Start up: yet another UK broadband pledge, what is mobile?, hacking Samsung’s theft protection, and more


A Huawei-made Nexus 6P: no breakage of the camera visor panel here. Photo by TechStage on Flickr.

You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.

A selection of 12 links for you. Use them wisely. I’m charlesarthur on Twitter. Observations and links welcome.

Fast broadband for all by 2020 pledged by David Cameron » BBC News

All UK homes and businesses will have access to “fast broadband” [of at least 10 megabits per second] by 2020, David Cameron has pledged.

The PM is to introduce a “universal service obligation” (USO) for broadband, giving the public a legal right to request an “affordable” connection.

It would put broadband on a similar footing to other basic services such as water and electricity.
In 2010, the coalition government promised the UK would have the best superfast broadband in Europe by 2015.

Then, in 2012, a pledge was made by then-Culture Secretary Jeremy Hunt that the UK would have “the fastest broadband of any major European country” by 2015.

He defined high-speed broadband as offering a download speed of greater than 24 megabits per second (Mbps). Communications regulator Ofcom defines it as 30Mbps.

That final sentence completely shows how weak this “pledge” really is: from 30Mpbs down to 24 down to 10. I suspect BT, as the dominant operator which also now owns a 4G network, will aim to fulfil this revised USO via 4G.
link to this extract


Some Nexus 6P owners are reporting spontaneously broken rear glass panels » Android Police

Michael Crider:

The early reaction to the Nexus 6P from both critics and owners has been mostly positive, but a few new owners seem to be encountering serious problems. Specifically, the glass panel on the rear of the phone, which covers the camera, LED flash, and laser autofocus module, is reportedly cracking and breaking on its own. A user on the Android subreddit reported the rear panel cracking, and at least two others have reported similar results, with the panel splitting into multiple cracks with no particular rough handling or impact.

That subreddit is getting pretty big, and there isn’t a lot of joy for the 6P. One person has had two in a row go wrong. Problem for Huawei?
link to this extract


How uBeam transmits energy wirelessly using ultrasound » uBeam

Meredith Perry, uBeam’s founder, has a big explainer about how it works, because people have been saying that either it doesn’t work, or it’s dangerous:

The uBeam system is composed of two parts: a transmitter that emits energy, and a receiver that receives energy. The transmitter is like a sound speaker, but instead of emitting audible sound, uBeam’s transmitter emits high frequency sound. This sound can’t be heard by humans or dogs; it’s called ultrasound. The receiver, like a microphone, picks up the sound and converts it into usable energy. Sound, like light and wind, is a form of energy that can be converted into electrical energy with our proprietary energy harvesting technology. The receiver then sends this electrical power to charge or power an electronic device.

link to this extract


Mobile, ecosystems and the death of PCs » Benedict Evans

Evans wrestles with the question of “what is ‘mobile’?” in the face of competing devices like the SurfaceBook, the Surface Pro, iPad Pro and so on:

Each generation of technology goes through an S-curve of development – slow improvement of an impractical product, then explosively fast improvement once fundamental barriers are solved, and then slowing iteration and refinement as you solve every last issue and the curve flattens out. PCs are on that flattening part of the curve, just as the [fastest ever piston-powered aircraft developed at the end of WW2, soon surpassed by jets, the Republic] Rainbow was.

They get perfect because you’re debugging the big things you invented in the past, and now your innovation is in the extra little things (such as the Rainbow using exhaust for extra thrust), and there are no big new innovations to debug. But meanwhile, the new ecosystem is catching up, and the curve of development and innovation for that generation will flatten out way out of reach. The new curve is crossing the old one. This is why they look simliar – this is why a Surface Pro and an iPad Pro look similar. They both exist right at the point that those development curves cross. The iPad might still be a little below, but its curve is heading up.

That is, the point that you can start to do old ecosystem things on what look like new ecosystem devices is also the point that the new ecosystem can do those things too – but the new ecosystem has 10x the scale, and the new ecosystem is just starting down the innovation track where the old one is at its end.

The really tricky part is knowing where on the S-curve something is, and whether there’s still money to be made from it. As Evans points out,

No-one is going to found a new company to make Win32 applications (though enterprise Windows apps will be worked on for a long time, just as mainframe apps were [after the IBM PC arrived]).

link to this extract


It’s incredibly easy to bypass Factory Reset Protection on a Samsung phone [with video] » 9to5 Google

Stephen Hall:

Factory Reset Protection was introduced with Android Lollipop, and, like Apple’s iCloud Activation Lock, it’s supposed to make it really hard to resell a stolen Android phone. The gist is that when you use Android recovery menu to reset a phone to factory settings, the phone will require upon reboot that you sign in using a Google account you previously used on the device before resetting it. If someone steals your phone and wipes it, they need your Google account for it to be anything but a brick.

Well, it appears that a flaw in Samsung’s phones lets potential thieves around this security measure, and it looks like the workaround takes just about five minutes to pull off…
Obviously a thief wouldn’t be able to get around a password-secured phone, so a factory reset would require going to Android’s recovery menu after a reboot (as opposed to going into the Settings app and doing a factory reset from there).

But since Samsung’s phones automatically pull up a file manager when you plug in an external storage device (even in the set up process), all you have to do is load an app file that lets you open up the stock Settings app. Press a couple buttons to do what the phone thinks is a legitimate/authorized reset, and the phone reboots without tripping Factory Reset Protection.

D’oh.
link to this extract


Google annual search Statistics » Statistic Brain

The number of annual searches conducted by Google, according to ComScore and the “Statistic Brain Research Institute” (sounds grand).

Compare the numbers in the top two lines of the table. It suggests that in 2014 the total number of Google searches fell, for the first time ever. Even within margins of error, that suggests search growth has stopped.
link to this extract


XcodeGhost S: a new breed hits the US » FireEye Threat Research

Yong Kang, Zhaofeng Chen, and Raymond Wei:

Through continuous monitoring of our customers’ networks, FireEye researchers have found that, despite the quick response, the threat of XcodeGhost has maintained persistence and been modified.

More specifically, we found that:

• XcodeGhost has entered into U.S. enterprises and is a persistent security risk
• Its botnet is still partially active
• A variant we call XcodeGhost S reveals more advanced samples went undetected

After monitoring XcodeGhost related activity for four weeks, we observed 210 enterprises with XcodeGhost-infected applications running inside their networks, generating more than 28,000 attempts to connect to the XcodeGhost Command and Control (CnC) servers – which, while not under attacker control, are vulnerable to hijacking by threat actors.

Pretty dramatic. And it can affect apps via third-party frameworks, as Possible Mobile discovered. Meanwhile, on Android…
link to this extract


Lookout discovers new trojanized adware; 20K popular apps caught in the crossfire » Lookout Blog

Michael Bentley of the anti-malware company:

Auto-rooting adware is a worrying development in the Android ecosystem in which malware roots the device automatically after the user installs it, embeds itself as a system application, and becomes nearly impossible to remove. Adware, which has traditionally been used to aggressively push ads, is now becoming trojanized and sophisticated. This is a new trend for adware and an alarming one at that.

Lookout has detected over 20,000 samples of this type of trojanized adware masquerading as legitimate top applications, including Candy Crush, Facebook, GoogleNow, NYTimes, Okta, Snapchat, Twitter, WhatsApp, and many others.

Malicious actors behind these families repackage and inject malicious code into thousands of popular applications found in Google Play, and then later publish them to third-party app stores. Indeed, we believe many of these apps are actually fully-functional, providing their usual services, in addition to the malicious code that roots the device.

Oh, and also: if you get infected you probably won’t be able to uninstall it; you’ll either need a pro or a trip to buy a new one. (Factory reset won’t do it.)
link to this extract


BlackBerry Priv review: good, but probably only for keyboard junkies » Android Police

David Ruddock is befuddled by those little things with letters on:

But time for some real talk about those keys, in respect to my particular tapping of them. I am awful at these tiny little keyboards. Like, your grandpa trying to use an ATM when 6 other people are in line behind him and all of them are clearly in a rush awful. It’s just not my thing, it never has been, and it never will be. To me, this is mind-bendingly unintuitive and would take me months to master in anything approaching a respectable way. I’m not going to be using the Priv for months. I cannot give you a good evaluation of the keyboard on the merits. Sorry. I can show you what it looks like, though! Also, it’s backlit.

My thoughts without getting into the related software bits are as follows: the keys are really small. They depress and feel clicky. They are keys. Again, I am sorry. I really, really, can’t get into this keyboard-for-ants thing, even as I have forced myself to use it on the Priv.

This is the reason why anyone who began using a smartphone after 2010 is going to find the Priv completely weird. It’s like introducing typewriters to schools that have used iPads.
link to this extract


HTC One A9 review » AndroidAuthority

Joshua Vergara:

Remember the Sensor Suite originally announced in the HTC One M8? It allowed for the phone to go straight into specific areas with taps and swipes after the phone knew it was brought up for usage. Now, because the fingerprint reader is there, it is the wall that prevents all of these extra unlocking methods from being used. That also doesn’t include the fact that it can be a home button, without any capacitive keys accompanying it. Soft keys are still used, so using the reader as a home button takes some getting used to – and fiddling between the two, we’ve found to be really common.

Of course, there is also the omission of BoomSound speakers due to the addition of the fingerprint reader. This is a pretty bold move for the company, as one of its most-recognized features isn’t here anymore. Sound, thus, gets a big downgrade with the bottom-mounted unit. It certainly doesn’t get very loud at all, and it’s safe to say that we miss the stereo audio found in past One devices.

Storage options with the A9 are pretty standard, with the option to choose between 16 or 32GB variants. It should be noted that the 16GB model comes with just 2GB of RAM, while the 32GB variant comes with 3GB. We’ve been testing the 32GB model with 3GB of RAM, and we’ve noticed that it gets a little slow at times.

Jeepers – it’s sometimes slow with 3GB of RAM? None of this is really a vote of confidence.
link to this extract


HTC pushes US One A9 pre-order shipments back by up to several weeks, delays Verizon compatibility indefinitely » Android Police

David Ruddock:

While the A9 is indeed a pretty good phone, there’s no doubt HTC’s bungled the launch of the device a bit. First, the whole promotional pricing thing (and the 2GB/16GB variant abroad being so damn expensive), and now? A pre-order shipment delay for those who did choose to buy one. We’re hearing from US readers that HTC has sent out the following email, pushing back shipment of the initially available colors until next Tuesday, November 10th, at the earliest. Some customers, though, will be waiting much longer than that – especially if you ordered a Sprint variant.

In addition, HTC has now delayed Verizon network compatibility for the One A9 indefinitely. They had promised compatibility shortly after the November launch, then in December, and now have no ETA for the feature.

And it gets worse; certain colour variants are going to take weeks and weeks to ship. Dead on non-arrival?
link to this extract


Who the f*** is that advertiser? » Medium

Rob Leathern on the problem of validating who is advertising (which amounts to “running random Javascript on your system); the Interactive Advertising Bureau wants to charge $10,000 per company for this. Leathern laughs:

Google Adwords probably has over 2.5 million advertisers by this estimate. The top 100 to 1,000 advertisers (likely to be cost-insensitive enough to sign up for a program like this) aren’t the problem for online and mobile advertisers. The problem area is distinguishing between tens of thousands of large but legitimate advertisers, and those with money who are not legitimate or who are fronts for malware, botnets, and schlocky affiliate offers.

The goal shouldn’t be to register the top few thousands advertisers, but make the barriers low enough that we can validate every single advertiser consistently, and then do the kinds of auditing, checks and follow-up necessary to stop problem advertisers from being banned and then popping back up right away under another name or identity. Once you can accurately identify advertisers and have every part of the value chain understand this information, both publishers and consumers should be able to decide what kinds of advertisers they want to block.

If I had to guess, it’s a $10/year fee (ten dollars) and not $10,000, that will be a better incentive to get companies to participate and to create the infrastructure needed to validate this information at enormous scale.

Even at that level, it wouldn’t happen. And malware generators would still find ways to get around it.
link to this extract


Errata, corrigenda and ai no corrida: none notified. But the week is still young.

Start up: inside a content factory, US reacts to Safe Harbour sinking, why Surface?, Android lemons and more


In China, such literalism might really happen. Photo by GotCredit on Flickr.

A selection of 8 links for you. Fee fi fo fum. I’m charlesarthur on Twitter. Observations and links welcome.

The Chicago End-Times » The Awl

Sam Stecklow on the “content factory” at the Chicago Sun-Times, churning out meaningless content because ads:

Network staffers were concerned with the quality of work they were being asked to do, too. Marty Arneberg, a former intern, told me, “When I was applying to jobs, I would send very few Sun Times Network articles. I would mention in my résumé, forty hours a week I worked here, but I would not send them any examples. Because it was such a content factory, you just had to pump stuff out all the time. It was just like, get it out there, we need some pageviews now.” A former editor told me, “I wouldn’t read most of what I wrote if given the choice.” He added, “Spending more than thirty minutes on any article was generally frowned upon.” Arneberg told me that a “post got me the most pageviews of any post that I wrote and it was complete bullshit. It was a total hoax,” he said. “The weird thing is, when it came out that that was a hoax, nobody spoke to me. Nobody said anything, like, ‘Hey, you gotta watch out for that.’ It was just ignored.”

The question of whom, exactly, Sun Times Network is supposed to be for is one I asked everyone I interviewed for this story, and none of them could provide a good answer. I can’t either.

Stecklow’s descent into the toxic hellstew is well-described; it’s like a modern version of The Jungle. This is where content is heading. And not long after that, the stories will be “written” by computers, and you’ll wonder why we don’t just get computers to read them too, and go and do something more worthwhile, such as digging ditches. Oh, and reading The Awl.
link to this extract


The company behind Relish wireless broadband makes a big loss » Engadget

Nick Summers:

Relish’s dream to connect London homes with wireless broadband, rather than traditional landlines, could be in trouble. UK Broadband, the company behind the service, has reported losses of £37.5m for 2014 – almost four times what it was the year before. To make matters worse, turnover slipped from roughly £2m to £1.5m over the same period. Relish was launched in June 2014 as a simpler, but capable broadband alternative to the likes of BT, Sky and Virgin Media. Instead of copper and fibre cables, the company relies on 4G connections to deliver the internet to its customers. The advantages are plentiful — you don’t need to pay for a landline, and because Relish’s network is already up and running, you don’t need an engineer to install anything. Once you’ve signed up, a router is sent round within the next working day and you can instantly get online. The concept is similar to the mobile broadband packages offered by EE, Three and other UK carriers, although here there are no restrictive data allowances. So what’s gone wrong?

Nobody, it seems, knows.
link to this extract


China is building the mother of all reputation systems to monitor citizen behaviour » Co.Exist

Ben Schiller:

“They’ve been working on the credit system for the financial industry for a while now,” says Rogier Creemers, a China expert at Oxford University. “But, in recent years, the idea started growing that if you’re going to assess people’s financial status, you should equally be able to do that with other modes of trustworthiness.”

The document talks about the “construction of credibility”—the ability to give and take away credits—across more than 30 areas of life, from energy saving to advertising. “It’s like Yelp reviews with the nanny state watching over your shoulder, plus finance, plus all of these other things,” says Creemers, who translated the plan.

The system, overseen by the State Council, is made possible by two factors. One, it’s now possible to gather information about behavior as never before. As we use the Internet and different devices, we’re leaving behind a huge footprint of data. Second, the Chinese government sees no reason to safeguard its citizens’ data rights if it thinks that data can benefit them, says Creemers.

“In Europe and the U.S., there’s a notion that the state should be constrained, that it’s not right to intervene in people’s lives, unless for justified reasons. In China, the state has no qualms about that. It says ‘data allows us to make society for better, so we’re going to use it,'” he says.

link to this extract


Behind the European privacy ruling that’s confounding Silicon Valley » NYTimes.com

Robert Levine:

American technology firms are especially worried because they routinely transfer so much information across the Atlantic. “International data transfers are the lifeblood of the digital economy,” said Townsend Feehan, chief executive of IAB Europe, which represents online advertising companies including Google as well as small start-ups. The ruling “brings with it significant uncertainty as to the future possibility for such transfers.”

As Mr. Schrems sees it, however, what is at stake is a deeper conflict between the European legal view of privacy as a right equivalent to free speech and that of the United States, where consumers are asked to read and agree to a company’s terms of service and decide what’s best for themselves. “We only do this in the privacy field — dump all the responsibility on the user,” Mr. Schrems said. He pointed out that consumers are not expected to make decisions about other complex issues, like food or building safety. “In a civilized society,” he said, “you expect that if you walk into a building it’s not going to collapse on your head.”

But if it collapses on your head and kills you, then you sue! No, hang on. (Bonus point to Levine for the handwringing quote from the advertising industry.)
link to this extract


Microsoft Surface: from cross-bearer to standard-bearer » Fast Company

Ross Rubin:

As the Surface Pro customer base has grown, it’s likely that Microsoft is just accommodating potential customers who prefer a more laptop-like device than the Surface Pro 4, which is still a tablet propped up with a kickstand.

While Microsoft is quick to compare its “ultimate laptop”—which starts at $1,500 and goes way, way up—to Apple’s portables, it will walk a far narrower tightrope in competing with its own hardware partners with the Surface Book. Not only does the first model stand to do battle with the best that HP, Dell, Acer, and Lenovo have to offer, but the company is poised to come downmarket with a lower-priced mainstream version, as it did with the $500 Surface 3.

The Surface experience story isn’t quite as good as it looks on paper. Even with the considerable reconciliation of Windows 10 and the arrival of a touch-optimized Office as well as other universal apps, Windows’ interface is still in transition. Many people with Surfaces spend much of their day working not so differently than they would with a no-touch Windows 7 laptop. Even on the marketing side, Microsoft needs to rethink the Surface Pro, which it’s been promoting as the tablet that can replace your laptop. Now that the company wants to sell you a laptop, where does that leave the Surface Pro?

This is slightly the problem: why Surface Pro, if there’s Surface Book? Rubin also thinks there’s a Surface iMac (for want of a better name) brewing in Redmond. This seems unlikely though – the sales figures would be so miniscule it would never make money for anyone. Speaking of which…
link to this extract


Why Apple is still sweating the details on iMac » Medium

Steven Levy was given access to Apple’s Ergonomic Design Lab to get the inside story of how the new iMacs and Magic Mouse and so on were built. But what are they for? Phil Schiller, Apple’s head of marketing, explains:

“The job of the watch is to do more and more things on your wrist so that you don’t need to pick up your phone as often. The job of the phone is to do more and more things such that maybe you don’t need your iPad, and it should be always trying and striving to do that. The job of the iPad should be to be so powerful and capable that you never need a notebook. Like, Why do I need a notebook? I can add a keyboard! I can do all these things! The job of the notebook is to make it so you never need a desktop, right? It’s been doing this for a decade. So that leaves the poor desktop at the end of the line, What’s its job?”

Good question. And the answer?

“Its job is to challenge what we think a computer can do and do things that no computer has ever done before, be more and more powerful and capable so that we need a desktop because it’s capable,” says Schiller. “Because if all it’s doing is competing with the notebook and being thinner and lighter, then it doesn’t need to be.”

But – take note – no intention of introducing a touchscreen iMac. None at all, says Schiller: “The Mac OS has been designed from day one for an indirect pointing mechanism. These two worlds are different on purpose.”
link to this extract


​Android security a ‘market for lemons’ that leaves 87% vulnerable » ZDNet

Liam Tung:

“The difficulty is that the market for Android security today is like the market for lemons,” Cambridge researchers Daniel Thomas, Alastair Beresford, and Andrew Rice note in a new paper.

“There is information asymmetry between the manufacturer, who knows whether the device is currently secure and will receive security updates, and the customer, who does not.”

Their analysis of data collected from over 20,000 Android devices with the Device Analyzer app installed found that 87% of Android devices were vulnerable to at least one of 11 bugs in the public domain in the past five years, including the recently discovered TowelRoot issue, which Cyanogen fixed last year, and FakeID.

The researchers also found that Android devices on average receive 1.26 updates per year.

“The security community has been worried about the lack of security updates for Android devices for some time,” Rice said.

The “security community” hasn’t had much effect, then. The study was part-funded by Google.
link to this extract


US says Apple e-books antitrust monitor no longer needed » Reuters

Nate Raymond:

The US Justice Department has determined that Apple Inc has implemented significant improvements to its antitrust compliance program and that a court-appointed monitor’s term does not need extended, according to a court filing.

The Justice Department in a letter filed late Monday in Manhattan federal court said its recommendation was despite Apple’s “challenging relationship” with Michael Bromwich, who was named monitor after the iPad maker was found liable for conspiring to raise e-book prices.

The Justice Department said its decision to not recommend extending the monitorship beyond its two-year term was “not an easy one,” as Apple “never embraced a cooperative working relationship with the monitor.”

But the department said it was giving greater weight to Bromwich’s “assessment that Apple has put in place a meaningful antitrust compliance program than to the difficult path it took to achieve this result.”

Apple is still considering an appeal to the Supreme Court. The antitrust thing must feel like a stain.
link to this extract


No, wait! You can now sign up to receive each day’s Start Up post by email. You’ll need to click a confirmation link, so no spam.