PUBG Mobile controller support: All the best options



from android to iphone :: Article Creator

Google's Surprise Update Just Made Android More Like IPhone

The differences between Android and iPhone used to be stark, but those dividing lines are diminishing. And Google's latest updates just narrowed that gap further...

Google's new advances close the gap on iPhone

getty

Google's mission to make Android more like iPhone continues—nowhere more so than over privacy and security, whether fully encrypted WhatsApp calls integrated into its dialer or enhanced Play Store defenses. The latest Android updates have just been revealed, and these have very different security and privacy considerations.

The first is surprisingly only just going live now, having been announced almost a year ago. As reported by GApps Flags & Leaks on Telegram, "Google has started rolling the Find My Network with Google Play Service beta version 24.12.14. It's enabled for me without turning on any kind of flags."

MORE FROM FORBESGoogle Update Reveals AI May Read All Your Private Gmail MessagesBy Zak Doffman

Android's new shadow, bluetooth-powered network mirrors Apple's equivalent on a vast scale. Billions of devices, potentially. But it has been held up for security and privacy reasons—fears that it might unleash a new wave of electronic stalking.

The delay has enabled Google and Apple to collaborate on industry standard protections against FindMy networks being used to secretly track users without their knowledge. That is now done and expected to go live with Apple's iOS 17.5, clearing the way for Google to launch its own network.

Tracking has been a major concern for these shadow networks, built by crowd-linking smartphones to enable a lost device or tracked tag to find its way home without its own cellular network access. This is done through Bluetooth, and so enables a wide array of device types to join the shadow network.

This update will enable Apple's iOS FindMy to warn that a non-Apple certified device might be tracking its user, and one assumes vice versa. This ability to alert cross-platform deals with a serious privacy issue that has emerged, especially with the popularity of AirTag and AirTag-like devices that make tracking so simple.

Just like Apple, Google assures that "the Find My Device network was built with user privacy as a key priority. Location data crowdsourced from the network is end-to-end encrypted, which ensures Google can't see or use it for any other purposes."

All that said, there will remain privacy concerns and with any new offering at this scale, bad actors will be out to probe for vulnerabilities and then exploit those they find. On balance, it's worth using given the lost device benefits, but keep any eye on reports as to teething issues as this rolls out at scale.

The second Android networking update has security and privacy concerns of its own. As I've reported before, Google is outdoing Apple's SOS satellite feature with an Android update that lets users message anyone, not just emergency services, as long as they have a satellite connectivity add-on to their cell plan.

Satellite connectivity is not well known amongst cellphone users; it has relied on expensive devices and expensive call plans. This has confined it to specialist use cases—remote exploration, dangerous off-grid locations, sailing and spooks.

Compared to the complex matrix of cellular radios, the concept of a direct to satellite link is relatively crude and therefore easier to attack. We have seen this with Starlink looking to address denial of service—or jamming—at times when it has been used in conflict zones. Such attacks and counter-attacks are business as usual in the world of defense communications, but not in mainstream cellular.

One former special forces operative with plenty of first-hand experience told me "there are several factors attaining to the reduced security of satellite systems and more so for low earth orbit systems. Unlike 5G, the attack surface is much more extensive as it's like attacking an enterprise network where the landscape for attack becomes the actual terminals, the ground stations or the satellites themselves. Other vulnerabilities should also be considered such as denial of service and interception."

Clearly, while this is not a major issue for the niche use of satellite for emergency messaging or comms back home from very remote locations, expectations are that this could become more widespread. It won't impact occasional users in mundane locations, but were for example there are multiple satellite users in a single location relying on such comms, then the equation changes.

"Geo stationary low earth orbit satellite handsets are often issued to troops for emergency communications. Unfortunately, many organizations have become to rely on these and it presents numerous security challenges, not only are they more susceptible to cyber-attacks and denial of service attacks, but given these handsets rely on GPS to function, they present real a risk to those using them."

MORE FROM FORBESGoogle Issues Critical Update For Millions Of Pixel UsersBy Zak Doffman

From a content perspective, anything properly encrypted is safe as long as you can attest to the integrity of the connection. "If the data is encrypted during transit do we really care about the communication?" CISO Ian Thornton-Trump says. But the wrap around the data is vulnerable. The ability to derive device IDs, locations and any unencrypted traffic—basic messaging being an example—remains a risk.

As ESET's Jame Moore explains, "if used purely as a backup service, it could be vital for those in remote areas or in times of need. However, as satellite communication is usually more vulnerable to security threats, it should not be relied upon as a default messaging service when other more privacy focused and secure services exist."

Again not an issue if this stays emergency only—but with the surge in LEO-based Wi-Fi and tie-ups with movie network operators, this is only going to become more extensive. And so that catching up needs to happen if enterprises are planning to rely on such devices and networks as an extension of business as usual.

Apple handles the security of its satcom offering by limited it to a managed service, whereby it encrypts the messages from the iPhone and then decrypted them and provides them to the emergency services. The user's location is also shared.

Clearly, Android is offering a wider messaging service over satellite and so the equivalent, curated security wrap is unlikely to be there. Ultimately, if satcom from an Android expands to offer more versatile usage, then all the usual security and privacy considerations will need to apply.

MORE FROM FORBESWhy You Should Change This iPhone Setting To Secure All Your PhotosBy Zak Doffman

As cybersecurity analyst Mike Thompson warns, "how many cyber people know its nuances enough to have a sensible opinion on it? Users being in the dark is one thing, the security industry another. Not that there won't be expertise out there, but I'd question how mainstream it is."

And that's the key. In industries with remote locations or the requirement to centralize mobile connectivity rather than roam on various flavors of host networks will drive new policies and optionality. If mobile devices extend corporate networks, additional security will need to be put in place.


IOS 18 Will Finally Bring This Android Feature To IPhone

iOS 18 will allow iPhone users to place app icons anywhere on the Home Screen grid, according to sources familiar with development of the software update. This basic feature has long been available on Android smartphones.

Generic iOS 18 Feature PurpleWhile app icons will likely remain locked to an invisible grid system on the Home Screen, our sources said that users will be able to arrange icons more freely on iOS 18. For example, we expect that users will be able to create blank spaces, rows, and columns between app icons, making a variety of layouts possible.

iPhone Home Screen Gradient Blank Spaces 1

iPhone Home Screen Gradient Blank Spaces 1

iPhone users can already customize the Home Screen with apps such as Shortcuts and Widgetsmith, which can be used to create "blank" app icons and widgets, but Apple's official solution will be much more convenient.

Apple is expected to announce iOS 18 at its annual developers conference WWDC in June, and the update should be released in September.


This Guy's IPhone Turned Out To Be A Reskinned Android! Here's How To Avoid Scam And Spot A Fake IPhone

Leaving aside the eternal debate about which is better - Android or iPhone - but given that the price of Apple smartphones is usually quite high, Apple gadgets can become a convenient bait for some naive users. How to avoid scams and what signs can you use to detect a fake iPhone?

It would seem that a person who uses a smartphone and is interested in new gadgets should easily distinguish between an iPhone and an Android. However, not everyone is interested in mobile devices; some people do not fully comprehend the nuances, making them potential targets for scammers. For instance, by purchasing an iPhone 13 or 14 at an attractive discount, they can easily fall victim to deceit. Cases of such deception with reskinned Androids can be found on social networks and forums, shared by affected customers who unknowingly bought a fake iPhone. For example, a purchaser of a new iPhone 14 Pro Max discovered that they could not update it to the latest version of iOS and later realized that the application had an "apk" signature, indicating it was a reskinned Android, purchased for $300.

Buying a smartphone from an authorized site eliminates the risk of counterfeiting. Fraudulent incidents often occur in small physical stores or on marketplaces such as Facebook or eBay. Retail professionals note that sometimes these counterfeits appear very high-quality and authentic, with packaging boxes indistinguishable from Apple-branded packaging at first glance. Therefore, the foremost advice to buyers is to never purchase a phone without turning it on and verifying its authenticity. Are the iOS and apps genuine?

Here are a few more detailed and useful tips by which you can recognize an Android device reskinned to mimic an iPhone:

  • Software interface inconsistencies: Pay attention to the software interface. If it looks like iOS but behaves inconsistently or lacks the fluidity typical of an iPhone, it might be a reskinned Android device.

  • App Store differences: Check the App Store. If it's the Google Play Store instead of the Apple App Store, it's a clear indication that the device is running Android, regardless of its appearance.

  • Settings menu: Dig into the settings menu. Android devices have a different settings layout compared to iPhones. If you notice settings menus and options that are typical of Android, it's likely a reskinned device.

  • Hardware design and build quality: While the exterior might resemble an iPhone, upon closer inspection, you might notice differences in build quality or materials used.

  • Button placement and functionality: Compare the placement and functionality of buttons such as the volume rocker, power button, and mute switch. If they don't match the typical layout of an iPhone, it's likely an Android device.

  • System performance: Run performance tests or try running demanding applications. If the performance is subpar or inconsistent with what you'd expect from an iPhone, it might indicate an underlying Android system.

  • Check for manufacturer branding: Look for any manufacturer branding or logos. Some reskinned Android devices might still bear the branding of their original manufacturer, giving away their true identity.

  • Remember, the best way to ensure you're purchasing a genuine iPhone is to buy from authorized retailers or directly from Apple. If you're unsure, it's always wise to seek expert advice or do thorough research before making a purchase.






    Comments

    Popular Posts

    Signal, WhatsApp and Telegram: All the major security differences between messaging apps - CNET

    VPN browser extensions: Why you shouldn't use then - Tech Advisor

    Police Target Criminal Users of Sky ECC Cryptophone Service - BankInfoSecurity.com