Can We Get This Right? | T3 262

T3vid-basic

If at first you don’t succeed, try, try again. And that’s just what we’ve been doing for the last five years, and we still haven’t gotten it right. The big adventure is just 10 days away, and this time we’re going in with a plan.

Plus the dirty secret from Mobile World Congress 2018, Apple gets caught using Google’s cloud, and finally a useful password tool.

Thanks to:


Ting

Direct Download:

Episode Links
  • Red Hat at Mobile World Congress 2018 — Connect with Red Hat onsite at Mobile World Congress 2018 to see why 100% of telecommunications organizations in the global Fortune 500 rely on Red Hat technology.

  • Mobile World Congress 2018 | Ubuntu Insights — Today Canonical operates telco networks worldwide in partnership with leading hardware and NFV vendors . We’re also collaborating with institutions worldwide to build tomorrow’s applications on Ubuntu: blockchain, machine learning, robotics or autonomous vehicles… To make sure that your infrastructure will be future proof.* FCC Will Auction 5G-ready 3.7–4.2GHz and mmWave Spectrum — Speaking at the Mobile World Congress today in Barcelona, Spain, U.S. FCC chairman Ajit Pai today announced that the commission is prepared to quickly make 5G-ready wireless spectrum available in two critically important ranges: Mid-frequency, including both 3.5GHz and 3.7–4.2GHz ranges, and high-frequency, including 24GHz and 28GHz millimeter wave (mmWave) ranges. Pai suggested that the FCC is ready to auction the spectrum in the near future, but requires Congressional cooperation by May 13 to make the 24GHz and 28GHz allocations happen.

  • Samsung Galaxy S9, Nokia 8110: All smartphones unveiled at MWC 2018 — With 5G technology taking an increasing share of the spotlight, as top executives stress the importance of the next generation of mobile networks, smartphones are still very much center stage.

  • How to find out if an old password has been stolen — The Pwned Passwords tool, integrated into the popular password manager 1Password, lets customers type in an old password and find out if it’s been leaked in a data breach.

  • Pwned Passwords — With Half a Billion Passwords for Download* Apple confirms it now uses Google Cloud for iCloud services – The Verge — Apple has confirmed that it uses Google’s public cloud to store data for its iCloud services in its latest version of the iOS Security Guide last month, as spotted by CNBC.

  • Apple confirms it uses Google cloud for some of iCloud | Hacker News — From Apple’s actual iCloud security document:

Each file is broken into chunks and encrypted by iCloud using AES–128 and a key derived from each chunk’s contents that utilizes SHA–256. The keys and the file’s metadata are stored by Apple in the user’s iCloud account. The encrypted chunks of the file are stored, without any user-identifying information, using third-party storage services, such as S3 and Google Cloud Platform.

  • Vulkan is coming to macOS and iOS, but no thanks to Apple | Ars Technica — The open source, royalty-free release of MoltenVK—a runtime for macOS and iOS that offers an almost complete subset of the Vulkan API implemented using Metal. Released under the Apache 2 license

  • Israel-Based Vendor Cellebrite Can Unlock Every iPhone, including the Current-Gen iPhone X, That’s On the Market: Forbes – Slashdot — The Israeli firm, a subsidiary of Japan’s Sun Corporation, hasn’t made any major public announcement about its new iOS capabilities. But Forbes was told by sources (who asked to remain anonymous as they weren’t authorized to talk on the matter) that in the last few months the company has developed undisclosed techniques to get into iOS 11 and is advertising them to law enforcement and private forensics folk across the globe. Indeed, the company’s literature for its Advanced Unlocking and Extraction Services offering now notes the company can break the security of “Apple iOS devices and operating systems, including iPhone, iPad, iPad mini, iPad Pro and iPod touch, running iOS 5 to iOS 11.”

Question? Comments? Contact us here!