonymous is testing Airchat, a free communications tool for the world that uses only radio waves Lulz Labs Online hacktivist collective Anonymous has announced that it is working on a new tool called Airchat which could allow people to communicate without the need for a phone or an internet connection - using radio waves instead. Anonymous, the amorphous group best known for attacking high profile targets like Sony and the CIA in recent years, said on the Lulz Labs project's Github page: "Airchat is a free communication tool [that] doesn't need internet infrastructure [or] a cell phone network. Instead it relies on any available radio link or device capable of transmitting audio." The idea is that people all over the world, including those in rural areas and developing countries, will one day be able to communicate for free without the need for a mobile phone network, phone line or internet access. While the project is workable at the moment, it is simply a proof of concept at this stage and Anonymous has revealed Airchat in the hope to get more people involved in developing the technology as well as raising funds. Interactive chess Despite the Airchat system being highly involved and too complex for most people in its current form, Anonymous says it has so far used it to play interactive chess games with people at 180 miles away; share pictures and even established encrypted low bandwidth digital voice chats. In order to get Airchat to work, you will need to have a handheld radio transceiver, a laptop running either Windows, Mac OS X or Linux, and be able to install and run several pieces of complex software. Anonymous says that a cheap radio transmitter costs as little as $40 (£23.80) meaning the system should be affordable to most people or communities. However because the system isn't working with a specific make or model of transmitter, connecting them to your laptop is a little tricky as there is no standard connector on these devices. Decode "Almost every single home in this world has a common AM and/or FM radio. In cases where not everyone is able to get [a] cheap radio transceiver, [they can] at least be able to decode packets being transmitted via a pirate FM station" Anonymous said. Video The video above shows the Airchat tool in use, evening managing to pull up Twitter search results for the keyword "Ukraine". While it is clearly not as fast and graphically rich as a standard internet browser, for someone looking to get crucial information fast, it could prove a vital tool. Anonymous says that Airchat has numerous use cases other than preventing government agencies like the NSA from spying on citizens, ranging from people living in countries where the internet has been shut down or censored, such as Twitter being banned in Turkey or the telecommunications network being shut down in Crimea by Russian forces. NGOs and medical teams working in Africa or disaster zones who need to coordinate aid efforts or explorers at expedition basecamps who want to communicate from rural areas or with rescue teams would also find the solution useful. Connecting the world This is not the first time that Anonymous has tried to create free communications to connect the world. Since the Arab Springs began in 2010, Anonymous has opened up communication channels in countries when they have been closed, creating internet access points and producing "care packages" that include information about everything from first aid to how to access dial-up internet, for example, in Syria in 2012. The hacktivist collective has also worked together with the dissident group Telecomix to help activists access banned websites in Bahrain, Egypt, Libya, Jordan, and Zimbabwe. Source
  24. Seed Phone offers a unique way to converge multiple devices using a single smartphone A computer engineering student from the University of Cape Town has come up with a unique way to transform a smartphone into anything from a laptop to a games console. In an effort to eliminate the disjointed experience of using multiple devices across different platforms, Nick Rout developed Seed - a range of laptop, tablet, TV and console hub prototypes capable of converging around a single smartphone. "While our devices are individually really capable, using them together is quite disjointed," Rout tells IBTimes UK. "These devices all have different operating systems. An app might work on one and not another, your files are often scattered across them in an unorganised fashion and settings/preferences differ from device to device." A multi-faceted approach Having previously relied upon an ad hoc solution of cloud services and portable storage, Rout decided to transform his current smartphone - a Google Nexus 4 - into a range of devices that he designed. A 3D render of the Seed concept. A 3D Prited prototype of the Seed Phone. The Seed Phone magnetically docked into the Tablet. The Seed Phone docked into the laptop prototype. The Seed Phone docked in the TV/ games console hub. Inserting the cylindrical magnets into the Nexus 4 case. In developing prototypes that locally synchronised all of a user's data into one multipurpose device, Rout also sought to overcome a number of other tech-related problems that modern devices encounter. The ones he identified with the most included poor battery performance, the high cost of owning a whole set of devices and the ever-growing concern of data security. For it to work, Rout needs an operating system that can handle convergent user-interface switching. Fortunately, the Ubuntu OS will be offering this exact functionality in the very near future. "This multi-faceted approach aims to unify the disparate user experience one encounters when hopping from mobile to desktop to tablet and back again," writes Joey-Elijah Sneddon, editor of OMGUbuntu. The success of Seed will therefore likely depend heavily on the success of this new operating system, unless a significant contender - like Apple or Microsoft - moves into the space. Growing the idea The cost of development has so far come straight out of the student's own pocket but Rout is currently in talks with a number of potential investors. A crowd-funding campaign is also expected in the near future. "My hope is that it would reach consumers within six months to a year of development," Rout says. While products like the Motorola Atrix and the Asus Padfone have previously experimented with portions of what Seed would offer, none has yet achieved widespread commercial success. Could Seed be any different? Rout seems to think so. "The devices only offered convergence between two form factors and the docks they created were too expensive. Seed aims to change all of this." Source
  25. I've been thinking, with all the revelations coming out about the NSA spying on all of us, maybe we've been going about reacting the wrong way. I mean, we all seem to fall somewhere on the spectrum of being upset about this, from the more mildly uncomfortable but resigning folks that are okay with the spying to those more militant about privacy. What if we're all just pissed that we aren't the ones getting to do all this sweet, sweet surveillance on everyone we know. Well, that's all changed, thanks to the makers of the mSpy software, which allows you to gift smart phones preinstalled with their software to those you care about most and then play NSA on them to your heart's content. Starting today, the company is also selling phones preloaded with the software, making it simple for users without any tech savvy to start surveillance right out of the box. The phone package is available with the HTC One, Nexus 5, Samsung Galaxy S4 and iPhone 5s, at varying cost; for example, the Samsung Galaxy S4 costs $300; the subscription for the preloaded software costs another $199 for a year. [From the moment the software is installed], the phone records everything that happens on the device and sends the details to a remote website. Every call is recorded, every keystroke logged, every email seen, every SMS chat or photograph monitored. Count me as someone who is suddenly even more glad than ever that I'm out of the dating world. On the other hand, I suppose it'll be weird for any of us married folks to get smart phones as gifts from now on as well. Oh well, down the surveillance hatch, I say! The NSA spies on us, we spy on each other, and the important thing to remember is that the makers of this software, which advertises to buyers that their targets "won't find out", are the most innocent of innocents here. The phone's proclaimed target markets are employers and parents who have the legal authority to watch what their children do on their smart phones. Company founder Andrei Shimanovich knows others may use his products in illegal ways, but says it is not his responsibility. "It is the same question with the gun producer," says Shimanovich, a Belarus native who recently moved to New York. "If you go out and buy a gun and go shoot someone, no one will go after the gun producer. People who shoot someone will be responsible for this. Same thing for mSpy. We just provide the services which can solve certain tasks regarding parents and teenagers." And creepy bastards, estranged lovers, stalkers, or anyone else who might be able to surreptitiously sneak this software onto the phones of whomever they're targeting. While it's completely true that we ought not blame the tool-maker for the way the tool is used, that doesn't discount the level of creepy in this software. Gone, apparently, are the days when parents raised their children to be responsible and then loosed them on the world to make a few mistakes and grow up better because of it. Gone are the days when employers made it a point to hire staff that they trusted. The NSA has paved the way for a whole new level of Orwellian acceptance, where the only difference between government surveillance and that we do ourselves is that our personal spying might actually be effective, since it will be more targeted. Prepare yourselves, people, for when the news media first gets hold of some stalker who commits a violent act and is found to have employed this software, because the backlash against it is going to be insane Source