LightBlog

lundi 14 novembre 2016

ASUS could reveal its Tango-based ZenFone AR phone at CES 2017

ASUS-2014-CES-BRAND-LOGO-4

ASUS-2014-CES-BRAND-LOGO-4

Another smartphone that will use Google's Tango 3D mapping technology maybe revealed in the near future. A new report claims that ASUS CEO Jerry Shen could reveal that phone, the ZenFone AR, as part of the company's announcements in early January during the 2017 Consumer Electronics Show in Las Vegas.

See also:

Lenovo Phab 2 Pro with Google's Tango 3D camera now on sale

2 weeks ago

This new report comes from Digitimes, who claims this info came directly from Shen. With that said, it's best if we take this information with a grain of salt.

Tango, which Google has been developing for years, uses its technology to map out the outside world with its camera. The smartphone can then use that map for AR-based games and apps. Earlier this month, Lenovo launched the first commercial smartphone with a Tango-based camera, the 6.4-inch Phab 2 Pro.

Today's report said that the ASUS ZenFone AR will come with "advanced functionality and performance at a competitive price", according to Shen. However, that's all we know about the device at the moment. Hopefully we will learn much more at CES 2017.

The same report also stated that the ASUS ZenFone 4 smartphones will begin shipping in the second quarter of 2017. Once again Shen provided little to no details about the phones, other than they will have "enhanced cameras". Finally, an all-in-one VR device from ASUS could be launched in the third quarter of 2017.



from Android Authority http://ift.tt/2g8bqmS
via IFTTT

Huawei has just unveiled the Mate 9 Pro in China

huawei-mate-9-pro_10

huawei-mate-9-pro_10

At a recent press event in Munich, Germany, Huawei announced two new phones — Mate 9 and Mate 9 Porsche Edition. Today, the company took the stage in China, where it has also officially released yet another addition to the Mate series.

This newer, more powerful device goes by the name of 'Mate 9 Pro' and is identical in terms of specs as well as design to the Mate 9 Porsche Edition. It does, however, drop the famous German car maker's branding, which makes it a bit less prestigious in some people's eyes.

The lack of the Porsche branding has obviously affected the price tag of the device, as the Mate 9 Pro is quite a bit cheaper than its more pretentious brother. Pricing starts at 4,699 Yuan ($686 USD) for the version with 4GB of RAM and 64GB of storage, while the 6GB/128GB model retails for 5,299 Yuan ($774 USD) in China.

See also:

Hands-on with the powerful new Huawei Mate 9

2 weeks ago

It could be argued that this is somewhat of a reasonable price, given the fact that the phone sports a 5.5-inch Quad HD curved AMOLED display, a Kirin 960 64-bit Octa-core processor, a dual Leica branded camera setup (20MP and 12MP), an 8MP selfie snapper and the latest version of Android, 7.0 Nougat.

If Huawei decides to bring the Mate 9 Pro to Western markets (US and EU), we can expect the price to increase thanks to VAT and other taxes (especially in Europe). But our guess is that the device, unfortunately, won't see the light of day in markets outside China. However, if you really want to get your hands on one, you might be able to (eventually) buy it through a few third-party sellers. We'll keep our eyes peeled, and when or if we spot a great deal, we'll be sure to let you folks know.



from Android Authority http://ift.tt/2frnQ7k
via IFTTT

Anker’s smart-driving system Roav can now be pre-ordered for $299

android-authority-roav-driving-tool

android-authority-roav-driving-tool

This article originally appeared on our sister site, Charged.

Anker's dash-mounted smart driving system, Roav, is now up for pre-order. The voice-controlled computer assists drivers with directions, speed, calling and more with a clear glass display that sits in front of the steering wheel.

The Roav is a standalone system with a dual-core processor and 32 GB of internal storage space, featuring Wi-Fi and 4G connectivity. Instead of checking your phone for information while driving, the Roav's voice-activated hardware is able to read notifications aloud and provide route information on its dash-mounted panel.

"This voice-control technology not only makes the driving experience more convenient, but also safer," said Steven Yang, CEO of Anker, adding "With a simple command, drivers can simply ask for the fastest way home or the best restaurant nearby, and let Roav do the rest."

Among Roav's features are:

• Navigation
• Live-traffic re-routing
• Live-traffic alerts
• Speed limit alerts
• Music Streaming
• Calling
• Messaging and notifications
• Trip statistics
• Onboard map

android-authority-roav-driving-tool022

android-authority-roav-driving-tool022

The Roav is similar to the self-titled device from San Francisco startup Navdy. Navdy has been in development for two years but still is yet to see an official release.

Anker has also undercut the $800 price tag of its competitor with the Roav, which comes in two variants: the 4G version priced at $299 and the Wi-Fi version for $399. These early-bird pre-order prices are discounted from the regular retail prices, which come in at $499 and $599 respectively.

See also:

Anker launches Roav, a dash-mounted HUD for your car

October 11, 2016

Anker says this is just phase one of its Roav project with phase two launching in Summer of 2017. This would introduce dashcams featuring ADAS (Advanced Driving Assistance System) to alert the driver of possible dangers.

The 4G version ships in the US in Spring 2017, while the Wi-Fi versions land in the USA, UK and Canada in the Summer. The 4G variant in Canada will be on sale Summer 2017 also.

Is the Roav on your radar? Let us know in the comments.



from Android Authority http://ift.tt/2fz4WsK
via IFTTT

Is Google Home everything you hoped it would be? [Poll of the Week]

google-home-first-impressions-aa-3-imp

google-home-first-impressions-aa-3-imp
Last week's poll summary: Out of over 5,500 total votes, 30.1% of our readers said they would have preferred an AMOLED display on Huawei's Mate 9 flagship. 24.2% of our readers said they would have liked a Quad HD display, while 21.3% said they aren't a fan of the company's EMUI 5 software skin.

Google's first big Amazon Echo competitor, Google Home, was officially announced way back at the I/O developer conference in May. While it took the company about six months to put the finishing touches on the product, we're happy to say that you can finally purchase the connected speaker from the Google Store and other retailers for about $130.

Six months of waiting around is a pretty long time, though, and if you're like me, you were chomping at the bit to see what Google Home could bring to the table that the Amazon Echo couldn't.

We've been using Google Home for over about two weeks now, and there's certainly a lot to like about it. Not only does it come with the new Google Assistant (the same one that's powering the Pixel and Pixel XL), it works seamlessly with Chromecast, Philips Hue, Nest Thermostat devices and a few more connected home products (mostly thanks to IFTTT integration). Plus, this is a very well-built piece of hardware – it looks good in most rooms throughout the house, and sound quality is very impressive for a speaker of this size.

Google Home shines in many areas, but is very much lacking in others

With all that said, there are a few areas where Google Home could improve. It isn't compatible with too many applications yet; only a handful of Google apps and third-party services are supported. And of the Google apps that are supported, integration could be much more robust. For instance, Google Assistant is only able to add items to your shopping list in Google Keep, and asking what podcasts are available in Play Music is like pulling teeth. Perhaps the biggest downside to Google Home right now – at least for families – is the lack of multi account support. This means if anyone in your house needs to get directions to their place of work or ask what's on their agenda, Google Home will give them information based on your Google account. Support for multiple accounts may be on its way in the future, but unfortunately it's not here yet.
See also:

Google Home first impressions: It'll get better

5 days ago

So, we want to know – is Google Home everything you hoped it would be? Or are you not impressed? Be sure to cast your vote in the poll below, and if you have anything to add, feel free to leave a comment below. We look forward to hearing what you have to say!



from Android Authority http://ift.tt/2gauHDa
via IFTTT

How easy is it to capture data on public free Wi-Fi? – Gary explains

If you have read my article on what is a VPN? or read my review of Express VPN, you will have noticed that I recommend a level of caution when connecting to free public Wi-Fi hotspots. The reason is that all the traffic that goes from your device to the Wi-Fi router is unencrypted and because it is unencrypted then anyone who is within range of the same Wi-Fi signal can look at your Internet traffic! So, here is the question, just how easy is it to steal data on public free Wi-Fi?

There are three main problems with unencrypted public Wi-Fi hotspots. First, as I have mentioned, the packets of data that go from your device to the router are public and open for anyone to read. That sounds scary and it is, but thankfully because of tech like SSL/TLS it isn't as bad as it was a few years ago.

Second, hackers can quickly create  fake rogue Wi-Fi hotspots, setup just to steal your info. Have you ever said to yourself, "Great! The coffee shop now has free Wi-Fi, it didn't last week, they must have upgraded." Did the coffee shop upgrade? Or is it some hacker just setting up a honey pot to catch you unawares?

Third, public Wi-Fi hotspots can be manipulate to launch man-in-the-middle (MitM) attacks where someone alters key parts of the network traffic or redirects your traffic to the wrong place. You might think you are connecting to Amazon.com but actually you are connecting to the hackers fake server designed just to capture your username and password.

Snooping and Sniffing

http

http

When you want to read a page on a website then your device will make a connection to the webserver to ask for the web page. It does that using a protocol called the HyperText Transfer Protocol (HTTP). On an open Wi-Fi router these requests and the responses can be seen by anyone who is listening. With wired networking then listening to the data packets zipping back and forth is more intrusive. However with wireless networking all that data is sent whizzing through the air, in every direction, for any Wi-Fi equipment to receive!

Normally a Wi-Fi adapter is set into "managed" mode which means it just acts as a client and connects to a single Wi-Fi router for access to the Internet. However, some Wi-Fi adapters can be set into other modes. For example, if I was configuring an access point (a hotspot) then the Wi-Fi needs to be set into "master" mode, more about that soon. Another mode is "monitor" mode. In "managed" mode a Wi-Fi network interface ignores all data packets except those specifically addressed to it. However in "monitor" mode the Wi-Fi adapter will capture all the wireless network traffic (on a certain Wi-Fi channel) regardless of the destination. In fact, in "monitor" mode the Wi-fi interface can capture packets without even being connected to any access point (router), it is a free agent, sniffing and snooping at all the data in the air!

Not all off-the-shelf Wi-Fi adapters can do this as it is cheaper for the manufacturers to make Wi-Fi chipsets that only handle "managed" mode, however there are some out there that can be placed into "monitor" mode. During my testing and research for this article I used the TP-Link TL-WN722N.

The easiest way to sniff Wi-Fi packets is to use a Linux distribution called Kali. You can also use the more standard distributions like Ubuntu, but you will need to install some of the tools yourself. If you don't have Linux on a laptop then the good news is that Kali Linux can be used on a virtual machine like Virtual Box.

To capture the traffic we are going to use the aircrack-ng suite of tools, plus some others like driftnet, Wireshark and urlsnarf. There are plenty of tutorials out there about capturing traffic with aircrack-ng but here is the essence:

First you need to find out the name of your wireless network adapter, it will probably be wlan0, but to check it run ifconfig and then to double check, run iwconfig:

steal-data-wifi-ifconfig-aa-16x9

steal-data-wifi-ifconfig-aa-16x9

Next put the card into "monitor" mode, as I mentioned before, not all adapters/cards support this, so you must make sure you are using a compatible adapter. The command is:

  airmon-ng start wlan0  

steal-data-wifi-monitor-mode-aa-16x9

steal-data-wifi-monitor-mode-aa-16x9

This will create a new virtual interface called wlan0mon (or maybe mon0). You can see it using the iwconfig:

steal-data-wifi-iwconfig-post-monitor-mode-aa-16x9

steal-data-wifi-iwconfig-post-monitor-mode-aa-16x9

Wi-Fi uses radio and like any radio it needs to be set to a certain frequency. Wi-Fi uses 2.4GHz and 5GHz (depending on which variation you are using). The 2.4GHz range is split into a number of "channels" which are 5MHz apart. To get two channels which don't overlap at all they need to be spaced around 22MHz apart (but that also depends on which variation of the Wi-Fi standard is being used). That is why channels 1, 6 and 11 are the most common channels as they are far enough apart so that they don't overlap.

To capture data via a Wi-Fi adapter in "monitor" mode you need to tell the adapter which frequency to tune into, i.e. which channel to use. To see which channels are in use around you and which channel is being used by the free public Wi-Fi service you wish to test then use the airodump-ng command:

  airodump-ng wlan0mon  

steal-data-wifi-networks-aa-16x9

steal-data-wifi-networks-aa-16x9

The first list shows the Wi-Fi networks within reach of your laptop. The "CH" tells you which channel number each network is using (11, 6, 1 and 11) and the "ESSID" shows the names of the networks (i.e. the service set identifiers). The "ENC" column reveals if the network is using encryption and if so, what type of encryption. You can see from the screenshot that one of the networks is listed as OPN (i.e. OPEN). This is an open Wi-Fi access point I have setup in my house for testing purposes.

If the free Wi-Fi is on channel 6 then you now use the airodump-ng command to capture the data like this:

  airodump-ng -c 6 -w allthedata wlan0mon  

steal-data-wifi-capture-aa-16x9

steal-data-wifi-capture-aa-16x9

This will start capturing all the data on channel 6 and write it to a file called allthedata-01.cap. Let that run for however long you need and the press CTRL-C to exit.

OK, now we have a big lump of network traffic. The next step is to analyze that data. Network traffic contains lots of different information. For example there are all the broadcast packets which contain the information about the wireless network, the SSID etc. That is what your device receives when it is looking for the available networks. The question is, how can we sort through all the packets and find something interesting.

Each service on the Internet uses what is called a port, this is a way for a service (like a web server) and a client to communicate. Web servers use port 80, Email servers use port 25 (and some others), FTP uses port 21, SSH uses port 22 and so on. A single server can run multiple services (web, email, FTP, etc.) even though the IP address is the same, because each service uses a different port.

What this means is that I can sort the packets by port. I can filter out and examine the traffic working off port 80, i.e all web traffic. Or all the email traffic or whatever. It is also possible to dive deeper into the HTTP traffic and see what kind of data is coming back, images, javascript, whatever.

There are lots of different tools that you can use to filter the data in the network capture. Some simple command line tools include urlsnarf, dsniff and driftnet.

To filter out all the URLs from the data capture use:

  urlsnarf -p allthedata-01.cap  

steal-data-wifi-urlsnarft-aa-16x9

steal-data-wifi-urlsnarft-aa-16x9

To see if there are any passwords lurking around in the data then use:

  dsniff -p allthedata-01.cap  

steal-data-wifi-driftnet-aa-16x9

steal-data-wifi-driftnet-aa-16x9
And to see what pictures where being viewed use the driftnet tool:
  driftnet -f allthedata-01.cap -a -d capturedimages  

steal-data-wifi-driftnet-results-16x9

steal-data-wifi-driftnet-results-16x9

The -a option tells driftnet to write the images to disk rather than display them on screen. The -d option specifies the output directory.

If you don't like the command line you can use Wireshark. This graphical tool allows you to look at each packet of data individually but it also offers lots of neat filtering. So if you type "http" into the filter bar then only the web related fields will be displayed. There is also the option to export all the images from the HTTP traffic via the File->Export Objects->HTTP menu item.

steal-data-wifi-wireshark-3-export-http-objs-16x9

steal-data-wifi-wireshark-3-export-http-objs-16x9

SSL/TLS and Android

If this was the end of the story then we would be in a very bad place. Any time you connect to an open Wi-Fi router then you are completely exposed. Thankfully there is help at hand in the form of SSL/TLS. Along side HTTP we have HTTPS, where the extra "S" on the end means secure, i.e. an encrypted connection. In the past HTTPS used SSL (Secure Sockets Layer) but that has now been replaced by TLS (Transport Layer Security). However since TLS 1.0 used SSL 3.0 as its basis then you often find that the two terms are used interchangeably. What TLS and SSL do is provide the protocol so that an encrypted connection can be established between a web browser and a server.

When connecting to a site which uses HTTPS the data inside the packets is encrypted, this means that even if you are connected to an open Wi-Fi hotspot then any packets which are sniffed out of the air can't be read.

However the problem is this, not all websites use HTTPS. Most of the popular sites will use HTTPS for sign-in, when you need to enter your username and password, and also for any financial transactions. But the rest of your visits to the site remain in the clear, open and exposed. Google has a good list of which sites fully utilize HTTPS and which ones don't. Thanks to initiatives like Let's Encrypt, the number of sites using HTTPS is growing rapidly.

what-is-https

what-is-https

It is fairly simple with a web browser to see if a site is using encryption, however it is much harder with apps. On your browser you have various signs, like the padlock icon, which tell you that you are connecting to a secure website. But when you use an app, how can you be sure that it is safe? The short answer is that you can't. Does your favorite app use encryption when it is posting your status updates to your friends? Is encryption used when you send a private instant message to someone? Is it safe to use a public Wi-Fi hotspot and then use third-party apps on your smartphone?

There are way to many apps to make a judgement call, but my initial reaction is no, it isn't safe. That isn't to say that there aren't safe apps. For example, WhatsApp encrypts all forms of communication within the app but Google's Allo only uses encryption in "incognito mode" and the search giant will store all non-incognito chats on its servers. Sounds to me like an Allo chats sent over an open Wi-Fi connection are ripe for the picking, but I haven't tested it to see.

Rogue hotspots and man-in-the-middle attacks

Capturing unencrypted packets out of the air isn't the only way that public Wi-Fi can be dangerous. Whenever you connect to an open Wi-Fi router you are explicitly trusting the provider of that Wi-Fi connection. Most of the time that trust is well placed, I am sure the people running your local coffee shop aren't trying to steal your personal data. However the ease with which we connect to open Wi-Fi routers means that hackers can easily setup a fake Wi-Fi hotspot to lure you into their traps.

Once a rogue hotspot has been established then all the data flowing through that hotspot can be manipulated. The best form of manipulation is to redirect your traffic to another site which is a clone of a popular site, however it is fake. The single aim of the site is to capture personal information. It is the same technique used in phishing email attacks.

What is more freighting is that hackers don't need a fake hotspot to manipulate your traffic. Every Ethernet and Wi-Fi network interface has a unique address called a MAC address (where MAC stands for Media Access Control). It is basically used to make sure that the packets physically arrive at the right destination. The way devices, including routers, discover the MAC addresses of other devices is to use ARP, the Address Resolution Protocol. Basically your Android smartphone sends out a request asking which device on the network uses a certain IP address. The owner replies with its MAC address so that the packets can be physically routed to it.

steal-data-wifi-arpspoof-aa-16x9

steal-data-wifi-arpspoof-aa-16x9

The problem with ARP is that it can be spoofed. That means that your Android device will ask about a certain address, say the address of the Wi-Fi router, and another device will reply with a lie, a fake address. In a Wi-Fi environment as long as the signal from the fake device is stronger than the signal from the real device then your Android smartphone will be deceived. There is a neat tool for this called arpspoof that comes with Kali Linux.

Once the spoofing has been enabled, the client device will send all the data to the fake router rather than to the real router, from here the fake router can manipulate the traffic however it sees fit. In the most simple case the packets will be captured and then forwarded on to the real router, but with the return address of the fake access point so that it can catch the replies as well!

Wrap-up

With the growing use of HTTPS and secure connections using TLS, the ease at which data can be stolen has lessened, however with a laptop, a free Linux distro and an inexpensive Wi-Fi adapter you would be amazed at what you can achieve!

Do you think we should be more or less concerned about the encryption being used in our devices and how our communications are protected over the Internet? Please let me know below.



from Android Authority http://ift.tt/2eTb2T5
via IFTTT

HTC 10 said to receive Android 7.0 update late November – early December (EU)

HTC 10 Themes AA 3

HTC 10 Themes AA 3

LlabTooFeR, an Android Developer and creator of the MaximusHD ROM, claims that the HTC 10 will receive the Android 7.0 update by the end of November or beginning of December in Europe. LlabTooFeR mentioned this earlier today on Twitter, where he has previously leaked information regarding upcoming HTC products and updates.

The HTC 10 is the manufacturer's latest Android flagship, released in May of this year. HTC has previously confirmed that the HTC 10 would receive Android 7.0 Nougat, as you would expect, but hasn't provided a timeline for when it might appear.

In the past, HTC has promised to deliver the latest Android software to its flagship phones within 90 days of it first being made available to developers.

See also:

HTC (re)confirms Android 7.0 Nougat is coming to HTC 10, One M9 and One A9

July 1, 2016

Responding to further comments, LlabTooFeR also suggested that the HTC One M9 could receive Android Nougat in late December or early January.

There's nothing to say that LlabTooFeR's information is correct, or that HTC's plans won't change, but based on his track record, it's likely a good indication of the timescales.



from Android Authority http://ift.tt/2g7A0nw
via IFTTT

Official CyanogenMod 14 nightly builds are available for the OnePlus 3

Android geeks love installing different ROMs onto their devices, as they offer more customization options to play around with.

Well, if you're an Android geek and currently use a OnePlus 3 device, you're in luck. Nightly builds of CyanogenMod 14 for the OnePlus 3 have been released last week. The ROM bring a few nifty customization tricks for the status bar, which allow you to tweak its icons as well as modify the clock style. You can also enable features like Brightness control, which allows you to adjust the screen's brightness by sliding your finger across the status bar, and Notification count, which displays the number of pending notifications.

Other features include Double-tap to sleep and Quick pulldown that brings up the quick settings by swiping down from the top right side.

See also:

What is CyanogenMod?

September 19, 2016

Before you get too excited, please keep two things in mind. First, you need a rooted OnePlus 3 to install the ROM. And second, some features do not fully work yet. Among these is the battery icon that doesn't change when the device is plugged in.

Despite a few bugs here and there, the CyanogenMod 14 should be stable enough for daily use. If you are interested in downloading it, please visit the XDA-Developers forum for more details on head over straight to the download page to get CM14 right now.



from Android Authority http://ift.tt/2fN8jge
via IFTTT