|
Authored by: Anonymous on Wednesday, September 12 2012 @ 01:24 PM EDT |
Link
Memo to Samsung (005930): Now this is how you
get
away with copying Apple (AAPL)! GizChina reports that a
Chinese manufacturer
has used leaked photos of Apple’s next-
generation iPhone to slap together a
quick knockoff of the
device called the Goophone I5 and release it before Apple
has a chance to launch the genuine article later this month.
What’s more, the
company has actually patented the knockoff
design in China and is poised to sue
Apple if it launches
the next-generation iPhone in China later this
year.
[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Wednesday, September 12 2012 @ 02:00 PM EDT |
The plan was, using a Kindle as a screen, connecting it to the
processing power of the Raspberry Pi while using an external keyboard to work
comfortably. Since connecting an external keyboard to the Kindle seemed
impossible at that point, I needed to use the Raspberry Pi as the ‘hub’.
The
tinkering started and the KindleBerry Pi was soon to be born.
damaru, ponnuki[ Reply to This | Parent | # ]
|
|
Authored by: IMANAL_TOO on Wednesday, September 12 2012 @ 02:13 PM EDT |
http://money.cnn.com/2012/09/12/technology/apple-iphone-5-event/index.html
"Another new feature -- correctly foreshaowded by rumors -- is
"lightning," Apple's new eight-pin connector, which is significantly
smaller than the 30-pin connector that Apple has used since 2003. Apple will
sell adapters so people can still use old chargers and legacy connectors."
LOL!
Apple...
---
______
IMANAL
.[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Wednesday, September 12 2012 @ 06:51 PM EDT |
I'm not sure if this is the correct place to mention this,
but I think I recall
during the first day of testimony that
one of the Apple witnesses mentioned
that the 4 by 4 grid
was
"ornamental" rather than functional. However, the
iPhone 5,
as announced today adds a 5th row as a result of the
additional
screen real-estate. Wouldn't that make D604,305
functional rather
than ornamental? If it was an ornamental
decision surely they'd have
maintained the 4 by 4 grid,
correct? [ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Wednesday, September 12 2012 @ 09:12 PM EDT |
There's a news article on the CBC web site Instagram hashtags help Aussie police
crack down on marijuana about how police are using Instagram hashtags to
find marijuana smokers. The rights or wrongs of marijuana are not relevant here,
but it is interesting how some people seem to have a false sense of anonymity on
the Internet.
Police are cracking down on illegal grow-ops
and marijuana possession in Australia right now, thanks in part to the help of
snap-happy potheads who flag their Instagram photos with tags like
#aussiestoners #weedstagram and #oznugs.
A Victoria Police spokesman
warned this week that “online dopes” would be tracked and prosecuted through
photo-sharing websites, and would face hefty penalties if
caught.
They're not even trying very hard to hide
themselves.
Pictures of joints, bongs, clouds of smoke,
bags of weed and tools like grinders are found in many of the photos. Some show
full-out crops of the illegal plants.
Some even leave
their location coordinates on!. I suspect that's a result of simple stupidity
though, not brazenness.
While most instagrammers have
remembered to turn off the service's automatic geo-location feature before
posting these photos, some do not. Many of the photos also contain identifiers
like faces, locations and regularly-used screennames.
I
think this is a good example of what a lot of "Face-Twit" users are really like.
They really don't know what they are doing when it comes to personal
security, and aren't prepared to listen to anyone who does know. They will
however act completely amazed when it all catches up to them. A lot of people
haven't clued into the fact that anyone who wants to find them, will.
I won't be surprised if police eventually start to use image
recognition software more advanced than what we use today to start trolling
social media sites for pictures of various crimes or other legal or political
infractions. There will be a huge treasure trove of people doing stupid things
to draw on,
Governments already use sites like Facebook to identify
political "enemies". That happened in the city where I live, where a young girl
was detained by police as a potential "troublemaker" because she had a photo of
herself on Facebook standing beside the leader of the opposition at a public
event. There was no suggestion that she had done anything wrong or planned to do
anything wrong. She wasn't a member of any political party. The prime minister's
staff were simply using Facebook to target anyone who had contact with
opposition politicians to "sanitize" the city prior to a visit by their boss.
This is "democracy" in our enlightened world today.
So to everyone who
has Facebook or Twitter accounts, the question you need to ask yourself is "how
could someone use this against me if they wanted to"? A lot of people would
answer "but I'm no one, so who would go through the trouble of bothering me"?
Well when software is developed which can rifle through your past cheaply and
easily, bothering you really won't be much trouble at all for someone. It will
all be automated except for the actual arrest.
As Cardinal Richelieu
is believed to have once said: "If you give me six lines written by the hand of
the most honest of men, I will find something in them which will hang him."
[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Wednesday, September 12 2012 @ 10:03 PM EDT |
Don’t buy it from AT&T
arstechnica
Samsung are gonna have their
work cut out hackin' thru the 4G market jungle...
[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Thursday, September 13 2012 @ 12:56 AM EDT |
If you only thought Apple, Microsoft and Nokia may be
plotting against Google
and it's Android OHA members, read
this. Google and it's partners need for
everybody in this
country to be aware of what's going on in the Netherworlds,
that Nokia, Microsoft and Apple are attempting to misinform
the public and
turn us against those that built our Wireless
technologies from
scratch!
Many of these members are responsible for spending Billions
of
Dollars on the development of ETSI Standards for Wireless
Telecommunications.
So stand by to be thoroughly
enlightened, while reading Google's Statement
especially if
you haven't already read it: (Google's Statement begins
about
half way down this PDF)
Statements to
Congressional Committee Google on Frand and
Injunctions
What I'm most impressed by is Google's perspicuous insights
into the motives and strategies employed by these 3
companies
in a for sure
collaborative effort to eliminate Choice for
Consumers. The anticompetitive
nature of these viperous
three
corporations should wake you up to what they
are really
attempting to sell on.
The Triad; Microsoft, Nokia and Apple are
pulling out all
the
stops in an attempt to paint SAMSUNG, Motorola and HTC as
the
bad guys, they are only trying to save us from. While
filling
us with
copious amounts of Media RDF, Balmer Ranting Snake
oil and painting themselves
as little puppy underdogs like
Nokia. It seems they want us to believe they're
all about to
have the life snuffed out of themselves by the big old mean
and
nasty Google and their fellow corporate criminals!
....but in reality, I'm sure
"EMBRACE EXTEND EXTINGUISH" is
the foundation of this EVIL TRIAD ULtIMATE
AIMS!!!
[ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Thursday, September 13 2012 @ 07:08 AM EDT |
From a Bloomberg interview with the Woz:
“I
hate it,” Wozniak said when asked about the patent fights
between Apple and
Samsung. “I don’t think the decision of
California will hold. And I don’t agree
with it -- very
small
things I don’t really call that innovative." [ Reply to This | Parent | # ]
|
|
Authored by: Anonymous on Thursday, September 13 2012 @ 11:40 AM EDT |
Rese
archers have published some new flaws in the widely-used "Chip and PIN"
smartcard systems (used worldwide in credit cards, bank cards, etc.)
Half of
the ATM brands they tested, proved vulnerable. They've built proof-of-concept
prototypes of all stages of the main attack against ATMs whose "unpredictable
numbers" are not really unpredictable. Also, the "unpredictable number" is not
tamper-proof in communication between the ATM and the issuing bank, so even
with ATMs whose UN generation is properly secured, man-in-the-middle network
attacks still give the same result: details skimmed from a card days or weeks
earlier can be presented to a legitimate ATM using a fake card, and the issuing
bank can't tell the difference.
These new attacks are effectively as
powerful as being able to just clone the info on the smartcard (which is what
the entire Chip-and-PIN system supposedly makes impossible).
The best part
is this: As these new cards were deployed, all of the banks switched from making
the merchants liable for the fraudulent transactions, to making the CARDHOLDERS
liable! Because the cards are "secure" now. So if your account gets ripped
off, your bank probably won't reimburse you.
The paper is quite
readable, even for non-cryptography experts. [ Reply to This | Parent | # ]
|
|
|
|
|