luni, 29 mai 2017

Could the UK be about to break end-to-end encryption?

Could the UK be about to break end-to-end encryption?

Once again there are indications the UK government intends to use the law to lean on encryption. A report in The Sun this week quoted a Conservative minister saying that should the government be re-elected, which polls suggest it will, it will move quickly to compel social media firms to hand over decrypted data.
The paper quoted an unnamed government minister saying: “The social media companies have been laughing in our faces for too long”, and suggested that all tech companies with more than 10,000 users will face having to significantly adapt their technology to comply with the decryption law.
The relevant Statutory Instrument, to enable UK government agencies to obtain warranted access to decrypted data from communications service providers, currently sitting in draft form, will be voted through parliament within weeks of a new government taking office after the June 8 general election, according to the report.
As is typically the case when strong encryption comes back under political pressure in the modern Internet age, this leaked hint of an impending ‘crack down’ on tech firms came hard on the heels of another terrorist attack in the UK — after a suicide bomber blew himself up at a concert in Manchester on Monday evening. The underlying argument is that intelligence agencies need the power to be able to break encryption to combat terrorism.

Strong encryption, cryptic answers

The problem — as always in this recurring data access vs strong encryption story — is that companies that use end-to-end encryption to safeguard user data are not able to hand over information in a readable form as they do not hold the encryption keys to be able to decrypt it.
So the question remains how can the government compel companies to hand over information they don’t have access to?
Will it do so by outlawing the use of end-to-end encryption? Or by forcing companies to build in backdoors — thereby breaking strong encryption in secret? The latter would arguably be worse since government would be opening app users up to potential security vulnerabilities without letting them know their security is being compromised.
The UK government has been rubbing around this issue for years. At the back end of last year it passed the Investigatory Powers Act, which threw up questions about the looming legal implications for encrypted communications in the UK — owing to a provision that states communications service providers may be required to “remove electronic protection of data”.
It’s those powers that ministers are apparently intending to draw on to break social media firms’ use of strong encryption.
During the scrutiny process of the IP bill last year, ministers led a merry dance around the implications of the “electronic protection” removal clause for e2e encryption. The best interpretation of which was that the government was trying to frame a law that encouraged tech platforms to eschew the use of strong encryption in order not to risk falling outside the scope of an unclear law.
“He seems to be implying that providers can only provide encryption which can be broken and therefore can’t be end-to-end encryption,” was Lord Strasburger’s assessment of the government response to questions on the topic last July.
No clarity has emerged since then. The situation is still ongoing fuzziness about the legality of e2e encryption in the UK. To break or not to break, that is the question?
Arguably, as Strasburger suggested, this is strategic; intentional obfuscation on the part of the UK government — to spread FUD as a strategy to try to discourage use of a technology their intelligence agencies view as a barrier to their work.
But the problem for the government is that use of e2e encryption has been growing in recent years as awareness of both privacy risks and cyber security threats have stepped up, thanks to data breach scandal after data breach scandal, as well as revelations of the extent of government agencies’ surveillance programs following the 2013 Snowden disclosures.
Not holding encryption keys allows tech firms to step outside the controversy related to digital snooping and to bolster the security cred of their services. Yet, as a result, popular services that have championed strong encryption are increasingly finding themselves in the crosshairs of government agencies. Be it the Facebook Messenger app, or Facebook’s WhatsApp messaging platform, or Apple’s iOS and iMessage.
After another terror attack in London in March, UK Home Secretary Amber Rudd was quick to point the finger of blame at social media firms — saying they should not provide “a secret place for terrorists to communicate with each other”, and asserting: “We need to make sure that our intelligence services have the ability to get into situations like encrypted WhatsApp.”
Of course she did not explain how intelligence agencies intended to “get into” encrypted WhatsApp. And that earlier political pressure on encryption morphed into calls for social media firms to be more proactive about removing terrorist content from their public channels. At least publicly. Discussions held vis-a-vis encryption were not made public.
But again, if the latest reporting is to be believed, Rudd is intent on breaking strong encryption after all.

Exceptional access, unacceptable risk 

It’s worth revisiting Keys Under Doormats; aka the paper written by a group of storied security researchers back in 2015, re-examining the notion of so-called “exceptional access” for security agencies to encryption systems — at a time when debate had also been re-ignited by politicians calling for ‘no safe spaces for terrorists’.
The report examined whether it is “technically and operationally feasible to meet law enforcement’s call for exceptional access without causing large-scale security vulnerabilities” — posing the question of whether it’s possible to build in such exceptional access without creating unacceptable risk?
Their conclusion was clear: exceptional access without unacceptable risk is not possible, they wrote. Nor is it clear it would even be feasible given how the services in question criss-cross international borders.
Here’s one key paragraph from the paper:
Designing exceptional access into today’s information services and applications will give rise to a range of critical security risks. First, major efforts that the industry is making to improve security will be undermined and reversed. Providing access over any period of time to thousands of law enforcement agencies will necessarily increase the risk that intruders will hijack the exceptional access mechanisms. If law enforcement needs to look backwards at encrypted data for one year, then one year’s worth of data will be put at risk. If law enforcement wants to assure itself real time access to communications streams, then intruders will have an easier time getting access in real time, too. This is a trade-off space in which law enforcement cannot be guaranteed access without creating serious risk that criminal intruders will gain the same access. Second, the challenge of guaranteeing access to multiple law enforcement agencies in multiple countries is enormously complex. It is likely to be prohibitively expensive and also an intractable foreign affairs problem.
They further concluded:
From a public policy perspective, there is an argument for giving law enforcement the best possible tools to investigate crime, subject to due process and the rule of law. But a careful scientific analysis of the likely impact of such demands must distinguish what might be desirable from what is technically possible. In this regard, a proposal to regulate encryption and guarantee law enforcement access centrally feels rather like a proposal to require that all airplanes can be controlled from the ground. While this might be desirable in the case of a hijacking or a suicidal pilot, a clear-eyed assessment of how one could design such a capability reveals enormous technical and operational complexity, international scope, large costs, and massive risks — so much so that such proposals, though occasionally made, are not really taken seriously.
One thing the paper did not consider is that much politicking can be primarily intended as a theatre of influence for winning votes from spectators.

And the timing of the latest leaked call for ‘decryption on-demand’ coincides with an imminent UK general election, while also serving to shift potential blame for security failures associated with a terrorist attack that took place during the election campaign off of government agencies — and onto a softer target: overseas tech firms.
As we’ve seen amply in recent times, populist arguments can play very well with an electorate. And characterizing social media companies as the mocking, many-headed pantomime villain of the story transforms complex considerations into a basic emotional attack that might well be aimed at feeding votes back to a governing party intent on re-election.

“…to disclose, where practicable… in an intelligible form”

Returning to UK law, the (still draft) ‘Investigatory Powers (Technical Capability) Regulations 2017‘ is the legal route for placing obligations on comms service providers, under the IP Act, to maintain the necessary technical capabilities to afford government agencies the warranted access on demand that they keep demanding.
Yet exactly what those technical capabilities are remains unclear. (And “vague” technical requirements for exceptional access are also raised as a problem in Keys Under Doormats.)
Among the list of obligations Technical Capability Notices can place on comms service providers is the following non-specific clause:
To provide and maintain the capability to disclose, where practicable, the content of communications or secondary data in an intelligible form and to remove electronic protection applied by or on behalf of the telecommunications operator to the communications or data, or to permit the person to whom the warrant is addressed to remove such electronic protection.
The document also sets out that decrypted data must be handed over within a day after a CSP has been served a warrant by a government agency, and that CSPs must maintain the capability to intercept simultaneously comms and metadata for up to 1 in 10,000 of their customers.
The technical details of how any encryption perforations could be achieved are evidently intended to remain under wraps. Which means wider data security risks cannot be publicly assessed.
“I suspect that all the vagueness about concrete technical measures is deliberate, because it allows the government to deal with the technical details within a particular technical capability notice, which would be under a gag order, and thus avoid any public scrutiny by the infosec community,” argues Martin Kleppmann, a security researcher at the University of Cambridge who submitted evidence to the parliamentary committees scrutinizing the IP bill last year. And who has blogged about how the law risks increasing cyber crime. 
“It’s easy to criticize encryption technologies as providing ‘safe spaces’ for terrorists while forgetting that the exact same technologies are crucial for defence against criminals and hostile powers (not to mention protecting civil liberties),” he adds.
“Intelligence agencies don’t seem to actually want bulk access to encrypted data, but merely want the capability to intercept specific targets. However… if a system allows encryption to be selectively circumvented at the command of an intelligence agency, it’s not really end-to-end encryption in a meaningful sense!”
One possibility for enabling ‘exceptional access’ that has sometimes been suggested is a NOBUS: aka a ‘nobody but us’ backdoor — i.e. a backdoor which is mathematically/computationally impossible to find. However Kleppmann points out that even if the math itself is solid, it merely takes one person with knowledge of the NOBUS to leak it — and then, as he puts it, “all mathematical impossibility goes out of the window”.
“The only way of making a system secure against adversaries who want to harm us is by designing it such that there are no known flaws or backdoors whatsoever, and by fixing it if any flaws are subsequently discovered,” he argues.
Meanwhile, on the vulnerability front, Kleppmann notes that even users of services which have open source components — such as WhatsApp, which uses the respected (and independently security reviewed) Signal Protocol for its encryption system — there’s still a requirement for users to trust the company’s servers are doing what they say they are when they hand over keys. Which could offer a potential route for a government-mandated backdoor to be slipped in.
“With WhatsApp/Signal/iMessage there is the remaining problem that you have to trust their server to give you the correct key for the person you want to communicate with,” he says. “Thus, even if the encryption is perfect, if a government agency can force the server to add the government’s special decryption key to your list of device keys, they can still subvert the security of the system. People are working on improving the transparency of key servers to reduce this problem, but we still have a long way to go.”
“I do believe open source is very helpful here,” he adds. “It’s not a silver bullet, but it makes it more difficult to sneak in a backdoor unnoticed.”
Previously, UK government ministers have both claimed they do not want to ban end-to-end encryption nor are demanding that backdoors be built in digital services. Although they have also described the rise of e2e encryption as “alarming“.
When interrogated specifically on the e2e question, the former UK Home Secretary (and now UK Prime Minister) said that companies should take “reasonable steps to ensure that they are able to comply with the warrant that has been served on them”.
Yet — and you might be spotting a pattern here — there has been no definition of what those “reasonable steps” might be.
Therefore it remains unclear where the UK’s legal line will be drawn on encryption.

Backdoors and outlaws

If The Sun‘s story is correct, and UK government-ministers-in-waiting are indeed preparing to demand the likes of WhatsApp and Apple hand over decrypted messages then those “reasonable steps” would presumably require an entire reworking of their respective security systems.
And if the companies don’t bow to such demands what then? Will the UK government move to block access to WhatsApp’s e2e encrypted messaging service? Or ban the iPhone, given that Apple’s iMessages also uses e2e encryption? We just don’t know at this point.
A spokesperson for WhatsApp declined to comment when contacted for a response to this story.
Apple’s press team did not respond to a request for comment either. But the company has a history of strongly defending user privacy — taking to the courts in the US last year to fight the FBI’s demand to weaken iOS security to help facilitate access to a locked iPhone that had been used by a terrorist, for example.
WhatsApp has also had its service blocked multiple times in Brazil after it was taken to court for not handing over decrypted data to law enforcement authorities. Its response? To state in public that it cannot hand over information it does not hold.


However, the legal situation in the UK is different owing to the 2016 IP Act — with its troublesome clause about “removing electronic protection”.
And while there may be fresh moves afoot in the US to introduce a decrypt bill in the US — such legislation has not yet come to pass. Whereas in the UK the relevant law is now framed in such a way as to be possible to interpret that it requires CSPs to deliver up decrypted data on warranted demand.
So it’s not apparent that there would be any legal route for Apple to try to fight a decryption order for iMessage — should it be handed one by UK government agencies — given the company has a substantial presence in the UK. (As does Facebook, the parent of WhatsApp.)
“You can’t run a company as an outlaw,” says Danvers Baillieu, former lawyer turned COO for a startup after a stint working for VPN firm, HideMyAss. “If you change the law and it is [a company’s] legal duty to do something they don’t really have a leg to stand on. It’s all very well them saying they’re going to crusade for this and that but they ultimately have to comply with the law.”
“As a VPN provider we obviously told people to get lost the whole time from other countries because we didn’t have a physical presence there and we said we just had to abide by UK law. So we were constantly having services taken down in countries like India and Turkey and other places — because the authorities there would then lean on our local server providers,” he adds.
“But we could get away with it because we weren’t physically there. But the moment you have a physical presence — and the moment we got taken over by a multinational [HMA was acquired by AVG in 2015] we suddenly had to think about these things far more, because suddenly we were part of a multinational with offices in all these countries. And we had to be a lot more sensitive to these things.”
At this point we simply do not know what these multinational tech giants might feel they have to do to their security systems behind closed doors when/if they are being leant on by the full force of UK law — also behind closed doors, as CSPs are forbidden from disclosing the existences of Technical Capability Notices.
And if they’re being leant on to build and test backdoors to afford UK intelligence agencies access to their systems we may never know as there’s no legal route for them to tell their users what’s happening.
Perhaps they’d just remove marketing materials that mention ‘end to end’ encryption from UK versions of their services — and, much like a warrant canary, we’d have to make an inference that a certain service might no longer be trustworthy for UK users from that moment on.
“It would certainly make for some very bad PR, were a company to defy the gag order and make it publicly known,” says Kleppmann. “So maybe in such cases the government would choose not to serve a technical capability notice in the first place, and only rely on cooperation from companies that are happy to cooperate voluntarily. But now we’re really in guesswork territory.”
Meanwhile, plenty of tech services are of course built and maintained by overseas firms or developers with little or no presence in the UK.
Which raises the question of how the government would respond to that workaround for its plan to acquire decrypted data? And whether it would seek to block access to services that offer e2e encryption and cannot be legally compelled to build in backdoors.
A lawyer we spoke to for this story who did not wish to be identified suggested there may be some overseas providers that are willing to “do something” — “if they can find a way to do so, and want the comfort of a legal compulsion”.
For those overseas providers that are adamant they will not remove electronic protection when handed a UK warrant, it’s difficult to say what the government might do. The source suggested they could try blocking access to such services by leaning on other UK-based companies — such as ISPs and multinational app stores.
“We’ve seen in the Digital Economy Act, in the context of overseas porn sites which fail to comply with UK rule, the fall-back position is one of ISP blocking,” they said. “There is also the (seemingly non-binding) approach of having a chat with app store operators and other ‘ancillary service providers’, to encourage them to take action — presumably, removing an app from the store, or the removal of payment services provision from the app/service in question.”
A blocking strategy would be highly unlikely to render it impossible to access all services offering e2e encryption without any government backdoors — so, as ever, the political desire to have an absolute workaround for strong encryption would be doomed to fail. Meanwhile, the cost to mainstream app users of government requiring CSPs build access exploits into their systems ‘just in case’ would be greater risk their communications are hacked, leaked and snooped on.
“I think ultimately the reputable, multinational companies would comply but then you’re always going to have some kid spinning up a service from their bedroom in the middle of nowhere — or you have the latest version of Telegram, or something like that — and then it’s not going to comply. So obviously any sensible criminal or terrorist is not going to use the mainstream ones,” says Baillieu. “Criminals are generally quite dumb about this sort of stuff. But whether that applies to the more motivated terrorists, we just don’t know.”
“I think equally there’s a very good argument to say you should make it hard for these people to do this stuff,” he adds. “They shouldn’t just be able to use the most convenient apps that everyone has on their phone. We should make it difficult for them — and they might slip up… And I think you can make it quite hard for non-compliant apps to get distributed.
“I think a lot of people, probably this week, are feeling a little bit vulnerable. And we have to do something to address this.”
While Baillieu’s view is understandable, given the horror and fear generated by terrorism, it does risk losing sight of the wider, day to day risks posed to all users of digital services if governments systematically undermine data security. And we don’t have to look far back in time for an example of the risks.
The WannaCry ransomware, which caused havoc globally earlier this month, including locking out healthcare systems in the UK, utilized an exploit developed by (and leaked from) US intelligence agencies.
So, really, a “clear-eyed assessment” is what’s called for here — despite, and perhaps even because of, the horrors of terrorism.
“These proposals are unworkable in practice, raise enormous legal and ethical questions, and would undo progress on security at a time when Internet vulnerabilities are causing extreme economic harm,” is how Keys Under Doormats‘ assessed the “exceptional access” proposals of 2015.
Two years later their assessment would surely be that the risks of seeking to systematically backdoor encryption now are only greater — as more and more systems are being connected and more and more people are dependent on the data they contain.
Yet politicians in positions of power are apparently intent on waging yet another self-defeating crypto war. Where’s the sense in that?

Source: TechCrunch

vineri, 26 mai 2017

Apple iPhone 6 16GB- A8 Dual Core 4.7 inch IPS 1GB RAM 4G LTE iOS Unlocked Phone 239$ Sealed box

1: Unlocked Original apple phone can use in worldwide in Sealed Box + New accessories Refurbished Phone Can Update iOS in future.
2: 180 days warranty guaranteed offer by us.
3: Phone looked 100% brand new but is used and refurbished.
4: When upgrade device please fully chargered phone connect PC by itunes with data-line doing upgrade,
It can not be used WIFI automatic upgrade, will be locked.

Product Status: Sealed Box & New Accessories All same as new !

Real In Stock Products Show:
Model : Apple iPhone 6 16GB- US Version
Screen Information : 4.7 Inch IPS Retina Capacitive touch Screen
Resolution : 750 x 1334 pixels
Band (Network) : 2G: GSM 850 / 900 / 1800 / 1900
CDMA 800 / 1700 / 1900 / 2100
3G: WCDMA 850 / 900 / 1700 / 1900 / 2100
4G: LTE 700/800/850/900/1700/1800/1900/2100/2600
(1,2,3,4,5,7,8,13,17,18,19,20,25,26,28,29)
OS : iOS 8, upgradable to iOS 8.4
CPU : Apple A8, Dual-core 1.4 GHz Cyclone (ARM v8-based)
GPU : PowerVR GX6450 (quad-core graphics)
RAM : 1 GB
ROM : 16 GB
Sim Card : Nano-SIM
Camera : 8 MP, 3264 x 2448 pixels
1.2 MP, 720p@30fps, face detection
Bluetooth : Bluetooth v4.0, A2DP, LE
GPS : Yes, with A-GPS support and GLONASS
FM Radio : Stereo FM radio with RDS
JAVA : No
WIFI : Wi-Fi 802.11 a/b/g/n/ac,
dual-band, Wi-Fi Direct, DLNA,hotspot
Data transfer : USB/Bluetooth 
Mobile internet : WCDMA/WIFI 
Media Formats : MP3/WAV/eAAC+/AC3/FLAC
MP4/DivX/XviD/WMV/H.264/H.263
Connectivity : 1 x SIM Slot (Standard)
microUSB v3.0 (MHL 2 TV-out), USB Host
3.5mm audio out port
Language : Multi Language
Message : SMS/MMS, Email, Push Mail, IM
Input : Handwrite/Keypad 
Other Feature  : - Active noise cancellation with dedicated mic
- Siri natural language commands and dictation
- iCloud cloud service
- iCloud Keychain
- TV-out
- Maps
- Audio/video player/editor
- Organizer
- Document viewer/editor
- Photo viewer/editor
- Voice memo/dial/command
- Predictive text input

Dimensions : 138.1 x 67 x 6.9 mm
Net Weight(Including battery) : 129g
Battery : Non-removable Li-Po 1810 mAh battery (6.9 Wh)
Package Contents : 1* original cell phone(unlocked)
1* charger(US/UK/EU/AU standard)
1* Built-in Battery
1* Manual book
1* earphone
1* data cable
1* box

Even the world’s largest bitcoin exchange couldn’t handle this week’s cryptocurrency boom

For those operating a bitcoin exchange — where people can buy cryptocoins — you’d imagine that the current surge in value for bitcoin and others like Ethereum’s ether coin is a dream come true. The answer is yes and no.
Coinbase, the world’s most funded bitcoin exchange, was dragged offline by the massive increase in interest in the space. Users have reported issues with various aspects of the service this week, and things reached a head on Thursday when the Coinbase website and mobile apps were unavailable to users for hours due to “unprecedented” levels of trading and traffic, the company said.
Bitcoin crossed the $2,000 mark for the first time this past weekend, and the charge continued this week until yesterday when, after reaching a new high of $2,805 on the Coinbase exchange, the valuation fell to $2,307. The currency has since stabilized, but its current value of $2,475.23 represents a $116.41 drop over the last 24 hours.
“The market cap of digital currencies has increased ~50 percent to $91 billion in the past week. As a result, Coinbase has seen a dramatic increase in traffic and trading volume,” the company told TechCrunch in a statement.
“The Coinbase engineering and support teams have been working round the clock to keep up with this unprecedented volume. However, Coinbase.com has suffered a few outages, including degraded performance and deposit/withdrawal delays for some users. We are actively working on resolving these issues and restoring our site to normal performance,” it added.
Things seem more stable today, with the Coinbase website and app functioning as usual. Having said that, at the time of writing, there are some minor issues with certain debit and credit cards, according to the company’s own status report.
According to Crunchbase, Coinbase has raised more than $117 million from investors that include Bank Of Tokyo – Mitsubishi UFJ, the New York Stock Exchange, Union Square Ventures, Draper Fisher Jurvetson and Andreessen Horowitz. Its $75 million Series C in 2015 was a record funding round for any bitcoin-focused startup.
Featured Image: Jon Russell/Flickr

duminică, 21 mai 2017

118$ LG G4 An Android smartphone that's all about its camera

118$ LG G4



1. 5.5 inch IPS LCD capacitive touchscreen 
2. 2K Screen 2560*1440 screen resolution 
3. Android 5.1 operating system 
4. Use a Qualcomm MSM8992 Snapdragon 808 Quad-core 1.44 GHz Cortex-A53 & dual-core 1.82 GHz Cortex-A57 processor, along with 3GB RAM and 32GB internal storage 
5. Hexa core processor delivers a smooth Android experience and eliminates stutter when playing games or HD video 
6. Support an external TF card up to 128GB (not included) 
7. 16MP rear camera and 8MP front camera, capture the world around you 
8. Support Bluetooth, WiFi, GPS, NFC, Stereo FM radio with RDS, GSM & WCDMA & FDD-LTE 
9. Integrated Bluetooth v4.1 for wireless data transmission 
10. Powered by 2900mAh battery



Buy it here.

Bitcoin just surged past $2,000 for the first time


The world’s most popular cryptocurrency is now worth over $2,000 per coin.  That’s according to a range of bitcoin exchanges, including Coinbase and Kraken. That valuation puts the total market cap of bitcoin — the total number of coins in circulation — at $32.92 billion.
Bitcoin has been on a tear this year, as this chart from Coindesk shows.

Bitcoin first broke the $1,000 valuation mark way back in 2013, but a combination of factors — including the implosion of then-top exchange Mount Gox — saw the currency drop in value. Support from financial institutions trialed bitcoin and blockchain-based services, and a general stability following new regulation in China, saw bitcoin return to the $1,000 mark again at the end of last year. Since then, its valuation has continued to grow consistently through 2017.
When we wrote about bitcoin (and ethereum) hitting all-time highs back at the end of April, you could buy a bitcoin coin for $1,343. Now, some three weeks later, the valuation is up 50 percent. The price of a coin rose 12 percent over the past week alone.
But bitcoin isn’t the only cryptocurrency on the rise. Ripple, the centralized currency that is aiming to be a settlement protocol for major banks, has surged more than 10x, or 1000% in under a month making it now the second most valuable cryptocurrency (only behind bitcoin) in circulation.
Similarly, ethereum, a cryptocurrency designed to function as a blockchain-based computing platform for developers, is now trading $130 per coin with a total market cap of just under $12B, which represents a a little more than a 2x increase over the last month.
The result of these increases is that bitcoin no longer constitutes the majority of the market cap for all cryptocurrencies. Today the total market cap of bitcoin represents just 47% of total cryptocurrencies – up until a few months ago it consistently hovered around 80%.

Why have these other cryptocurrencies been performing so much better than bitcoin? Some say it’s because of bitcoin’s scaling issue. The currency has grown so large that the network is having trouble quickly confirming transactions unless users attach hefty fees for minors. And while the problem can be fixed with solutions like SegWit or Bitcoin Unlimited, the most powerful miners (who effectively control the codebase of bitcoin) haven’t been able to come to a consensus on which new protocol to implement.
While increases of 10x in a month would typically be an obvious sign of a bubble, it’s a little different with cryptocurrencies because no one really knows how much they should be worth. Unlike a company there are no assets or revenues we can use to assess a predictable valuation. So in one sense, a total cryptocurrency market cap of $70B is insane – considering there is no tangible value behind it.
But on the other hand, if (any of) these cryptocurrencies actually replace or supplant a global store of value like gold, then $70B is nothing. For example, the total estimated value of all gold mined is around $8.2 trillion USD. Meaning that right now all cryptocurrencies put together don’t even equal 1% of the world’s gold reserves. Similarly, there is currently about $1.5 trillion USD in circulation, meaning that all cryptocurrencies today are still worth less than 5% of USD in circulation.
The currency is in unchartered waters at $2,000, but some pundits believe it has the potential to reach $10,000 (or more). To achieve this the community would likely have to sort out the scaling issue, which would give investors confidence that bitcoin’s infrastructure be able to support it as it grows.
Featured Image: Mike Lewinski/Flickr UNDER A CC BY 2.0 LICENSE

Source: TechCrunch

vineri, 19 mai 2017

Google’s AMP now powers 2B+ mobile pages and 900K domains, loads 2x faster

As Google looks for ways to keep people using its own mobile search to discover content — in competition with apps and other services like Facebook’s Instant Articles — the company is announcing some updates to AMP, its collaborative project to speed up mobile web pages. Today at the Google I/O developer conference, Google announced that there are now over 2 billion AMP pages covering some 900,000 domains. These pages are also loading twice as fast as before via Google Search. Lastly, the AMP network is now expanding to more e-commerce sites and covering more ad formats.
The advances serve as a counterbalance to some of the controversy that Google and others have courted through initiatives like this, which are optimised for user experience, but have been criticised for pointing people essentially to Google/Facebook/other domains and therefore taking traffic away from the sites themselves.
In a blog post announcing the news — published on WordPress, possibly to underscore how Google is trying to show this off as a collaborative, cross-company initiative? — Google takes a page from the Amazon school of stats and declines to disclose what the actual page load time is now via Google Search for HTML pages encoded with AMP (short for accelerated mobile pages).
But it notes that the improvement comes from changes that have been made at the backend, specifically with the AMP Cache, reducing bandwidth for images by 50 percent; and implementing a new compression algorithm called Brotli that Google announced in 2015 that reduces document size by 10 percent.
The list of sites that support AMP, meanwhile, has now had a massive boost with some of the latest additions focusing on social networking.
Tumblr (which is owned by Yahoo, whose search engine points to AMP pages) is now pushing 340 million blogs and 500,000 domains to render in AMP on mobile. Twitter is also now linking to AMP pages in mobile web (when you click on links in Tweets), and plans to expand AMP links to its mobile apps soon.
In Asia, Tencent’s Qzone (the largest social network in China) and Weibo (the third largest) now also rendering mobile pages using AMP.
Now that Google has established the basics of how AMP works for a wide swathe of pages, it looks like it’s stepping up its commercial gears in AMP.
Specifically, it’s ramping up the number of e-commerce pages that are using the format, and it’s also expanding the number of ad units that AMP pages will support.
The e-commerce expansions include eBay, which first introduced AMP support on about 15 million pages about a year ago and is now expanding to “millions more” including all of its product pages with a specific focus on adding name-brands and “Interest” pages that aim to give users more targeted results rather than the hodge-podge that you might otherwise see on the site.
Others who are adding AMP include Zalando in Europe, Myntra in India, and AliExpress in China.
The ads initiative, meanwhile, applies much of the same principle as the general page-loading times to the concept of advertising. Specifically, today Google is introducing coding for three new ad formats:

This is significant because one main reason that pages have crept to a halt on the web is because of advertising and the large amount of bloatware that accompanies them to measure what we do.
It’s led many people to implement ad blockers or browsers like Opera that block ads for you.
For a company like Google, whose bread and butter is essentially online ads, this is an alarming trend, and so it’s no surprise at all that its efforts to improve the mobile user experience have moved into improving the mobile advertising user experience.
Of course, by writing the code for these new ad formats, it’s also putting itself in the middle of how those ads will be implemented, giving Google an ongoing place at the table for how the next generation of the mobile web will monetize.

Source: TechCrunch

joi, 18 mai 2017

Uber Freight launches to connect truck drivers with available shipments



Uber is now the ‘Uber for trucking’ – Uber Freight is a new service from the ride hailing company that pairs up trucking companies, including independent operators, with loads that need to be hauled from one place to another. The app looks a lot like the main Uber app, but it’s targeted towards vetted and approved drivers, who can browse for nearby available loads, see destination info, distance required and payment upfront and then tap to book.
The idea is to streamline something that used to take hours of back and forth negotiation via phone or other communication, putting it in a simple workflow with confirmation of job acceptance and rates paid within a few seconds.

Uber also notes that they’re addressing another big pain point when it comes to small trucking companies and independent drivers: payment speed. Like many freelancers, truckers typically have to wait at least 30 days to receive a pay out, while Uber Freight will pay “within a few days, fee-free, for every single load,” according to the company, and in cases where payments don’t go through so quickly, Uber will pay additional fees depending on the wait periods.
This service is entirely focused on drivers and trucking companies, and Uber makes not mention in its press materials around the launch of Otto, the automated trucking service it acquired last year and still operates separately. It would be hard to imagine a scenario in which Uber wouldn’t make use of information and data gleaned from this new service to help further develop its autonomous trucking ambitions however.
The key to making any kind of self-driving tech more robust is logging lots of miles on the road for systems to learn from, after all, and this can help them in that regard much like Uber’s regular consumer car service informs its self-driving pickup plans.

Source: TechCrunch

Mercedes home storage batteries coming to the US


Mercedes-Benz Energy announced that it’s teamed up with Vivint Solar to provide batteries for storing energy at home in the United States, starting in California this spring.
Last year, Mercedes started a program in Germany that works almost exactly the same way. Mercedes uses the automotive-grade batteries it’s developed for electric vehicles, which can withstand a lot of charging and discharging cycles. The company partnered with utilities and solar companies in Germany to store surplus energy for later use in the home.
This is exactly the same kind of system. When new customers hire Vivint Solar to install an array of solar cells on their roof, they can choose to add up to eight 2.5 kWh Mercedes batteries. The modular battery systems allows the homeowner to customize energy storage depending on how much energy is being captured and used.
The batteries work as a backup if the grid goes down, but they also allow users to make the most of their solar energy. The system can store the energy created during the day for use later, when the sun goes down and energy usage rates often climb.
The main competitor for Mercedes-Benz Energy and Vivint is Tesla, which makes Powerwall storage batteries and now the solar cells. Tesla would like you to charge your Tesla car with energy from Tesla solar cells that’s been stored in a Tesla Powerwall, but you as a consumer are not required to buy into a particular ecosystem. Mercedes and Vivint are only the latest option of what will likely be many more in the future.
Featured Image: Mercedes-Benz Energy
Source: TechCrunch

Android Go is a lightweight version of Android for crazy cheap phones


There are 2 billion Android devices currently in use around the world. Google is now thinking about the next 2 billion devices. In order to do this, Google has a new project called Android Go. It’s a lightweight version of the upcoming version of Android (Android O) with optimized apps and Play Store.
Google focused on devices with very low specs, users with limited connectivity and multilingual capabilities. And it can run on devices with less than 1GB of memory. The Play Store is going to highlight apps that can run on these cheap devices.
These apps should be less than 10MB, work well when you’re not connected to the internet and support devices with slow systems-on-a-chip and little RAM.
Sameer Samat talked about Chrome’s data saver as an essential feature to load more pages with a minimal amount of cell data. But the company doesn’t plan to stop there.
For instance, YouTube Go is going to be an optimized version of the YouTube app. There’s a new preview feature so that you can have a look at the video before even loading the video.
Once you know for sure that you want to watch this video, you can select the quality of the video even before playing the video so that it doesn’t eat up all your data allowance. And if you’re on Wi-Fi, you can even download the video and watch it later.
This feature was limited to YouTube Red subscribers before. But YouTube Red is only available in the U.S., while Android Go is going to target developing countries. And if you’re watching videos with a friend, you can even share videos between multiple Android Go devices using peer-to-peer transfers.
In the future, all version of Android are going to ship with an Android Go variant. As Android becomes more powerful, Android Go seems like a smart move to make it run on crazy cheap phones and slow networks. Google hasn’t announced hardware partner yet.
 
 
Source: TechCrunch 

Facebook fined $122M in Europe over misleading WhatsApp filing

Facebook’s 2014 acquisition of messaging app WhatsApp cost $19 billion when it was announced. Now the price tag has been bumped up a little more, after European regulators slapped the company with a €110M (~$122M) fine for providing “incorrect or misleading” information at the time of the deal. The European Commission said today that Facebook told it at that time that it could not automatically match user accounts on its own platform and WhatsApp — yet the company subsequently revealed it would be doing just that.
The controversial change to WhatsApp’s privacy policy to share user data including phone numbers with Facebook took place in August last year — and led to widespread condemnation of the privacy U-turn.
In a statement today, the European Commission said: “The Commission has found that, contrary to Facebook’s statements in the 2014 merger review process, the technical possibility of automatically matching Facebook and WhatsApp users’ identities already existed in 2014, and that Facebook staff were aware of such a possibility.”
This follows a Statement of Objections to Facebook detailing the Commission’s concerns last December.
Facebook responded to the fine with its own statement — claiming it had made “errors” in 2014 when it made the filing to regulators.
“We’ve acted in good faith since our very first interactions with the Commission and we’ve sought to provide accurate information at every turn. The errors we made in our 2014 filings were not intentional and the Commission has confirmed that they did not impact the outcome of the merger review. Today’s announcement brings this matter to a close,” it said.
The EC is not reversing its decision to clear the WhatsApp acquisition. However it’s clear the region’s regulators are waking up to the cumulative power of big data holdings. And European data protection agencies’ fast-flowing objections to the WhatsApp-Facebook data-sharing quickly led to Facebook suspending these data flows in the region.
In a statement on today’s fine, EU Competition Commissioner Margrethe Vestager said: “Today’s decision sends a clear signal to companies that they must comply with all aspects of EU merger rules, including the obligation to provide correct information. And it imposes a proportionate and deterrent fine on Facebook,” she added.
The EC further notes that today’s decision is “unrelated to either ongoing national antitrust procedures or privacy, data protection or consumer protection issues, which may arise following the August 2016 update of WhatsApp terms of service and privacy policy”.
So while Facebook is claiming the specific matter is closed, it remains to be seen whether the company will face further regulatory problems related to its ownership and operation of WhatsApp.

Source: TechCrunch

miercuri, 17 mai 2017

What to expect from Google I/O 2017


Google’s annual I/O developer conference starts on Wednesday, and the 2017 edition of the show should be full of news and announcements, just like every year before now. Typically, we see lots in the way of new versions of Google apps, new software features and even major operating system updates – all of those are likely to be revealed during tomorrow’s keynote at 10 AM PT (which we’ll be live blogging). But this year’s show could also have some surprises in store in terms of hardware and powerful developer tools.

Android

The next version of Google’s mobile OS — Android O — will likely be revealed in full detail at the event. The successor to Nougat will have some big shoes to fill, since the last revision included some significant additions like Google Assistant, but you can expect Google to pack in plenty of additions.
We already know some things about what’s coming in Android O, because there’s already a developer preview available to download and work with for dedicated tinkerers. The dev preview has tipped new features, including Notifications Channels to group relevant notifications together; picture-in-picture for web and in-app video; multi-display support for individual apps; in-app navigation using hardware keyboards (like on Chromebooks); new networking features and more.
As for names, Google has made some time-ups including a mobile game and teasing exec tweets that suggest Oreo will be the moniker, similar to how it partnered with Kit-Kat for Android K. I can’t think of any other ‘O’ desserts of the top of my head, so it seems like a good bet.
In terms of what kind of actual software release we can expect, it’s probable we still have to wait for a consumer release. Instead, expect maybe an OTA, easier-to-access version of the developer preview, with more general stability and perhaps some added features. We’ll also probably find out that Android O will be released for general consumers starting this fall.

Also Android

Google is likely to spend some time talking about other places Android is going to work beyond smartphones and tablets. That could include updates to its crossover functionality with Chromebooks, for instance, which debuted earlier this year but which critics basically universally said still needs work before it’s ready for prime time.
Google itself also gave us something to look for specifically: More Android in the car. The OS is branching out from Android Auto to take over tasks related to cockpit and environment controls, and Google will have two test vehicles on site to show off what that looks like, with initial partners Audi and Volvo.

Finally, there are some hints that suggest Android Pay could roll out to a few additional markets. A website for Visa in Canada showed a mention of Android Pay, and it also showed up in a recent APK as well as on Android devices in Canada via an update, before being pulled back again.

VR

Virtual reality has been an area of ongoing evolution for Google, culminating most recently in Daydream, the built-in VR platform for Android. Daydream debuted with the Pixel last year alongside Android N, and has expanded out to a few other devices, including the Moto Z.
Android O could bring additional VR features to Daydream, and it’s possible that Google will also reveal new partners for Daydream on both the hardware and software side. There could also be more around Tango, the depth sensing camera tech that has been built into a few devices but that could ultimately do a lot more specific to VR, including adding inside-out environment tracking.

Android Wear

Google already updated Android Wear to version 2.0, building in a host of new features and debuting the platform iteration with a slate of new hardware, including showcase devices from LG. It might make sense to preview additional Wear features or updates again, even though it hasn’t been that long since the 2.0 update went live.
Wearables is still a category with questionable value for both OEMs and platform operators, basically across the board. Android Wear is still among the options out there with the most potential, but it’ll be very interesting to see how hard Google pushes Wear and Wear-related tech and development features at I/O. This could be a good opportunity to take the temperature of the search giant on its overall wearable ambitions.

Google Home and Assistant

Google is likely to show us a lot around Google Assistant, and we’ll likely get a look at some of the first partner hardware to sport Home-like Assistant features built-in. One likely specific launch is the Nvidia Spot, an AI assistant microphone that you can plug into any outlet and use with a Shield streaming set-top box for whole home Assistant integration.
Expect Assistant to reach further and get smarter, with more built-in features, more third-party integrations, and more platforms. Google doesn’t want to cede this ground to Amazon and Alexa, and it’s probably going to be a central theme of the I/O keynote, especially because I/O is all about rallying developers to build experiences for Google’s priority platforms.
Nvidia Spot

Lots more

This is one of the  I/O events in recent memory that we know the least about, so you can expect plenty more beyond what we’ve listed here (and a lot of this is also just guesswork). We’ll be there live with our keynote starting early tomorrow AM before the 10 AM PT kick-off time. There’s also a Developer Keynote later in the day, so stick around for plenty of news from that, too.
Featured Image: Bryce Durbin Source: TechCrunch

joi, 11 mai 2017

Tesla opens up Solar Roof pre-orders, answers the most important question: how much will it cost you?


Back in October of last year, Tesla unveiled a new project it had been secretly cracking away at behind the scenes: solar roof tiles. Unlike traditional solar panels that sit on top of the roof, these solar tiles would replace your roof outright — and, if all went to plan, they’d look as good as any other roof. Just… maybe a little shinier.
The first question that popped up on everyone’s mind seemed to be the same: “Cool! How much will it cost?”
Alas, that question has proven challenging to answer. Tesla has given ballpark estimates and comparison numbers, but there’s no one concrete answer that fits all homes. Different homes have different energy needs; different structures have different roofs and different challenges (chimneys, trees, etc); different states have different tax breaks.
This afternoon, pre-orders are going live ($1,000 deposit, refundable if you change your mind before signing the final contract). They can’t really expect people to pre-order without some idea of what they’ll pay in the end, so they’ve built a cost calculator that tries to crunch the numbers for your specific house.
Punch in your address and it’ll spit out a custom estimate.
Here’s what one looks like:
Tesla is tapping Google’s Project Sunroof here, which uses some 3D mapping trickery to give them a rough idea of how much roof area (square footage) you’ve got, and how much of it is actually good for solar use. That gives them a ballpark estimate for the roof cost (including materials, installation and the cost of removing your old roof), at which point they factor in the cost of a Powerwall battery. Then they wrap in offsets like local tax credits and the money saved on your electric bill to give you a final cost after 30 years.
Tesla CEO Elon Musk also shed a bit of light on how the ordering process works: Once you’ve placed your order and made your way up the waiting list, they send out an engineer who works out exactly what your roof needs. How much square footage of tile? How much of it should be solar versus non-solar?
That last bit is an interesting note: not all tiles they install will actually be solar tiles. Spots on your roof that don’t get much sun, for example, will get non-solar tiles — but they’ll look exactly the same from the street, says Elon.
The company also tightened up the timing window of various panel styles a bit: installations of the the smooth/textured glass solar panels will start this year, while the wavier Tuscan and Slate panels won’t start hitting houses until 2018 (Elon tweeted that it’d be in “about 6 months,” so it sounds like