Friday, September 06, 2013

Alcatel intros four One Touch Pop C-series smartphones, keeps them cheap

Source: http://www.engadget.com/2013/09/06/alcatel-one-touch-pop-c-series/

Alcatel intros four cheapandcheerful One Touch Pop smartphones

Not everyone needs a giant, higher-end smartphone like the One Touch Hero -- many can get by with just the basics. For those users, Alcatel has unveiled four One Touch Pop models with smaller screens and entry-level performance. The Android 4.2-based range begins with the Pop C1, a starter phone with a 3.5-inch screen, a dual-core 1GHz processor and sprightly color options like neon green and pink. Need more? The Pop C3 jumps to a 4-inch screen and a dual-core 1.3GHz chip; the Pop C5 steps up to a 4.5-inch screen, and the Pop C7 carries both a 5-inch display as well as a quad-core 1.3GHz processor. If you're interested, you can pick up the C1 or C3 as soon as October. The C5 ships in November, while the C7 arrives sometime during the last quarter of the year. %Gallery-slideshow79376%

Filed under: ,

Comments

Source: Alcatel

Read More...

Leaked Verizon doc prices Galaxy Note 3 at $699 retail, $299 with contract, $599 if you bundle the watch

Source: http://www.engadget.com/2013/09/06/verizon-galaxy-note-3-prices/

AT&T and T-Mobile customers already know what they will have to cough up if they want to squeeze Samsung's Galaxy Note 3 into their pockets. Verizon customers, however, are currently in the dark -- despite big red encouraging you commit in advance all the same. A reportedly leaked document received by AndroidSPIN pegs the phone at $699 sans-contract, or $299 if you sign on the dotted line for a two-year fling. Verizon seems keen to bundle in the Galaxy Gear, too, offering a joint package for $599 should you want to go all in. The pricing-curtain officially lifts at 9am ET, but here's a head start if you need to count those beans. Take a squint at the image yourself past the break.

Filed under: , ,

Comments

Via: Sammobile

Source: AndroidSPIN

Read More...

LG's 77-inch Ultra HD curved OLED TV is the biggest, with the most buzzwords (update: eyes-on)

Source: http://www.engadget.com/2013/09/06/lg-77-inch-curved-uhd-oled/

LG's 77inch Ultra HD curved OLED TV is the biggest, with the most buzzwords update eyeson photos

The never ending battle between Korean manufacturers Samsung and LG has moved to its inevitable next level, as LG has introduced an even larger super high-res OLED than its competitor's 55-inch models. The new high water mark is this 77-inch Ultra HD curved OLED it's showing off at IFA 2013, which is a step up in pretty much every way possible and even makes us recall the LCD size wars of the mid '00s. Whether or not we asked for it, it's bringing new display technology, a rare shape and of course, that truly outstanding size. It's only a concept now, but so was the $15,000 55-inch version at one point so we'd suggest keeping your black card handy.%Gallery-slideshow83284%

Filed under: , ,

Comments

Source: LG Newsroom

Read More...

Thursday, September 05, 2013

American and British spy agencies can thwart internet security and encryption

Source: http://www.engadget.com/2013/09/05/american-and-british-spy-agencies-can-thwart-encryption/

American and British spy agencies can thwart internet security and encryption

As reporters at the New York Times, the Guardian and ProPublica dig deeper into the documents leaked by Edward Snowden, new and disturbing revelations continue to be made. Two programs, dubbed Bullrun (NSA) and Edgehill (GCHQ), have just come to light, that focus on circumventing or breaking the security and encryption tools used across the internet. The effort dwarfs the $20 million Prism program that simply gobbled up data. Under the auspices of "Sigint (signals intelligence) enabling" in a recent budget request, the NSA was allocated roughly $255 million dollars this year alone to fund its anti-encryption program.

The agencies' efforts are multi-tiered, and start with a strong cracking tool. Not much detail about the methods or software are known, but a leaked memo indicates that the NSA successfully unlocked "vast amounts" of data in 2010. By then it was already collecting massive quantities of data from taps on internet pipelines, but much of it was safely protected by industry standard encryption protocols. Once that wall fell, what was once simply a torrent of scrambled ones and zeros, became a font of "exploitable" information. HTTPS, VoIP and SSL are all confirmed to have been compromised through Bullrun, though, it appears that some solutions to the NSA's "problem" are less elegant than others. In some cases a super computer and simple brute force are necessary to peel back the layers of encryption.

Filed under:

Comments

Source: New York TImes, Guardian, ProPublica

Read More...

The NSA Has Figured Out How To Access Some Of The Most Private Data On The Internet

Source: http://www.businessinsider.com/the-scariest-part-about-the-nsa-access-2013-9

world Internet map

The New York Times has published a report, drawing on documents leaked by Edward Snowden, that reveals the National Security Agency is able to circumvent the encryption, or digital scrambling, that guards the privacy of much of the traffic on the Internet.

The most alarming part is that they want it all.

The Times' report explains how, exactly, the agency has been able to obtain so much access to the world's web traffic.

From The Times:

Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware.

So the world's largest spy agency is paying companies, coercing companies, stealing from companies, and/or altering the software of companies to get the access to Internet data.

In the words of Bruce Schneier, an encryption expert and fellow at Harvard's Berkman Center for Internet and Society, the NSA is "doing it primarily by cheating, not by mathematics."

And the agency can only to this with the voluntary or involuntary cooperation of Internet companies.

That $250-million-a-year effort, called the Sigint Enabling Project“actively engages the U.S. and f! oreign I T industries to covertly influence and/or overtly leverage their commercial products’ designs” to make them “exploitable."

From The Guardian, which has published a parallel report:

"For the past decade, NSA has lead [sic] an aggressive, multi-pronged effort to break widely used internet encryption technologies," stated a 2010 GCHQ document. "Vast amounts of encrypted internet data which have up till now been discarded are now exploitable."

Ultimately, beyond the capabilities provided through the a highly classified program, code-named Bullrun, is that the NSA and its British counterpart (i.e. GCHQ) want even more access.

From the New York Times (emphasis ours):

But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence.

One way to do this would be to obtain the master keys that companies use for Web encryption. It is unclear how far the U.S. and U.K. spy agencies have come to realizing that goal.

According to Schneier, there are still ways to remain secure against NSA surveillance.

SEE ALSO: CYBER EXPERT: The NSA Has The Means And Motive To Spy On Everyone

Join the conversation about this story »


    






Read More...