technology:android

  • Can Code be Self Aware? Musings on Studying Computer Science at #mit (Part I)?
    https://hackernoon.com/can-code-be-self-aware-musings-on-studying-computer-science-at-mit-part-

    I remember first thinking about self-awareness, like many things, from watching too much science fiction. Was Data, the android in Star Trek: The Next Generation, a conscious being, or just a “machine”?Was Data Self-Aware? Picard Argued Yes.OK robots are one thing — they have a physical presence and whether or not they are conscious most machines will have some basic self-diagnostic capabilities and be aware of the state of their “physical body”. Even a car is now “aware” if its door is open or not or if the seat belt is on.There are examples of robots passing the Mirror Test (read about it here), which was created by Gallop in 1970 to see if an animal (or a species of animals) could recognize themselves. According to Gallop, most infants didn’t pass this test until they were at least 18 months (...)

    #hacking #programming #robotics #artificial-intelligence


  • Strengthen #tls in React Native Through Certificate Pinning — iOS Edition
    https://hackernoon.com/strengthen-tls-in-react-native-through-certificate-pinning-ios-edition-9

    Strengthen TLS in React Native Through Certificate Pinning — iOS EditionEnhance React Native’s networking API protection on Android and iOS without touching your Javascript code or manually editing the native code projects.The first edition of this article implemented TLS certificate pinning for React Native apps on Android. Since then, the #react-native-cert-pinner package has been enhanced to support pinning on iOS devices, and this edition of the post walks through the previous example for iOS.Beginning in July 2018 with the 68 release, Chrome began marking all sites not running HTTPS (TLS over HTTP) as “not secure”. TLS uses site certificates to establish a chain of trust and encrypt communication at the transport layer.SOURCE: Google Security BlogThis is a significant boost in networking, (...)

    #mobile-app-development #ios-app-development #certificate-pinning


  • Google Launches #flutter 1.0 Which Goes Beyond Mobile App Development
    https://hackernoon.com/google-launches-flutter-1-0-which-goes-beyond-mobile-app-development-750

    Google finally released Flutter version 1.0 on December 5th 2018 at its Live event in London.It is a fast, powerful cross-platform app UI framework that helps developers create attractive, native mobile app user experiences from a single codebase.Ever since its first announcement in March 2017, Flutter has been talk of the town among most developer communities. Though few said that Flutter is just a Google’s small product of experiment that the company is not even serious about.But, after the latest Flutter live event in London, Google demonstrated how serious they’re with Flutter, proving all naysayers wrong!In fact, a considerable number of developers have established Flutter as their ideal cross-platform mobile application development tool. Plus, the adoption rate of Flutter is (...)

    #android-app-development #hybrid-app-development #ios-app-development #mobile-app-development


  • We are all victims of #facebook manipulation
    https://hackernoon.com/we-are-all-victims-of-facebook-manipulation-925fe5d2f8f0?source=rss----3

    Facebook has taken a battering recently, and what many users have spotted is that there is a massive gap between how the company operates and the PR messages it sends to the world.Look at some of the messages that Mark Zuckerberg sent out in 2012, the year it acquired Instagram and brought Sheryl Sandberg to its boardroom table:“Helping a billion people connect is amazing, humbling and by far the thing I am most proud of in my life.”“I am committed to working every day to make Facebook better for you, and hopefully together we will be able to connect the rest of the world too.”“At Facebook we believe that the need to open up and connect is what makes us human. It’s what brings us together. It’s what brings meaning to our lives.”It all sounds very warm and worthy. Yet there were other things (...)

    #facebook-motherboard #facebook-manipulation #facebook-android-update #internet



  • What does it take to make your own #blockchain explorer?
    https://hackernoon.com/what-does-it-take-to-make-your-own-blockchain-explorer-47ea1f64b41e?sour

    Even though the bear market is quite strong lately and there may not be much interest in the space, this is still arguably a great time to build new and cool things that may or may not be useful in the future.This summer we were contracted by a client who wanted to build an Ethereum wallet for Android and iOS that would enable their users to safely store and send crypto-currency. An integral part of the application was the ability view a history of transactions. As it turns out that is not a simple thing to do without third-parties since there the web3 does not allow querying an account for it’s past transactions. We have explored an option to build our own ethereum indexer but after taking into consideration time and budget restrictions we opted for Etherscan.io set of free APIs to (...)

    #software-development #internet-explorer #blockchain-explorer #cryptocurrency


  • CIMON, the International Space Station’s artificial intelligence, has turned belligerent - NZ Herald
    https://www.nzherald.co.nz/world/news/article.cfm?c_id=2

    CIMON was programmed to be the physical embodiment of the likes of ’nice’ robots such as Robby, R2D2, Wall-E, Johnny 5 … and so on.

    Instead, CIMON appears to be adopting characteristics closer to Marvin the Paranoid Android of the Hitchhiker’s Guide to the Galaxy — though hopefully not yet the psychotic HAL of 2001: A Space Oddysey infamy.

    Put simply, CIMON appears to have decided he doesn’t like the whole personal assistant thing.

    He’s turned uncooperative.

    Open the pod bay doors, HAL?

    No. Not quite. Not yet.

    In this case, the free-floating IBM artificial intelligence was — for the first time — interacting with ESA astronaut Alexander Gerst.

    Watch the whole interaction here - the creepiness factor ramps up from 3 minutes 30.

    https://www.youtube.com/watch?time_continue=133&v=3_2Jy1Ur0js

    #IA #robot #kubrick


  • Why ‘think small’ makes sense with TVs
    https://hackernoon.com/why-think-small-makes-sense-with-tvs-e062d6f5537f?source=rss----3a8144ea

    Today’s huge, expensive 4K TVs will be dinosaurs in a year or twoIn India, the TV has long been the main source of entertainment in most homes, with the cellphone still lagging far behind. Most families religiously follow the daily melodramatic soaps that rule the Indian TV landscape. This explains why Indians invest in expensive models. But having shelled out good money, they expect those TV to last for ten years or more. That’s bad for TV manufacturers but good for the environment as India is among the top five e-waste generating nations.However the smart TV revolution is finally reaching India, and it’s ever so slowly beginning to change that mindset. I must confess I’m one of those FOMO-driven laggards who has just climbed aboard the smart TV bandwagon. The good thing is this means I (...)

    #apple #android-tv #smart-tv #consumer-behavior #obsolescence



  • How to Connect Your Android Phone to Ubuntu Wirelessly
    https://www.omgubuntu.co.uk/2018/11/connect-android-ubuntu-gsconnect

    Learn how to connect your Android phone to Ubuntu using GSConnect to transfer files, see notifications, or use your phone touchscreen as a mouse. This post, How to Connect Your Android Phone to Ubuntu Wirelessly, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.


  • How We Built a Secure Crypto Portfolio Tracker
    https://hackernoon.com/how-we-built-a-secure-crypto-portfolio-tracker-d6431ee287d2?source=rss--

    We built Squirrel for people who are nuts about tracking their digital assets. As #blockchain enthusiasts we want to track all of our holdings from one app. I was tired of switching between various exchanges and excel sheets to manage my assets, so I envisioned Squirrel, an all-in-one solution that is fully-featured and it is easy to use.Squirrel is as a crypto portfolio and asset tracking tool, offering real-time market data for all token holdings. Our main mission is to equip users with live price updates and portfolio tracking tools, so they may react to any changes in the market quickly and stay on top of their game.Fast setup, ease of use, and integration into existing activities are among our top priorities for Squirrel users. Simply add your assets, select your preferred data (...)

    #ios #android #squirrels #cryptocurrency


  • Build #android Chatbot with #dialogflow (API.ai)
    https://hackernoon.com/build-android-chatbot-with-dialogflow-api-ai-97d15eefe6?source=rss----3a

    In this article, we will be sharing steps to integrate dialogflow chatbot into your Android app. All you need to build a sample chatbot for an android app is Dialogflow and #kommunicate.Below is an example of Kommunicate Support Bot developed in android using Dialogflow. We actually use this bot on our website. If you wish to see the bot live in action, head here.The actionable rich messaging powered bot can reply based on whether users are on chat for general queries, technical queries or scheduling a demo.You can use your existing dialogflow bot or checkout bot samples to build a qualifying bot of your own. Download the Kommunicate Support Bot from here and import into your Dialogflow account.Step 1: Setup an account in KommunicateThis is fairly simple. You can get a free account in (...)

    #chatbots #customer-support


  • How Onion Routing Can Save Your Crypto
    https://hackernoon.com/how-onion-routing-can-save-your-crypto-32b005b318e5?source=rss----3a8144

    SourceNote : This article is written for Android users. I will update it when I find appropriate solutions for other platforms.In this article I will explain how the usage of Onion routing can save the #cryptocurrency you own in your wallet.Mt.Gox and Maple change hacks has proved that owning cryptocurrencies on an exchange is not safe since the whole infrastructure can be hacked/ransacked. The only other alternative we have is to store the cryptocurrencies in a wallet.Even-though we have wallets like Coinbase with secure infrastructure(No known hacks till now), there is still one possible way in which a hacker can still have access to your cryptocurrencies i.e by installing a Keylogger.Keylogger is a bug that is planted on the host computer to log all the keystrokes. Now, the most secure (...)

    #crypto-onion-routing #onion-routing #bitcoin-wallet #onion-router


  • High score, low pay : why the gig economy loves gamification | Business | The Guardian
    https://www.theguardian.com/business/2018/nov/20/high-score-low-pay-gamification-lyft-uber-drivers-ride-hailing-gig-econ

    Using ratings, competitions and bonuses to incentivise workers isn’t new – but as I found when I became a Lyft driver, the gig economy is taking it to another level.

    Every week, it sends its drivers a personalised “Weekly Feedback Summary”. This includes passenger comments from the previous week’s rides and a freshly calculated driver rating. It also contains a bar graph showing how a driver’s current rating “stacks up” against previous weeks, and tells them whether they have been “flagged” for cleanliness, friendliness, navigation or safety.

    At first, I looked forward to my summaries; for the most part, they were a welcome boost to my self-esteem. My rating consistently fluctuated between 4.89 stars and 4.96 stars, and the comments said things like: “Good driver, positive attitude” and “Thanks for getting me to the airport on time!!” There was the occasional critique, such as “She weird”, or just “Attitude”, but overall, the comments served as a kind of positive reinforcement mechanism. I felt good knowing that I was helping people and that people liked me.

    But one week, after completing what felt like a million rides, I opened my feedback summary to discover that my rating had plummeted from a 4.91 (“Awesome”) to a 4.79 (“OK”), without comment. Stunned, I combed through my ride history trying to recall any unusual interactions or disgruntled passengers. Nothing. What happened? What did I do? I felt sick to my stomach.

    Because driver ratings are calculated using your last 100 passenger reviews, one logical solution is to crowd out the old, bad ratings with new, presumably better ratings as fast as humanly possible. And that is exactly what I did.

    In a certain sense, Kalanick is right. Unlike employees in a spatially fixed worksite (the factory, the office, the distribution centre), rideshare drivers are technically free to choose when they work, where they work and for how long. They are liberated from the constraining rhythms of conventional employment or shift work. But that apparent freedom poses a unique challenge to the platforms’ need to provide reliable, “on demand” service to their riders – and so a driver’s freedom has to be aggressively, if subtly, managed. One of the main ways these companies have sought to do this is through the use of gamification.

    Simply defined, gamification is the use of game elements – point-scoring, levels, competition with others, measurable evidence of accomplishment, ratings and rules of play – in non-game contexts. Games deliver an instantaneous, visceral experience of success and reward, and they are increasingly used in the workplace to promote emotional engagement with the work process, to increase workers’ psychological investment in completing otherwise uninspiring tasks, and to influence, or “nudge”, workers’ behaviour. This is what my weekly feedback summary, my starred ratings and other gamified features of the Lyft app did.

    There is a growing body of evidence to suggest that gamifying business operations has real, quantifiable effects. Target, the US-based retail giant, reports that gamifying its in-store checkout process has resulted in lower customer wait times and shorter lines. During checkout, a cashier’s screen flashes green if items are scanned at an “optimum rate”. If the cashier goes too slowly, the screen flashes red. Scores are logged and cashiers are expected to maintain an 88% green rating. In online communities for Target employees, cashiers compare scores, share techniques, and bemoan the game’s most challenging obstacles.
    Advertisement

    But colour-coding checkout screens is a pretty rudimental kind of gamification. In the world of ride-hailing work, where almost the entirety of one’s activity is prompted and guided by screen – and where everything can be measured, logged and analysed – there are few limitations on what can be gamified.

    Every Sunday morning, I receive an algorithmically generated “challenge” from Lyft that goes something like this: “Complete 34 rides between the hours of 5am on Monday and 5am on Sunday to receive a $63 bonus.” I scroll down, concerned about the declining value of my bonuses, which once hovered around $100-$220 per week, but have now dropped to less than half that.

    “Click here to accept this challenge.” I tap the screen to accept. Now, whenever I log into driver mode, a stat meter will appear showing my progress: only 21 more rides before I hit my first bonus.

    In addition to enticing drivers to show up when and where demand hits, one of the main goals of this gamification is worker retention. According to Uber, 50% of drivers stop using the application within their first two months, and a recent report from the Institute of Transportation Studies at the University of California in Davis suggests that just 4% of ride-hail drivers make it past their first year.

    Before Lyft rolled out weekly ride challenges, there was the “Power Driver Bonus”, a weekly challenge that required drivers to complete a set number of regular rides. I sometimes worked more than 50 hours per week trying to secure my PDB, which often meant driving in unsafe conditions, at irregular hours and accepting nearly every ride request, including those that felt potentially dangerous (I am thinking specifically of an extremely drunk and visibly agitated late-night passenger).

    Of course, this was largely motivated by a real need for a boost in my weekly earnings. But, in addition to a hope that I would somehow transcend Lyft’s crappy economics, the intensity with which I pursued my PDBs was also the result of what Burawoy observed four decades ago: a bizarre desire to beat the game.

    Former Google “design ethicist” Tristan Harris has also described how the “pull-to-refresh” mechanism used in most social media feeds mimics the clever architecture of a slot machine: users never know when they are going to experience gratification – a dozen new likes or retweets – but they know that gratification will eventually come. This unpredictability is addictive: behavioural psychologists have long understood that gambling uses variable reinforcement schedules – unpredictable intervals of uncertainty, anticipation and feedback – to condition players into playing just one more round.

    It is not uncommon to hear ride-hailing drivers compare even the mundane act of operating their vehicles to the immersive and addictive experience of playing a video game or a slot machine. In an article published by the Financial Times, long-time driver Herb Croakley put it perfectly: “It gets to a point where the app sort of takes over your motor functions in a way. It becomes almost like a hypnotic experience. You can talk to drivers and you’ll hear them say things like, I just drove a bunch of Uber pools for two hours, I probably picked up 30–40 people and I have no idea where I went. In that state, they are literally just listening to the sounds [of the driver’s apps]. Stopping when they said stop, pick up when they say pick up, turn when they say turn. You get into a rhythm of that, and you begin to feel almost like an android.”

    In their foundational text Algorithmic Labor and Information Asymmetries: A Case Study of Uber’s Drivers, Alex Rosenblat and Luke Stark write: “Uber’s self-proclaimed role as a connective intermediary belies the important employment structures and hierarchies that emerge through its software and interface design.” “Algorithmic management” is the term Rosenblat and Stark use to describe the mechanisms through which Uber and Lyft drivers are directed. To be clear, there is no singular algorithm. Rather, there are a number of algorithms operating and interacting with one another at any given moment. Taken together, they produce a seamless system of automatic decision-making that requires very little human intervention.

    For many on-demand platforms, algorithmic management has completely replaced the decision-making roles previously occupied by shift supervisors, foremen and middle- to upper- level management. Uber actually refers to its algorithms as “decision engines”. These “decision engines” track, log and crunch millions of metrics every day, from ride frequency to the harshness with which individual drivers brake. It then uses these analytics to deliver gamified prompts perfectly matched to drivers’ data profiles.

    To increase the prospect of surge pricing, drivers in online forums regularly propose deliberate, coordinated, mass “log-offs” with the expectation that a sudden drop in available drivers will “trick” the algorithm into generating higher surges. I have never seen one work, but the authors of a recently published paper say that mass log-offs are occasionally successful.

    Viewed from another angle, though, mass log-offs can be understood as good, old-fashioned work stoppages. The temporary and purposeful cessation of work as a form of protest is the core of strike action, and remains the sharpest weapon workers have to fight exploitation. But the ability to log-off en masse has not assumed a particularly emancipatory function.

    After weeks of driving like a maniac in order to restore my higher-than-average driver rating, I managed to raise it back up to a 4.93. Although it felt great, it is almost shameful and astonishing to admit that one’s rating, so long as it stays above 4.6, has no actual bearing on anything other than your sense of self-worth. You do not receive a weekly bonus for being a highly rated driver. Your rate of pay does not increase for being a highly rated driver. In fact, I was losing money trying to flatter customers with candy and keep my car scrupulously clean. And yet, I wanted to be a highly rated driver.
    How much is an hour worth? The war over the minimum wage
    Read more

    And this is the thing that is so brilliant and awful about the gamification of Lyft and Uber: it preys on our desire to be of service, to be liked, to be good. On weeks that I am rated highly, I am more motivated to drive. On weeks that I am rated poorly, I am more motivated to drive. It works on me, even though I know better. To date, I have completed more than 2,200 rides.

    #Lyft #Uber #Travail #Psychologie_comportementale #Gamification #Néo_management #Lutte_des_classes



  • 10 Mistakes In Mobile App Development That Make You Look Dumb
    https://hackernoon.com/10-mistakes-in-mobile-app-development-that-make-you-look-dumb-8cfd33eb85

    Developing a mobile app is not easy. A single mistake is enough to make sure the tonnes of coding generated after months of hard work becomes useless in no time. With the mobile app development market growing tenfold globally, more and more businesses have opted for a mobile app to boost their marketing tactics. Almost 3.8 million apps on Google Play Store, 2 million in the Apple App Store, 430k in the Amazon App Store, and 669k in the Windows Store are numbers good enough to prove the last statement. According to a report by Forrester, mobile-influenced offline spending had breached the $1 trillion mark by 2017 itself, which is why companies do not mind spending a hefty sum on getting a mobile app developed.With so much relying on the miniature looking mobile apps, a mistake from a (...)

    #play-store #app-store #mobile-app-development #android #ios-app-development


  • San Diego LEWG Trip Report with Ashley Hedberg
    http://cppcast.libsyn.com/san-diego-lewg-trip-report-with-ashley-hedberg

    Rob and Jason are joined by Ashley Hedberg to discuss the San Diego C++ Committee meeting from her perspective on the Library Evolution Working Group. Ashley Hedberg has been working at Google for the last three years. She currently works on Abseil, an open-source collection of C++ library code designed to augment the C++ standard library. San Diego was her second WG21 meeting. News How to Write a Good Proposal to C++ TL:DR for #CppSan CppCon Videos and Lightning Talks Ashley Hedberg Ashley Hedberg Ashley’s GitHub Links 2018 San Diego ISO C++ Committee Trip Report C++ Current Status Abseil #include Sponsors Download PVS-Studio We Checked the Android Source Code by PVS-Studio, or Nothing is Perfect JetBrains Hosts @robwirving @lefticus  

    http://traffic.libsyn.com/cppcast/cppcast-175.mp3?dest-id=282890



  • Europe is using smartphone data as a weapon to deport refugees

    European leaders need to bring immigration numbers down, and #metadata on smartphones could be just what they need to start sending migrants back.

    Smartphones have helped tens of thousands of migrants travel to Europe. A phone means you can stay in touch with your family – or with people smugglers. On the road, you can check Facebook groups that warn of border closures, policy changes or scams to watch out for. Advice on how to avoid border police spreads via WhatsApp.

    Now, governments are using migrants’ smartphones to deport them.

    Across the continent, migrants are being confronted by a booming mobile forensics industry that specialises in extracting a smartphone’s messages, location history, and even #WhatsApp data. That information can potentially be turned against the phone owners themselves.

    In 2017 both Germany and Denmark expanded laws that enabled immigration officials to extract data from asylum seekers’ phones. Similar legislation has been proposed in Belgium and Austria, while the UK and Norway have been searching asylum seekers’ devices for years.

    Following right-wing gains across the EU, beleaguered governments are scrambling to bring immigration numbers down. Tackling fraudulent asylum applications seems like an easy way to do that. As European leaders met in Brussels last week to thrash out a new, tougher framework to manage migration —which nevertheless seems insufficient to placate Angela Merkel’s critics in Germany— immigration agencies across Europe are showing new enthusiasm for laws and software that enable phone data to be used in deportation cases.

    Admittedly, some refugees do lie on their asylum applications. Omar – not his real name – certainly did. He travelled to Germany via Greece. Even for Syrians like him there were few legal alternatives into the EU. But his route meant he could face deportation under the EU’s Dublin regulation, which dictates that asylum seekers must claim refugee status in the first EU country they arrive in. For Omar, that would mean settling in Greece – hardly an attractive destination considering its high unemployment and stretched social services.

    Last year, more than 7,000 people were deported from Germany according to the Dublin regulation. If Omar’s phone were searched, he could have become one of them, as his location history would have revealed his route through Europe, including his arrival in Greece.

    But before his asylum interview, he met Lena – also not her real name. A refugee advocate and businesswoman, Lena had read about Germany’s new surveillance laws. She encouraged Omar to throw his phone away and tell immigration officials it had been stolen in the refugee camp where he was staying. “This camp was well-known for crime,” says Lena, “so the story seemed believable.” His application is still pending.

    Omar is not the only asylum seeker to hide phone data from state officials. When sociology professor Marie Gillespie researched phone use among migrants travelling to Europe in 2016, she encountered widespread fear of mobile phone surveillance. “Mobile phones were facilitators and enablers of their journeys, but they also posed a threat,” she says. In response, she saw migrants who kept up to 13 different #SIM cards, hiding them in different parts of their bodies as they travelled.

    This could become a problem for immigration officials, who are increasingly using mobile phones to verify migrants’ identities, and ascertain whether they qualify for asylum. (That is: whether they are fleeing countries where they risk facing violence or persecution.) In Germany, only 40 per cent of asylum applicants in 2016 could provide official identification documents. In their absence, the nationalities of the other 60 per cent were verified through a mixture of language analysis — using human translators and computers to confirm whether their accent is authentic — and mobile phone data.

    Over the six months after Germany’s phone search law came into force, immigration officials searched 8,000 phones. If they doubted an asylum seeker’s story, they would extract their phone’s metadata – digital information that can reveal the user’s language settings and the locations where they made calls or took pictures.

    To do this, German authorities are using a computer programme, called Atos, that combines technology made by two mobile forensic companies – T3K and MSAB. It takes just a few minutes to download metadata. “The analysis of mobile phone data is never the sole basis on which a decision about the application for asylum is made,” says a spokesperson for BAMF, Germany’s immigration agency. But they do use the data to look for inconsistencies in an applicant’s story. If a person says they were in Turkey in September, for example, but phone data shows they were actually in Syria, they can see more investigation is needed.

    Denmark is taking this a step further, by asking migrants for their Facebook passwords. Refugee groups note how the platform is being used more and more to verify an asylum seeker’s identity.

    It recently happened to Assem, a 36-year-old refugee from Syria. Five minutes on his public Facebook profile will tell you two things about him: first, he supports a revolution against Syria’s Assad regime and, second, he is a devoted fan of Barcelona football club. When Danish immigration officials asked him for his password, he gave it to them willingly. “At that time, I didn’t care what they were doing. I just wanted to leave the asylum center,” he says. While Assem was not happy about the request, he now has refugee status.

    The Danish immigration agency confirmed they do ask asylum applicants to see their Facebook profiles. While it is not standard procedure, it can be used if a caseworker feels they need more information. If the applicant refused their consent, they would tell them they are obliged under Danish law. Right now, they only use Facebook – not Instagram or other social platforms.

    Across the EU, rights groups and opposition parties have questioned whether these searches are constitutional, raising concerns over their infringement of privacy and the effect of searching migrants like criminals.

    “In my view, it’s a violation of ethics on privacy to ask for a password to Facebook or open somebody’s mobile phone,” says Michala Clante Bendixen of Denmark’s Refugees Welcome movement. “For an asylum seeker, this is often the only piece of personal and private space he or she has left.”

    Information sourced from phones and social media offers an alternative reality that can compete with an asylum seeker’s own testimony. “They’re holding the phone to be a stronger testament to their history than what the person is ready to disclose,” says Gus Hosein, executive director of Privacy International. “That’s unprecedented.”
    Read next

    Everything we know about the UK’s plan to block online porn
    Everything we know about the UK’s plan to block online porn

    By WIRED

    Privacy campaigners note how digital information might not reflect a person’s character accurately. “Because there is so much data on a person’s phone, you can make quite sweeping judgements that might not necessarily be true,” says Christopher Weatherhead, technologist at Privacy International.

    Bendixen cites the case of one man whose asylum application was rejected after Danish authorities examined his phone and saw his Facebook account had left comments during a time he said he was in prison. He explained that his brother also had access to his account, but the authorities did not believe him; he is currently waiting for appeal.

    A spokesperson for the UK’s Home Office told me they don’t check the social media of asylum seekers unless they are suspected of a crime. Nonetheless, British lawyers and social workers have reported that social media searches do take place, although it is unclear whether they reflect official policy. The Home Office did not respond to requests for clarification on that matter.

    Privacy International has investigated the UK police’s ability to search phones, indicating that immigration officials could possess similar powers. “What surprised us was the level of detail of these phone searches. Police could access information even you don’t have access to, such as deleted messages,” Weatherhead says.

    His team found that British police are aided by Israeli mobile forensic company Cellebrite. Using their software, officials can access search history, including deleted browsing history. It can also extract WhatsApp messages from some Android phones.

    There is a crippling irony that the smartphone, for so long a tool of liberation, has become a digital Judas. If you had stood in Athens’ Victoria Square in 2015, at the height of the refugee crisis, you would have noticed the “smartphone stoop”: hundreds of Syrians, Iraqis, and Afghans standing or sitting about this sun-baked patch of grass and concrete, were bending their heads, looking into their phones.

    The smartphone has become the essential accessory for modern migration. Travelling to Europe as an asylum seeker is expensive. People who can’t afford phones typically can’t afford the journey either. Phones became a constant feature along the route to Northern Europe: young men would line the pavements outside reception centres in Berlin, hunched over their screens. In Calais, groups would crowd around charging points. In 2016, the UN refugee agency reported that phones were so important to migrants moving across Europe, that they were spending up to one third of their income on phone credit.

    Now, migrants are being forced to confront a more dangerous reality, as governments worldwide expand their abilities to search asylum seekers’ phones. While European countries were relaxing their laws on metadata search, last year US immigration spent $2.2 million on phone hacking software. But asylum seekers too are changing their behaviour as they become more aware that the smartphone, the very device that has bought them so much freedom, could be the very thing used to unravel their hope of a new life.

    https://www.wired.co.uk/article/europe-immigration-refugees-smartphone-metadata-deportations
    #smartphone #smartphones #données #big_data #expulsions #Allemagne #Danemark #renvois #carte_SIM #Belgique #Autriche


  • Samsung ‘Linux on DeX’ Enters Beta, Here’s How to Take Part
    https://www.omgubuntu.co.uk/2018/11/linux-on-dex-ubuntu

    Do you dream of being able to use an Android phone as a Linux PC when connected to a big screen and full-size keyboard? If so, you’re gonna love Samsung. The South Korean tech giant has launched its “Linux on DeX” app in beta, and is inviting early adopters to register to help test it […] This post, Samsung ‘Linux on DeX’ Enters Beta, Here’s How to Take Part, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.




  • PSA: if you use the option MACE by PrivateInternetAccess on Android, you might want to use their apk instead of going through the Google Play Store:

    The Google Play Store version of our app no longer includes MACE due to Google Play Store policies.

    Their apk: https://www.privateinternetaccess.com/installer/download_installer_android

    MACE:

    Private Internet Access MACE returns IP addresses of unwanted domain names as an address that’s not routable on the public internet.

    https://www.privateinternetaccess.com/helpdesk/kb/articles/what-is-mace


  • My Self Vishnuvardhan, I am working as a Staff Author at FieldEngineer.com a Marketplace for On-Demand telecom workforce,
    ranging from field engineers to high-level network engineers, project managers and Network Architects in 146 countries.
    I am a Computer Science engineer from JNTU. I can understand ongoing technology trends and keep myself updated in technology industry”
    Field Engineer is a unique and freelance site for Telecom Engineers and professionals. By helping telecom field engineers and businesses
    interact seamlessly, the company seeks to dramatically reduce the burdens of hiring, job hunting, vetting and payment.
    To learn more, visit fieldengineer.com , or download the Field Engineer app for Android or iOS.
    http://www.fieldengineer.com


  • Simplenote Adds a Distraction-Free Focus Mode
    https://www.omgubuntu.co.uk/2018/10/simplenote-focus-mode

    A distraction-free focus mode has been added to the nifty note taking app Simplenote. The feature is one of several improvements the desktop client picks up in its latest update, and is freely available for Windows, macOS, and Linux users. Mobile apps for iOS and Android are also available. Famed for its markdown support in particular, Simplenote […] This post, Simplenote Adds a Distraction-Free Focus Mode, was written by Joey Sneddon and first appeared on OMG! Ubuntu!.