Start up: Google+ dies, fingerprint better, being watch-y, it’s the robots!, Yahoo’s odd numbers, and more


How best to read it? Photo by kevin dooley on Flickr.

A selection of 10 links for you. Free! Like beer! Except not liquid! I’m charlesarthur on Twitter. Observations and links welcome.

Google, proving it still hasn’t figured out social, will strip Google+ for parts » Quartz

Mike Murphy:

Google+ is a social graveyard. It’s reported to have more than 2 billion profiles, but fewer than 6 million active users. While Google isn’t yet admitting defeat, it will be carving out the most popular parts of Google+ into separate services—as sure a sign as any that the comprehensive approach to social media isn’t working out.

Bradley Horowitz, a seven-year veteran of Google products, including Google+, announced on the social network this morning that he will be heading up two new products, “Photos” and “Streams.” He didn’t mention Google+ by name, but at Mobile World Congress in Barcelona earlier today, Android head Sundar Pichai put Horowitz’s announcement in context:

For us, Google+ was always two things, a stream and a social layer. The stream has a passionate community of users, but the second goal was larger for us. We’re at a point where things like photos and communications are very important, we’re reorganizing around that. Hangouts will still exist.

Google’s list of failed social networks is amazing. Orkut; Buzz; and now this. It’s been quite the year for giving up: Glass and now this.

Spam uses default passwords to hack routers » Krebs on Security

Brian Krebs:

In case you needed yet another reason to change the default username and password on your wired or wireless Internet router: Phishers are sending out links that, when clicked, quietly alter the settings on vulnerable routers to harvest online banking credentials and other sensitive data from victims.


John Lanchester reviews ‘The Second Machine Age’ by Erik Brynjolfsson and Andrew McAfee and ‘Average Is Over’ by Tyler Cowen » London Review of Books

One should always read anything Lanchester writes:

This has been a joke or riff for so long – such and such ‘reads like it was written by a computer’ – that it’s difficult to get one’s head around the fact that computer-generated news has become a reality. A company called Automated Insights owns the software which wrote that AP story. Automated Insights specialises in generating automatic reports on company earnings: it takes the raw data and turns them into a news piece. The prose is not Updikean, but it’s better than E.L. James, and it gets the job done, since that job is very narrowly defined: to tell readers what Apple’s results are. The thing is, though, that quite a few traditionally white-collar jobs are in essence just as mechanical and formulaic as writing a news story about a company earnings report. We are used to the thought that the kind of work done by assembly-line workers in a factory will be automated. We’re less used to the thought that the kinds of work done by clerks, or lawyers, or financial analysts, or journalists, or librarians, can be automated.


AVG Android App Performance Report Q4 2014 » Slideshare

Fascinating insight into what’s going on inside Android phones. And all enabled through an antivirus app.


Ways to think about market size » Benedict Evans

What happens when you’re trying to estimate the size of a market for a completely new product?

The same problem [of estimating the potential size of the market] applied to mobile phones. [In their early days] You could do a bottom-up analysis that counted business travellers, taxi-drivers, fleet dispatch and so on, and get to maybe 10-15% of the population. Lots of people did that in the 1990s. They were all wrong. For phones, as for PCs, you had to make an imaginative leap into the unknown. You had to say ‘I believe’ that this experience will be transformative, and everyone on earth who has the money will get one. Moore’s Law takes care of ‘having the money’ meaning 4-5bn people, but it’s the imagination that gets you to teenage girls living in text messages. You could predict that phones might get really cheap, but not what that might mean.

In that light it’s worth comparing these two mobile phone ads from the early days of the industry in the UK. The first, perfectly rationally,  starts from the mentality ‘how many people will need this?’ This is the ’10-15%’ argument. The second, from Orange, assumes that everyone will want one and it’s our job to get it to them, because we’re changing the world. Phones don’t have specific use cases – they’re a universal product. Hence, the CEO at the time, Hans Snook, went around saying that the UK would go to 150% penetration and most people thought he was mad (note that the Cellnet ad was made two years later).

The ads are priceless.


gotofail and a defence of purists » Lockstep

Remember the “gotofail” bug in Apple’s iOS 7? Stephen Wilson wrote this at the time, considering his history writing software for implantable defibrillators:

I want to suggest that all software is tragically fragile. It takes just one line of silly code to bring security to its knees. The sheer non-linearity of software – the ability for one line of software anywhere in a hundred million lines to have unbounded impact on the rest of the system – is what separates development from conventional engineering practice. Software doesn’t obey the laws of physics. No non-trivial software can ever be fully tested, and we have gone too far for the software we live with to be comprehensively proof read. We have yet to build the sorts of software tools and best practice and habits that would merit the title “engineering”.

I’d like to close with a philosophical musing that might have appealed to my old mentors at Telectronics. Post-modernists today can rejoice that the real world has come to pivot precariously on pure text. It is weird and wonderful that technicians are arguing about the layout of source code – as if they are poetry critics.

We have come to depend daily on great obscure texts, drafted not by people we can truthfully call “engineers” but by a largely anarchic community we would be better off calling playwrights.


Fingerprint sensor revealed by Qualcomm at MWC » BBC News –

Qualcomm said that its sensor works by using sound waves to penetrate the outer layers of the user’s finger.

The information gathered is then used to create a surface map of the person’s skin including the ridges of their fingerprints and sweat pores.

By contrast, Apple and others use capacitive sensors – which make use of the human body’s electrical properties – to take high-resolution scans of sub-epidermal skin below the outer layer of a user’s finger.

Qualcomm suggests its method is superior because it scans through both contaminants and smartphone covers.

“Snapdragon Sense ID 3D Fingerprint Technology’s unique use of ultrasonic technology revolutionises biometrics from 2D to 3D, allowing for greater accuracy, privacy and stronger authentication,” said Raj Talluri, a Qualcomm executive.

One security expert agreed there were merits to the approach.

“The Qualcomm offering is a good idea, as it appears to deal with some of the issues around ‘lifting’ of prints from other surfaces,” said Ken Munro from Pen Test Partners.


Yahoo’s incredible shrinking profitability in its core business » Forbes

Eric Jackson, in a long and deep dive into Yahoo’s numbers:

Yahoo’s actual EBITDA which it’s getting from search and advertising related to their core properties is actually far below this estimated $1.1 billion. Over the years – and this started before Mayer arrived on the scene but has accelerated under her watch in the last 2 years especially – Yahoo has struck deals with partners to help get temporary high-margin revenue which it has been including in its adjusted EBITDA numbers even these are coming from effectively one-time or at least temporary gains.

Most people, when judging the health of a business and its future profitability potential, try to strip out any temporary gains or revenue streams which are not going to around for the long-haul.  Then, they can really see how profitable the core business is and judge it on those merits.

In the case of Yahoo, over the years, it has struck a number of IP-related sales with Alibaba and Yahoo Japan which it has been recognizing as high margin adjusted EBITDA over time to supplement the EBITDA it’s getting from its core business. If you actually removed these gains away from that adjusted EBITDA, the profitability of the core business is far less. And if you took out the stock-based compensation expenses on top of that, there’s virtually no EBITDA left.


Android, the anti-productivity OS » Hal’s (Im)Perfect Vision

Hal Berenson is giving up and going back to Windows Phone:

Android just never worked for me. Want me to say something good about it?  It has the apps. If they actually work on your device. I admit I’m sorry I went for the LG G3 over a Samsung Galaxy S5 for three reasons. One is that the S5 has fewer app compatibility issues owing to its popularity (aka, the G3 suffers from Android’s fragmentation problem). Another is that the G3 has been unreliable, requiring pulling the battery about every other week to deal with a system hang. But mostly because if used with a non-LG charger the G3 will beep every minute once it is 100% charged.  This is not good for sleep. There is no reliable way to eliminate this beeping, except perhaps by rooting the device. That is BS.

My biggest issue with Android itself is how poorly it supports the Microsoft ecosystems, both the business (i.e., Exchange) and consumer (i.e., outlook.com) based ecosystems.

Berenson used to work at Microsoft; now he’s at Amazon.


The most hated design trend is back » FastCo.Design

John Brownlee on how smartwatches are trying to be “watch-y”, with good reason:

this new wave of skeuomorphism isn’t just limited to their digital interfaces. The industrial design of smartwatches themselves are inherently skeuomorphic. After all, a smartwatch is a computer that you wear on your wrist. It aspires to be the same kind of connected portal of information that your smartphone, your TV, and your laptop are. It can be any shape, any size, but the reason it looks like a watch is simply for the sake of familiarity: to ease you into something new. This goes double for the Apple Watch and its primary interactive element, the digital crown, which repurposes the age-old watch component as a new way to zoom in and out of digital interfaces.

You don’t check your pulse, or remotely control your phone camera, or control Netflix, or pay for a cup of coffee with a traditional watch, but you will do all those things with the Apple Watch. Just like the iPhone was a sci-fi device come to life, the Apple Watch is a Dick Tracy communicator, and its very existence raises all sorts of questions: What is this thing? What’s it for? How are we supposed to interact with it?


Start up: web design for 2015, Nexus 6’s long slipway, hacking journalism under threat?, Zoë Keating v YouTube redux, and more


In 2012 the Nexus 6 designers were expecting to deal with these to unlock the phone. Photo by kevin dooley on Flickr.

A selection of 7 links for you. Refrigerate before use. I’m charlesarthur on Twitter. Observations and links welcome.

The challenge for web designers in 2015 (or how to cheat at the future) » Memespring

Richard Pope:

The 7 years of the Apple App Store and the android equivalents have, in effect, been mass, micro funded experiments in UI design for small, touch sensitive devices with lots of sensors and outputs. They have generated winning patterns like:

Checkboxes replaced by switches
Check-ins
Edit without save button
Everything can be contextual, any bit of UI can disappear between pages
Everything has it’s own settings page
Floating buttons
Keeping primary navigation off canvas (hidden behind the page)
Minimal or zero page header (the context an old school page header / nav gives seems less important when you are holding the app in your hand.)
Multiple, focused apps for the same service
Offline by default
Overscroll to refresh
Reserving dropdown menus for actions on the current context
Search scoped to their current context (the app)
These are patterns that people use day in day out on facebook, Gmail and WhatsApp. These are the new normal, what people expect.

But with a few notable exceptions – eg the mobile versions of Wikipedia and Forecast – these are not patterns that are making their way on to the web.

So, here is the challenge for anyone designing and building for the web in 2015.

He also points out what you can do with HTML5 browsers now too. Worth considering.


Dennis Woodside on Motorola, Google and the future of Dropbox » Telegraph

Matt Warman spoke to Woodside, formerly chief executive at Motorola, and now chief operating officer at Dropbox:

the 6-inch Nexus 6, he can now admit, was stymied by just one of those big players [which he previously criticised for keeping prices high]. A dimple on the back that helps users hold the device should, in fact, have been rather more sophisticated. “The secret behind that is that it was supposed to be fingerprint recognition, and Apple bought the best supplier. So the second best supplier was the only one available to everyone else in the industry and they weren’t there yet,” says Woodside. Nonetheless, he adds, the addition of fingerprint recognition, “wouldn’t have made that big a difference.”

Here’s what’s interesting about this. Apple bought Authentec in mid-2012 (for $356m). The Nexus 6 was released in September 2014. Motorola’s development of that smartphone was so far in train that it didn’t have time to change the design of the back fascia from dimpled to flat.

Smartphones take two or more years to design and implement. Consider that: what comes out now was being worked on in early 2013.

Kudos to Woodside for admitting fingerprint recognition wouldn’t have made much difference. As it wasn’t being tied into a payment system, it would have been a gimmick – and those don’t add lasting value.


We should all step back from security journalism » Medium

Quinn Norton:

Part of Barrett Brown’s 63 month sentence, issued yesterday, is a 12 month sentence for a count of Accessory After the Fact, of the crime of hacking Stratfor. This sentence was enhanced by Brown’s posting a link in chat and possessing credit card data. This, and a broad pattern of misunderstanding and criminalizing normal behavior online, has lead me to feel that the situation for journalists and security researchers is murky and dangerous.

I am stepping back from reporting on hacking/databreach stories, and restricting my assistance to other journalists to advice. (But please, journalists, absolutely feel free to ask me for advice!) I can’t look at the specific data another journalist has, and I can’t pass it along to a security expert, without feeling like there’s risk to the journalists I work with, the security experts, and myself.

Brown’s sentence wasn’t quite as simple as “linking to stolen stuff”, but Norton’s concern is understandable – especially given the tendency of US law enforcement to go like a runaway train after hackers, and those defined as hackers, of all stripes.


Zoe Keating’s experience shows us why YouTube’s attitudes to its creators must change » Music Industry Blog

Mark Mulligan weighs in on the Zoë Keating row linked here on Monday:

it is the Content ID clause that is most nefarious. Content UD is not an added value service YouTube provides to content owners, it is the obligation of a responsible partner designed to help content creators protect their intellectual property. YouTube implemented Content ID in response to rights owners, labels in particular, who were unhappy about their content being uploaded by users without their permission. YouTube’s willingness to use Content ID as a contractual lever betrays a blatant disregard for copyright.

Ben Thompson is much more straightforward: on Stratechery.com he analyses Keating’s position, and suggests – for her particular situation, as a niche player seeking the most eager fans – that she should tell YouTube to take a hike. Especially when you look at her income breakdown: 60,000 tracks (roughly) sold on iTunes generated $38,195, while 1.9m YouTube views (mostly of her music on other peoples’ videos) earned $1,248.

Would the iTunes sales have happened without the YouTube views? Quite possibly not – but using ContentID as a lever, as Mulligan says, is to aggressively deny her copyright.


Digital music sales on iTunes and beyond are now fading as fast as CDs. – The Atlantic

Derek Thompson has some shudder-making figures:

how about the hits? The top 1% of bands and solo artists now earn about 80% of all revenue from recorded music, as I wrote in “The Shazam Effect.”

But the market for streamed music is not so concentrated. The ten most-popular songs accounted for just shy of 2% of all streams in 2013 and 2014. That sounds crazy low. But there are 35m songs on Spotify and many more remixes and covers on SoundCloud and YouTube, and one in every 50 or 60 online plays is going to a top-ten song. With the entire universe of music available on virtual jukeboxes, the typical 3.5-hour listening session still includes at least one song selected from a top-ten playlist that accounts for .00003% of that universe. The long tail of digital music is the longest of tails. Still, there is a fat head at the front.


China buying more iPhones than US » FT.com

Analysts at UBS estimate that China accounted for 36% of iPhone shipments in the most recent quarter, compared with 24% for the US. During the same period last year, 29% of units were sold in the US and 22% were in China, UBS said.

Predictable enough, given the size of China, and the fact that the US is essentially saturated. The fact that two markets probably account for 60% of all iPhone shipments – around 36m phones in the quarter – is perhaps a concern for Apple. It’s much the same for Samsung: losing its lead in China has hurt it and left the US as its key market.

However, this rather gives the lie to those stories from September which said that Apple was washed up in China when smugglers had to cut prices of the iPhone 6 – ignoring the fact that the devices were going to go on sale officially in a few weeks. Nope, then the problem was that

Four years ago, the iPhone 4 was a status symbol, with the black market booming before the product was officially introduced. Today, the iPhone is simply one option among many, as local companies like Xiaomi and Meizu Technology rival Apple in terms of coolness while charging less than half the price.


Demographics of key social networking platforms » Pew Research Center’s Internet & American Life Project

Tons of demographic data (including age, ethnicity, gender, education, income and location) about the online over-18s in the US:
• 71% use Facebook (more women than men, strong in 18-29);
• 23% use Twitter (men strongly growing, skews towards degree-qualified);
• 26% use Instagram (53% of 18-29s; also strong among Hispanics and African-Americans);
• 28% use Pinterest (up from 21% in August 2013; 3:1 women:men, strongly skewed to white)
• 28% use LinkedIn, strongly up among women since 2013, but now equal across sexes; skews strongly to university education

The whole study is fascinating: Facebook growth is slowing down, but it’s still “home base”, and used most daily.


Start up: India blocks Xiaomi, Chinese app habits, Office gets Bing, hacking smartwatches, and more


Refuelling a Toyota Prius. By the time he’s grown up, it might have paid for itself. Photo by Chris Yarzab on Flickr.

A selection of 9 links for you. Slippery when wet. I’m charlesarthur on Twitter. Observations and links welcome.

Breaking News: Delhi High Court grants injunction against Xiaomi >> Spicy IP

[On Monday] the Delhi High Court granted an ex parte injunction order against Chinese operator Xiaomi for infringement of Ericsson’s patents. The patents in question are Standards-Essential Patents (SEPs) which are subject to FRAND (Fair, Reasonable and Non-Discriminatory) terms. However, they may also be the same patents which are the subject matters of litigation Ericsson has mounted against Micromax, Gionee and Intex. As Shamnad Sir noted earlier today, while Ericsson has largely favourable orders against Micromax and Gionee, the same cannot be said for its case against Intex. Therefore, when the same patents are potentially in question under other cases as well, there was no need for the Courts to rush to grant an injunction against a new defendant, namely Xiaomi.

At this juncture, it is more interesting to note the reasons provided for granting the said injunction. One factor that the Court found persuasive was that Xiaomi had not responded to Ericsson’s repeated communications  (6 in number from July 2014). However, it must be questioned whether Xiaomi’s purported laxity in this matter is a sufficient reason to grant an injunction against them. More so, when an alternative remedy in the form of damages is available which is one of the cardinal principles that goes against the granting of injunctions.

This ex parte order injuncts Xiaomi from selling, advertising, manufacturing or importing devices that infringe the SEPs in question. The judge also directed the Customs officials to stop the imports under the IPR Rules, 2007. Moreover, local commissioners have been appointed to visit Xiaomi officers to ensure the implementation of these orders.

This is going to put a whole new complexion on Xiaomi’s expansion – and profitability – outside China, and probably means it won’t be coming to the US any time soon.


Chinese mobile app UI trends >> Dan Grover

Slightly to his surprise, San Francisco native Grover finds himself a product manager on Chinese messaging app WeChat, in Guangzhou; from the photo, it’s Shenzhen, as that’s where WeChat is headquartered. This isn’t the cheesy opener to a TV series, unless you make it so:

Moving to a new country has meant learning how to do lots of things differently: speaking a new language, eating, shopping, getting around. In a few months, I’m surprised at how acclimated I’ve become to what, at first, seemed such an overwhelmingly alien place.

This has applied to my digital life too. I’ve replaced all my apps with those used here, owning both to my keen interest as someone in the tech industry, and to “go native” to the extent I can. Since then, I’ve similarly become blind to the adaptations required there, too.

One day, for the fun of it, I started writing a list in my notebook of all the things that are different between apps here and those I’m accustomed to using and creating back in the US. When I finished, I was surprised by how long the list was, so it seemed fitting to flesh it out into a post.

You’ll look at it and say “oh, that’s why feature X that I never use is in iOS 8”. Plus much more. China may be like Japan – a harbinger of some of the mobile future, but not all. The trouble is figuring out which bits are which.


How the Prisoner’s Dilemma explains the lack of forked Android phones outside China >> Tech-Thoughts

I’ve taken liberties with the headline on Sameer Singh’s article, but that’s basically what he’s doing:

[in the classic minimax game] the best payoff for both prisoners will be achieved if both remain silent. But the best individual payoff requires each to betray the other. So the only rational course for any self-interested party (like profit-generating enterprises) is to betray each other. In the case of Android OEMs, it may benefit the whole industry (from a differentiation and profit standpoint) to fork Android and exclude Google services. But the threat of selling a non-competitive forked device, while others sell devices with Google services is too great for this to ever happen.

The rest is insightful too. Sameer’s been quiet for a while; pieces like this contribute greatly to our understanding of ecosystems:

There are close to 2 billion smartphone users today and that will grow to roughly 4 billion over the next few years. However, the purchasing power of these users will be far lower than that of the existing user base, i.e. they will probably buy $25-$50 devices and not $600 or even $200 devices. How do you monetize a user who can only afford to pay $25-$50 for a phone?

The answer: services, dear boy, services.


PC makers may beat Apple to the punch with new ‘fingerprint ID’ sensors built into notebook touchpads >> Apple Insider

Calling it the “first solution to integrate fingerprint ID technology into the TouchPad,” the Synaptics SecurePad is a 4-by-10-millimeter sensor on the surface of a notebook’s cursor controls. The SecurePad activates with the touch of a finger, and like Apple’s Touch ID, it supports fingerprint detection at any angle.

The Synaptics SecurePad is a Fast Identity Online-ready authenticator supporting the use of password-free security. It will allow PC makers to implement fingerprint scanning technology without the need to duplicate hardware components, allowing for simpler integration into existing notebook designs.

Once a user scans their fingerprint when prompted for a password, SecurePad initiates a cryptographically secure challenge and response with an online service provider. The Synaptics solution does away with storing password databases in the cloud, further improving security with FIDO-compliant partners.

Useful for enterprise PCs; unclear whether there will be much demand for it from consumers (though users of iOS devices with TouchID might like the idea). It all rests on the execution.


Microsoft begins integrating Bing search into Office >> ZDNet

Microsoft is beginning to integrate its Bing search technology into Office, starting with Word Online, company officials announced on December 10.

Microsoft is calling the new embedded search capability “Insights for Office”. Microsoft is rolling out the capability worldwide (everywhere where Bing is available) starting today, December 10. The rollout should be complete within the next few days, officials said.

Users don’t need to do anything to get the new capability; it will just be added to Word Online automatically. The new “intelligent search experience,” as Microsoft officials are calling this, isn’t ad supported. It’s free.

Bill Gates wanted to include Microsoft’s search solution in Office back in 2003, but antitrust concerns, and the Office team’s refusal to help the search team, killed it. (Source: my book, Digital WarsUS version. Just the present for you or someone like you.)


With $2 Gas, the Toyota Prius Is for drivers who stink at math >> Businessweek

It would take almost 30 years of fuel savings from the hybrid Prius to cover its price premium over the little Chevy Cruze, although that doesn’t account for the Chevy buyer marking savvy investments with her savings in the meantime. It doesn’t matter since we will all be flying around in futuristic Teslas before the Prius pays off. The all-electric Nissan gets a lot closer: The all-electric Nissan Leaf, without any gas stops, take just 3.8 years on the road to beat the cheaper sticker price of the Cruze.

The Cruze gets a respectable 30 miles per gallon of combined highway and city driving, but its real strength is relative affordability. Without a second engine and a massive battery, the average Cruze had a $21,322 sticker price last month, compared with almost $31,973 for a Prius and $32,933 for a Leaf. Even after federal tax breaks, Cruze buyers start with an advantage of $8,151 over the Prius and $4,111 over the Leaf. That’s a lot of gas money.

For the 13 states with no hybrid incentives, this is where the equation stops.

This is the real reason why the US hasn’t made any progress on electric cars: the lack of tax incentive. True, the idea that carbon emissions are a problem is relatively new, but the US’s dependence on foreign oil (and hence oil) was seen as a problem as far back as Jimmy Carter’s time in the 1970s.


Eric Young on Twitter: “”I work for 1 of largest credit issuers n world…”

Eric Young quoting a source at “a major [US] bank: “I work for 1 of [the] largest credit issuers n [in the] world. We processed way more Apple Pay transactions than all of Google Wallet since its beginning”.

I’ve calculated there have been 20m Google Wallet downloads (it’s US-only), and people who should know have subsequently suggested that perhaps one-tenth of those are active. Apple Pay is very likely far past Google Wallet for number of active users in the US, even though Google Wallet came out in 2011 – and Apple Pay in September.


Mobile Enterprise Apps >> Apple

The first fruits of the collaboration with IBM, yielding what Apple calls “a new class of apps — entirely reimagined for the mobile enterprise, made for iOS, and designed to empower employees wherever their work takes them”. I was struck by the one for pilots, and this one for law enforcement officers:

With the Incident Aware app, police officers can know each other’s whereabouts with greater insights in emergency situations. When law enforcement officials receive an emergency call, responders can go in with a bird’s-eye view of the scene’s perimeter that includes GPS map data, the location of those involved in the incident, and live video feeds updated in real time on their iPhone devices. This powerful and intuitive app can even access police records to calculate risk, letting other law enforcement stakeholders know where and when other responders will appear.

It relies of course on Apple Maps, which will really up the stakes on getting that right and up-to-date.


Data sent between phones and smartwatches wide open to hackers >> Ars Technica

The growing number of smart devices that interoperates with smartphones could leave text messages, calendar entries, biometric data, and other sensitive user information wide open to hackers, security researchers warn.

That’s because most smart watches rely on a six-digit PIN to secure information traveling to and from connected Android smartphones. With only one million possible keys securing the Bluetooth connection between the handset and the smart device, the PINs are susceptible to brute-force attacks, in which a nearby hacker attempts every possible combination until finding the right one.

Researchers from security firm Bitdefender mounted a proof-of-concept hack against a Samsung Gear Live smartwatch that was paired with a Google Nexus 4 running Android L Preview. Using readily available hacking tools, they found that the PIN obfuscating the Bluetooth connection between the two devices was easily brute forced. From that point on, they were able to monitor the information passing between the watch and the phone.

Trying to feel anxious. Somehow can’t summon up the necessary level of worry about someone seeing a calendar alert.


Start up: Sony-signed malware, robots watching videos, Nexus 6’s lost finger lock, are tablets desktops?, and more


I love robots, by Duncan on Flickr.

A selection of 10 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Swedish police raid The Pirate Bay, site offline >> TorrentFreak

This morning, for the first time in months, The Pirate Bay disappeared offline. A number of concerned users emailed TF for information but at that point technical issues seemed the most likely culprit.

However, over in Sweden authorities have just confirmed that local police carried out a raid in Stockholm this morning as part of an operation to protect intellectual property.

“There has been a crackdown on a server room in Greater Stockholm. This is in connection with violations of copyright law,” read a statement from Paul Pintér, police national coordinator for IP enforcement.


‘Destover’ malware now digitally signed by Sony certificates >> Securelist

Functionally, the backdoor contains two C&Cs [command & control servers for computers taken over by the malware] and will alternately try to connect to both, with delays between connections:

208.105.226[.]235:443 – United States Champlain Time Warner Cable Internet Llc

203.131.222[.]102:443 – Thailand Bangkok Thammasat University

So what does this mean? The stolen Sony certificates (which were also leaked by the attackers) can be used to sign other malicious samples. In turn, these can be further used in other attacks. Because the Sony digital certificates are trusted by security solutions, this makes attacks more effective. We’ve seen attackers leverage trusted certificates in the past, as a means of bypassing whitelisting software and default-deny policies.

We’ve already reported the digital certificate to COMODO and Digicert and we hope it will be blacklisted soon. Kaspersky products will still detect the malware samples even if signed by digital certificates.

Everyone says “ooh! Thailand again!” (a previous part of the hack was linked to a hotel in Bangkok) but nobody says “hmm, Time Warner.” What if the hackers are based in the US? (Speaking of which, has Re/Code walked back – as one says – on its claim that North Korea was behind the Sony hack?)


Android source reveals scrapped Nexus 6 fingerprint sensor >> Ars Technica

Methods like “FINGERPRINT_ACQUIRED_TOO_FAST” and “FINGERPRINT_ACQUIRED_TOO_SLOW” in the fingerprint API suggest it supported a “swipe” style fingerprint reader, which, unlike Apple’s stationary fingerprint reader, requires the finger to be moved across a sensor at the right speed. Another file said the system would show a picture indicating which part of the finger would need to be scanned next, which again points to it being more like a swipe reader and less like a whole-fingerprint scanner.

The fingerprint API would be open to multiple apps, with a comment saying Google had built “A service to manage multiple clients that want to access the fingerprint HAL API.” Presumably this would allow apps like Google Wallet to use your fingerprint as authentication.

Motorola had a fingerprint scanner in the Atrix in 2011. Sucked.


The real reason why Google is dropping the tablet v desktop distinction – it’s the user context, stupid! >> Search Engine Land

Looking at the huge amount of search query data that they have access to, Google picked up on a pattern in the way people use their devices. What they noticed is that user context trumps everything else.

“User context” refers to the time, location and device from which a search is conducted, and as [group product manager of Global Mobile Search Ads at Google] Surojit [Chatterjee] put it: “User context drives what people search for, and the actions they take. So for example, say I am at home in the evening, and I’m doing a search. The actions that I will take will be largely the same if I’m using a smartphone, tablet or notebook, because the context is the same. Particularly between notebook and tablet, the query patterns are very similar.”

Similarly, the types of searches that we typically think of as “mobile” searches are the ones that people make when they’re out and about, away from home or work – and that user context is actually far more important than the physical device they are using.

Also: “Currently, 80% of tablet traffic occurs in the home, in the evening, and Google is much more interested in user context vs. user hardware.”

In other words, tablets are the new laptops/desktops.


Korea’s shrinking market: domestic smart device market size likely to shrink for two years >> BusinessKorea

[Research company IDC] mentioned a decline in smartphone supply as the main culprit of the negative growth of the domestic market. The smartphone segment used to account for 80% of the overall smart device market, but the domestic supply is forecast to drop by 20.5% to 17.54m units and the sales by 29.2% to 12.345trn won (US$11.1bn) this year.

“The smartphone market has already reached a saturation point, and the market downturn has been accelerated by the recent suspension of the business of mobile carriers, the Terminal Distribution Structure Improvement Act and the crisis of Pantech,” IDC Korea explained.

Non-tablet PC demand is on the decline as well, with more and more people using their smartphones and tablet PCs instead of conventional PCs.

That’s a steep drop in Samsung’s and LG’s homeland.


OMG! Mobile voice survey reveals teens love to talk >> Official Google Blog

Mobile voice searches have doubled in the past year, says Google, which commissioned a study of 1,400 US adults so it could commission an annoying infographic:

We weren’t surprised to find that teens — always ahead of the curve when it comes to new technology—talk to their phones more than the average adult. More than half of teens (13-18) use voice search daily — to them it’s as natural as checking social media or taking selfies. Adults are also getting the hang of it, with 41% talking to their phones every day and 56% admitting it makes them “feel tech savvy.”

Those numbers feel high. Would love to know how they break down between smartphone platform; Google doesn’t specify that, and doesn’t show what the actual questions on the survey are.

Given that about half of smartphone owners in the US have iPhones, could it be that a significant portion of those people who use voice commands (because that’s what the survey asks about – not voice search) were actually asking Siri to do stuff?

Note though how Google cleverly elides from “voice search” (what it offers in the Google app) to voice commands – which don’t necessarily involve Google at all.


Digitimes Research: Lenovo mobile device shipments to lead Samsung by 9 million units in 2015 >> Digitimes

Note that by “mobile” it’s excluding smartphones, which might strike some as contrary. But anyway, Jim Hisiao and Joanne Chien report:

Despite difficulties to achieve further shipment growths for its tablet business, Lenovo with its advantage as the largest notebook brand vendor worldwide and aggressive promotions of its inexpensive and phone-enabled tablets is expected to achieve 50m in total tablet and notebook shipments in 2015, widening its gap with Samsung to 9m units.

Because tablet demand will weaken in 2015, Lenovo’s and Samsung’s strategies for the mobile computing device market are expected to focus on maintaining their tablet shipments. Digitimes Research believes Lenovo’s shipments for tablets with phone functions to emerging markets in 2015 are expected to remain strong…

…Samsung’s aggressive expansion of its tablet product line in the first half of 2014 did not receive a good response from the market. Since the company is expected to turn conservative about its tablet business and place most of the resources on the smartphone business in 2015, Digitimes Research expects the Korea-based vendor’s tablet shipments to drop to 36m units in the year.

As for the notebook business, after phasing out from the market in the second half of 2013, Samsung’s shipment volume has dropped rapidly and is only expected to reach 5m units in 2015.

Samsung’s essential weakness compared to Lenovo is its failure to make any profit from selling PCs.


Editorial: No comments. An experiment in elevating the conversation >> St Louis Post-Dispatch

Last Sunday, we challenged our region to have the serious discussion on race that it has been avoiding for decades. Such difficult discussions are made more challenging when, just to present a thoughtful point of view, you have to endure vile and racist comments, shouting and personal attacks.

If you’ve watched many of the talking heads on cable television try to discuss the killings of Michael Brown and Eric Garner, you know what we’re talking about. Unfortunately, sometimes comments on newspaper stories and columns have a similar effect.

In fact, it has a name: “The nasty effect.”

That’s what University of Wisconsin-Madison researchers Dominique Brossard and Dietram Scheufele dubbed the negative effect certain comments can have on a reader’s understanding.

Comments on general news sites are a waste of the readers’ (and arguably writers’) time. I wonder how much further this trend will go.


Apple trial continues, without a plaintiff for now >> Associated Press

U.S. District Judge Yvonne Gonzalez Rogers scolded Marianna Rosen and her attorneys on Monday for not providing more complete information about the iPods Rosen had purchased. That came after Apple lawyers successfully argued that the devices purchased by Rosen were not among those affected by the lawsuit.

But the judge also rejected Apple’s argument that the case should be dismissed because it’s too late to name a new plaintiff. She ordered the attorneys suing Apple to identify a new person, by Tuesday, who can serve as a lead plaintiff.

Both sides estimate about 8 million people bought iPods that are potentially affected by the lawsuit, which focuses on Apple’s use of restrictive software that prevented iPods from playing music purchased from competitors of Apple’s iTunes store. The plaintiffs say that amounted to unfair competition and that Apple was able to sell iPods at inflated prices because the software froze makers of competing devices out of the market.

Apple is carving out entirely new areas of law. There was the antitrust case where it had the minority share (in ebooks), and now a class action (also with antitrust implications) where none of the plaintiffs shows up. Presumably a suitable plaintiff will have to show that they bought music from Real and that it was deleted… but that they then couldn’t reload it or play it on any device, or only on the iPods? Did Apple explicitly promise that they would be able to buy music bought from anywhere on it? (I don’t think so.) The limits of this case aren’t clear.


Robots, not humans, fake 23% of web video ad views, study finds >> Bloomberg

Computers being remotely operated by hackers account for almost one in four views of digital video ads worldwide, according to a study that estimates such fraud will cost advertisers $6.3bn next year.

The fake views, which also account for 11% of other display ads, often take place in the middle of the night when the owners of the hijacked computers are asleep.

The result is retailers, automakers and other companies paying for web advertisements that are never seen by humans, or are seen by fewer people than they are paying for, according to the report released today by the Association of National Advertisers, whose members include Wal-Mart Stores, Ford Motor Co. and Wendy’s.

“We’re being robbed,” said Bob Liodice, president and chief executive officer of the New York-based association, which has 640 members that spend more than $250bn a year in advertising. “This isn’t about system inefficiencies or process sloppiness. This is about criminal activity.”

Between this and Google’s announcement that half of all online ads aren’t actually viewed, a lot of the basis for the online advertising business begins to look a bit shaky.


China’s polluted soil is tainting the country’s food supply >> Businessweek

A new study from the China National Environmental Monitoring Center examines the results of nearly 5,000 soil samples from vegetable plots across China. Roughly a quarter of the sampled areas were polluted. The most common problem is high soil concentrations of heavy metals—such as cadmium, lead, and zinc—which leach out from open mines and industrial sites and into surrounding farmland.

Plants grown in tainted soil can absorb heavy metals. People who ingest high levels of heavy metals over an extended time can develop organ damage and weakened bones, among other medical conditions.