jm + phones   42

How Facebook Figures Out Everyone You've Ever Met
Oh god this is so creepy.
Facebook’s machinery operates on a scale far beyond normal human interactions. And the results of its People You May Know algorithm are anything but obvious. In the months I’ve been writing about PYMK, as Facebook calls it, I’ve heard more than a hundred bewildering anecdotes:

A man who years ago donated sperm to a couple, secretly, so they could have a child—only to have Facebook recommend the child as a person he should know. He still knows the couple but is not friends with them on Facebook.
A social worker whose client called her by her nickname on their second visit, because she’d shown up in his People You May Know, despite their not having exchanged contact information.
A woman whose father left her family when she was six years old—and saw his then-mistress suggested to her as a Facebook friend 40 years later.
An attorney who wrote: “I deleted Facebook after it recommended as PYMK a man who was defense counsel on one of my cases. We had only communicated through my work email, which is not connected to my Facebook, which convinced me Facebook was scanning my work email.”
facebook  privacy  surveillance  security  creepy  phones  contacts  pymk 
5 weeks ago by jm
iPhones4Autism
great idea -- donate old, obsolete iPhone 4/4s phones to a charity which repurposes them for autistic/non-verbal kids
autism  communication  health  phones  recycling  charity  iphones 
september 2016 by jm
Anti-Choice Groups Use Smartphone Surveillance to Target 'Abortion-Minded Women' During Clinic Visits - Rewire
Geofencing used for evil:
What Flynn realized is that he could use [ad targeting] to infer that a woman might be seeking an abortion, and to target her for ads from anti-choice groups [using geofenced advertising].

“We can reach every Planned Parenthood in the U.S.,” he wrote in a PowerPoint display sent to potential clients in February. The Powerpoint included a slide titled “Targets for Pro-Life,” in which Flynn said he could also reach abortion clinics, hospitals, doctors’ offices, colleges, and high schools in the United States and Canada, and then “[d]rill down to age and sex.” “We can gather a tremendous amount of information from the [smartphone] ID,” he wrote. “Some of the break outs include: Gender, age, race, pet owners, Honda owners, online purchases and much more.”

Flynn explained that he would then use that data to send anti-choice ads to women “while they’re at the clinic.”
geofencing  grim-meathook-future  abortion  phones  smartphones  pro-choice  ads 
may 2016 by jm
Bots won't replace apps. Better apps will replace apps
As I’ll explain, messenger apps’ apparent success in fulfilling such a surprising array of tasks does not owe to the triumph of “conversational UI.” What they’ve achieved can be much more instructively framed as an adept exploitation of Silicon Valley phone OS makers’ growing failure to fully serve users’ needs, particularly in other parts of the world. Chat apps have responded by evolving into “meta-platforms.” Many of the platform-like aspects they’ve taken on to plaster over gaps in the OS actually have little to do with the core chat functionality. Not only is “conversational UI” a red herring, but as we look more closely, we’ll even see places where conversational UI has breached its limits and broken down.
apps  bots  chatops  chat  ui  messaging  silicon-valley  agents  alexa  siri  phones 
april 2016 by jm
ZIP SIM
Prepaid talk+text+data or data-only mobile SIM cards, delivered to your home or hotel, prior to visiting the US. great service for temporary US business visits
visiting  us  usa  zip-sim  sims  mobile-phones  travel  phones  mobile  travelling  data 
april 2016 by jm
‘Error 53’ fury mounts as Apple software update threatens to kill your iPhone 6 | Money | The Guardian
Apple outlaws third-party repairs with vague TouchID-related justifications:
Freelance photographer and self-confessed Apple addict Antonio Olmos says this happened to his phone a few weeks ago after he upgraded his software. Olmos had previously had his handset repaired while on an assignment for the Guardian in Macedonia. “I was in the Balkans covering the refugee crisis in September when I dropped my phone. Because I desperately needed it for work I got it fixed at a local shop, as there are no Apple stores in Macedonia. They repaired the screen and home button, and it worked perfectly.” He says he thought no more about it, until he was sent the standard notification by Apple inviting him to install the latest software. He accepted the upgrade, but within seconds the phone was displaying “error 53” and was, in effect, dead.


Now that is scummy.
apple  error-53  ios9  ios  phones  smartphones  touchid  via:boingboing 
february 2016 by jm
OnePlus 2 and OnePlus X damaging Deutsche Telekom SIM cards
I can confirm, there is a help forum from the "deutsche telekom", they say there is a feature called MEC (it's mainly for setting phone parameters to match their network), active on all their SIM cards, which is not correctly handled by any of the OnePlus Devices (one, two, x) so it writes constantly to flash memory, killing it arround 100.000 writes which is 3-6 weeks.


(via Mike Walsh on the Irish tech slack)
via:itc  oneplus  phones  sim-cards  mec  deutsche-telekom  bugs  flash 
february 2016 by jm
NUMBER26
A German bank offering a worldwide(?) bank account, using your smartphone (with push notifications etc.) as the main UI
banking  germany  number26  banks  phones 
december 2015 by jm
The mystery of the power bank phone taking over Ghana
tl;dr: it's being used as a cheap, portable power bank
africa  ghana  battery  phones  power  recharging  gadgets 
december 2015 by jm
Floating car data
Floating car data (FCD), also known as floating cellular data, is a method to determine the traffic speed on the road network. It is based on the collection of localization data, speed, direction of travel and time information from mobile phones in vehicles that are being driven. These data are the essential source for traffic information and for most intelligent transportation systems (ITS). This means that every vehicle with an active mobile phone acts as a sensor for the road network. Based on these data, traffic congestion can be identified, travel times can be calculated, and traffic reports can be rapidly generated. In contrast to traffic cameras, number plate recognition systems, and induction loops embedded in the roadway, no additional hardware on the road network is necessary.
surveillance  cars  driving  mobile-phones  phones  travel  gsm  monitoring  anpr  alpr  traffic 
november 2015 by jm
Did you know that Dublin Airport is recording your phone's data? - Newstalk
Ugh. Queue tracking using secret MAC address tracking in Dublin Airport:
"I think the fundamental issue is one of consent. Dublin Airport have been tracking individual MAC addresses since 2012 and there doesn't appear to be anywhere in the airport where they warn passengers that this is this occurring. "If they have to signpost CCTV, then mobile phone tracking should at a very minimum be sign-posted for passengers," he continues.


And how long are MAC addresses retained for, I wonder?
mac-addresses  dublin-airport  travel  privacy  surveillance  tracking  wifi  phones  cctv  consent 
november 2015 by jm
User data plundering by Android and iOS apps is as rampant as you suspected
An app from Drugs.com, meanwhile, sent the medical search terms "herpes" and "interferon" to five domains, including doubleclick.net, googlesyndication.com, intellitxt.com, quantserve.com, and scorecardresearch.com, although those domains didn't receive other personal information.
privacy  security  google  tracking  mobile  phones  search  pii 
november 2015 by jm
How I Became A Minor Celebrity In China (After My Stolen Phone Ended Up There)
Phone is stolen, shipped to China, and winds up being bought by "Brother Orange" -- then the story becomes China's biggest viral hit
viral  theft  phones  iphone  china  stories  weibo 
february 2015 by jm
A World Transfixed by Screens - The Atlantic
Excellent "In Focus" this week -- 'The continued massive growth of connected mobile devices is shaping not only how we communicate with each other, but how we look, behave, and experience the world around us. Smartphones and other handheld devices have become indispensable tools, appendages held at arm's length to record a scene or to snap a selfie. Recent news photos show refugees fleeing war-torn regions holding up their phones as prized possessions to be saved, and relatives of victims lost to a disaster holding up their smartphones to show images of their loved ones to the press. Celebrity selfies, people alone in a crowd with their phones, events obscured by the very devices used to record that event, the brightly lit faces of those bent over their small screens, these are some of the scenes depicted below.'
mobile  photography  in-focus  alan-taylor  the-atlantic  phones  selfies  pictures 
january 2015 by jm
Following Fire Phone Flop, Big Changes At Amazon’s Lab126 | Fast Company | Business + Innovation
as one insider told me, it feels like "Lab126 is in the doghouse" and that "Jeff is taking out his frustration with the failure of the Fire Phone" on upper management.
lab126  amazon  fire-phone  phones  hardware  tech 
january 2015 by jm
"CryptoPhone" claims to detect IMSI catchers in operation
To show what the CryptoPhone can do that less expensive competitors cannot, he points me to a map that he and his customers have created, indicating 17 different phony cell towers known as “interceptors,” detected by the CryptoPhone 500 around the United States during the month of July alone.  Interceptors look to a typical phone like an ordinary tower.  Once the phone connects with the interceptor, a variety of “over-the-air” attacks become possible, from eavesdropping on calls and texts to pushing spyware to the device.

“Interceptor use in the U.S. is much higher than people had anticipated,” Goldsmith says.  “One of our customers took a road trip from Florida to North Carolina and he found 8 different interceptors on that trip.  We even found one at South Point Casino in Las Vegas.”
imsi-catchers  security  cryptophone  phones  mobile  3g  4g  eavesdropping  surveillance 
august 2014 by jm
Six things we know from the latest FinFisher documents | Privacy International
The publishing of materials from a support server belonging to surveillance-industry giant Gamma International has provided a trove of information for technologists, security researchers and activists. This has given the world a direct insight into a tight-knit industry, which demands secrecy for themselves and their clients, but ultimately assists in the violation human rights of ordinary people without care or reproach. Now for the first time, there is solid confirmation of Gamma's activities from inside the company's own files, despite their denials, on their clients and support provided to a range of governments.
finfisher  gamma-international  privacy  surveillance  iphone  android  rootkits  wiretapping  germany  privacy-international  spying  bahrain  turkmenistan  arab-spring  egypt  phones  mobile 
august 2014 by jm
China detains 1,530 in telecom spam crackdown
via Christopher Soghoian: 'IMSI catchers/fake base stations are out of control in China. The gov shut down 24 IMSI catcher factories, 1500+ people were arrested.'
privacy  spam  china  imsi-catchers  mobile  3g  gsm  phones 
august 2014 by jm
How Emoji Get Lost In Translation
I recently texted a friend to say how I was excited to meet her new boyfriend, and, because "excited" doesn't look so exciting on an iPhone screen, I editorialized with what seemed then like an innocent "[dancer]". (Translation: Can't wait for the fun night out!) On an Android phone, I realized later, that panache would have been a put-down: The dancers become "[playboy bunny]." (Translation: You’re a Playboy bunny who gets around!)
emoji  icons  graphics  text  speech  phones 
june 2014 by jm
Stuck in the iMessage abyss? Here’s how to get your texts back
some potential (apocryphal) workarounds for this extremely annoying Apple bug
apple  bugs  imessage  sms  phones  mobile  android  hacks 
may 2014 by jm
iMessage purgatory
Oh Apple, you asshats. This is some seriously shitty programming. iMessage on iOS devices caches the "iMessage-capable" flag for all numbers, indefinitely, so if you switch from iPhone to Android, messages from your friends' iPhones won't get delivered to you henceforth -- and to add insult to injury, it claims they do with a "Delivered." status appearing under the message. This is happening to me right now...
apple  sms  messaging  phones  mobile  imessage  android  fail  bad-programming  bugs 
may 2014 by jm
Android 4.4 KitKat Problems: HTC UK Speaks Out About HTC One Update Issues
Good advice on improving battery life with the KitKat 4.4.2 point release on a HTC One. I had serious battery problems, but they seem to have been resolved by following this advice
wifi  kitkat  android  4.4.2  htc-one  htc  battery  blinkfeed  mobile  phones 
may 2014 by jm
TJ McIntyre on the incredible surveillance of telephone traffic at various Garda stations around the country
The most grave issue is that each recording likely amounted to a serious criminal offence. Under Irish law, the recording of a telephone conversation on a public network without the consent of at least one party to the call amounts to an "interception", a criminal offence carrying a possible term of imprisonment of up to five years. [...] Consequently, unless gardai were notified that their calls might be recorded then a large number of criminal offences are likely to have been committed by and within the Garda Siochana itself.
gubu  surveillance  gardai  ags  tjmcintyre  bugging  tapping  phones  ireland  politics 
march 2014 by jm
Death by Metadata
The side-effects of algorithmic false-positives get worse and worse.
What’s more, he adds, the NSA often locates drone targets by analyzing the activity of a SIM card, rather than the actual content of the calls. Based on his experience, he has come to believe that the drone program amounts to little more than death by unreliable metadata. “People get hung up that there’s a targeted list of people,” he says. “It’s really like we’re targeting a cell phone. We’re not going after people – we’re going after their phones, in the hopes that the person on the other end of that missile is the bad guy.”
false-positives  glenn-greenwald  drones  nsa  death-by-metadata  us-politics  terrorism  sim-cards  phones  mobile-phones 
february 2014 by jm
"High Performance Browser Networking", by Ilya Grigorik, read online for free
Wow, this looks excellent. A must-read for people working on systems with high-volume, low-latency phone-to-server communications -- and free!
How prepared are you to build fast and efficient web applications? This eloquent book provides what every web developer should know about the network, from fundamental limitations that affect performance to major innovations for building even more powerful browser applications—including HTTP 2.0 and XHR improvements, Server-Sent Events (SSE), WebSocket, and WebRTC.

Author Ilya Grigorik, a web performance engineer at Google, demonstrates performance optimization best practices for TCP, UDP, and TLS protocols, and explains unique wireless and mobile network optimization requirements. You’ll then dive into performance characteristics of technologies such as HTTP 2.0, client-side network scripting with XHR, real-time streaming with SSE and WebSocket, and P2P communication with WebRTC.

Deliver optimal TCP, UDP, and TLS performance;
Optimize network performance over 3G/4G mobile networks;
Develop fast and energy-efficient mobile applications;
Address bottlenecks in HTTP 1.x and other browser protocols;
Plan for and deliver the best HTTP 2.0 performance;
Enable efficient real-time streaming in the browser;
Create efficient peer-to-peer videoconferencing and low-latency applications with real-time WebRTC transports


Via Eoin Brazil.
book  browser  networking  performance  phones  mobile  3g  4g  hsdpa  http  udp  tls  ssl  latency  webrtc  websockets  ebooks  via:eoin-brazil  google  http2  sse  xhr  ilya-grigorik 
october 2013 by jm
London orders rubbish bins to stop collecting smartphone data
Good call.
AUTHORITIES IN LONDON’S financial district have ordered a company using high-tech rubbish bins to collect smartphone data from passers-by to cease its activities, and referred the firm to the privacy watchdog. The City of London Corporation, which manages the so-called “Square Mile” around St Paul’s Cathedral, said such data collection “needs to stop” until there could be a public debate about it.


(via Daragh O'Brien)
via:dobrien  privacy  phones  wifi  mac-address  data-protection  data-retention  renew  london  bins  snooping  sniffing 
august 2013 by jm
Police may block recording with Apple patent
Creeptastic, Apple.
Apple has patented a piece of technology which would allow government and police to block transmission of information, including video and photographs, from any public gathering or venue they deem “sensitive”, and “protected from externalities.” In other words, these powers will have control over what can and cannot be documented on wireless devices during any public event. And while the company says the affected sites are to be mostly cinemas, theaters, concert grounds and similar locations, Apple Inc. also says “covert police or government operations may require complete ‘blackout’ conditions.”
apple  iphone  via:devore  creepy  police  photos  recording  remote-control  phones  blackout 
august 2013 by jm
Skype's principal architect explains why they no longer have end-to-end crypto
Mobile devices can't handle the CPU and constantly-online requirements, and an increased reliance on dedicated routing supernodes to avoid Windows-client monoculture and p2p network fragility

(via the IP list, via kragen)
skype  p2p  mobile  architecture  networking  internet  snooping  crypto  via:ip  via:kragen  phones  windows 
june 2013 by jm
how to restore from iCloud backup
the trick: don't try and do it through iTunes, it won't give you the option, apparently. I have a carrier unlock, and apparently need to wipe the phone for it to take place; this scares the crap out of me
backup  iphone  restore  sysadmin  phones  icloud  apple  howto 
june 2012 by jm
The lessons I learnt from my iPhone mugging | Benjamin Cohen on Technology
some good tips on iPhone security settings, in particular disabling the ability to turn off location services via Restrictions. I should do this
crime  iphone  location  london  mugging  phones  security  theft 
may 2012 by jm
RIM: The inmates have taken over the asylum
some notes from Blackberry's slow circle round the toilet, as it's hammered by iPhones and Androids. also: I can't believe QNX is still alive
rim  mobile  blackberry  qnx  embedded  phones  from delicious
march 2011 by jm
Cellphones Track Your Every Move, and You May Not Even Know - NYTimes.com
data retention in Germany revealed via FOI: 'in a six-month period — from Aug 31, 2009, to Feb. 28, 2010, Deutsche Telekom had recorded and saved his longitude and latitude coordinates more than 35,000 times. It traced him from a train on the way to Erlangen at the start through to that last night, when he was home in Berlin.'
data-retention  germany  phones  mobile  geolocation  tracking  mobile-phones  surveillance  from delicious
march 2011 by jm
good investigation into an Android WebKit exploit
already fixed in Froyo, but still -- interesting write-up from Sophos. good to see Google have chosen to separate all apps into individual uids, too
froyo  google  apps  phones  smartphones  android  webkit  exploits  security  from delicious
november 2010 by jm
Mobile Internet access data retention (not!)
so, it seems the wireless ISPs don't have sufficient IPv4 space for their customers, and are filtering access to the internet via NAT; unfortunate side effect is that this breaks data retention as defined in the UK. wonder if the same applies here?
uk  data-retention  privacy  nat  isps  wireless  mobile  phones  networking  internet  filtering  from delicious
january 2010 by jm
Malicious App In Android Market
phisher creates a banking app for Android phones which relays the authorization details to another site, possible because of insufficient app vetting (via Mulley)
apps  iphone  android  smartphones  phones  mobile  phishing  security  banking  fraud  from delicious
january 2010 by jm
All Android Phones
so many! Saw a Hero last night, it looked pretty swish -- although not quite as pretty as the iPhone ;)
phones  android  htc  hero  os  g1  mobile  tech  shopping  from delicious
november 2009 by jm
HTC Hero is on Meteor
according to Fergal, at half of the price of O2's iPhone "deal"
htc  hero  o2  iphone  android  phones  mobile  ireland  meteor  from delicious
november 2009 by jm
o2.ie's iPhone stock levels
massive shortages of iPhones in Ireland; this forum thread is apparently the most reliable way to determine if you'll be able to get your hands on one (via Keith)
via:keith-brady  phones  iphone  apple  o2  ireland  shortages  drought  forums 
july 2009 by jm

related tags

2g  3g  4.4.2  4g  abortion  ads  africa  agents  ags  alan-taylor  alexa  alpr  amazon  android  anpr  apple  apps  arab-spring  architecture  autism  backup  bad-programming  bahrain  banking  banks  battery  bins  blackberry  blackout  blinkfeed  book  bots  browser  bugging  bugs  cars  cctv  charity  chat  chatops  china  communication  consent  contacts  creepy  crime  crypto  cryptophone  culture  data  data-protection  data-retention  death-by-metadata  deutsche-telekom  driving  drones  drought  dublin-airport  eavesdropping  ebooks  egypt  embedded  emoji  error-53  exploits  facebook  fail  false-positives  family  filtering  finfisher  fire-phone  flash  forums  fraud  froyo  g1  gadgets  gamma-international  gardai  geofencing  geolocation  germany  ghana  glenn-greenwald  google  graphics  grim-meathook-future  gsm  gubu  hacking  hacks  hardware  health  hero  howto  hsdpa  htc  htc-one  http  http2  icloud  icons  ilya-grigorik  imessage  imsi-catchers  in-focus  internet  ios  ios9  iphone  iphones  ireland  isps  kitkat  lab126  latency  llama  locale  location  london  mac-address  mac-addresses  mec  media  messaging  meteor  mobile  mobile-phones  monitoring  mugging  nat  networking  nsa  number26  o2  oneplus  os  p2p  performance  phishing  phones  photography  photos  pictures  pii  police  politics  power  privacy  privacy-international  pro-choice  public  pymk  qnx  recharging  recording  recycling  remote-control  renew  restore  rim  rootkits  search  security  selfies  shopping  short-codes  shortages  silicon-valley  sim  sim-cards  sims  siri  skype  smartphones  sms  sniffing  snooping  spam  speech  spying  sse  ssl  stories  surveillance  sysadmin  tapping  tech  terrorism  text  the-atlantic  theft  tjmcintyre  tls  touchid  tracking  traffic  tragedy  travel  travelling  turkmenistan  twitter  udp  ui  uk  us  us-politics  usa  via:boingboing  via:devore  via:dobrien  via:eoin-brazil  via:ip  via:itc  via:keith-brady  via:kragen  viral  visiting  webkit  webrtc  websockets  weibo  wifi  windows  wireless  wiretapping  xhr  zip-sim 

Copy this bookmark:



description:


tags: