Pixelmator Updates are Coming. Here’s a Sneak Peek

On its blog today Pixelmator shared that updates for all three of its apps are coming: Pixelmator Pro, Pixelmator Photo, and Pixelmator for iOS. I’m very excited to get an update to Pixelmator for iOS, it’s waaaaaay overdue. As the post mentions, two and a half years overdue. Hurry and sign up for the betas.

The answer is that, little by little, we plan to refresh and improve the app and, eventually, make it compatible with Pixelmator Pro. This is one very fundamental step towards that goal. We don’t have a timeline just yet for full compatibility and this will take a while but we’re very excited to get started on it!

How Worried Should You Be About Public USB Charging Stations?

Today DuckDuckGo published a post about the risks of using public charging stations. Technology exists that lets hackers install malware via these chargers. While I personally think the risk is a bit overblown, this is an argument I think can be added in favor of a portless iPhone.

Although it has become synonymous with charging, USB technology was initially developed with the aim of transmitting data. Thus, hackers can use these public charging stations to install malware on your smartphone or tablet through a compromised USB cable. This process, called “juice jacking”, allows hackers to read and export your data, including your passwords. They can even lock your device this way, rendering it unusable.

A Database of 500 iPhones Cops Tried to Unlock

Motherboard built a database of over 500 iPhones that law enforcement have tried to unlock. Many of them weren’t able to be unlocked at all.

Out of 516 analyzed cases, 295 were marked as executed. Officials from the FBI, DEA, DHS, Homeland Security and Investigations, the Bureau of Alcohol, Tobacco, Firearms and Explosives were able to extract data from iPhones in investigations ranging from arson, to child exploitation, to drug trafficking. And investigators executed warrants against modern iPhones, not just older models.

As mentioned, this provides useful data instead of the usual anecdotes. You can find the database here.

Working From Home Isn’t For Everyone, But it’s Not Overrated

Writing for ˆThe New York Times, Kevin Roose says that working from home is overrated. Is it really though? I took umbrage at the sensational headline until I came to this part (emphasis mine):

But I’ve been researching the pros and cons of remote work for my upcoming book about human survival in the age of artificial intelligence and automation. And I’ve now come to a very different conclusion: Most people should work in an office, or near other people, and avoid solitary work-from-home arrangements whenever possible.

In other words, this article is an ad for his book. Moving on. To be fair, if you tend to fall on the extroverted end of the spectrum, maybe remote work isn’t best for your mental health. But calling it “overrated” just because you don’t care for it is simplistic.

Yahoo Mobile Phone Service Arrives for $40

Yahoo Mobile is a new phone service that costs US$40/month. It uses Verizon’s network to give you unlimited texts, calls, and 4G data.

Times of high congestion will result in a slower connection, and tethering is limited to 5Mbits, with one tethered device permitted at time. Regular download speeds will range between 5-12 Mbps, with upload speeds of around 2-5 Mbps — not ground-breaking stuff, but reasonable enough.

It’s a direct competitor to Verizon’s other prepaid service, Visible (Which I use). Visible sounds like a better deal than Yahoo Mobile though since it removed its data cap.

Careless ‘Whisper’ Leaks Years of User Data

Whisper, an app for people to share their secrets, exposed user data like age, location, and more for years.

The records were viewable on a non-password-protected database open to the public Web. A Post reporter was able to freely browse and search through the records, many of which involved children: A search of users who had listed their age as 15 returned 1.3 million results.

The cybersecurity consultants Matthew Porter and Dan Ehrlich, who lead the advisory group Twelve Security, said they were able to access nearly 900 million user records from the app’s release in 2012 to the present day.

You can never be 100% secure but at least put a damn password on your server.

Do You Own a Tesla? It’s Vulnerable to Hacking

Security experts found that Teslas are vulnerable to certain kinds of hacks. One expert, Brian DeMuth, said there are no easy ways to prevent it, but you can take some measures.

There are a few things that can reduce the risk if you are willing to accept diminished functionality in the car. For example, the telematics unit can be removed from the vehicle to eliminate attacks over the cellular network, but this also will prevent mobile apps and other remote functionality from working. Removing the telematics unit could also trigger warnings and other errors to appear in the instrument cluster or infotainment system.

Apple Employee at Cork Campus Tests Positive For Covid-19

An employee at Apple’s Cork campus in Ireland has tested positive for the Coranavirus, the Irish Independent reported. The company confirmed the case of Covid-19. Over the weekend, Apple encouraged employees who were able to to work from home at a number of global locations, although Cork does not appear to be one where this policy was initially implemented.

“One of our employees in Cork has been confirmed to have Covid-19,” the company said in a statement. “We are closely coordinating with the local health authorities who feel the risk to others is low, and the individual remains in self-isolation. As a precaution, we have asked some of our team members to stay at home while we work with the Health and Safety Executive to assess the situation. We are continuing to regularly deep clean all our offices and stores and will take all necessary precautions in accordance with guidance from health authorities.” The Apple campus employs over 6,000 people.

Australia Takes Facebook to Court Over Privacy Violations

Australia’s privacy regulator is taking Facebook to court over Cambridge Analytica. It could impose a fine of AUD$1.7 million (US$1.1 million) for every privacy violation.

“Facebook failed to take reasonable steps to protect those individuals’ personal information from unauthorised disclosure,” the Australian commissioner’s office said.

Big companies like Facebook need fines in the billions of dollars for them to start paying attention.

Patch Your Netgear Router Because it Could Get Hacked

Netgear is pushing out security patches for its networking products this week. They contain flaws that could open them up to hackers.

Modem/routers:

D6200, D6220, D6400, D7000, D7000v2, D7800, D8500

Range extenders:

PR2000

Routers:

JR6150, R6120, R6220, R6230, R6250, R6260, R6400, R6400v2, R6700, R6700v2, R6700v3, R6800, R6900,  R6900P, R6900v2, R7000, R7000P,  R7100LG, R7300DST, R7500v2, R7800, R7900, R7900P, R8000, R8000P, R8300, R8500, R8900, R9000, RAX120, RBR20 (Orbi), RBS20 (Orbi), RBK20 (Orbi), RBR40 (Orbi), RBS40 (Orbi), RBK40 (Orbi), RBR50 (Orbi), RBS50 (Orbi), RBK50 (Orbi), XR500, XR700

How Coronavirus Misinformation is Spreading Across Facebook

Almost as soon as the seriousness of the coronavirus outbreak became clear, misinformation and conspiracy theories relating to it began spreading. Not surprisingly, Facebook is an absolute hub of inaccurate information. Wired took a look at what is being shared across various groups on the platform.

This fake news has spread through “cure” books on Amazon, WhatsApp viral texts, and even the mainstream media. Now, according to data taken from CrowdTangle, a Facebook-owned tool that tracks the diffusion of viral stories, a small army of Facebook fringe groups are following suit and pivoting to a new hot topic: coronavirus misinformation. The posts, which are filling innocuous Facebook groups normally dedicated to political discussions and flight deals, are a strange evolution of conspiracy theories that have been knocking around the internet for years. One much-mooted theory, for example, is that the coronavirus has been caused by radiation from 5G masts. One of these posts, on Smart Meter Health problems UK, garnered 191 reactions, 188 comments and 86 shares – eleven times the normal amount for the group.

How the EARN IT Act is an Attack on Encryption

Introduced by Senators Lindsey Graham and Richard Blumenthal, the EARN It act would force companies to “earn” protection from Section 230 to fight online child exploitation.

Though it seems wholly focused on reducing child exploitation, the EARN IT Act has definite implications for encryption. If it became law, companies might not be able to earn their liability exemption while offering end-to-end encrypted services. This would put them in the position of either having to accept liability or remove encryption protections altogether.

My linked teaser from yesterday was separate from the EARN It act, but now it shows that companies are being coerced on two fronts.

Utah is Now a Surveillance State Thanks to This Company

A surveillance company called Banjo has partnered with Utah state authorities to enable a dystopian panopticon.

The lofty goal of Banjo’s system is to alert law enforcement of crimes as they happen. It claims it does this while somehow stripping all personal data from the system, allowing it to help cops without putting anyone’s privacy at risk. As with other algorithmic crime systems, there is little public oversight or information about how, exactly, the system determines what is worth alerting cops to.

A.G. William Barr Wants Tech Companies to Fight Child Sexual Abuse

Attorney General William Barr wants tech companies like Apple to fight online child sexual abuse even more with “voluntary standards.”

These voluntary principles are built on existing industry efforts to combat these crimes.  Some leading companies have dedicated significant resources to develop and deploy tools in the fight to protect children online and to detect, disrupt and identify offenders.  Although significant progress has been made, there is much more to be done to strengthen existing efforts and enhance collective action.

First, as I discovered last year Apple started to scan online iCloud content for child sexual abuse material (CSAM). Many other companies do the same. Second, although encryption wasn’t explicitly mentioned, this is undoubtedly (in my opinion) a new development in the war on encryption. Child predators are one of the scary boogeymen used by the government to erode our privacy even further. I of course do support Apple scanning for this content, but it’s not a black and white issue.

More Details of How Uyghur Muslims Are Exploited in Tech Supply Chains Emerge

Earlier this week, I reported on research by an Australian think tank that highlighted how Uyghur Muslims in China were being exploited, maltreated, and used in the manufacturing of products. Apple is one of the companies whose supply chain was cited in the report. Now, the Associated Press has published further on-the-ground reporting about the exploitation of this minority during the making of tech products. Apple is again one of the firms mentioned, along with the likes of Lenovo and Huawei.

OFILM’s website indicates the Xinjiang workers make screens, camera cover lenses and fingerprint scanners. It touts customers including Apple, Samsung, Lenovo, Dell, HP, LG and Huawei, although there was no way for the AP to track specific products to specific companies. Apple’s most recent list of suppliers, published January last year, includes three OFILM factories in Nanchang. It’s unclear whether the specific OFILM factory the AP visited twice in Nanchang supplies Apple, but it has the same address as one listed. Another OFILM factory is located about half a mile away on a different street. Apple did not answer repeated requests for clarification on which factory it uses. In an email, Apple said its code of conduct requires suppliers to “provide channels that encourage employees to voice concerns.” It said it interviews the employees of suppliers during annual assessments in their local language without their managers present, and had done 44,000 interviews in 2018.

Twitter Tests Tweets That Disappear After 24 Hours

Twitter is testing a new feature called “fleets” which are tweets that disappear after 24 hours.

According to Twitter, an initial survey of users showed they would be more comfortable “sharing everyday thoughts” if they disappear after 24 hours.

Like tweets, Twitter fleets are based primarily on text, but you also can include videos, GIFs or photos in them. Users’ fleets will appear at the top of their home page and visible to their followers. Other users can reply to a fleet via private direct message or with an emoji.

It sounds like a good idea on the surface, but given that Twitter is a dumpster fire, you can imagine hateful tweets, political lies, etc. all disappearing from the public record. Of course, people can just screenshot them.

Someone Hacked J.Crew Last Spring and we Only Find Out Today

According to a notice [PDF] from J.Crew, someone hacked the company last year. For some reason we’re only finding out about it today, a year later.

“The information that would have been accessible in your jcrew.com account includes the last four digits of credit card numbers you have stored in your account, the expiration dates, card types, and billing addresses connected to those cards, and order numbers, shipping confirmation numbers, and shipment status of those orders,” J.Crew’s data breach notification explains.

You know, sometimes when I write about this stuff, like Facebook doing every bad thing under the sun with our data, I stop and think: “Am I just a cynical a**hole?” Then, when yet another idiot company has a data breach, I realize, no I’m just reporting reality. These companies deserve to be named and shamed.

U.S. Lawmakers Urge UK to Rethink Huawei 5G Involvement

Senior U.S Senators have once again urged the British government to not give Huawei any role in the development of the country’s 5G network, Sky News reported. In total, 20 lawmakers from both parties signed the open letter.

In a letter to MPs, the group of US politicians – including both Democrats and Republicans – expressed their “significant concern” with Prime Minister Boris Johnson’s decision to hand the Chinese company an infrastructure role. Critics allege Huawei has close links to the Chinese government and its equipment could be used for espionage purposes – something the company has always denied. US President Donald Trump has put trade restrictions on Huawei and previously suggested future intelligence-sharing cooperation with America’s “Five Eyes” allies – the UK, Canada, Australia and New Zealand – could be put at risk if the UK worked with the firm.

Book Publishers Artificially Limit eBook Lending in Libraries

Major book publishers impose limits on how libraries handle ebooks, with short-term licenses and contracts.

Because only one reader can check out an ebook at a time, and because the cost of licensing an ebook is prohibitively high for libraries to invest in hundreds of copies for every new title, library-goers have become accustomed to long waits to check out ebooks, particularly bestsellers. For publishers, that’s the point. If you have to wait weeks to check out a new ebook, you might just cruise on over to Amazon and pay $14.99 to have it delivered immediately to your Kindle or the Kindle app on your phone.

Expensive college textbooks and dumb eBook rules are two good examples of how ripe for disruption this space is. It’s also shortsighted. The point of digital media is to make it so easy to access that people don’t feel the need to pirate anymore. But practices like this is partly what drives people to pirate.

Atari’s Missile Command Heads to iOS This Spring

2020 is the 40th anniversary of Missile Command and Atari is bringing it to iOS sometime this spring.

Missile Command: Recharged maintains the same perspective of the original game, in which missile silos battle incoming rockets to protect civilian structures. Recharged uses a neon-colored visual design, a la classic arcade game re-imaginings like Pac Man Championship Edition and Space Invaders Extreme. Gameplay has been remixed, with power-ups, an upgrade system, and an augmented reality mode that projects gameplay onto a “virtual arcade cabinet.”

YouTube Doesn’t Recommend as Many Conspiracy Videos Anymore

YouTube is working to cut the number of conspiracy video it recommends to users, but that number is slowly increasing again.

Researchers trained an algorithm to judge the likelihood that a video on the site contained conspiracy theories by looking at the description, transcript, and comments. They examined eight million recommendations over 15 months. They found that shortly after YouTube announced it would recommend less conspiracy content in January 2019, the numbers did indeed gradually drop—by about 70% at the lowest point in May 2019. However, the number of conspiracy videos YouTube’s algorithm recommends has steadily risen again since then. These recommendations are now only 40% less common than when YouTube started its crackdown.

The Macintosh II Was Launched Today in 1987

Another great ‘Today in Apple History’ from Cult of Mac today. On this day in 1987, the legendary Macintosh II was launched.

Although four Mac models already have been released, the definitive, full-number name of the Macintosh II makes clear that this is a major upgrade for the product line. With a massive hardware boost, optional color display (!) and a new open architecture, it does not disappoint! By far the biggest change with the Mac II? Its open architecture, which allows users to expand the computer. More than just a tech upgrade, this marked a fundamental shift in the way Apple engineers thought about the Macintosh.

Apple Will Pay up to $500 Million to Settle Slow iPhone Class Action

Apple is set to pay up to $500 million to settle a U.S class action related to iPhone slowing allegations, Reuters reported. Claimants said that Apple slowed down devices to encourage users to upgrade to newer ones.

The preliminary proposed class-action settlement was disclosed on Friday night and requires approval by U.S. District Judge Edward Davila in San Jose, California. It calls for Apple to pay consumers $25 per iPhone, which may be adjusted up or down depending on how many iPhones are eligible, with a minimum total payout of $310 million. Apple denied wrongdoing and settled the nationwide case to avoid the burdens and costs of litigation, court papers show.

How to Steal and Repurpose Mac Malware

A former NSA hacker argued that stealing and then repurposing Mac malware can be more powerful than creating it from scratch. Patrick Wardle demonstrated one example of how he went about it at RSA Conference, ArsTechnica reported.

Patrick Wardle, who is now a security researcher at the macOS and iOS enterprise management firm Jamf, showed how reusing old Mac malware can be a smarter and less resource-intensive approach for deploying ransomware, remote access spy tools, and other types of malicious code. Where the approach really pays dividends, he said, is with the repurposing of advanced code written by government-sponsored hackers. “There are incredibly well-funded, well-resourced, very motivated hacker groups in three-letter agencies that are creating amazing malware that’s fully featured and also fully tested,” Wardle said during a talk titled “Repurposed Malware: A Dark Side of Recycling.” “The idea is: why not let these groups in these agencies create malware and if you’re a hacker just repurpose it for your own mission?” he said.