Category: Software

  • Nick Clegg Exits Meta; Joel Kaplan Becomes Global Affairs Chief

    Nick Clegg Exits Meta; Joel Kaplan Becomes Global Affairs Chief

    Nick Clegg, who is the president of global affairs at Meta, has declared he will resign to allow his deputy, Joel Kaplan, to take the helm.

    Background of Clegg and Kaplan

    Before his role at Meta, Clegg was the deputy prime minister of the UK and led the Liberal Democrats party. Joel Kaplan, the new president, has been with Meta since 2011, where he managed US public policy. He has a history in politics, having worked under former US President George W. Bush.

    Clegg’s Departure Announcement

    Clegg shared his decision on Facebook, noting it was “the right time” for him to leave. He described his time at Meta as “an adventure of a lifetime!” and recognized the “significant scrutiny and controversy” the company has dealt with during his tenure.

    “I feel proud of the work I’ve done leading and supporting teams throughout the company, ensuring that ongoing innovation can go together with greater transparency and accountability, along with new forms of governance,” stated Clegg.

    Implications of the Leadership Change

    Many observers interpret this change as Meta’s effort to rebuild its relationship with President-Elect Donald Trump, who is set to assume office this month. Trump had been banned from Facebook and Instagram in 2021 after the Capitol riots, but Meta reinstated his accounts in 2023.

    Source: Link

  • Telegram Introduces Third-Party Verification in Latest Update

    Telegram Introduces Third-Party Verification in Latest Update

    Telegram has rolled out its first update of the year, introducing a verification system that enables users to quickly identify sources. This new feature allows official third-party services to attach additional verification icons to both their accounts and chats, making it easier for users to discern authenticity.

    Enhancing Security and Trust

    The company recently shared that it has achieved profitability for the first time, and it is optimistic that this new system "will help prevent scams and reduce misinformation." When users tap on the verification icon in profiles, they can access more details regarding the account’s verification status.

    Telegram clarified that this verification is separate from the checkmark system used for public figures and organizations. Additionally, an account must first be verified by Telegram before it can offer third-party verifications. At this moment, individual user accounts are not eligible for verification on the platform.

    New Collectibles Feature

    In other news, users can now transform gifts into collectibles that can be traded on NFT marketplaces. Gifts consist of unique messages and emojis that users can send to each other using Telegram’s in-app currency. Recipients of these gifts can upgrade them into collectibles, which reveal a new look and a random secondary trait, such as background color, icon, or number.

    Furthermore, users have the ability to react to service messages shown by the platform while receiving gifts, initiating video chats, or adding new members to a group. The update also brings enhanced search bar filters that allow users to narrow down their results into private chats, group chats, or channels. Lastly, custom emojis can now be utilized for naming folders.

    Source: Link

  • US Treasury Confirms Breach by Chinese Hackers

    US Treasury Confirms Breach by Chinese Hackers

    The US Treasury Department has reported that it fell victim to a cyberattack carried out by hackers considered to be sponsored by the Chinese government. In a letter sent to US lawmakers, which was shared via TechCrunch, the Treasury revealed that these hackers gained remote access to employee workstations and unclassified documents.

    Security Breach Details

    The point of entry for the hackers was a third-party software provider named BeyondTrust. This company disclosed that the hackers accessed a security key stored in their database. With this key, the attackers were able to remotely access user workstations that held unclassified documents. Currently, the service is offline.

    Ongoing Investigation

    The Treasury is collaborating with CISA, the FBI, and other intelligence agencies to assess the extent of the cyberattack. In their statement, the Treasury indicated that, "based on available indicators, the incident has been attributed to a China state-sponsored Advanced Persistent Threat (APT) actor."

    China’s Response

    Bloomberg reported that a spokesperson from the Chinese Foreign Ministry described these allegations as "unwarranted and groundless." During a press conference in Beijing, spokeswoman Mao Ning stated that China opposes "all forms of hacking, and especially, we oppose the spread of disinformation related to China that is driven by a political agenda."

    TechCrunch | Bloomberg

    Source: Link

  • Rust-Based Open-Source WiFi Stack Now Available for ESP32

    Rust-Based Open-Source WiFi Stack Now Available for ESP32

    An experimental open-source WiFi stack has been introduced for the ESP32. This project, named Ferris on Air (FoA), is created in async rust and serves as a proof-of-concept 802.11 stack. It aims to enable various interfaces using Embassy, a rust framework for embedded devices. The ultimate goal of this framework is to provide the ESP32 with features such as mesh networking and AirDrop. Although these features are thrilling, they were previously unattainable.

    The Challenge of Closed-Sourced Modules

    The ESP32 is mainly open-source, but its WiFi and Bluetooth modules are not, likely due to a hardware NDA that Espressif, the company behind the ESP32, is under. Thankfully, Espressif has agreed that the team could legally reverse engineer these modules and share the results under an Apache license. However, the process of reverse engineering is quite complex.

    The Reverse Engineering Journey

    To unlock the WiFi module, the team utilized Ghidra, a reverse engineering tool from the NSA, to study its code structure, logic, and function names—information that Espressif generously left in the code. This allowed the team to understand the roles of each hardware register that controls the WiFi Module. By combining physical and emulated ESP32 hardware analysis, they successfully reverse-engineered the WiFi module. Interestingly, the team had to create a DIY Faraday cage to separate the WiFi signals from the ESP32. For this, they constructed a wooden cube lined with conductive fabric, a fiberoptic cable to transmit signals to the ESP32, and a car battery to power the whole system.

    Future Developments

    Ferris on Air is still at the beginning of its journey but is rapidly developing and adding new features. More information about the reverse engineering process and additional project details can be found below.

    Check out Frosty314159 on GitHub and 38C3 for further insights.

    Source: Link

  • OxygenOS 15 Update Now Available for These OnePlus Phones

    OxygenOS 15 Update Now Available for These OnePlus Phones

    OxygenOS 15 is a major update that brings hundreds of enhancements, both large and small, to Android 15. The animations have received a substantial upgrade, resulting in a smoother and more responsive experience. New flux themes, additional customization options, and exciting AI features make OxygenOS 15 an appealing upgrade.

    Quick Release by OnePlus

    OnePlus has a reputation for being fast with operating system updates, and Android 15 is no exception. It was among the first brands to showcase the new OS through its beta program, and the stable version followed soon after. The OnePlus 12 was the first device to receive the stable OxygenOS 15 update, and since then, it has rolled out to a variety of other devices.

    List of Updated Devices

    To help you keep track of the rollout, here is a list of devices that have begun receiving the stable OxygenOS 15 update:

    • OnePlus 12
    • OnePlus 12R
    • OnePlus 11
    • OnePlus 11R
    • OnePlus Nord 4
    • OnePlus Nord CE 4
    • OnePlus Nord CE 4 Lite 5G
    • OnePlus Open
    • OnePlus Pad
    • OnePlus Pad 2

    Currently, these devices have been upgraded to stable OxygenOS 15. However, since the rollouts happen gradually, it may take several days to weeks for the update to reach your specific OnePlus device. If you haven’t seen the update yet, check by going to Settings > System > System updates.

    Regular Updates Coming

    We will keep this list up to date as more OnePlus devices get the OxygenOS 15 upgrade. Feel free to return to this page for the latest information.

    Key Features of OxygenOS 15

    OxygenOS 15 introduces numerous significant changes, including greatly enhanced animations and improved rendering capabilities, all due to a new graphics engine. The new parallel processing feature significantly boosts animation interactions. The internal improvements ensure stability and smoothness in all situations.

    OnePlus phones now include the popular circle to search feature as part of OxygenOS 15. It also introduces flux themes, which are high-quality themes that allow for a personalized touch. The lock screen benefits from new customization options, including blurred wallpapers and AI depth effects, along with AI auto-fills.

    AI Innovations

    OnePlus OneTake offers a seamless visual experience by ensuring a fluid transition from the always-on display to the lock screen and then to the home screen. The Live Alerts feature, similar to Apple’s Dynamic Island, now supports more functions like hotspots, screen recording, and music playback.

    On the AI front, OxygenOS 15 adds various features, including AI Unblur for restoring details in blurry images and AI Reflection Eraser for eliminating glares in photos. The Notes app now incorporates AI to help structure, summarize, and generate text. You can also use AI to improve voice recordings, correct grammar mistakes, and rewrite text.

    OxygenOS 15 also introduces new icons and a charging limit feature that allows users to pause charging at 80%. Accessing notifications and Quick Settings is quicker now: simply swipe down from the top left for notifications and from the top right for Quick Settings. There’s a new OnePlus Share for easier file sharing with iOS devices, although it still requires several steps.

  • Netflix Sues Broadcom Over Virtual Machine Patent Infringement

    Netflix Sues Broadcom Over Virtual Machine Patent Infringement

    Netflix has taken legal action against Broadcom and VMware in a district court in California, claiming that they have violated its virtual machine (VM) patents. The lawsuit concerns five specific patents: the 424 patent, 707 patent, 891 patent, 893 patent, and 122 patent. These patents involve technology connected to CPU utilization in VMs and the establishment of VMs on physical hardware.

    Accusations and Responsibilities

    In its legal filing, Netflix states that Broadcom should be held responsible for all patent violations, given that VMware operates as a subsidiary of Broadcom. The complaint further asserts that VMware gained its standing in the market by “using technological advancements made by others.” Netflix is focusing on the cloud services offered by VMware, including those on AWS, Azure, Alibaba Cloud, Google Cloud, Oracle, IBM, and other products or services that are based on “vSphere.”

    Legal Demands and Future Battles

    Netflix is seeking the court to “grant damages” for the infringement, either from Broadcom alone or jointly with VMware, along with any applicable interest. Notably, Broadcom purchased VMware for a staggering $69 billion in November of the previous year. Additionally, Netflix and Broadcom are set to clash again in June 2025 regarding a separate case where Netflix has accused Broadcom of infringing its video streaming patents.

    Source: Link

  • Japan’s Antitrust Case May Find Google Guilty of Competition Violations

    Japan’s Antitrust Case May Find Google Guilty of Competition Violations

    Nikkei Asia has reported that Japan’s Fair Trade Commission plans to find Google guilty of violating the country’s antimonopoly regulations. The regulatory body has concluded that Google’s agreements with smartphone makers “unfairly limit competition” in the search industry.

    Unfair Contracts

    According to the watchdog, Google’s contracts contain conditions for the installation of its Search app and Chrome browser on Android devices, which could stifle competition in both the search and browser markets. Google is currently confronting multiple antimonopoly lawsuits globally, including in the United States.

    Legal Actions in the US

    Last month, the US government proposed that Google divest its Chrome and Android platforms in order to eliminate the company’s monopolistic influence on the search engine market. This proposal requires Google to sell Chrome and allow third-party access to its search engine at a minimal cost. The trial is set to occur in April 2025.

    Investigations in India

    In India, the Competition Commission is looking into Google following complaints from Winzo, a local real-money gaming company. Winzo claims that Google has exploited its dominant market position to disadvantage real-money gaming apps.

    Source: Link

  • Windows 10 Support Ends in 2025: Upgrade to ChromeOS Flex Now

    The end of Windows 10 support is coming soon in October 2025, allowing users some time to decide on their next steps. Many computers from the last 5-6 years, particularly those with Intel Core 8000 or AMD Ryzen 3000 processors, should be eligible for a free upgrade to Windows 11. For PCs or laptops that can’t be upgraded due to outdated hardware or if there’s no upgrade planned, users can either switch to a different operating system or delay the end of support for a maximum of three years by paying an annual fee. If they choose the latter, Microsoft will keep providing security updates.

    Options for Users

    While it’s technically possible to install Windows 11 on computers that don’t meet Microsoft’s minimum requirements, the experience may be far from smooth. Updates and error-free performance are not guaranteed, making this option quite impractical.

    Linux distributions like Ubuntu, Fedora, and Mint, as well as ChromeOS Flex, are viable alternatives to consider. We’ll focus on ChromeOS Flex. We tested it on a decade-old Lenovo ThinkPad L540, which recently underwent a retrofitting process (the article is in German, but readers can use translation tools in their browsers).

    Features of ChromeOS

    ChromeOS is a streamlined operating system from Google, primarily designed for cloud services and applications, especially Google’s own (like Docs, Sheets, and Gmail). Over time, support for native and Android apps has been introduced, broadening its functionality. However, ChromeOS Flex is a more limited version that doesn’t support Android apps. On the bright side, Google offers it at no cost.

    Typically, ChromeOS comes installed on Chromebooks, Chromeboxes, or Chromebases, but ChromeOS Flex is meant for installation on existing hardware. This lightweight OS can breathe new life into older computers, although it doesn’t fully replicate the Windows 10 experience.

    Installation Process

    According to Google, “ChromeOS Flex is designed to support the most common PCs and Macs from the last decade, but it is only officially supported on certified models.” While there’s a large list of certified devices, non-certified ones aren’t automatically ruled out. Users can test compatibility by running the ChromeOS Flex installation medium without needing to install it. Note that ChromeOS Flex supports only x64 hardware, while the full ChromeOS accommodates ARM architecture.

    Our test device, the ThinkPad L540, isn’t on the certified list, but its 14-inch counterpart, the ThinkPad L440, shares the same platform. This means that all hardware in the L540 is supported, including a recently added LTE modem.

    The ChromeOS Flex image comes in a ZIP folder (no need to unpack), which can be written to a USB stick (minimum 8 GB) using the “Rufus” tool to create a bootable drive. Alternatively, Google offers the Chromebook Recovery Utility, which is an extension for the Chrome browser, not a standalone app.

    Booting and Installation

    To use the USB stick, insert it into the target computer, power it on, access the boot menu (by pressing F12 for the ThinkPad L540), and start the system from the USB. If this fails, disabling Secure Boot in the BIOS settings may help. The USB can be utilized for direct installation or as a live system without installation. In either case, an internet connection and a Google account are necessary.

    Important: During installation, the entire hard drive of the target computer will be wiped clean. Therefore, running another operating system alongside it is not an option.

  • YouTuber Exposes Honey’s Deceptive Affiliate Practices

    YouTuber Exposes Honey’s Deceptive Affiliate Practices

    YouTuber MegaLag has uncovered serious issues with Honey, a well-known browser extension backed by big names like Linus Tech Tips, MKBHD, and MrBeast, and owned by PayPal. Honey claims to help users find the best coupon codes online, but evidence suggests this might not be entirely true. Some partner stores can direct Honey to display only certain discount codes.

    The Problem with Discount Codes

    In an example provided by MegaLag, if a retailer has a discount code that offers a 30% reduction on a specific item alongside another code that provides just 5%, Honey will only show the less advantageous code. This goes against Honey’s promise of helping users save money. Worse still, Honey appears to undermine the very creators who endorse it.

    How Honey Affects Creators

    Many users may have noticed that Honey typically activates right before the checkout process. While searching for discount codes, Honey replaces any affiliate cookies with its own. This action effectively robs the creators you support of their affiliate earnings, even if you don’t finalize the purchase right away.

    Watch the Full Video

    The video dives deeper into how this whole operation unfolds, and we suggest watching it in its entirety. It’s the first part of a three-part series, and MegaLag has stated he will expose more inconsistencies with the service in future videos.

  • Beware: Fake Google Calendar Invites Are the Latest Phishing Scam

    Beware: Fake Google Calendar Invites Are the Latest Phishing Scam

    Fake Google Calendar invites that look like they’re from real sources are the latest trick used by scammers to collect personal info. By cleverly changing the email headers, these messages appear to come from official companies or acquaintances of the victim. While the attacks can take various forms, they all share a common element: a Google Calendar invite. Clicking on the link usually leads victims to a site designed to gather personal details, which the scammers can use to carry out further attacks or even request sensitive financial data directly.

    Rise in Attack Frequency

    Researchers have noted that these kinds of attacks have increased in recent weeks. Around 4,000 emails of this type have been sent to unsuspecting targets over a four-week span, impersonating more than 300 different brands. Email scanning tools found in services like Gmail and Microsoft Outlook started to detect these attacks at some point, prompting criminals to adapt their strategies. Now, the fake links might direct users to pages using Google Forms or Google Drawings, and may even feature a phony ReCaptcha screen. Ultimately, the goal is still to mislead the victim, who trusts the message’s supposed sender, into providing sensitive information that the attackers can exploit later.

    Recommendations for Users

    After being informed about this scheme, Google recommended that users take advantage of Gmail’s filtering rules and the "known senders" setting. These measures can help stop potential victims from accessing harmful emails in the first place. Until a more complete security solution is developed, the best defense is to stay alert and only click on links from trusted contacts or those that were expected to arrive.

    Check Point | Dark Reading

    Source: Link