cross pond high tech
159.9K views | +1 today
Follow
cross pond high tech
light views on high tech in both Europe and US
Your new post is loading...
Your new post is loading...
Scooped by Philippe J DEWOST
Scoop.it!

This $2800 "concept phone" is almost entirely made of screen

This $2800 "concept phone" is almost entirely made of screen | cross pond high tech | Scoop.it

Xiaomi’s Mi Mix series has always pushed the boundaries of phone screens and form factors, from the original model that kicked off the bezel wars to last year’s sliding, notchless Mi Mix 3. Now, just as we’re starting to see “waterfall” displays with extreme curved edges, Xiaomi is taking this to a wild new level with the Mi Mix Alpha.

The “surround screen” on the Alpha wraps entirely around the device to the point where it meets the camera module on the other side. The effect is of a phone that’s almost completely made of screen, with status icons like network signal and battery charge level displayed on the side. Pressure-sensitive volume buttons are also shown on the side of the phone. Xiaomi is claiming more than 180 percent screen-to-body ratio, a stat that no longer makes any sense to cite at all.

The Mix Alpha uses Samsung’s new 108-megapixel camera sensor, which was co-developed with Xiaomi. As with other recent high-resolution Samsung sensors, pixels are combined into 2x2 squares for better light sensitivity in low light, which in this case will produce 27-megapixel images.

We’ll have to see how that works in practice, but the 1/1.33-inch sensor is unusually large for a phone and should give the Mix Alpha a lot of light-gathering capability. There’s also no need for a selfie camera — you just turn the phone around and use the rear portion of the display as a viewfinder for the 108-megapixel shooter.

 

Philippe J DEWOST's insight:

Xiaomi Mi Mix Alpha display wraps around the entire phone, which brings some interesting possibilities (no need for a front end selfie camera) as well as questions (will it break as the design forbids any covers and protections ? 

No comment yet.
Rescooped by Philippe J DEWOST from Digital Sovereignty & Cyber Security
Scoop.it!

Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret - at least 75 companies have access

Your Apps Know Where You Were Last Night, and They’re Not Keeping It Secret - at least 75 companies have access | cross pond high tech | Scoop.it

Data reviewed by The Times shows over 235 million locations captured from more than 1.2 million unique devices during a three-day period in 2017.

The millions of dots on the map trace highways, side streets and bike trails — each one following the path of an anonymous cellphone user.

One path tracks someone from a home outside Newark to a nearby Planned Parenthood, remaining there for more than an hour. Another represents a person who travels with the mayor of New York during the day and returns to Long Island at night.

Yet another leaves a house in upstate New York at 7 a.m. and travels to a middle school 14 miles away, staying until late afternoon each school day. Only one person makes that trip: Lisa Magrin, a 46-year-old math teacher. Her smartphone goes with her.

An app on the device gathered her location information, which was then sold without her knowledge. It recorded her whereabouts as often as every two seconds, according to a database of more than a million phones in the New York area that was reviewed by The New York Times. While Ms. Magrin’s identity was not disclosed in those records, The Times was able to easily connect her to that dot.

The app tracked her as she went to a Weight Watchers meeting and to her dermatologist’s office for a minor procedure. It followed her hiking with her dog and staying at her ex-boyfriend’s home, information she found disturbing.

“It’s the thought of people finding out those intimate details that you don’t want people to know,” said Ms. Magrin, who allowed The Times to review her location data.

Like many consumers, Ms. Magrin knew that apps could track people’s movements. But as smartphones have become ubiquitous and technology more accurate, an industry of snooping on people’s daily habits has spread and grown more intrusive.

Lisa Magrin is the only person who travels regularly from her home to the school where she works. Her location was recorded more than 800 times there, often in her classroom .

A visit to a doctor’s office is also included. The data is so specific that The Times could determine how long she was there.

Ms. Magrin’s location data shows other often-visited locations, including the gym and Weight Watchers.

In about four months’ of data reviewed by The Times, her location was recorded over 8,600 times — on average, once every 21 minutes.

Philippe J DEWOST's insight:

Who is watching you ?

Philippe J DEWOST's curator insight, December 10, 2018 3:19 PM

Lots of "brothers" are watching you via apps on your phone and without any of your consent.

Scooped by Philippe J DEWOST
Scoop.it!

The end of mobile

The end of mobile | cross pond high tech | Scoop.it

There are about 5.3bn people on earth aged over 15. Of these, around 5bn have a mobile phone and 4bn a smartphone. The platform wars ended a long time ago, and Apple and Google both won (outside China, at least). So it is time to stop making charts.

Philippe J DEWOST's insight:

5bn people have a mobile phone now, and 4bn have a smartphone. This interesting post details usage as well as it draws a perspective with the PC market. And concludes it is time to stop making charts.

No comment yet.
Scooped by Philippe J DEWOST
Scoop.it!

University of Cambridge study finds 87% of Android devices are insecure

University of Cambridge study finds 87% of Android devices are insecure | cross pond high tech | Scoop.it

It's easy to see that the Android ecosystem currently has a rather lax policy toward security, but a recent study from the University of Cambridge put some hard numbers to Android's security failings. The conclusion finds that "on average 87.7% of Android devices are exposed to at least one of 11 known critical vulnerabilities."

Data for the study was collected through the group's "Device Analyzer" app, which has been available for free on the Play Store since May 2011. After the participants opted into the survey, the University says it collected daily Android version and build number information from over 20,400 devices. The study then compared this version information against 13 critical vulnerabilities (including the Stagefright vulnerabilities) dating back to 2010. Each individual device was then labeled "secure" or "insecure" based on whether or not its OS version was patched against these vulnerabilities or placed in a special "maybe secure" category if it could have gotten a specialized, backported fix.

Philippe J DEWOST's insight:

OEMs seems to be the core issue while Google's own Nexus hardware  looks more secure (or less vulnerable depending on how you look at this)

No comment yet.