Start up: Reddit implodes, catching criminals via Spotify, Cameron’s mad encryption plan, and more


A better way to think of Reddit? Photo by avisualstudy on Flickr.

A selection of 11 links for you. With added anchors, so you can link direct to observations Kontra. I’m charlesarthur on Twitter. Observations and links welcome.

Cops nab fugitives in Cabo San Lucas by tracking Spotify IP address » Ars Technica

David Kravets:

Husband Peter Barr and wife Brittany Nunn of Wellington, Colorado, were brought to Denver days ago and face felony charges in connection to the children’s disappearance. Nunn had lost custody of her children to their fathers, but she did not appear when the exchange was supposed to happen in December. The duo had been on the lam ever since, and they are accused of unlawfully taking the woman’s two biological children, 4 and 6, to Mexico, according to The Coloradoan.

The case was broken by Larimer County Sheriff’s investigator Drew Weber. According to the paper:

Drawing on new investigative tactics, Weber executed a search warrant and pulled records from Nunn’s Spotify account. He found it was being used from an IP address in Mexico. He later pulled search records from Netflix and Nunn’s other accounts and eventually tracked a package that Nunn had ordered to be shipped to Cabo San Lucas.

A private investigator soon joined Weber and helped monitor the family for months while agents with FBI, customs officials and the US State Department worked with the consulate in Mexico on a plan to bring the children and alleged abductors home.

This is how it’s going to be from now on: go on the lam, stay offline. Or get caught. And staying offline will be increasingly difficult.
link to this


Student’s Dilemma, a riff of the Prisoner version with extra credit » Flowing Data


By way of Chris Volinsky, a quiz dilemma for students who want extra credit. It’s a variation on the Prisoner’s Dilemma, a popular game theory example that uses two criminals instead of students and lesser jail time instead of extra credit.

What’s your answer? I take the two.

link to this


FTC exploring Apple rules for streaming music rivals in App Store » Reuters

Diane Bartz and Julia Love:

U.S. government antitrust regulators are looking into claims about whether Apple’s treatment of rival streaming music apps is illegal under antitrust law, according to three industry sources.

Apple recently launched a new music streaming service, Apple Music. It also provides the App Store platform for competing streaming services including Jango, Spotify, Rhapsody and others.

Apple takes a 30% cut of all in-app purchases for digital goods, such as music streaming subscriptions and games, sold on its platform.

While $9.99 has emerged as the going monthly rate for music subscriptions, including Apple’s, some streaming companies complain that Apple’s cut forces them to either charge more in the App Store than they do on other platforms or erode their profit margins.

That’s OK – all Apple needs to do is put its Beats sub on the App Store and take a 30% cut. Oh, wait!

But the 30% tithe has been in place since before Apple had a streaming service. Hard to see the antitrust case here, unlike the ebooks “let’s agree to alter prices upwards” case. Google also has the same 30% cut in place, and a larger market share.
link to this


Bruce Schneier: David Cameron’s encryption ban would ‘destroy the internet’ » Business Insider

Rob Price:

amid heightened terror fears, Cameron says “we must look at all the new media being produced and ensure that, in every case, we are able, in extremis and on the signature of a warrant, to get to the bottom of what is going on.”

The prime minister first indicated that he would try to clamp down on secure communications that could not be decrypted by law enforcement in January, after the Charlie Hebdo shootings in Paris. His comments sparked an immediate flurry of condemnation from privacy and security activists, but his recent statements show he’s not backing down. (Number 10 has not responded to requests for clarification about Cameron’s comments.)

Business Insider reached out to Bruce Schneier to discuss the feasibility of Cameron’s proposed ban on “safe spaces” online. Schneier, a widely respected cryptography and security expert, is a fellow at the Berkman Centre for Internet and Society at Harvard Law School, serves on the board of the digital-liberties pressure group the Electronic Frontier Foundation, and writes frequently on encryption and security. He didn’t hold back.

The Cameron suggestions are clearly nonsense, which as Schneier points out, raises the question of why nobody around him has said “er, we can’t implement that, because it’s totalitarian, and also unworkable.”

So how does Cameron extricate himself from this?
link to this


Why Android and Windows should embrace RAW photography before Apple catches up » The Next Web

Napier Lopez:

Sticking with JPEG is like watching The Lion King on VCR when it’s available on Blu-Ray.

Not everyone cares about taking better photos, but it’s clear many do. Just take a look at apple’s “Shot with iPhone” campaign; advertising for flagship phones centers around cameras, flaunting things like resolution and aperture when a more substantial improvement lies with a feature right under our noses.

For Android and Windows Phone, investing resources into making their RAW files more accessible can help give them a big head start over Apple. RAW support on its own is awesome, but software developers and manufacturers need to make it easy to use before the masses adopt it. I should be able to upload a RAW file straight onto Instagram, not be forced to buy a Lightroom Mobile subscription or load it onto my computer.

In any case, it’s likely RAW will come to iOS too.

Might do, although probably only as an option; it sucks up a lot of storage, and some people are already pushing it on their photo libraries.
link to this


Reddit is not the front page of the internet » The Daily Beast

Samantha Allen with an excoriating (but also pinpoint accurate) take:

Reddit became a web destination and a traffic powerhouse by virtue of the clicking, viewing, and typing habits of a relatively narrow subsection of Internet users. 74% of Reddit users are men, the highest of any social networking website. Instagram, Facebook, and YouTube all come much closer to gender parity. Describing Reddit without making reference to its gender asymmetry is akin to reporting on Pinterest, which is 72% female, without noting that the site caters to women.

And, indeed, when The New York Times reviewed Pinterest in 2012, they rightly referred to it as “female-oriented,” but when the CEO of a 74% male social network resigns after facing intense criticism from its users—much of it laced with misogyny—they somehow forget to label Reddit, in turn, as “male-oriented.” Reddit too often passes in the media as unmarked and neutral territory while sites like Pinterest get pigeonholed as girly.

Reddit is also one of the most youthful social networks, with nearly 60% of its visitors coming in under age 34. For comparison, over 60% of Facebook users are above age 34. Increasingly, younger Internet users seem to perceive Facebook as a network for grandmas but, in 2015, grandmas are as vital a part of the internet as anyone else—even if they’d never be caught dead on its supposed “front page.” Only 2% of people over 50 use Reddit.

She also captures it in one phrase elsewhere: “Reddit is not so much the generic front page of the Internet as it is its spacious, tricked-out man cave: a lot of people can fit inside, but only some people feel comfortable hanging out there.”
link to this


The death of Reddit » Chuq Von Rospach

Von Rospach has been in charge of online community efforts at Apple and Palm, among others:

I see poor management with a naive attitude about the use of the site, weak tools and IP, a mis-aligned power structure where there’s no need for the people with the real power to care what the company wants, no real communication between company and its moderators or users, and a lot of really toxic users and groups that have caused the site major PR and reputation disasters but which the company is both reluctant and in many cases unable to control or remove.

Other than that, Mrs. Lincoln, how did you like the play?

How do you fix this?

You don’t. You can’t. Reddit has failed, and we are now witnessing its immolation.
So what should Reddit do? Let me say up front this basic fact: if the Reddit board were to call me up and offer me a blank check to come in and fix Reddit for them, I would laugh and hang up. I wouldn’t touch this disaster under any circumstances. But if they were to ask me what advice I have for the idiot stupid enough to take this gig, here’s what I’d tell them:

Don’t try to fix it. It’s broken. It can’t be fixed. Instead, it’s time to decide what the service you want is, and build that service out of the ashes of the failure of this Reddit. A great starting point is the AMA and the most popular reddits. Figure out the revenue model and make sure it’s baked in to this new model. Anything that isn’t part of this new model that exists on the old site will end up being shut down. you can expect that won’t go well when you announce it.

link to this


The dark side of Google 10x » Business Insider

Jillian D’Onfro on how Google’s “10X” projects, which are meant to be the “moonshots” that are ten times better than anything else, can go awry:

One former exec told Business Insider that the gospel of 10x, which is promoted by top execs including CEO Larry Page, has two sides. “It’s enormously energizing on one side, but on the other it can be totally paralyzing,” he says. 

“Larry’s job is to point out things you haven’t thought of, so he has to suspend reality a little bit,” he said.

When it comes to building out-there ideas like smart contact lenses, that contrarian instinct makes a lot of sense. But this former employee believes it’s dangerous when that logic gets applied to products that don’t need it. 

For example, when Google was designing the remote control for its early iteration of Google TV, Page didn’t think any of the prototypes were ambitious enough.

Why doesn’t it have a screen in case you needed to go to the bathroom and keep watching? Page asked. Why not a mouse pad, a keyboard?

When the team tried to argue that a remote didn’t need those things, Page kept pushing for more ambitious features that no other controllers out there came with. 

There are more.
link to this


Google Photos may be uploading your pics, even if you don’t want it to » Nashville Business Journal

David Arnott:

All I had to do to turn my phone into a stealth Google Photos uploader was to turn on the backup sync, then uninstall the app. Whereas one might reasonably believe uninstalling the app from the phone would stop photos from uploading automatically to Google Photos, the device still does it even in the app’s absence. Since making this discovery, I have re-created the issue multiple times in multiple settings on my Galaxy S5.

I reached out to Google, and after reaching someone on the phone and describing the issue, was told to wait for a comment. Several hours later, I received a terse email that said, “The backup was as intended.” If I want to stop it from happening, I was told I’d have to change settings in Google Play Services.

It goes almost without saying that this makes no sense, and makes me not trust Google. Plus, it seems to me to possibly represent a security issue. If I understand how Google Photos works, none of my photos were made public to the wider world. But that’s beside the point — I didn’t want Google to have them, either.

Here’s his tweet when he first discovered it. This might make sense for people who don’t really care, but you delete the app and it lives on? That’s counterintuitive.
link to this


Consumers are ‘dirtying’ databases with false details » Call Week

It only takes a relatively small percentage of database entries to be ‘dirty’ before its value disproportionately declines, according to the report. Companies therefore need to up their efforts to encourage people to give the right information.

The research shows that 60% of consumers intentionally provide incorrect information when submitting their personal details online. Broken down by the types of data provided, birth dates are the most commonly falsified, as almost a quarter of consumers (23%) give the wrong date of birth to companies ‘some of the time’, 9% do this ‘most of the time’ and 5% ‘always’ give the wrong date.

The research also shows that nearly one-third of people give a fake email address and a made-up name at least some of the time. It is a similar story for incorrect information given about home addresses, phone numbers, job titles and company names.

“The upside of providing information has not been articulated,” says managing director at Verve Colin Strong. “The case is not always made by companies about what consumers
are going to get in return for providing information, but people see the immediate effects of being put on more marketing lists and being pursued by online advertising and email spam.”

The original article is actually on Marketing Week, but you have to register, and — you get the picture. The upside is far smaller than the downside (“happy birthday!” emails from sites you logged in to once, say).
link to this


Microsoft mission statement: so many words, most of them empty » FT.com

The wonderful Lucy KEllaway eviscerates Satya Nadella’s memo in which he axed thousands of jobs in Windows Phone:

With some clearing of the throat about how proud he is in announcing it, the CEO unveils the new mission of Microsoft: “to empower every person and every organisation on the planet to achieve more”.

The first sign of trouble is the word “planet”. There is a rule that says whenever this word is used as a substitute for “world”, the sentence in which it appears is utter tosh. If the cosmic resonance is gratuitous, the author is writing through his hat.

In the early days of Microsoft, Bill Gates came up with a vastly better mission: a computer on every desk and in every home. There was no windy nonsense about planets, nor any tiresome talk of empowering. Best of all, it was precise. The main problem with the new mission is not its grandiosity but its emptiness. Achieve more what? On this vital question, Mr Nadella is silent.

Indeed, the best way to empower people on the planet to achieve more would be to persuade them to love their mobile devices a little less and turn them off occasionally and get on with something real instead.

Not content with announcing his new mission, Mr Nadella empowers himself to achieve still more: “Today I want to share more on the overall context and connective tissue between our mission, worldview, strategy and culture.”

To have a mission and a vision and worldview is greedy. But to have so many abstract things with lots of connective tissue between them leaves one feeling slightly sick.

One good thing, though: parsing this sort of stuff will remain beyond AI for many years to come. Human: “Oh, he’s firing a ton of people in Devices.” Machine: “VOID.”
link to this


Start up: YouTube’s smartest change, Google + Huawei, the truth on ads, Windows Phone redux, and more


When Javascript hits a particular temperature… Photo by Tom Gill on Flickr.

A selection of 11 links for you. Too much, right? I’m charlesarthur on Twitter. Observations and links welcome.

The ‘terrifying’ moment in 2012 when YouTube changed its entire philosophy » Business Insider

Jillian D’Onfro:

the discovery algorithm often recommended videos that weren’t the best fit. For example, if a user searched for the footage from a recent fight, YouTube might recommend a clip with a thumbnail image of a juicy punch and a title about someone getting knocked out. When the user clicked, the actual video would be not fight footage, but a dude sitting in his living room just talking about the epic punch.

But when the frustrated user clicked through several different videos, the algorithm tallied up the views and counted it as an accomplishment.  

“We realized that if we made the viewer click that many times, it didn’t seem to be a good estimate of how much value they were deriving from YouTube,” [YouTube’s director of engineering for search and discovery, Cristos] Goodrow said. “Instead, we realized that if they didn’t leave a video and continued watching, that seemed like a better estimate of the value they were getting.” 

So, after bouts of data collection and analysis coupled with countless meetings, YouTube re-jiggered its search-and-discovery algorithm on March 15 to make watch time, not views, the determining factor in what videos to recommend.

Seems obvious. But actually, that’s the sort of customer dissatisfaction that’s really hard to spot in the first place, and then really hard to change – because it upsets the existing order.


Google’s best Android friend » The Information

Amir Efrati:

Unlike other Android hardware partners like Samsung and Xiaomi, Huawei has no ambition whatsoever to compete with Google in mobile software and services. Huawei has agreed to help Google distribute a mobile app store in China, a market where Google has largely been shut out, say people briefed on the talks between the companies. (It remains to be seen whether Google can get a green light from the government to do so.)

Huawei, whose core networking-equipment business has helped it develop relationships with wireless carriers globally, could help Google expand its nascent wireless network service outside the U.S. and work on other wireless experiments to expand Internet access in emerging markets. Google might also seek to license some of Huawei’s patents in that area.

Meanwhile, Huawei this fall will become the first mainland China manufacturer to produce a “Nexus” smartphone together with Google, people with direct knowledge of the project have said. While the phone likely won’t be a big seller, it will serve as a status symbol for a privately-held Chinese firm that is trying to boost its consumer brand around the world and be as beloved as Coca-Cola.

Risky game for Google: Huawei has found it impossible to shake off suspicions in the US about its Chinese ownership and allegations of spying. There’s absolutely no evidence against Huawei, but that isn’t an obstacle for some.


Content blockers, bad ads, and what we’re doing about it » iMore

Rene Ritchie explains why there are sometimes tons of ads on iMore pages – which led one person to write a content blocker for iOS 9. This part though is worth noting:

Just as desktop ads pay far less than old-fashioned print ads, mobile ads pay far less than desktop. Because phone displays are smaller than desktop, ads are also far harder to ignore. They’re not off to the side or a small strip on a big screen. They’re in our faces and in our way.

As more and more people move to mobile, revenue goes down, and the typical response is to amp up the ads in an attempt to mitigate the loss. That, of course, just makes them even more annoying.

Ad networks have not responded well to any of this. Hell, they still haven’t fully responded to Retina and HiDPI displays, and those came out in 2011.

You’d think the ad industry would be at the forefront of user experience, and that making gorgeous, high performance, highly engaging ads would boost conversion and ultimately income for everyone. Unfortunately, it seems like whatever math they’re running shows crappy ads perform well enough that making great ads isn’t worth the extra effort.

Note that first paragraph: “because phone displays are smaller than desktop, ads are also far harder to ignore”. In that case, why do they pay less on mobile, which has more readers?


Scary internet scam becoming disturbingly common » TidBITS

Randy Singer:

While the legions of Mac viruses still haven’t appeared, there is a new nasty out there that takes advantage of this paranoia. It isn’t a virus, a Trojan Horse, or any other sort of actual malware. Instead, it’s more like a phishing scam, using social engineering to get you to do something that the bad guys want you to do. It does it by scaring the willies out of you, and it is becoming disturbingly common. Some call it “scareware” or “ransomware.”

What happens is that you visit a Web site and seemingly have your browser maliciously frozen. You’ll find that you can’t quit, nor can you navigate away from the page by clicking the Back button.

Next, a page or pop-up appears telling you any of a number of stories (often tailored to your location), perhaps that your Mac has a problem or has illegal material on it, or that your data has been encrypted by some malevolent entity.

The real culprit: a (non-destructive) Javascript hack. But if you follow the scam instructions, you will have a real problem.


Musings on autonomous transport: are self-driving Starbucks the future? » Core77

Michael Ditullo:

what happens when the car evolves from a means of transport to a place itself? Commuting to work? Take a Starbucks owned and operated car where you can get a latte and lounge at a table while working on your laptop along the way. A long drive to see the in-laws? Call for a movie car where you can watch a Michael Bay blockbuster in full surround sound on that two hour ride. Need to run some errands and grab lunch? Sounds like a burrito car. Need to work off the day’s stress on the way home? Pick from a workout car or a zen meditation car.

Once upon a time Starbucks called itself the “third place.” Not home, not work, that other place you wanted to go in-between. The self-driving car could very well evolve into that third place, but a place on-the-go. The in-between place becomes something that can also get you where you need to go. I imagine an entire crop of small businesses existing solely on cars. The payment in exchange for the goods and services these businesses provide would pay for the car journey itself.

This all assumes that we’ll need to travel to exactly the same extent. Can we be sure that’s true? Why take the Michael Bay blockbuster car if you could get the same at home? Does the car become a relief from home? So many assumptions are built into the way we view self-driving cars. More working from home, less travel?


The three unlikely lessons from the Microsoft/Nokia Adventure » VisionMobile

Michael Vakulenko:

Looking at the industry through the lens of software-defined business models has helped us to accurately predict years before the story unraveled the duopoly of Apple and Google (2009), the demise of Palm (2009), the outcome of HP’s foray into mobile with WebOS (2010), BlackBerry’s meltdown (2010), and the failure of Windows Phone (2012).

The story repeats in Internet of Things. Much like in mobile, software-defined business models cause deep shifts in how value is created and delivered. The IoT winners will be decided by business model innovation, not by technology, product features or standard committees. VisionMobile’s Stijn Schuermans wrote about it here – What the Internet of Things is not about.

How bad is it for Microsoft if it misses out on the IoT?


Microsoft takes $7.6bn Nokia writedown and cuts 7,800 jobs » FT.com

Richard Waters and Richard Milne with the collateral damage:

The job cuts will include 2,300 of the 3,200 remaining Nokia handset workers in its home country of Finland, adding to a decline in the pulp and paper industry that has led some to dub it the new “sick man” of Europe as unemployment and public debt levels have risen.

Microsoft took on 25,000 workers with the acquisition in April last year, inflating its headcount to 128,000. By the end of March this year it had cut its workforce back to about 119,000.

“In practice, this means the end of Nokia’s old business in Finland,” Juha Sipilä, the country’s prime minister, told a hastily-convened press conference on Wednesday. The situation is so serious in the country, which has been mired in recession for the past three years, that the new centre-right government has called for an extra budget in September to help the affected workers.

Also in the story:

“It’s a repudiation of the Ballmer strategy to buy Nokia,” said Ken Dulaney, an analyst at Gartner. Microsoft should have acquired BlackBerry instead to focus on its core business users, he added — a strategy that the company backed on Wednesday, as Mr Nadella announced a narrowing of the handset division’s focus to making handsets for workers and a smaller number of “flagship” devices.

Yes: Microsoft really should have bought BlackBerry. Wouldn’t have cost much more, and would have been a valuable asset adding to what it’s trying to do. Love to know the discussions that happened, or didn’t, over that.


Wikileaks release indicates Hacking Team sold spyware to FSB, Russia’s secret police » Forbes

Tom Fox-Brewster:

in December 2012, a NICE employee asked Hacking Team whether it had sold directly to the FSB rather than via the Israeli company.

“Yes we did,” the Hacking Team employee responded. “We discussed this opportunity in the past and you were aware of the fact we were working there. I’d like to take advantage of this conversation to ask you a feedback about Azerbaijan.”

Asked about working in Russia, Hacking Team head of communications Eric Rabe said: “We have not sold to blacklisted countries — at least when they were actually on a blacklist. As you know these things can change and a country, that is considered respectable, may later on turn out not to be.”

So classy. Here’s the Wikileaks link, if you’ve got a few spare years to read through the emails.


Hacking Team Flash zero-day tied to attacks in Korea and Japan… on July 1 » Trend Micro

Weimin Wu:

Earlier this week several vulnerabilities were disclosed as part of the leak of information from the Italian company Hacking Team. We’ve noted that this exploit is now in use by various exploit kits. However, feedback provided by the Smart Protection Network also indicates that this exploit was also used in limited attacks in Korea and Japan. Most significantly, these took place before the Hacking Team leak took place; we first found this activity on July 1.

The exploit code we found is very similar to the code published as part of the Hacking Team leak. As a result of this, we believe that this attack was carried out by someone with access to the Hacking Team tools and code.

According to the Adobe security bulletin, the vulnerability CVE-2015-5119 affects all of the latest Flash versions on Windows, Mac, and Linux. Adobe has since provided a security update for this vulnerability.

Not clear from this – and apparently not to Trend Micro either – whether this attack was by Hacking Team, or by someone who had already broken into their systems and was using this attack for themselves.

In other news, Adobe’s security update team must be one of the hardest-working in the industry.


Apple plans record number of new iPhones » WSJ

Lorraine Luk and Daisuke Wakabayashi say it has ordered 85m-90m devices – up from 70m-80m last year:

The changes in the iPhone models expected to be released later this year will be less noticeable than last year’s. The phones are expected to feature Apple’s Force Touch technology that can distinguish between a light tap and deep press, allowing users to control a device differently depending on how hard they push on the screen, according to people familiar with the matter. Apple has added this feature to the Apple Watch and MacBook laptop computer.

In addition to keeping the display size unchanged, Apple is expected to keep the screen resolution about the same, according to people familiar with the matter.

It may offer a fourth color for the aluminum casing of the iPhone, in addition to silver, gold and space gray, these people said.

Force Touch is being signalled so strongly it would be surprising if it weren’t there. (I’ll elucidate later.)


Finland enlists convicted Lizard Squad hacker to fight cyber crime » Newsweek

Caroline Baylon:

17-year-old Julis Kivimaki, a member of the infamous Lizard Squad hacking group, was found guilty of over 50,000 counts of computer crime by a Finnish court, local media have reported, but rather than face prison time, the judge has ordered that Kivimaki himself help “fight against cyber crime”.

The extent of Kivimaki’s punishment will be a two-year suspended sentence, the confiscation of his computer, and being made to return some €6,500 in profits earned from cyber crime.

Kivimaki, known by the online nickname “zekill”, has been hacking since age 15 and committed a wide range of attacks directed at individuals, engaging in online harassment and identity theft, as well as corporations, where he triggered data breaches, hijacking of emails, and stealing credit card information.

To catch a thief…


Start up: Windows Phone hits the buffers, more Flash woes, do Google ads discriminate?, and more


If there’s a stream and nobody listens… hang on. Photo by jjjj56cp on Flickr.

A selection of 9 links for you. They flip, they bend, they twirl away. I’m charlesarthur on Twitter. Observations and links welcome.

Zero-day Flash player exploit disclosed in ‘Hacking Team’ data dump » The Hacker News

Swati Khandelwal:

While analyzing the leaked data dump, researchers discovered at least three software exploits – two for Adobe Flash Player and one for Microsoft’s Windows kernel.
Out of two, one of the Flash Player vulnerabilities, known as Use-after-free vulnerability with CVE-2015-0349, has already been patched.

However, the Hacking Team described the other Flash Player exploit, which is a zero-day exploit with no CVE number yet, as “the most beautiful Flash bug for the last four years.”
Symantec has also confirmed the existence of the zero-day flaw in Adobe Flash that could allow hackers to remotely execute code on a targeted computer, actually allowing them to take full control of it.

Researchers found a Flash zero-day proof-of-concept (POC) exploit code that, after testing, successfully worked on the most latest, fully patched version of Adobe Flash (version 18.0.0.194) with Internet Explorer.

Successful exploitation of the zero-day Flash vulnerability could cause a system crash, potentially allowing a hacker to take complete control of the affected computer.

Flash depresses me. I removed it from my machine some time ago; it’s basically a malware vector whose functions can almost always be replaced with HTML5 by normal users. See below.


How to enable click-to-play plugins in every web browser » Hot-To Geek

Chris Hoffman:

Most web browsers load Flash and other plug-in content as soon as you open a web page. Enable “click-to-play” plug-ins and your browser will load a placeholder image instead — click it to actually download and view the content.

Click-to-play allows you to conserve download bandwidth, improve page load times, reduce CPU usage, and extend laptop battery life. This feature gained popularity with Flashblock for Firefox and is now built into modern browsers.

Do this, for the safety of your system.


Satya Nadella email to employees on sharpening business focus » Microsoft News Center

Phones. Today, we announced a fundamental restructuring of our phone business. As a result, the company will take an impairment charge of approximately $7.6bn related to assets associated with the acquisition of the Nokia Devices and Services business in addition to a restructuring charge of approximately $750m to $850m.

This isn’t actual lost money, but lost value of the business – a “goodwill” writedown. The phones aren’t any more or less profitable as a result.

I am committed to our first-party devices including phones. However, we need to focus our phone efforts in the near term while driving reinvention. We are moving from a strategy to grow a standalone phone business to a strategy to grow and create a vibrant Windows ecosystem that includes our first-party device family.

Translation: phones that don’t run Windows are not needed. Say goodbye to those Nokia featurephones (24.7m in Q1, likely fewer in Q2, probably zero by Q4).

In the near term, we will run a more effective phone portfolio, with better products and speed to market given the recently formed Windows and Devices Group. We plan to narrow our focus to three customer segments where we can make unique contributions and where we can differentiate through the combination of our hardware and software. We’ll bring business customers the best management, security and productivity experiences they need; value phone buyers the communications services they want; and Windows fans the flagship devices they’ll love.

Translation: cheap Lumias continue; will do a flagship. Business customers will get support on whichever platform.

In the longer term, Microsoft devices will spark innovation, create new categories and generate opportunity for the Windows ecosystem more broadly. Our reinvention will be centered on creating mobility of experiences across the entire device family including phones.

Translation: phones aren’t so important, are they?


September 2013: The deal that makes no sense » Stratechery

Ben Thompson, back in September 2013:

Early this morning Microsoft acquired Nokia for €3.79 billion (plus €1.65 billion for patents). It is a deal that makes no sense.

While industry observers love to pontificate about mergers and acquisitions, the reality is that most ideas are value-destroying. It is far better to form an alliance or partnership; most of the benefits, none of the costs.

A partnership similar, in fact, to the one formed just two years ago between Microsoft and Nokia.

From Microsoft’s perspective, that was a brilliant deal; Matt Drance characterized it as “Microsoft Buys Nokia for $0B,” and he wasn’t far off. The premier pre-iPhone phone maker, with what was even then one of the best supply chains, distribution networks, and brands in the world would be exclusively devoted to Windows Phone.

There is nothing further to be gained by an acquisition.

Actually, turned out to have negative value, financially speaking. (The whole post is very well worth re-reading in hindsight.)


Two-Factor authentication » Apple Developer

Is going to be built in to iOS 9 and OSX 10.11 (aka “El Capitan”):

Whenever you sign in with your Apple ID on a new device or browser, you will verify your identity by entering your password plus a six-digit verification code. The verification code will be displayed automatically on any Apple devices you are already signed in to that are running iOS 9 or OS X El Capitan. Just enter the code to complete sign in. If you don’t have an Apple device handy, you can receive the code on your phone via a text message or phone call instead.

Once signed in, you won’t be prompted for a verification code again on that device unless you erase your device, remove it from your device list, or need to change your password for security reasons. When signing in on the web, you can choose to trust your browser so you won’t be prompted for a verification code the next time you sign in from that computer.

The problem with 2FA is always “what if I lose my phone?” Google gets around this by letting you have printed codes that act as verification numbers; it’s a good idea that Apple might do well to take up.

But this looks a lot better than the version used at present in iCloud.


Study suggests Google’s ad-targeting system may discriminate » MIT Technology Review

Tom Simonite:

Researchers from Carnegie Mellon University and the International Computer Science Institute built a tool called AdFisher to probe the targeting of ads served up by Google on third-party websites. They found that fake Web users believed by Google to be male job seekers were much more likely than equivalent female job seekers to be shown a pair of ads for high-paying executive jobs when they later visited a news website.

AdFisher also showed that a Google transparency tool called “ads settings,” which lets you view and edit the “interests” the company has inferred for you, does not always reflect potentially sensitive information being used to target you. Browsing sites aimed at people with substance abuse problems, for example, triggered a rash of ads for rehab programs, but there was no change to Google’s transparency page.

What exactly caused those specific patterns is unclear, because Google’s ad-serving system is very complex. Google uses its data to target ads, but ad buyers can make some decisions about demographics of interest and can also use their own data sources on people’s online activity to do additional targeting for certain kinds of ads. Nor do the examples breach any specific privacy rules—although Google policy forbids targeting on the basis of “health conditions.” Still, says Anupam Datta, an associate professor at Carnegie Mellon University who helped develop AdFisher, they show the need for tools that uncover how online ad companies differentiate between people.

Google didn’t respond to the researchers’ requests. But, oddly, it changed the language on that transparency page. This is the AdFisher study


Apple Music and the listener-to-buyer ratio » Music Industry Blog

Mark Mulligan on the maths of streaming v buying:

What quickly becomes apparent is that the most viable route to ensuring Apple Music streaming revenue offsets the impact of lost iTunes sales revenue is as big an installed base of streaming users as possible. The more Apple Music users there are, the more likely more of them will find and listen to your music. This is why the scale argument so is so important for streaming and also why small labels feel the effect less quickly. If you have a vast catalogue you don’t need to worry too much about the listener-to-buyer ratio because you have so many tracks that you are a much bigger target to hit. The laws of probability mean that most users are going to listen to some of your catalogue.

Let’s say you are a big major with 1 million tracks out of the 5 million tracks that get played to any meaningful degree in streaming services. That gives you a 20% market share. But if you are an independent with 50,000 tracks that gives you 1%, 20 times less than the major. Which means that you are 20 times less likely to have your music listened to. And that is without even considering the biases that work in favour of the majors such as dominating charts and playlists, and other key discovery points.


YouTube gaming star PewDiePie ‘earned $7m in 2014’ » BBC News

YouTube continues to be a profitable enterprise for its top tier stars, who earn money from advertisements placed around their videos.

The site’s terms and conditions forbid creators from disclosing how much they earn, but on Monday gamer Olajide Olatunji, known as KSI, told the newspaper Metro he had earned enough money to buy his parents a house.

Although some stars supplement their income with product placement deals, [Felix] Kjellberg [aka PewdiePie] says he does not do very many.

“I make more than I need from YouTube,” he wrote on Reddit. “With that freedom, but also to respect my fans for making that possible, I don’t end up doing many endorsements.”

[Ian] Maude [of Enders Analysis] has a word of caution for anybody eyeing up YouTube with dreams of becoming a millionaire.

“As with many things, a few people at the top do exceptionally well but there’s a long tail of people who don’t make any money at all,” he said.

Why can’t they disclose how much they earn?


Apple Watch sales plunge 90% » MarketWatch

Brett Arends:

two-thirds of the watches sold so far have been the lower-profit “Sport” version, whose price starts at $349, according to Slice, rather than the costlier and more advanced models that start at $549.

In an ambitious bid for the luxury market, Apple also unveiled a gold “Edition” model priced at $10,000 or more. So far, fewer than 2,000 of them have been sold in the U.S., Slice contends.

Slice bases its research on electronic receipts sent to millions of email addresses following purchases. The company conducts market research on behalf of consumer-goods companies, among others, many of them in the Fortune 500.

Wall Street has been desperately trying to work out how well the new watch has been selling, but Apple has been refusing to say. The company, which in the past has updated Wall Street on the sales of new products soon after the launch, has yet to release any numbers about the watch.

Those Edition watches will have made a ton of profit. But apparently the fall in sales is “ominous”. Seems like about 3m sold in the US in the quarter. That’s about four times the number of Android Wear devices sold in seven months or so from multiple manufacturers at lower prices worldwide last year. Ominous.


Start up: Wi-Fi password sharing?, machine intelligence smart and stupid, Pebble Time review, and more


You’ll never believe what happens if you play it backwards. Photo by Janitors on Flickr.

A selection of 9 links for you. Show them eagerly to the person beside you! I’m charlesarthur on Twitter. Observations and links welcome.

UH OH: Windows 10 will share your WiFi key with your friends’ friends » The Register

Simon Rockman:

A Windows 10 feature, Wi-Fi Sense, smells like a security risk: it shares WiFi passwords with the user’s contacts.

Those contacts include their Outlook.com (nee Hotmail) contacts, Skype contacts and, with an opt-in, their Facebook friends. There is method in the Microsoft madness – it saves having to shout across the office or house “what’s the Wi-Fi password?” – but ease of use has to be teamed with security. If you wander close to a wireless network, and your friend knows the password, and you both have Wi-Fi Sense, you can now log into that network.

Wi-Fi Sense doesn’t reveal the plaintext password to your family, friends, acquaintances, and the chap at the takeaway who’s an Outlook.com contact, but it does allow them, if they are also running Wi-Fi Sense, to log in to your Wi-Fi. The password must be stored centrally by Microsoft, and is copied to a device for it to work; Microsoft just tries to stop you looking at it. How successful that will be isn’t yet known.

“For networks you choose to share access to, the password is sent over an encrypted connection and stored in an encrypted file on a Microsoft server, and then sent over a secure connection to your contacts’ phone if they use Wi-Fi Sense and they’re in range of the Wi-Fi network you shared,” the Wi-Fi Sense FAQ states.

Has been on Windows Phone for ages, yes, but most WP users don’t know any significant number of other WP users (because they’re so few). Not so with Windows. Microsoft says it only allows internet access and not LAN access – via port restrictions? That’s going to get hacked for sure.

Or could people maliciously spread their Wi-Fi details to try to sniff people’s viewing habits and details?


Pebble Time review » Wareable

Sophie Charara:

First things first, the Pebble looks better in real life than the pics you’ll have seen online. The black model is a little boring but will look neat under suit sleeves – for the record, we prefer the red and black Time.

Admittedly, the Time is plasticky, with a stainless steel bezel, but it retains the toy-like charm of the original Pebble while adding friendlier, more unisex curves. It’s very light at just 42.5g including the standard strap, 20% thinner at 9.5mm and the new slightly curved body helps to make it comfortable to wear on the wrist.

It’s amazing how many smartwatch manufacturers are satisfied with making devices that sit flat on top. The Time is the kind of smartwatch you can forget you’re wearing, until it vibrates.

I bought an original Pebble on Kickstarter. This? Looks like a toy compared to the Apple Watch. Not quite half the price, but really nothing like half as attractive.


Apple Sim iPads change the international data roaming game » Fortune

This morning, Apple and GigSky teamed up to offer travelers the ability to instantly connect to a local data network in more than 90 countries and territories upon touchdown—no need to visit a kiosk, talk to a service agent, or really, do anything at all. Instead, iPads with AppleSIM cards will automatically offer the option to sign up for a data plans as soon as a local network is in reach. (The GigSky network includes most of Western Europe, from France and Germany to the Netherlands; Australia; South Africa; parts of the Middle East; and beyond.)

Because travelers are accessing onto local networks, rather that roaming from their domestic carrier, prices are impressively affordable as long as you’re traveling on the beaten path. Entry-level data plans begin at just $10, covering anywhere between 10MB (in Papua New Guinea) to 75 MB (in Italy); in countries with better access, the premium plans top out at 3GB for $50. By comparison, AT&T’s best deal currently charges $30 for 120 MB or $120 for 800 MB.

Latest iPads only have them preinstalled, although for older ones you can get Apple SIMs in its stores, apparently.


Superconductivity record bolstered by magnetic data » Scientific American

Edwin Cartlidge:

The long-standing quest to find a material that can conduct electricity without resistance at room temperature may have taken a decisive step forward. Scientists in Germany have observed the common molecule hydrogen sulfide superconducting at a record-breaking 203 kelvin (–70 ˚C) when subjected to very high pressures. The result confirms preliminary findings released by the researchers late last year, and is said to be corroborated by data from several other groups.

Some physicists urge caution, however. Ivan Schuller at the University of California in San Diego, says that the results “look promising” but are not yet watertight.

Pressure of 1.5 million atmospheres. Don’t hold your breath for this one.


Why the BBC is wrong to republish ‘right to be forgotten’ links » The Guardian

Julia Powles:

The reaction to [BBC Online managing editor Neil] McIntosh’s post was predictable, inaccurate and devastating. The Times led with “BBC lists stories on abusers and rapists hidden under ‘right to be forgotten’”, gratuitously highlighting two stories.

The first was a 12-year-old story about a settlement between an alleged rape victim and the Catholic church, over incidents that occurred a half-century ago. The long-deceased abuser clearly couldn’t have filed the obscurity request with Google – leaving, rather less salaciously, the victim.

The second case concerned a nanny jailed for child abuse. Even a cursory Google search coupled with the basics of the Rehabilitation of Offenders Act would have told the journalist that an unspent conviction for such an offence clearly denied any reasonable claim to delisting. Caution raised, a bit more searching would have revealed the truth: that the conviction was overturned by the Court of Appeal. That former nanny has been exculpated under the law of the land – but not by Google and not, it seems, by the press either.

Other publications followed suit. Boing Boing drew attention to a rape story. Given it concerned a fairly recent conviction in 2012, clearly the sex offender has no entitlement to be delisted.

But what about his friend who was also named in the article because he happened to be in the house where the attack took place?

The “right to be forgotten” is so poorly understood, which frustrates the hell out of me. (See the comments under the article.) I wrote an explanation of what it is, and what it is not; please, before you discuss the topic with me (or anyone), read and absorb it. The topic is simple. It just takes a bit of thought.


Growing conspiracy theory: is spy equipment really included in Samsung smartphone batteries? » BusinessKorea

Cho Jin-young:

A video circulating on Facebook and YouTube that was posted at the beginning of the last week of June shows that after tearing off a sticker that wraps around the battery of the Galaxy S4, the man in the video points to a small coil inside, saying, “This is the spy equipment.”

He remarked, “Samsung can record pictures on your smartphone and overhear your calls through the coil shaped like this antenna,” adding, “So, you’d better tear off the sticker that wraps the battery first and use the phone.”

In fact, this video attracted 12 million views on Facebook only four days after it was initially posted, and around 300,000 people reportedly shared the video.

However, local media outlets pointed out that this conspiratorial video originated from a misunderstanding about the Near Field Communication (NFC) antenna, a communication technology that makes it possible to transmit different kinds of wireless data to a distance of 10 cm.

Would be fun to know how weird ideas like this get started. I’ve seen a few incoming search queries on this to this blog, and wondered what was going on (it was because I wrote about Samsung obviously knowing whether people use replacement batteries).


DRAM spot prices hit 28-month low, says Taiwan Central News Agency » Digitimes

Jessie Chen:

Spot prices for 4Gb DDR3 chips already declined 17.55% in the second quarter, after falling 12.77% in the first quarter, the report quoted DRAMeXchange as saying.

Since 2015, DRAM spot prices have been dragged down by sluggish PC sales and a slowdown in smartphone demand, the report noted.

Hadn’t heard about this slowdown in smartphone demand anywhere else. China has, but elsewhere? Dram prices are often an early warning though.


Google apologises for Photos app’s racist blunder » BBC News

Google says it is “appalled” that its new Photos app mistakenly labelled a black couple as being “gorillas”.

Its product automatically tags uploaded pictures using its own artificial intelligence software.
The error was brought to its attention by a New York-based software developer who was one of the people pictured in the photos involved.

Google was later criticised on social media because of the label’s racist connotations.
“This is 100% not OK,” acknowledged Google executive Yonatan Zunger after being contacted by Jacky Alcine via Twitter.

“[It was] high on my list of bugs you ‘never’ want to see happen.”

Machines can’t be racist, of course; but quite how Google is going to prevent this happening again is an open question. Neural network/deep learning like this isn’t something you can tweak directly. You can’t really peer inside it. Great when it’s drawing arcane pictures, not good when it’s mislabelling pictures.


Could this computer save your life? » CNN

Jillian Eugenios:

“In one panel of scans that we looked at, when you look at the number of times that radiologists sent someone home with a clean bill of health, about 7% of the time that patient was ultimately found to have cancer,” said John Zedlewski, a data scientist with Enlitic, a medical technology company.

When Zedlewski used Enlitic’s algorithm against the same panel, there weren’t any mistakes.

How does it work? Enlitic’s technology uses machine learning — which some say is a version of artificial intelligence. It takes medical information from one patient — whether it’s a CT scan, an X-ray or details about, say, a tumor — and then converts it into a mathematical representation. It’s then added to a large pool of data and compared to other patients who have experienced similar issues.

Think of it as crowdsourcing your symptoms. And not just with one or two people, but millions. The more data the computer has, the smarter it gets, and the more accurate the diagnoses.

At least that’s the dream.

Seems to have a large base of data.


Start up: China’s Uber ripoff, Microsoft’s maps and ads exit, Google v Oracle redux, and more


Low power, but still pretty powerful. Photo licensed from Apple, I guess, on Flickr.

A selection of 12 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

One driver explains how he is helping to rip off Uber in China » Bloomberg Business

To create a fake trip, an Uber driver has essentially two options, according to drivers interviewed by Bloomberg, who asked not to be named discussing information that may get them barred by the company.

The first is a do-it-yourself option where the driver buys a hacked smartphone that can operate with multiple phone numbers and therefore multiple Uber accounts. Drivers use one number to act as a rider and request a lift, and then accept the trip as a driver with another phone number.

A driver like Li, for example, may know that he has a legitimate fare waiting for him at the airport, but he doesn’t want to make the trip there without getting paid. He could then request a trip as a rider, let the booking show up on Uber’s GPS tracking software as his car heads to the airport and then get paid by Uber for taking a “customer” on the route.

The second option involves working with other scammers over the Internet. If a driver doesn’t have a hacked phone, he can go into one of several invitation-only online forums and request a fake fare from professional ride-bookers. These bookers are referred to as “nurses” because they use specially tailored software to put an “injection,” or location-specific ride request near the driver.


Uber acquires part of Bing’s mapping assets, will absorb around 100 Microsoft employees » TechCrunch

Alex Wilhelm:

Uber will acquire assets from Microsoft Bing, including roughly 100 employees focused on the product’s image collection activities. In short, Uber is absorbing data-collection engineers from Microsoft to bolster its own mapping work.

The companies confirmed the transaction with TechCrunch, but each declined to name the terms of the agreement. Microsoft handing Uber part of its operating expenses is minor, given the financial scale of the firms. The technology transfer is far more interesting.

Uber’s app is essentially a map with add-ons, so that it would want to pick up engineers — currently the hottest Silicon Valley commodity1 — isn’t surprising. And that Microsoft might want to shed some talent that isn’t precisely core to its larger platforms and productivity efforts doesn’t shock.

So that’s one cost centre gone (and a nice win for Uber). One shoe drops..


Microsoft said to exit display ad business, cut 1,200 jobs » Bloomberg Business

Dina Bass:

Microsoft Corp. is shutting down its Web display advertising business and handing operations over to AOL Inc. and AppNexus Inc., a person with knowledge of the matter said.

About 1,200 jobs at Microsoft will be impacted, with some positions to be moved to AOL and AppNexus, said the person, who asked not to be identified because the deal hasn’t yet been announced. Some people will be offered other positions at Microsoft, while other jobs will be cut, the person said.

The software maker is shedding the business as Chief Executive Officer Satya Nadella works to sharpen focus on three key areas: personal computing, cloud platforms and business productivity.

And now we wait for the other other shoe to drop. Note how these disposals have come just ahead of the end of the fiscal quarter; Nadella is cleaning house.


CVE-2015-3113 (Flash up to 18.0.0.160) and Exploit Kits » Malware don’t need Coffee

Patched four days ago (2015-06-23) with Flash 18.0.0.194, the CVE-2015-3113 has been spotted as a 0day by FireEye, exploited in limited targeted attacks.  It’s now making its path to Exploit Kits

In other words, if there’s a Flash installation on your network that hasn’t been patched in the past four days, it’s vulnerable. (In this case, to malware aiming to exploit IE11 on Windows 7.)

If you haven’t removed Flash from your computer.. why not? YouTube will work fine (it goes to HTML5).


Reddit is an incubator of hate » BuzzFeed News

Charlie Warzel, pulling no punches:

At the core of the problem is Reddit’s newfound vow to police hate only when it manifests into real-world harassment — that is, to create a distinction between ideas and behavior that doesn’t actually exist. Ideas inform and incite behavior; we see this both in the physical world and on Reddit, where the ideals and discussions of its thousands of communities are reflected in the actions — both good (raising money for a Kenyan orphanage as well as a terminally ill cancer patient) and bad (Violentacrez, r/creepshots, and The Fappening) — of its members.

What’s more, there’s credible research to suggest that right-wing extremist online communities are frequently linked to hate crimes. An April 2014 report from the Southern Poverty Law Center found that more than 100 murders have been linked to Stormfront.org, a white nationalist website and forum that first emerged in 1995. The author of the report, Heidi Beirich, told The Guardian that her research showed that online hate forums helped nurture and strengthen already formed prejudices and, in the case of Stormfront, transform them into real-world violence


Benchmarks show iPhone performance difference when iOS 9’s Low Power mode is activated » Mac Rumors

Juli Clover:

Without Low Power mode activated, an iPhone 6 Plus scored 1606 on the single-core processor test and 2891 on the multi-core processor test. When Low Power mode was turned on, the same iPhone 6 Plus scored 1019 on the single-core test and 1751 on the multi-core test, suggesting there’s a significant performance reduction when Low Power mode is enabled to save as much battery as possible.

Results were similar on an iPhone 5s, with performance reduced by about 40%. We saw single/multi-core scores of 1386/2511 without Low Power mode and scores of 816/1405 with Low Power mode turned on.

Low Power mode activates when an iPhone is at 10% or 20% battery level, providing a popup that lets users toggle it on quickly. It can also be turned on via the new Battery section of the Settings app. When it’s turned on, in addition to lowering CPU speeds, Low Power mode also disables Mail Fetch, Background App Refresh, motion effects, and animated wallpapers.

At a guess, most people won’t notice the difference in processing power of engaging Low Power, but will like the battery life difference. And iOS 9 (in my own early testing) has remarkable battery life if you don’t have the phone baseband running, ie on non-LTE iPads and phones with Airplane mode engaged but Wi-Fi and Bluetooth on (so mobile calls and data aren’t on). And it’s still only beta 2.


The secret to groovy drumming may be math » Science/AAAS

Kerry Klein:

Holger Hennig, a physicist at the Max Planck Institute for Dynamics and Self-Organization in Göttingen, Germany, and colleagues decided to analyze the technique of prolific drummer Jeff Porcaro, one of the more famous musicians most people have never heard of. For more than a decade he drummed for the band Toto, and as a session musician he kept time for an extensive list of musical icons including Pink Floyd, Steely Dan, Michael Jackson, and Madonna. Porcaro died of a heart attack in 1992. Hennig and his colleagues chose to study Porcaro’s technique because the paper’s lead author, physicist Esa Räsänen of the Tampere University of Technology in Finland, is himself a drummer and admires Porcaro’s work.

As a representative sample of Porcaro’s timekeeping skills, the research team focused on the studio recording of the 1982 hit “I Keep Forgettin’ ” by singer Michael McDonald. The rapid, high-pitched tink-tink-tink-tink keeping the beat is the hi-hat, a clamshell arrangement of two small cymbals that a drummer opens and closes with a foot pedal and simultaneously strikes with a drumstick. With one hand, Porcaro hit the hi-hat four times on every beat, in subbeats known as sixteenth notes, and motored out almost 400 of them in every minute of the song.

It turns out that fractals are lurking. (Though when did he drum for Pink Floyd, exactly? I thought that was Nick Mason’s job.)


Hacker News » Premii

If you ever read Hacker News, you’ll have been frustrated by the way you have to click away to read the article, then click back (or to another tab) to read the comments on the story.

No more: now it’s in a convenient interface on Premii.


Do you trust Google to be the gatekeeper of your kids’ content? » Digital Content Next

Chris Pedigo (who is SVP of government affairs at DCN):

Google’s YouTube for Kids service is getting some attention recently from regulators and policymakers in Washington, DC. The FTC and now Senator Bill Nelson (D-FL) are asking questions about how content is selected for YouTube for Kids and how Google helps young viewers understand the difference between content and advertising. It has been alleged that some content is not appropriate for children and that some advertising in or around the content may not be labeled clearly enough for children and their parents.

While Google has a history of innovation, upending old business models and creating new opportunities and experiences via the internet, their “developer mentality” of breaking things to create even better new things may not work the same when it comes to products targeted to kids.

YouTube is great if you’re an adult, a disaster area (from a parent’s point of view) if you’re a child. Dividing the world into “over 18/under 18” really doesn’t work.


Oracle v. Google Android-Java copyright case goes back to San Fran: Supreme Court denies Google petition » FOSS Patents

Florian Müller (who has followed the ins and outs of this case over the years):

Now that the Supreme Court has denied Google’s petition and appellate attorney Joshua Rosenkranz (of Orrick Herrington Sutcliffe) has once again shown why he was dubbed the “Defibrillator” (for bringing cases back to life that appeared to have been lost), the sizable litigation caravan that had gone from California to Washington DC for the appellate proceedings–where an amazing reversal of fortunes occurred, with Oracle now having the upper hand–can finally head back all the way to the West. There, “fair use” will be the topic du jour. And, provided that Oracle wins (which I’ve always believed it will), remedies. This means injunctive relief more than anything else. The strategic implications are not described accurately by portraying this as a billion-dollar case.

On this occasion I do wish to say a few things about fair use. About a year ago I explained why I ultimately concluded that Google Books probably should fall under the “fair use” exception, but Android should not. What is really the idea of “fair use”? At a philosophical level, it’s all about whether, on balance, an unauthorized use of copyrighted material does more good than harm.

It’s difficult to get a handle on this case, but Müller is fairly sure that Google is going to have to pay something – perhaps quite a large something – to Oracle. (Note: Müller acts as a consultant to Oracle, and others. But his line on this case has been consistent since before Oracle hired him.)


Sky reveals evidence of Openreach service failure and calls for market investigation » Sky

In the submission, Sky sets out details of the standard of service delivered to consumers by BT’s Openreach division, which operates and maintains the UK’s national telecoms network. The evidence highlights how a history of under-investment has led to range of service quality problems including an excessive number of network faults, failure to meet targets for repairing faults, long waits to have new lines installed, appointments that are missed and jobs that are not completed. 

Key findings from Sky’s submission include:

More than 90% of new line installations, which require an Openreach engineer to attend, take 10 calendar days or longer. Almost one in ten installations takes longer than 30 days.
• Openreach changes the agreed installation date for Sky customers on average around 36,000 times a month.
• Openreach misses over 5002 appointments each month to install new lines for Sky customers and fails to complete a further 4,000 jobs per month.
• Fault rates across Openreach’s network increased by 50% between 2009 and 2012, the last year for which reliable data is publicly available.
• Openreach’s performance in fixing faults is consistently below the targets set out in agreements with service providers.

BT Openreach is such an anomaly. The electricity grid is owned separately from power generators; the railway lines aren’t owned by the train operators. So why does the dominant landline provider get to own the company doing landline upkeep and determine its budgets?


Galaxy S6 sales to reach 45 mln units in 2015: report » Yonhap News

“Samsung continues to struggle at the low-to-mid end, while the Galaxy S6 and S6 Edge combined look on course to reach a respectable 45m units this year,” EE Times said, citing a report released by Deutsche Bank.

If the sales estimate is accomplished, the Galaxy S6 will manage to catch up with the Galaxy S4, which holds the current annual sales record at 45m units.

The latest estimate, however, falls behind expectations made earlier by other market analysts.

Industry tracker DRAMeXchange had earlier estimated combined sales of 55m units for the new lineup, while Hong Kong-based researcher Counterpoint had offered a 50m sales figure for this year.


Start up: the forcePhone, analysts cut Samsung Q2 forecasts, bogus Beats?, the jailbreak economy, and more


Like this (from a MacBook), but in a phone. Photo by LoKan Sardari on Flickr.

A selection of 9 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Apple suppliers start making iPhones with Force Touch » Bloomberg Business

Tim Culpan:

Apple has started early production of new iPhone models with a feature called Force Touch, which senses how hard users are pressing down on a screen, people with knowledge of the matter said.

Its newest iPhones, in the same 4.7in and 5.5in versions as the current iPhone 6 and iPhone 6 Plus devices, will have a similar exterior design, the people said. Volume manufacturing is scheduled to ramp up as soon as next month, they said.

Apple is bringing Force Touch, first unveiled for the Apple Watch and the newest MacBook model, to the iPhone at least two years after it started working with suppliers to perfect the pressure-sensitive displays.

Totally makes sense; why do you think Apple has been making so much noise about this feature on its PCs?


China adds 20 million 4G users in May » Chinadaily.com.cn

Xinhua (the official Chinese news agency):

The number of 4G users in China continued to grow in May, with 20 million added during the period, the Ministry of Industry and Information Technology (MIIT) said on Thursday.

There are now 200 million 4G clients in China, as the country steps up investment in the telecom industry to expand broadband coverage. In total, there were 657 million mobile broadband users, including 3G and 4G users, at the end of May.

Even if it’s a some way off, China is still the biggest 4G provider in the world.


Taylor Swift may have triumphed, but Apple will still call the tune » The Guardian

I wrote about the whole Apple/Swift/streaming shenanigans:

Martin Goldschmidt, the founder and chief executive of independent record label Cooking Vinyl, whose artists include Marilyn Manson, Amanda Palmer, Billy Bragg and Groove Armada, says that Swift’s decision could certainly not have been because the video service pays better.

“YouTube has a revenue-sharing scheme from adverts, not per-stream, but compared to Apple or Spotify it pays one-tenth to one-twentieth as much per play,” he says. “People see music on YouTube as promotion – wrongly – and Spotify as the destination, the endgame. The reality is that YouTube is the biggest place for music consumption on the planet.

“The reason is that YouTube has colossal reach. We’re in the strange situation where 10m plays on Spotify is viewed as lost sales, while 10m plays on YouTube is a marketing success.”

It’s often overlooked that YouTube’s ad-supported streaming makes Spotify’s look like chicken feed.


Of Ma and malware: inside China’s iPhone jailbreaking industrial complex » Forbes

Great piece by Thomas Fox-Brewster:

Any hacker who can provide the full code for an untethered jailbreak, where the hack continues to work after the phone reboots, can expect a big pay check for their efforts. “Many experts agree the price for an untethered jailbreak is around $1 million,” says Nikias Bassen, aka Pimskeks, a lanky 33-year-old iOS hacker who is part of the evad3rs hacker collective. More often, sellers of iOS zero-day vulnerabilities – the previously-unknown and unpatched flaws required for jailbreaks – make thousands if not hundreds of thousands of dollars from Chinese firms, private buyers or governments, in particular three-letter agencies from the US.

Such big sums are on offer due to the explosion of the third-party app store industry in China. There are at least 362 million monthly active mobile app users in China, according to data provided by iResearch. Whilst smartphone owners in Western nations are content within the walled gardens of Apple and Google app stores for their games, media and work tools, the Chinese are fanatical about apps and want the broadest possible choice from non-Apple app stores. Jailbreaks, which do away with Apple’s chains and allow other markets on the device, are thus vital to meeting that demand.

Super-detailed piece, which also points to Alibaba’s involvement in this shady practice.


Google helps British criminals polish their image – but what about the innocent » The Register

Andrew Orlowski:

Just to make sure of Google knew its obligations, the Judges pointed out that information had to be “inadequate, irrelevant or no longer relevant” for an applicant to succeed. This would seem to rule out figures in public life wanting details related to their professional lives from succeeding in scrubbing them away … or serious criminals: under UK law, a conviction resulting in a sentence of more than four years is never “spent” under the Rehabilitation of Offenders Act. In serious criminal cases the public interest is unambiguous.

However, someone who has committed no major crime – or merely done something embarrassing – should usually be allowed to have it forgotten at some point rather than having the incident follow them around on the internet forever.

How do ordinary people who have done ordinary things, for whom the law was designed, fare? It’s difficult to say. No deletion requests have been sent to the ICO for the Courts to decide – Google has acted as judge and jury, voluntarily. Google says it has removed 39,000 links and declined to remove 66,000 in the UK. In many cases, academic Julia Powles explained to us, it’s an incidental character such as a witness who actually lodged lodged the request rather than the subject of the story. Requesters are understandably reluctant to attract publicity. Until an academic conducts a credible study.

Yet from the Telegraph and BBC lists, it’s clear that people convicted of serious crimes are getting their reputations cleaned – even if they didn’t request the original deletion. Surely that’s the opposite of what the law intended: Google is rewarding the guilty.


Uh-oh: Beats teardown apparently used Beats knockoffs » Core77

Rain Noe:

The prototype engineer who did the breakdown, Avery Louie, never mentions what model of Beats he tore down. But he refers to the price as $199, which is consistent with Beats’ Solo 2 headphones. However, the color scheme in Louie’s photos doesn’t match the Solo 2 offerings, indicating he used Beats’ discontinued Solo HD, which also retailed for $199. And here’s where it starts to unravel.

Louie found just two drivers, one per ear, in his teardown. But the Solo HD contains four drivers, two per ear. So it appears Louie’s been given a bogus pair.

Entirely possible – wander around Shenzhen and there are “Beats” headphones absolutely everywhere.


Between Kickstarter’s frauds and phenoms live long-delayed projects » Ars Technica

Casey Johnston:

Ethan Mollick, a professor in management at University of Pennsylvania’s Wharton School, does some of the most quoted research on the business of crowdfunding. In a 2013 study, he found that 316 of the 471 successfully funded projects analyzed—all with estimated delivery dates of July 2012 or earlier—promised to deliver a physical product. Only three of those 471 projects had declared failure and offered refunds, while another 11 dropped off the map and stopped responding to their backers. Actual shameless fraud appeared rare.

“The concerns about the ability of projects to deliver, however, are supported,” Mollick wrote. Only 24.9% of the projects analyzed delivered on time, and 33% “had yet to deliver” at the time of analysis. The average delay measured 2.4 months. Projects that raise ten times their goal are half as likely to deliver on time.

Mollick also found a correlation between how much money a project raised and delays: projects that raised under $50,000 had a near-perfect delivery rate after eight months’ delay, while projects that raised more than $50,000 hovered around a 75 percent delivery rate eight months later. According to the New York Times Magazine, Mollick reported that since his 2012 evaluation, another 14 percent of projects had delivered either nothing or a subpar product.

Mollick takes the opposite stance. “I’m impressed so many things get delivered at all,” he told Ars.

Good to have some statistics on this.


The Samsung Galaxy S6 is the world’s fastest smartphone » Tom’s Guide

Sam Rutherford and Alex Cranz:

A fast phone shouldn’t just score well in benchmarks. It should deliver swift, everyday performance, too, whether it’s opening a large file, gaming without lag or firing up its camera faster than you can say “cheese.” We pitted six of the latest smartphones against each other in nine rounds of competition, and the Galaxy S6 blew away the field, finishing first in 6 out of 9 real-world tests and synthetic benchmarks.

The LG G4 is our runner-up, turning in the fastest camera-open time and storage benchmark score. The iPhone 6 finished third, tying for first in our real-world gaming test and second in our PDF load-time score. The biggest letdown was the Nexus 6, which finished fifth overall and dead last in opening our PDF, camera-open and gaming tests.

Turns out there’s barely any difference – could you tell the difference between a camera load time of 52.5 milliseconds v 61.5ms? OK, the Nexus 6 load time of 128ms is a lot more. But many of these are the sorts of “differences that don’t make much difference”.


Estimates of Samsung Electronics’ Q2 profits adjusted downward » BusinessKorea

Cho Jin-young:

Korea Investment & Securities adjusted its forecast downward from 7.717trn won (US$6.957bn) to 7.046trn won (US$6.352bn) on June 24, adding that the profits of every business unit but semiconductors are predicted to fall short of expectations.

[Other analysts cut their forecasts too.] According to financial information provider WISEfn, the average estimate fell from 7.4565trn won (US$6.7222bn) to 7.3488trn won (US$6.6244bn) between late March and early this month, and then to 7.2518trn won (US$6.5376bn) on June 24. As recently as a month ago, Hyundai Securities, IBK Investment & Securities, and HMC Investment & Securities used to expect that it profits would exceed 8trn won.

The drop in estimates can be attributed to sluggish smartphone sales. “It seems that the sales volume of the Galaxy S6 and the Galaxy S6 Edge have been less than expected, due to a supply shortage and consumer preference for the iPhone 6,” Mirae Asset Securities explained. Nomura Securities recently lowered its Galaxy S6 shipment estimates for the second quarter by three million to 18m units.

18 million is still a lot.


Start up: Kickstarter disappointment, the Apple leaks source?, Google is listening, and more


Wikipedia: missing pieces on mobile. Photo by @bastique on Flickr.

A selection of 8 links for you. They join things together. I’m charlesarthur on Twitter. Observations and links welcome.

After raising $1 million, the super-thin CST-01 watch won’t make it to Kickstarter backers » The Verge

Jacob Kastrenakes:

The project has run into quite a few issues, but the broadest one is that the watches just aren’t easy to make. Little more than half of them are fully working after assembly, according to the two engineers behind CST-01, which means that the costs to make them are effectively doubled unless they can resolve the underlying issues. At this point, they can’t. As they explained in an earlier update, their project is basically out of money. One of their engineers supposedly went as far as sleeping in a van outside of the production factory so that he didn’t have to pay for a hotel.

Hardware is difficult.


Thoughts on Mark Gurman’s 9to5Mac article about Apple Watch rumors » Mobile Forward

Hristo Daniel Ushev, who worked at Motorola for eight years, on Gurman’s likely source, who he reckons is probably not an Apple employee:

It’s probably someone helping Apple with consumer research. I’m saying that because the leaked information concerns:

• “Considerations” (as far from a shipping product as a PowerPoint slide)
• Visible features, but no granular attributes (spec-level knowledge or software features)
• Price point variants
• Granular information from consumer research

Let’s combine these: a likely-external person, discussing feature “considerations”, without spec or software detail, about price point variants, and quoting granular information from consumer research. Based on that, I think it’s probably a low level employee (or attention-seeker) from a research firm that Apple trusted. The “considerations” may be features that appeared in a research aid.

Rings true. Takes nothing away from Gurman’s work in developing sources, of course.


Can Wikipedia survive? » The New York Times

Andrew Lih:

One of the biggest threats it faces is the rise of smartphones as the dominant personal computing device. A recent Pew Research Center report found that 39 of the top 50 news sites received more traffic from mobile devices than from desktop and laptop computers, sales of which have declined for years.

This is a challenge for Wikipedia, which has always depended on contributors hunched over keyboards searching references, discussing changes and writing articles using a special markup code. Even before smartphones were widespread, studies consistently showed that these are daunting tasks for newcomers. “Not even our youngest and most computer-savvy participants accomplished these tasks with ease,” a 2009 user test concluded. The difficulty of bringing on new volunteers has resulted in seven straight years of declining editor participation.

In 2005, during Wikipedia’s peak years, there were months when more than 60 editors were made administrator — a position with special privileges in editing the English-language edition. For the past year, it has sometimes struggled to promote even one per month.


Google Chrome listening in to your room shows the importance of privacy defence in depth » Privacy Online News

Pirate Party chief Rick Falkvinge:

it should be noted that this was Chromium, the open-source version of Chrome. If somebody downloads the Google product Google Chrome, as in the prepackaged binary, you don’t even get a theoretical choice. You’re already downloading a black box from a vendor. In Google Chrome, this is all included from the start.

This episode highlights the need for hard, not soft, switches to all devices – webcams, microphones – that can be used for surveillance. A software on/off switch for a webcam is no longer enough, a hard shield in front of the lens is required. A software on/off switch for a microphone is no longer enough, a physical switch that breaks its electrical connection is required. That’s how you defend against this in depth.

Of course, people were quick to downplay the alarm. “It only listens when you say ‘Ok, Google’.” (Ok, so how does it know to start listening just before I’m about to say ‘Ok, Google?’) “It’s no big deal.” (A company stealth installs an audio listener that listens to every room in the world it can, and transmits audio data to the mothership when it encounters an unknown, possibly individually tailored, list of keywords – and it’s no big deal!?) “You can opt out. It’s in the Terms of Service.” (No. Just no. This is not something that is the slightest amount of permissible just because it’s hidden in legalese.) “It’s opt-in. It won’t really listen unless you check that box.” (Perhaps. We don’t know, Google just downloaded a black box onto my computer. And it may not be the same black box as was downloaded onto yours. )

Early last decade, privacy activists practically yelled and screamed that the NSA’s taps of various points of the Internet and telecom networks had the technical potential for enormous abuse against privacy. Everybody else dismissed those points as basically tinfoilhattery – until the Snowden files came out, and it was revealed that precisely everybody involved had abused their technical capability for invasion of privacy as far as was possible.

When Google is making Falkvinge look reasonable, it’s made a bad mistake.


April 2010: Nokia exec: phones to make system cameras obsolete » Reuters

Tarmo Virki:

(From April 2010:) Fast developing cameraphone technology will shortly make SLR system cameras and even professional cameras obsolete, the sales chief of the world’s top cellphone maker Nokia said on Tuesday. “They will in the very near future revolutionise the market for system cameras,” Anssi Vanjoki said in a speech in Helsinki.

“There will be no need to carry around those heavy lenses,” Vanjoki said, pointing to a professional photographer taking pictures of him.

The proliferation of smartphones with picture quality comparable to most pocket cameras has boosted photography around the world, but they have so far not challenged real system cameras due to phones’ smaller size and weaker technology.

Vanjoki said high-definition (HD) quality video recording was also coming to cellphones within the next 12 months.

Wasn’t wrong. Yet the other elements of the smartphone business were more important.


The Asia report: leading the shift from… » Flurry Insights Blog

Flurry’s Chris Klotzbach:

Although we continue to see growth and user engagement in traditional app categories like Messaging & Social and Gaming, users in Asia demonstrated that in 2015, they are utilizing their smartphones and apps for more functional and practical purposes. This is indicated in the growth in the Shopping & Lifestyle and Utilities & Productivity app categories. Asia is the home of the phablet, and we see users have embraced this form factor- not only in terms of installed base but actual app usage. Just as the rest of the world is beginning to catch on to the phablet, only time will tell if we’ll catch up to Asia’s propensity to be productive and shop!


Impact of iOS 9’s space requirement » David Smith

Smith is an iOS developer:

using the dataset I have from my Audiobooks app I took at look at how many of my customers have enough space for the upgrade.

The result was pretty promising.

66% of my customers on eligible devices have at least 1.3GB of free space. This compares to just 37% of users who would have immediately had sufficient space at the old iOS 8 requirement.

The distribution of eligible devices breaks out roughly as you’d expect for the various capacities Apple sells:

Apple iphone upgrade potential

The rate for the 16GB devices (54%) is higher than I would have initially feared. The 16GB capacity accounts for 58% of devices, so it is vitally important that its users have the ability to upgrade.

This reduction in the space requirement (and other things Apple is doing on this front) make me think iOS 9 adoption to be even faster than iOS 8’s.


Google launches free streaming service ahead of Apple Music debut » Reuters

Yasmeen Abutaleb:

Google Inc launched a free version of its music streaming service on Tuesday, as it sought to upstage the debut of Apple Inc’s rival service next week.

Google Play Music has offered a $9.99 per month subscription service for two years but Tuesday’s launch is the first free version of the streaming service. It is available online and will be available on Android and iOS by the end of the week, Elias Roman, Google product manager, said.

Apple said earlier this month it would launch a music streaming service on June 30 for $9.99 per month along with a $14.99 per month family plan, with a free three-month trial.

As with other streaming services, such as Spotify and Rhapsody, Google Play Music curates playlists. Users can tailor playlists based on genre, artist or even activity, such as hosting a pool party or “having fun at work.”

“We believe this is a play that will expose a lot of people to the service,” Roman said in an interview.

Unlike Google’s subscription music service, the free service will carry ads, be unavailable offline and exclude certain songs.

Here’s the official announcement. What I find really weird is that Google, the high priests of “let machines do it”, is highlighting the human-curated nature of these playlists.


Start up: tracking Android, the 1998 software warning, Google’s revenge porn move, VUT Swift?, and more


Another micropayment from Amazon! Photo by Amanda Emilio on Flickr.

A selection of 8 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Android Tracker » Fiksu

In contrast to the iOS industry statistics, the Android landscape is much more fragmented, with dozens of manufacturers and thousands of devices on the market. We’ve put together four charts to help illuminate the situation:

• Android Tablet vs. Phone Usage
• Android Version Monitor
• Top Android Manufacturers
• Top Android Phones
• Top Android Tablets

The one for phone manufacturers is eye-opening, to say the least. Worth bookmarking. (Via Daniel Tello.)


BlackBerry’s Classic moment, or not » WSJ

Spencer Jakab:

Two things could leave the market pleasantly surprised on Tuesday. One would be an announcement that BlackBerry is distancing itself from handsets, devoting more resources to software. The other would be if that latter business shows signs of meeting some ambitious revenue targets laid out by chief executive John Chen.

A hopeful sign on software sales would affect the share price far more than if BlackBerry’s loss for the period through May was better than the 5 cents a share projected by analysts. They see BlackBerry reporting software and support revenue of $83m for the quarter, up from $56m a year earlier. The company wants to more than double the annual figure in fiscal 2016 to $500m and to produce operating profits on a sustained basis. That would come as services revenue continues to shrivel, falling by about half this fiscal year.

I’ll post my own forecast for BlackBerry’s results an hour or two after this post goes live. (These days people write about BlackBerry almost as a curio; it’s the Crimea of the smartphone wars.)


Launch of the new Companies House public beta service » GOV.UK

In line with the government’s commitment to free data, Companies House is pleased to announce that all public digital data held on the UK register of companies is now accessible free of charge, on its new public beta search service.

This provides access to over 170 million digital records on companies and directors including financial accounts, company filings and details on directors and secretaries throughout the life of the company.

Free access to the data is available both through a web service and an application program interface (API), enabling both consumers and technology providers to access real time updates on companies.

Fabulous. Back in 2006, the pricing was opaque and redacted.


These hackers warned the Internet would become a security disaster. Nobody listened. » The Washington Post

Craig Timberg:

Your computers, they told the panel of senators in May 1998, are not safe — not the software, not the hardware, not the networks that link them together. The companies that build these things don’t care, the hackers continued, and they have no reason to care because failure costs them nothing. And the federal government has neither the skill nor the will to do anything about it.

“If you’re looking for computer security, then the Internet is not the place to be,” said Mudge, then 27 and looking like a biblical prophet with long brown hair flowing past his shoulders. The Internet itself, he added, could be taken down “by any of the seven individuals seated before you” with 30 minutes of well-choreographed keystrokes.

The senators — a bipartisan group including John Glenn, Joseph I. Lieberman and Fred D. Thompson — nodded gravely, making clear that they understood the gravity of the situation. “We’re going to have to do something about it,” Thompson said.

What happened instead was a tragedy of missed opportunity, and 17 years later the world is still paying the price in rampant insecurity.


“Revenge porn” and search » Google Public Policy Blog

Amit Singhal, Google Search SVP:

We’ve heard many troubling stories of “revenge porn”: an ex-partner seeking to publicly humiliate a person by posting private images of them, or hackers stealing and distributing images from victims’ accounts. Some images even end up on “sextortion” sites that force people to pay to have their images removed.

Our philosophy has always been that Search should reflect the whole web. But revenge porn images are intensely personal and emotionally damaging, and serve only to degrade the victims—predominantly women. So going forward, we’ll honor requests from people to remove nude or sexually explicit images shared without their consent from Google Search results. This is a narrow and limited policy, similar to how we treat removal requests for other highly sensitive personal information, such as bank account numbers and signatures, that may surface in our search results.

In the coming weeks we’ll put up a web form people can use to submit these requests to us, and we’ll update this blog post with the link.

You could almost call it a “right to be forgotten” or “right to be delinked”. Let’s see – person requests that information about them which is irrelevant asks to have those pages removed from search. Which are we talking about, Europe or revenge porn?


Amazon’s new plan to pay authors every time someone turns a page » The Atlantic

Peter Wayner:

Soon, the maker of the Kindle is going to flip the formula used for reimbursing some of the authors who depend on it for sales. Instead of paying these authors by the book, Amazon will soon start paying authors based on how many pages are read—not how many pages are downloaded, but how many pages are displayed on the screen long enough to be parsed. So much for the old publishing-industry cliche that it doesn’t matter how many people read your book, only how many buy it.

For the many authors who publish directly through Amazon, the new model could warp the priorities of writing: A system with per-page payouts is a system that rewards cliffhangers and mysteries across all genres. It rewards anything that keeps people hooked, even if that means putting less of an emphasis on nuance and complexity.

So, basically, book streaming? Is Taylor Swift going to come to their aid? Or is it just an encouragement to write books at a length that people want to read? I think every author would like to know where people gave up on their books, if they didn’t finish them. Though that might not be the point at which they stopped being interested.


An Open Letter To Apple » German Association of Independent Music Companies

From 18 June, ie two days before Taylor Swift’s similar open letter:

Your plan not to compensate independent labels during the three-month trial period leads to the assumption that you don´t respect the music of independent artists or the work their partners do. It is obvious that this will reduce the overall income for independent artists and labels significantly at a time when many depend on every cent for survival.

Clearly what VUT needed was to rename itself “Taylor Swifte” or something. Or perhaps this was just another outgrowth of the ire felt among independent musicians. Apple Music (or more accurately the move to streaming and away from downloads) is going to cause yet another earthquake in the industry, rather like when CDs stopped being big.


Samsung’s mobile OS dilemma » Monday Note

Jean-Louis Gassée:

When we look at what it would take for Samsung to come up with its own mobile OS, the first thing to note is that “operating system” is a misnomer. Surely, iOS and Android are operating systems in the old-school “kernel” sense: They manage drivers, memory, input and output streams, user tasks, and the like. But today, an “operating system” is much more than just a kernel, it includes rich frameworks that support a wide range of applications, games, maps, social networking, productivity, drawing… Building these frameworks is a much harder task than adapting a Linux kernel.

And the OS is just the beginning. What Samsung really wants is its own ecosystem, a set of services that will ensure its autonomy, growth, and lasting importance. It wants its own app store, maps, music/video, cloud storage…

How long would it take for Samsung to build all of this? Three years, four years? Add to this the difficulty of “skating to where the puck will be”, to divine where the industry will land four years from now.

Samsung hasn’t been much good at building an ecosystem, either: look at all the content companies it has bought and then dumped, or services (ChatOn) it has started and stopped.


Start up: Lightning at Twitter, academic publishers strangle libraries, that iOS/OSX hack explained, and more


Do you recognise this person? Photo by Tim Dorr on Flickr.

A selection of 8 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

New smart home gadget called ELLA Assistant wants you to put down your phone » Tech In Asia

Steven Millward:

The startup team, which is based in Shanghai, sees it being used for things like telling you that you should take an umbrella, reminding you that you’re running late to an appointment, or for turning off all your smart lights at once. With a single press, it could alert your significant other that you’re leaving the house.

All that will depend on it working nicely with the brand of smart lights that you have, or syncing with the online calendar service that you use. The fact that the ELLA Assistant is subservient to your phone and other smart gadgets means it has to work with them all with ease, or it won’t gain favor with consumers. War tells Tech in Asia that the team will add support for various things as demand arises, but there are no specific supported devices or services listed yet – which is because the little gizmo hasn’t even launched. Once it’s out, it’ll have its own app store.

The ELLA Assistant will hit Kickstarter some time in August.

Hmm. Don’t think so, somehow.


This is Twitter’s top secret Project Lightning » BuzzFeed News

Mat Honan:

Project Lightning will bring event-based curated content to the Twitter platform, complete with immersive and instant-load photos and videos and the ability to embed those experiences across the Web — and even in other apps.

“It’s a brand-new way to look at tweets,” says Kevin Weil, who runs product for the company. “This is a bold change, not evolutionary.”

It is also still a few months out, and things could change. But here’s how it will work.

On Twitter’s mobile app, there will be a new button in the center of the home row. Press it and you’ll be taken to a screen that will show various events taking place that people are tweeting about. These could be based on prescheduled events like Coachella, the Grammys, or the NBA Finals. But they might also focus on breaking news and ongoing events, like the Nepalese earthquake or Ferguson, Missouri. Essentially, if it’s an event that a lot of people are tweeting about, Twitter could create an experience around it.

This likely comes out of the machine-intelligence-curated tweet streams from a company that Twitter just bought – under Costolo’s leadership, don’t forget. He just took too long to do it. (By the way, in future could “top secret” – used in the headline – please be reserved for things that actually are top secret, such as the content of the Snowden documents, and not PR-led product demos by the CEO?)


Academic publishers reap huge profits as libraries go broke » CBC News

Researchers rely on journals to keep up with the developments in their field. Most of the time, they access the journals online through subscriptions purchased by university libraries. But universities are having a hard time affording the soaring subscriptions, which are bundled so that universities effectively must pay for hundreds of journals they don’t want in order to get the ones they do.

Larivière says the cost of the University of Montreal’s journal subscriptions is now more than $7m a year  – ultimately paid for by the taxpayers and students who fund most of the university’s budget. Unable to afford the annual increases, the university has started cutting subscriptions, angering researchers.

“The big problem is that libraries or institutions that produce knowledge don’t have the budget anymore to pay for [access to] what they produce,” Larivière said.

“They could have closed one library a year to continue to pay for the journals, but then in twenty-something years, we would have had no libraries anymore, and we would still be stuck with having to pay the annual increase in subscriptions.”

The kicker: the five largest academic publishers produce 53% of scientific papers in natural and medical sciences – up from 20% in 1973. Consolidation and monopoly.


EFF and eight other privacy organizations back out of NTIA face recognition multi-stakeholder process » Electronic Frontier Foundation

Jennifer Lynch:

Despite the sensitivity of face recognition data, however, the federal government and state and local law enforcement agencies continue to build ever-larger face recognition databases. Last year the FBI rolled out its NGI biometric database with 14-million face images, and we learned through a Freedom of Information Act (FOIA) request that it plans to increase that number to 52-million images by this year. Communities such as San Diego, California are using mobile biometric readers to take pictures of people on the street or in their homes and immediately identify them and enroll them in face recognition databases. These databases are shared widely, and there are few, if any, meaningful limits on access. 

EFF has been especially concerned about commercial use of face recognition because of the possibility that the data collected will be shared with law enforcement and the federal government. Several years ago, in response to a FOIA request, we learned the FBI’s standard warrant to social media companies like Facebook seeks copies of all images you upload, along with all images you’re tagged in. In the future, we may see the FBI seeking access to the underlying face recognition data instead.

Huh. The FBI does that, does it?


Apple criticised over ‘presumptuous’ news app email » BBC News

Kevin Rawlinson:

According to Graham Hann, the head of technology, media and communications at the law firm Taylor Wessing, the terms of the deal are broadly in line with industry standards – except the requirement to opt out.

“The content of the notice is not unusual, although it has deliberately been dumbed down, possibly for clarity,” he told the BBC.

“However, the optout approach is very unusual and I don’t see how the notice could form a binding contract without a positive reply.

“Apple clearly wants to launch with as much content as possible and has taken this risk-based approach. Some publishers may object and even threaten to sue.

“However, I think it would be hard to claim damage beyond a reasonable royalty fee.”

Soooo… it’s not actually a big deal?


Internet TV boxes: Nvidia pips Google for Android » FT.com

Tim Bradshaw:

while [Android TV] mostly got the dictation right, it often failed to produce the results I was looking for. Asking for Breaking Bad brought up detailed information about the show and its actors, but no way to watch it. This query also produced a link to Pomodoro Wear, a countdown timer app shaped like a tomato and designed for Google’s Android Wear smartwatch platform.

Even Google itself does not seem to know quite how to use Android TV. Its marketing materials suggest asking for “romantic comedies set in New York”. But when I tried that on the Android TV itself, it produced only a list of YouTube videos, the first of which was about Lego sets from a New York toy fair. With no When Harry Met Sally or Manhattan to be found, I can only wonder whether anyone else — including Google’s own staff — has ever searched for something to watch this way.

Bear in mind that Apple experimented with the same voice dictation system for TV and, by the account in the WSJ, abandoned it.


XARA exploits on Mac, iPhone, and iPad, and what you need to know » iMore

Rene Ritchie with a series of Q+As on the vulnerability disclosed yesterday:

Q: So were the App Stores or app review tricked into letting these malicious apps in?

A: The iOS App Store was not. Any app can register a URL scheme. There’s nothing unusual about that, and hence nothing to be “caught” by the App Store review.

For the App Stores in general, much of the review process relies on identifying known bad behavior. If any part of, or all of, the XARA exploits can be reliably detected through static analysis or manual inspection, it’s likely those checks will be added to the review processes to prevent the same exploits from getting through in the future

Apparently apps now have to state the URL schemes they will use in plaintext in a .plist file; that’s easy to review, and Apple can easily spot duplicates by static testing. Security researchers suggest Apple probably began adding such tests when it was told about the weakness – so this is perhaps already “fixed” in the simplest way it can be. (Checking plist files can be done retrospectively too.)


How useful will Google Now be? » Naofumi Kagami

With Google announcing Google Now on Tap at Google I/O 2015 and Apple announcing Proactive at WWDC 2015, there is now a lot of discussion on how useful these predictive personal assistants will be. In particular, there is a lot of discussion on how much data these personal assistants will need to collect about you, and whether these assistants need to send this data to be analysed in the cloud.

The problem I have with these arguments is that they do not go into specifics. Instead of say “everything is going to be cool”, we should be having a detailed discussion of how each predictive recommendation is actually made, and whether each recommendation could be performed easily on your local device, or whether it needs to be done in the cloud.

I think Kagami’s question is really “What things need to be in the cloud for predictive analysis to work?” You could argue that traffic or transit news needs to be analysed in the cloud (a la Google) so it can warn you about delays; but on the other hand, an Apple device could pull that data from the cloud, and look at what’s in your device, and warn you too.

So the quest goes on.


Start up: Grexit to bitcoin?, Google’s antitrust deadline, Merkel’s suspect PC, Samsung security hole and more


Stockpiled – a bit like HTC’s unsold phones. Photo by .dh on Flickr.

A selection of 7 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Bitcoin surges as Grexit worries mount, posts best run in 18 months » Reuters

Jemima Kelly:

Joshua Scigala, co-founder of Vaultoro.com, a firm that holds bitcoin for its customers and allows them to exchange it for gold and vice versa, said that Greeks were buying the currency as their trust in the authorities waned. It is also unclear what currency would be used if a Grexit does occur — another potential factor driving Greek demand for bitcoin.

“Some people aren’t waiting for the government to figure out an exit plan and are doing it for themselves,” said Scigala.

“You have people worrying about their families’ wealth or their life savings, and worrying that their money might be locked up in banks … They’d rather hold money in a private asset like gold or bitcoin.”

Scigala said over the past two months, with Greece locked in talks with its creditors, the company had seen a 124% pick-up in inflows from Greek IP addresses – numerical labels that identify computers and other internet-enabled devices.

124% = doubling. Which doesn’t amount to much, really, unless Greece was already a lot of business. Here’s the problem with this story. To buy bitcoin, you have to sell the euros to someone. If Greeks are withdrawing their euros from banks, why not hold on to those euros instead of buying bitcoin with them? Do they really think a post-Grexit euro will be worth less, rather than more? I’d bet on the latter.

There may be some Greek euros moving into bitcoin, which is moving bitcoin – but that only indicates that bitcoin has low liquidity, and so small amounts of money can move the value easily. Or else it’s something else altogether causing it.


Critics due to get EU’s Google antitrust charge sheet this week: sources » Reuters

Foo Yun Chee:

Microsoft, German publisher Axel Springer and 17 other critics of Google are expected to get a copy of the EU’s antitrust charge sheet against the search engine giant this week in order to allow them to provide feedback, four people familiar with the matter said on Tuesday.

The 19 companies, which include U.S. online travel site Expedia, U.S. consumer reviews website Yelp, online mapping service Hot-map and British price comparison site Foundem, helped triggered the European Commission’s case against Google nearly five years ago…

…Google has until July 7 to respond to the accusations. This can be extended on request. It can also seek a closed-door hearing to argue its case before a broad audience of antitrust officials and the critics.

The complainants were told on Monday to sign confidentiality waivers not to disclose the so-called statement of objections to journalists or public affairs consultants before they could get a copy of the redacted document, according to a Commission letter seen by Reuters.

The critics were told to restrict the charge sheet to their lawyers and economists.

Leaks in 3,2,1… And there’s Andrew Orlowski’s writeup of the Foundem examination into Google’s “search for harm” blogpost.


One tiny number can reveal big problems at a global smartphone maker » Bloomberg Business

Tim Culpan:

Tucked away in a corporate earnings report—past the data on profit margins and revenue growth, hidden deep inside a balance sheet—is a number that can tell you a lot about a mobile phone maker’s health. In the global smartphone war, brands are routinely measured by market share, revenue, profit, and the coolness of their ads. But one line item called finished goods inventory, which refers to the percentage of materials that were manufactured into phones but went unsold, can give insight into whether a company’s fortunes are changing.

The latest company to let phones pile up in warehouses and on store shelves is HTC. The Taiwanese company’s stock just fell to its lowest point in a decade after lowering its sales forecast on June 5 and announcing a NT$2.9 billion ($93 million) writedown, though it’s recovered some of that loss amid speculation the decline could make it a buyout target. HTC’s finished goods inventory had climbed to a record high 2.35% of total assets at the end of last quarter. During the company’s heyday, that figure rarely nudged above 1%.

Culpan has done a neat job, building on what I pointed out last week about HTC’s broader inventory numbers. Relating inventory to total assets is an effective way to look at it; here’s the graph.

HTC inventory as percent of assets
So now it’s higher than ever before. Finished goods inventory is going to be one of the first numbers people look at when the Q2 figures are published (in late July, probably).


Merkel’s PC was the first one infected in the Bundestag hack »Security Affairs

I have written many posts regarding a recent attack against the German Bundestag with caused a major data breach.

We discussed the possibility that the cyber attack against the German Parliament was coordinated by Russian state-sponsored hackers that spread a highly sophisticated malware inside the network of the Bundestag.

The consequence of the data breach could be serious for the German Government, German media states that Bundestag may need to replace 20,000 computers after the intrusion, an operation that could cost millions of euros.

New revelations in the investigation confirms that the cyber attack on the German Bundestag began with the compromise of Chancellor Angela Merkel’s personal computer.

Her phone by the NSA, her computer by Russia…


Flaw lingers in Samsung phones, illustrating hacking risk » WSJ

Danny Yadron:

Last fall, researchers at cybersecurity firm NowSecure found a bug in most Samsung smartphones that could allow hackers to spy on users.

In March, Samsung told NowSecure it had sent a fix to wireless carriers that they could distribute to users. It asked NowSecure to wait three months before going public.

Last week, the researchers bought two new Samsung Galaxy S6’s from Verizon Wireless and Sprint. They found both were still vulnerable to the security hole, which involves how the phone accepts data when updating keyboard software.

NowSecure CEO Andrew Hoog shared his version of events with The Wall Street Journal as his company prepared to release its research Tuesday. The story helps illuminate why hacking is so hard to stamp out.

That’s particularly true in smartphones, with its diffuse system of device makers, software programmers and network operators. Things likely are only to get worse as Americans connect their thermostats, door locks and cars to the Internet and face the need to update their software…

…Welton found he could hijack the process of updating one of the virtual keyboards Samsung installs on many Android smartphones. From there, he could eavesdrop on phone conversations, rummage through text messages and contacts, or turn on the microphone to capture audio.

That was possible, Hoog said, because Samsung didn’t encrypt the update process.

It’s the IOT vulnerability that’s the real worry here, much more than which make of phone is involved. Except that Samsung asked NowSecure for a year to fix the bug – a month after it was told about it. And what does this mean for Google’s “we find a bug and we publicise it in 90 days” stance?


Nokia faces lengthy arbitration over LG patent royalty payments » Reuters

Jussi Rosendahl:

Nokia said the arbitration with LG is expected to conclude within two years. Shares in Nokia rose 1.4 percent by 1204 GMT (8.04 a.m ET).

“This is becoming a more and more common model. The companies won’t go to the court but instead let an independent party decide,” said Nordea analyst Sami Sarkamies.

He estimated that the Samsung deal, expected to conclude later this year, could eventually mean Nokia receives 100-200 million euros of additional royalty payments annually, on top of retroactive payments.

Seems to be related to 4G patents; Nokia signed a similar deal with Samsung a while back. For LG, means that profitability in the smartphone side becomes that little bit more elusive – especially after the back payment.


Apple News curation will have human editors and that will raise important questions » 9to5Mac

Jordan Kahn:

Techmeme‘s founder Gabe Rivera gave us the hard truth on why being an algorithm-based service like Google News doesn’t make sense for the Apple News app saying, “All news aggregators intended for the mass market need editors, so this makes sense for Apple.” But the flip side of Apple’s human-based curation is that without a separation of editorial and the business, there will undoubtedly be conflicts of interest. Rivera points out that “…as the world’s most valuable corporation, they can’t and shouldn’t be trusted to present well-rounded coverage on many important topics.” Rivera continues, “But most readers won’t care about that.”

Apple doesn’t want this to be an algorithm thing, because (a) algorithms might not pull outré-yet-fascinating stuff to the surface (b) if some story that were grisly/violent/sexual – pick the topic you think Americans in particular would react in horror to – popped up, Apple would of course get the blame. Apple hates that.

So it wants humans on hand to stop the Bad Stuff that will Offend People finding its way into the app. But that immediately raises the question: what will it define as Bad Stuff? Are Mark Gurman’s well-sourced leaks of Apple plans Bad Stuff? Is vicious criticism of Apple?

I suspect people are overplaying this; Apple is really wary of consumer backlashes over pr0n. Look at how Facebook struggles with the same topic, and the issue of content posted by millions of people which some find offensive and others really don’t.

No simple answer, but Apple may not have realised it was putting itself in the position of a publisher.