Apple patent application reveals an LCD with switchable, privacy-protecting viewing angles

Don’t you hate it when the guy next to you on the subway is looking over your shoulder, watching you screw up in Fruit Ninja? Well, Apple could have predicted your discomfort — back in November 2009, before the iPad was anything more than a unicorn, the company applied for a patent on an LCD display with adjustable viewing angles, explicitly designed to “shield the display away from unintended viewers.” According to the filing, the display would include steering modules made of liquid crystal material, which aim the so-called scattering modules that sit on top of them. The top layer then redirects the light, making it possible to narrow down and alter the viewing angle. The patent specifically calls out cellphones and laptops, paving the way for discreet displays on MacBooks and iPhones, though the broad phrase “other portable electronic devices” leaves plenty of room for iPads and iPod Touches. No word, of course, on when or if Apple will secure this patent and if so, what devices might incorporate such screens. We may just be seeing this concept go public now, but it seems consumers could use this even more today than they did back in the fall of ’09, when all they had to worry about was a stranger squinting at their 3GS’ 3.5-inch screen.

Continue reading Apple patent application reveals an LCD with switchable, privacy-protecting viewing angles

Apple patent application reveals an LCD with switchable, privacy-protecting viewing angles originally appeared on Engadget on Sun, 22 May 2011 05:48:00 EDT. Please see our terms for use of feeds.

Permalink Electronista  |  sourceUSPTO  | Email this | Comments

99% of Android devices vulnerable to authentication attack

By this point, just about everyone knows how risky connecting to an unsecured wireless access point can be. Unfortunately, many public Wi-Fi hotspots forego security in exchange for convenience, and that ultimately leaves users exposed to attacks. Based on new research from the University of Ulm in Germany, Android users appear to be in even […]

Dutch telco KPN using deep packet inspection to monitor mobile customers, throttle services

KPN

KPN set off some alarms in Holland last month when it announced a plan to start charging customers separate fees for using VoIP, streaming video, and sending instant messages. But, the question remained: how exactly would it keep mobile data users honest? The answer turns out to be deep packet inspection, which examines network traffic to identify what you’re sending and where it’s going. It’s been suspected that the secret ingredient in KNP’s service-throttling sauce was DPI, but it was finally confirmed in a presentation to investors recently. In fact, Mark Fisher, the director of KPN Mobile, bragged that it was the “very first” provider to be “able to identify by deep packet inspection what is actually the destination as data packages go along.” Predictably, privacy and net neutrality advocates are up in arms, with some claiming it is a violation of the Dutch Data Protection Act. We just hope someone nips this in the bud soon — we don’t need American carriers knowing about our Scottish Fold obsession. Check out the source link for an audio clip of Fisher’s confession.

[Thanks, Daan]

Dutch telco KPN using deep packet inspection to monitor mobile customers, throttle services originally appeared on Engadget on Thu, 12 May 2011 17:43:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceWebWereld  | Email this | Comments

Anonymous IDs on iPhones, iPads Can Reveal Your Identity

Each iPad, iPhone and iPod Touch contains a "unique device identifier" that can potentially be linked to a customer's real-world identity, according to a security researcher. Photo: Jon Snyder/Wired.com

The unique string of numbers and letters assigned to your iPhone can potentially expose your real-life identity.

Security researcher Aldo Cortesi last week published his discovery of a flaw in the unique device identifier (UDID) stored on each iPhone, iPad and iPod Touch.

While this device identifier is well-known, it’s not supposed to be connected to a person’s actual identity. But Cortesi discovered that some apps can link the identifier to the phone owner’s Facebook profile, which effectively puts a face behind that string of numbers and letters.

“It’s like a permanent, unalterable tracking cookie that can’t be changed and that the user is not aware of,” Cortesi told Wired.com. “The UDID idea has got such deep flaws because it literally identifies the device.”

Apple and iOS app programmers use the 40-character string of letters and numbers as a method to identify each device uniquely, and presumably anonymously. The UDID is permanently tagged to the device, and it can’t be erased or changed.

By itself, the UDID doesn’t expose personal data, but to the extent that it’s tied to other information about the phone’s user, it can function like a permanent, ineradicable “evercookie.” In theory, that could allow advertisers or other parties to track a wide variety of your activities through your smartphone. Whether that constitutes a privacy invasion, an annoyance or a convenience depends on your perspective. Early concerns over Web cookies, for example, have faded as the business community has standardized privacy protocols, including allowing users to easily identify sites that use them, and to opt out if they so choose.

This identifier is at the center of criticism amid growing concerns about smartphone privacy. The Wall Street Journal last year conducted independent tests and found that out of 101 apps, 56 transmitted the device’s UDID to other companies without user awareness or consent.

In reaction to WSJ’s investigation, some customers in April filed a lawsuit against Apple and a handful of app makers, alleging that they invaded user privacy by accessing customer information without permission and sharing it with third-party advertisers. They argued that the UDID could be virtually stapled to other information, such as age and location, to personally identify a customer, and that advertisers can create profiles to track each customer for marketing purposes.

“They’re permanent Social Security numbers in your phone that are freely transmitted and can’t change,” said Justin Brookman, director of the Center for Democracy and Technology’s consumer privacy project.

Cortesi said that Apple’s UDID methodology is problematic because of the way it is designed. To track how apps transmit UDIDs, Cortesi created a tool called Mitmproxy.

In April, he found that OpenFeint, a gaming network integrated inside some apps to link players together, was transmitting UDID attached to personally identifiable information in some instances. When customers used their Facebook accounts to log in to OpenFeint, the game was transmitting UDID attached to the customer’s Facebook ID, picture and occasionally GPS coordinates, he said.

OpenFeint claims to have 75 million registered gamers. Popular games that integrate OpenFeint include TinyWings, Pocket God, Robot Unicorn Attack and Fruit Ninja.

OpenFeint fixed the flaw after Cortesi notified the company. However, Cortesi explained that the issue is not isolated to the gaming network.

Apple explicitly tells iOS programmers that they “must not publicly associate a device’s unique identifier with a user account” to ensure privacy. However, the fact that a network as big as OpenFeint managed to link UDIDs to Facebook accounts means that there are probably other apps linking UDIDs to personal data that have slipped past Apple’s radar.

“By designing an API to expose UDIDs and encouraging developers to use it, Apple has ensured that there are literally thousands of databases linking UDIDs to sensitive user information on the net,” Cortesi said.

Other than concerns about trading customer data with advertisers, an additional possibility is that app makers can peek at what a specific person is doing inside their apps, using analytics tools such as Flurry, Cortesi said.

Apple did not return a request for comment.

Charlie Miller, a security researcher who specializes in hacking smartphones, told Wired.com that the security issue raised by Cortesi is not a huge concern, but it does highlight some issues with the UDID. He said that a more secure design would be to have each app randomly generate a unique identifier for each device, so that a programmer can only track information relevant to his or her app.

However, Miller added that the erosion of privacy is inevitable in the always-connected age, and we have to sacrifice some privacy in exchange for app-powered services.

“The bottom line is traditional privacy has gone out the window with smartphones,” Miller said. “You’re carrying around always-on GPS-enabled, internet-enabled devices. You’re downloading and running applications that are designed to share your thoughts and photos. [Cortesi] points out some things Apple could have done better to help protect your privacy, but basically, you voluntarily give up some of your privacy in order to use these apps and devices.”

See Also:


Tor to fork Firefox for simplified anonymous browsing, doesn’t think you’re paranoid

Tor

Soon political dissidents, whistle blowers, and those trying to cheat MLB.TV’s blackout restrictions will have an easier way to protect their privacy thanks to a dedicated Tor Browser. For those of you unfamiliar with it, Tor is a tool for anonymizing web browsing and communications through encryption and proxy servers. Trouble is, it requires both a browser extension and a standalone app to work — leaving average users “horribly confused,” according to developer Mike Perry. So, the organization has decided to retire the Tor Button and create its own fork of Firefox with private browsing features baked in. As an added benefit, Tor will no longer be at the mercy of Mozilla to fix bugs that affect privacy and security. For now, the group will focus on its downloadable bundle with automatic configuration scripts for simplifying setup, but eventually the paranoid will have a browser they can finally call their own.

Tor to fork Firefox for simplified anonymous browsing, doesn’t think you’re paranoid originally appeared on Engadget on Sat, 07 May 2011 21:15:00 EDT. Please see our terms for use of feeds.

Permalink PC World  |  sourceThe Tor Blog  | Email this | Comments

Sony misses promised PlayStation Network and Qriocity restoration date, begs for more patience

Whoops. If you’ll recall, Sony held what can only be described as an emergency press event in Japan a week ago in order to issue a number of assurances about the resumption of service as it relates to the PlayStation Network and Qriocity. Seven days later, things are still as dead as they were pre-Cinco de Mayo. This evening, the company’s Senior Director of Corporate Communications Patrick Seybold punched out a quick update to let the world know that they could actually leave the house and find something else to entertain ’em — like it or not, PSN isn’t coming back online today. The reason? On May 1st, Sony was apparently “unaware of the extent of the attack on Sony Online Entertainment servers,” and now, it’s spinning its wheels in order to restore security on the network and “ensure” that user data is safe. Mr. Seybold seems to understand that you’re overly anxious about getting back into the swing of things, and he’s even going so far as to ask your trust that Sony’s doing “everything [it] can” to get the lights blinking once more. Oh, and if you were planning on visiting that source link just to find the new ETA… don’t. Sony’s planning to update you “as soon as it can.”

[Thanks, Alex]

Sony misses promised PlayStation Network and Qriocity restoration date, begs for more patience originally appeared on Engadget on Sat, 07 May 2011 03:18:00 EDT. Please see our terms for use of feeds.

Permalink Joystiq  |  sourcePlayStation Blog  | Email this | Comments

Sony promises ‘phased restoration’ of PlayStation Network and Qriocity starting this week

Sony made quite a few promises this morning about how it intends to deal with the fallout from the PlayStation Network outage and breach when it wasn’t profusely and solemnly apologizing — you can find our liveblog right here — including improved security measures and a few token handouts of 30-day free subscriptions to PlayStation Plus and Qriocity and possibly some free software. Perhaps more importantly for you gamers, Kaz Hirai told reporters that services will resume “soon,” and by the end of the week we should see some functionality return. Of course, it made those promises in Japanese, but if you want an English copy you won’t have to look far, as the official PlayStation.Blog got hold of a press release with them all spelled out. Find the full document after the break.

Continue reading Sony promises ‘phased restoration’ of PlayStation Network and Qriocity starting this week

Sony promises ‘phased restoration’ of PlayStation Network and Qriocity starting this week originally appeared on Engadget on Sun, 01 May 2011 02:47:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourcePlayStation.Blog  | Email this | Comments

Watch How the Police Raid a Cellphone [Video]

Everyone knows the cops have tools to get inside your phone. But what do they do? They suck your iPhone’s entire soul in 15 minutes. With one single click. This is what it looks like. More »

Apple Promises Fix for Location-Gathering ‘Bug’ on iPhone

An unencrypted file stored in iPhones and iPads constantly records location data. An open source application was used to plot the location data from an iPhone belonging to a Wired.com reporter.

Your iPhone isn’t stalking you, but some of its intrusive location-gathering techniques are the result of bugs that will be fixed soon, according to Apple.

Apple published a Q&A document on Wednesday to educate customers on how and why Apple is collecting location data, and the company admitted some of its techniques are flawed.

“Users are confused, partly because the creators of this new technology (including Apple) have not provided enough education about these issues to date,” Apple said in the statement.

Apple’s statement echoes Wired.com’s explanation of Apple’s location-gathering published last week, which was based on a letter Apple sent to Congressmen Ed Markey and Joe Barton in 2010 to disclose data-collection methods.

Apple’s Wednesday response comes nearly a week after two data scientists revealed that an unprotected file stored on iPhones and iPads was keeping a history of location data dating back to 10 months ago. Following that story, The Wall Street Journal discovered that the devices continue to store location data, even when location services are switched off.

Two customers have already filed a lawsuit against Apple, accusing the company of violating computer fraud laws by secretly recording location data of iPhone and iPad users.

Apple admits in the Q&A statement that the file should not be storing so much data dating as far back as a year ago, and it should not be storing location data even after location services are turned off. The company said an upcoming, free software update would fix both these issues, plus, it would encrypt the database file.

It’s worth noting that although Apple claims the excessive location-data storage method is a bug, the company recently filed for a patent that describes a location-gathering method in which the iPhone’s database file does not remove location history entries until the location database becomes full.

In the Q&A statement, Apple explained that the iPhone is collecting information on nearby cell towers and Wi-Fi access points to help customers rapidly calculate and accurately find their location.

Apple calls this “crowdsourcing” location data, because millions of iPhones are collecting this data and transmitting it to Apple to build its comprehensive location database to assist with location services.

“Calculating a phone’s location using just GPS satellite data can take up to several minutes,” Apple said. “iPhone can reduce this time to just a few seconds by using Wi-Fi hotspot and cell tower data to quickly find GPS satellites, and even triangulate its location using just Wi-Fi hotspot and cell tower data when GPS is not available (such as indoors or in basements).”

Apple said the bug fixes would arrive with the next major iOS software update.

See Also:


iSpy: Apple Will Fix the iPhone Location Problem [Privacy]

Surprise! Apple’s broken their silence on the iPhone location tracking controversy with an amazingly self-contradictory Q&A press release. Most notable: they say the massive data cache goes too far, and will be fixed in an impending software update. More »