Blog

Archive for the ‘mobile phones’ category: Page 191

Mar 14, 2017

Your brain is unique – here’s how it could be used as the ultimate security password

Posted by in categories: finance, internet, mobile phones, neuroscience, privacy, security

Biometrics – technology that can recognise individuals based on physical and behavioural traits such as their faces, voices or fingerprints – are becoming increasingly important to combat financial fraud and security threats. This is because traditional approaches, such as those based on PIN numbers or passwords, are proving too easily compromised. For example, Barclays has introduced TouchID, whereby customers can log onto internet banking using fingerprint scanners on mobile phones.

However, this is not foolproof either – it is possible to forge such biometrics. Fingers can after all be chopped off and placed by impostors to gain fraudulent access. It has also been shown that prints lifted from glass using cellophane tape can be used with gelatine to create fake prints. So there is a real need to come up with more advanced biometrics that are difficult or impossible to forge. And a promising alternative is the brain.

Emerging biometric technology based on the electrical activity of the brain have indeed shown potential to be fraud resistant. Over the years, a number of research studies have found that “brainprints” (readings of how the brain reacts to certain words or tasks) are unique to individuals as each person’s brain is wired to think differently. In fact, the brain can be used to identify someone from a pool of 102 users with more than 98% accuracy at the moment, which is very close to that of fingerprints (99.8% accuracy).

Read more

Mar 13, 2017

Could This Weird, Gelatinous Gadget be the Phone of the Future?

Posted by in categories: holograms, mobile phones

In Brief

  • A new phone concept designed by Philippe Starck and Jerome Olivet is a voice activated, gelatinous, transparent futuristic vision of where smartphones could go.
  • Continuing with the trend of subtracting hardware, the phone contains no screen but will be capable of projecting 3D holograms.

The words gelatinous and smartphone might not seem like they belong in the same sentence together. In fact, they barely belong in the same dictionary together. But the Alo smartphone, an unfinished, unreleased technology, is described as a gelatinous, ergonomically shaped to fit the hand well, voice-activated and controlled smartphone. Designed by Jerome Olivet and Phillippe Starck, this design promises to be the future of smartphone technology.

This phone is unlike any current model, and its most notable feature (that we know of yet) is that it will be able to project holograms. Yes, you read that right. Any messages, photographs, or even movies would be able to be viewed as 3D holograms. And while an entirely voice-controlled smartphone might seem a little bit strange and difficult to use, it is supposedly designed to be remarkably user-friendly.

Continue reading “Could This Weird, Gelatinous Gadget be the Phone of the Future?” »

Mar 13, 2017

How a Math Algorithm Could Educate the Whole World — for Free

Posted by in categories: education, information science, mathematics, mobile phones

Mathematics professor Po-Shen Loh has created Expii, a free education tool that democratizes learning by turning your smartphone into a tutor.

Read more

Mar 11, 2017

Hacking the Human Brain—New Tech Could Make It a Reality

Posted by in categories: food, government, health, military, mobile phones, neuroscience

In Brief

  • Your thoughts are your own, right? Perhaps not. New technology is bringing that day closer when the unscrupulous may actually be able to hack human thoughts.
  • It raises a number of new ethical concerns for this brave new world we’re entering with each rotation of the Earth.

Everyone is familiar with the concept of hacking. It is why we all strive to protect our computers and smartphones from nefarious outside sources trying to break in to steal information, implant malware, etc. Hackers pose a threat to everyone from teenage smartphone users to the computer databases of government organizations. Hacking is a threat that we are all familiar with, and something that many know how to protect against. But, as the line between science and science fiction blurs, even hacking is getting a futuristic upgrade. Recently, at the Enigma Security Conference, University of Washington researcher and lecturer Tamara Bonaci revealed technology that could be used to essentially “hack” into people’s brains.

She created this technology around a game called Flappy Whale. While people played the game, the technology was able to covertly extract neural responses to subliminal imagery in the game like logos, restaurants, cars, etc. Now, hacking into people’s underlying feelings and thoughts about seeing a fast food restaurant doesn’t seem like it could cause much harm, but this technology has the potential to gather much more intimate information about a person like their religion, fears, prejudices, health, etc. This technology could evolve from an interesting way to understand human response to a military device. The possibilities range from an incredibly useful research tool to a potentially frightening interrogation device.

Continue reading “Hacking the Human Brain—New Tech Could Make It a Reality” »

Mar 9, 2017

The future of AI is neuromorphic. Meet the scientists building digital ‘brains’ for your phone

Posted by in categories: mobile phones, robotics/AI

AI services like Apple’s Siri and others operate by sending your queries to faraway data centers, which send back responses. The reason they rely on cloud-based computing is that today’s electronics don’t come with enough computing power to run the processing-heavy algorithms needed for machine learning. The typical CPUs most smartphones use could never handle a system like Siri on the device. But Dr. Chris Eliasmith, a theoretical neuroscientist and co-CEO of Canadian AI startup Applied Brain Research, is confident that a new type of chip is about to change that.

Read more

Mar 7, 2017

Airbus unveils Pop.Up: An autonomous transportation concept that uses drones to carry cars

Posted by in categories: drones, mobile phones, robotics/AI

Airbus has proposed a new modular transportation idea mixing air and ground travel that will make you feel that the future cannot get here fast enough.

Unveiled today at the Geneva International Motor show, the system, dubbed “Pop. Up,” would start with a capsule that sits in the frame of an autonomous car. When traffic gets heavy, you just call a drone using your smartphone and lift the capsule up into the air and over the heads of those poor suckers stuck in traffic sucking on exhaust fumes.

The company says a new artificial intelligence platform will help manage the Pop. Up system, letting passengers optimize the mix of modalities for their trip.

Continue reading “Airbus unveils Pop.Up: An autonomous transportation concept that uses drones to carry cars” »

Mar 6, 2017

LED-it-GO: Leaking (a lot of) Data from Air-Gapped Computers via the (small) Hard Drive LED

Posted by in categories: cybercrime/malcode, drones, encryption, internet, mobile phones

Abstract: In this paper we present a method which allows attackers to covertly leak data from isolated, air-gapped computers. Our method utilizes the hard disk drive (HDD) activity LED which exists in most of today’s desktop PCs, laptops and servers. We show that a malware can indirectly control the HDD LED, turning it on and off rapidly (up to 5800 blinks per second) — a rate that exceeds the visual perception capabilities of humans. Sensitive information can be encoded and leaked over the LED signals, which can then be received remotely by different kinds of cameras and light sensors. Compared to other LED methods, our method is unique, because it is also covert — the HDD activity LED routinely flickers frequently, and therefore the user may not be suspicious to changes in its activity. We discuss attack scenarios and present the necessary technical background regarding the HDD LED and its hardware control. We also present various data modulation methods and describe the implementation of a user-level malware, that doesn’t require a kernel component. During the evaluation, we examine the physical characteristics of different colored HDD LEDs (red, blue, and white) and tested different types of receivers: remote cameras, extreme cameras, security cameras, smartphone cameras, drone cameras, and optical sensors. Finally, we discuss hardware and software countermeasures for such a threat. Our experiment shows that sensitive data can be successfully leaked from air-gapped computers via the HDD LED at a maximum bit rate of 4000 bits per second, depending on the type of receiver and its distance from the transmitter. Notably, this speed is 10 times faster than the existing optical covert channels for air-gapped computers. These rates allow fast exfiltration of encryption keys, keystroke logging, and text and binary files.

Read more

Feb 26, 2017

EDGEcard: EDGE is a dynamic all-in-one smartcard with a companion mobile wallet smartphone app

Posted by in category: mobile phones

Simply load all of your credit, debit, loyalty, and gift cards onto your EDGE and make payments anywhere.

Read more

Feb 25, 2017

Canada to Spend $750 Million to Ensure All Citizens Have Internet Access

Posted by in categories: government, internet, mobile phones

In Brief

  • Canada is spending millions to ensure all citizens have access to home internet with download speeds of at least 50Mbps and upload speeds of 10Mbps in the next 10 to 15 years.
  • At a time when so many things we used to do in person or via a physical medium are done digitally, living without the internet inherently puts a person at a disadvantage.

Canada is making some major moves to ensure that every citizen in the country has access to fast broadband speeds. The Canadian Radio-Television and Telecommunications Commission (CRTC) announced this week that it was setting up a fund of $750 million available over the next five years to expand internet access.

The CRTC is implementing a standard of universal availability of home internet with download speeds of at least 50Mbps and upload speeds of 10Mbps with the option of unlimited data. In doing so, the Canadian government is declaring that broadband internet is a basic telecommunications service, akin to phone service.

Continue reading “Canada to Spend $750 Million to Ensure All Citizens Have Internet Access” »

Feb 24, 2017

Why the Potential of Augmented Reality Is Greater Than You Think

Posted by in categories: augmented reality, business, habitats, mobile phones, virtual reality

Never before have businesses been able to build billion-dollar valuations in so little time. Never before have incumbent enterprises been able to go out of business so quickly. Disruption is now commonplace, and augmented reality (AR) is emerging as yet another avenue to turn industries on their heads. But what direction will this new technology take?

AR overlays digital information on the physical world using a smartphone (think Pokémon Go) or a headset. In its simplest form, AR is simply a rectangular display floating in front of the eyes, à la Google Glass. More advanced forms will drop video game characters or useful information seamlessly onto physical objects, from homes to industrial warehouses.

Continue reading “Why the Potential of Augmented Reality Is Greater Than You Think” »