The MacValley blog
Welcome to the MacValley blog, your first stop for all the latest MacValley news and views.
The MacValley blog Editor: Tom Briant
|
Labels used in posts
|
To search the blog posts please use the box below
Sunday, March 20, 2016
T-Rex Terrorizes NYC Comic Con - YouTube
T-Rex Terrorizes NYC Comic Con - YouTube: ""
(Via.)
Stop thinking and just enjoy this video.
Tom Briant
Editor, MacValley Blog
Sunday, March 13, 2016
Senior Correspondent Arnold Woodworth's Weekly Web Wrap-up for Sunday, March 12, 2016
Video:
Why I won’t trade in my iPhone for a Samsung Galaxy S7
http://www.techinsider.io/iphone-6s-plus-vs-samsung-galaxy-s7-2016-3
The Apple Pencil: an illustrator's review
Apple’s Pencil ...... is accessible, intuitive and easy to use.
Apple’s Pencil is very impressive and precise, but at the end of the day, it’s a secondary tool designed to work with the newest incarnation of one of their most profitable products. Which brings me to my biggest problem with the Apple Pencil, which isn’t the Pencil at all, it’s the gigantic expensive iPad Pro you need in order to use it.
http://www.theguardian.com/global/2016/mar/11/the-apple-pencil-illustrator-review
Apple just officially dispelled the biggest iPhone myth
Shutting apps from the multitasking menu does not save battery life and there is no need to do it, Apple's head of software Craig Federighi has said.
http://timesofindia.indiatimes.com/tech/tech-news/Apple-just-officially-dispelled-the-biggest-iPhone-myth/articleshow/51370345.cms
Mac ransomware KeRanger's flaws could let users recover files
The KeRanger file-encrypting ransomware program for Mac OS X contains crypto flaws that could allow users to recover their files without paying cybercriminals.
It's a mystery why the attackers went to great lengths to steal a legitimate Apple developer's certificate and break into the website of a trusted software project, only to distribute a flawed ransomware program.
Whatever the reason for this inconsistency, other cybercriminals will most likely try to replicate the attack, and they won't make the same mistakes.
http://www.computerworld.com/article/3042184/security/mac-ransomware-kerangers-flaws-could-let-users-recover-files.html
People are using shady apps to get around Snapchat's biggest limitation
On 9to5Mac.com, security expert Will Strafach examined another app like Snap Upload called Snapix and discovered that it was storing Snapchat logins on its own server over an unencrypted connection.
Snapchat itself strongly discourages giving third-party apps like these your login information.
"As always, third-party applications and plugins are not supported by Snapchat and can compromise the security of your account," a Snapchat spokesperson told Tech Insider.
http://www.techinsider.io/snapchat-apps-that-let-you-post-to-story-are-bad-news-2016-3
Video:
Here's what it was like to send an email back in 1984
The video makes one thing very clear: A lot can change in 30 years.
http://www.techinsider.io/video-what-early-email-looked-like-2016-3
See the exact moment the world champion of Go realizes [that the computer named] DeepMind is vastly superior
http://www.techinsider.io/video-lee-se-dol-reaction-to-move-37-and-w102-vs-alphago-2016-3
You can see a video of the move here, at timestamp 2:30:20. At first he seems paralyzed, and then he rocks backwards in surprise.
https://www.youtube.com/watch?v=1bc-8iomgB4&t=150m0s
You can watch another video at timestamp 1:18:27. AlphaGo, playing black, puts a stone on the right-middle of the board, at a diagonal to an isolated white stone. Lee's reaction: He gets up from his chair and walks away from the board.
https://www.youtube.com/watch?v=l-GsfyVCBu0
This one paragraph will make you appreciate your brain — and laugh at artificial intelligence
While we're (unfairly) quick to cede our human shortcomings to the unblinking precision of computers, our brains are really good at something current AI can't quite crack: Thinking.
AI definitely has us beat when it comes to things like precision computing and processing power. This makes machines really good at specialized tasks.
But something more nuanced, artistic, and human, like writing, is still hilariously bad when done by AI.
http://www.businessinsider.com/brain-versus-artificial-intelligence-abilities-2016-2
20 podcasts that will make you smarter
http://www.businessinsider.com/podcasts-that-make-you-smarter-2016-3
Windows 95 freaks out teenagers (See video)
http://www.networkworld.com/article/3041391/microsoft-subnet/windows-95-freaking-out-teenagers-will-amuse-adults.html
Worried about Apple? California Has a Bill That Would Disable Encryption on All Phones
Smartphone users in California take notice: a new CA State Assembly bill would ban default encryption features on all smartphones. Assembly Bill 1681, introduced in January by Assemblymember Jim Cooper, would require any smartphone sold in California “to be capable of being decrypted and unlocked by its manufacturer or its operating system provider.” This is perhaps even more drastic than the legal precedent at stake in Apple’s ongoing showdown with the Justice Department, in which the government is trying to force a private company to write code undermining key security features in specific cases.
EFF opposes A.B. 1681 and all other state proposals to regulate smartphone encryption because they are terrible policy. If passed, A.B. 1681 would leave law-abiding Californians at risk for identity theft, data breach, stalking, and other invasions of privacy, with little benefit to law enforcement. It would be both ineffective and impossible to enforce. And, if that weren’t enough, it suffers from serious constitutional infirmities.
Meanwhile, in the U.S. Congress, Representative Ted Lieu has introduced H.R. 4528, the ENCRYPT Act, which would definitively preempt state bills like A.B. 1681. EFF agrees this is the right approach to state legislation in this area, although we’d like H.R. 4528 to go further and also prevent Congress and the rest of the federal government from undermining encryption.
https://www.eff.org/deeplinks/2016/03/worried-about-apple-california-has-bill-would-disable-encryption-all-phones
Want to see what the future holds if Apple loses? See: Microsoft
The All Writs Act, after all, requires companies like Apple to comply with government requests as long as they don’t cause “undue burden.”
Apple’s congressional struggle hangs on just that, undue burden. Apple is arguing that its inability to decrypt the phone or access its contents without creating a new version of iOS would create this burden and that it shouldn’t be required to comply with the original order.
The FBI disagrees that this burden exists.
If the case would have involved ...... Microsoft instead of Apple, the argument would be irrelevant.
Both Windows and OS X give users the option to encrypt the hard drive, or specific files; the difference is in how they handle the encryption keys.
Since 2013, Microsoft has been automatically uploading a recovery key for Windows users that elect to encrypt their drive. This key is stored on a Microsoft server and is intended to provide access to your PC should you forget the password to decrypt it. It’s the equivalent of Apple uploading your encryption key to iCloud, something it doesn’t do as to avoid creating a backdoor — something it’s vehemently opposed to.
Microsoft has faced criticism from security researchers about this feature before. But, it doesn’t seem to have a problem with the trade-off between security and user convenience.
According to Matthew Green, professor of cryptography at Johns Hopkins University, in a comment to The Intercept:
“Your computer is now only as secure as that database of keys held by Microsoft, which means it may be vulnerable to hackers, foreign governments, and people who can extort Microsoft employees.”
That’s the problem with backdoors; there’s no way to ensure that they only work for the intended user.
http://thenextweb.com/opinion/2016/03/11/microsoft-storing-copy-disk-encryption-key-promises-never-give-cops/
Government says Apple arguments in encryption case a 'diversion,' presents point-by-point rebuttal
"Apple and its amici try to alarm this Court with issues of network security, encryption, back doors, and privacy, invoking larger debates before Congress and in the news media. That is a diversion. Apple desperately wants—desperately needs—this case not to be 'about one isolated iPhone,'" the letter reads.
"This burden, which is not unreasonable, is the direct result of Apple's deliberate marketing decision to engineer its products so that the government cannot search them, even with a warrant," according to the government.
http://appleinsider.com/articles/16/03/10/government-says-apple-arguments-in-encryption-case-a-diversion-presents-point-by-point-rebuttle-
http://www.wired.com/wp-content/uploads/2016/03/2016.03.10-149-Gov-Reply-ISO-Mot-to-Compel-Opp-to-Apple-Mot-to-Vacate.pdf
U.S. Government Calls Apple's Opposition to iPhone Unlocking Order a 'Diversion,' Says Fears Are ‘Overblown'
The document says Apple's rhetoric is false and "corrosive of the very institutions that are best able to safeguard our liberty and our rights." Apple's efforts, and those of its supporters, to highlight the wider issues the order could have on encryption, are a "diversion," says the government.
Apple is accused of "deliberately" raising technological barriers preventing the government from obtaining the data on the iPhone through a lawful warrant. "Apple alone can remove those barriers so the FBI can search the phone," reads the document, "and it can do so without undue burden." Apple is "one of the richest and most tech-savvy companies in the world," and is "more than able to comply with the AWA order."
http://www.macrumors.com/2016/03/10/government-motion-deny-apple-opposition/
The Justice Department just slammed Apple's stance on iPhone security
The Court’s Order is modest. It applies to a single iPhone ...... the Order does not compel it to unlock other iPhones or to give the government a universal “master key”or “back door.” It is a narrow, targeted order that will produce a narrow, targeted piece of software capable of running on just one iPhone, in the security of Apple’s corporate headquarters.
http://www.techinsider.io/the-justice-department-says-apple-lied-2016-3
Apple's lawyer just tore into the government — here's what he said
the tone of the FBI brief reads like an indictment. We've all heard Director Comey and Attorney General Lynch thank Apple for its consistent help in working with law enforcement. Director Comey's own statement that "there are no demons here." Well, you certainly wouldn't conclude it from this brief.
http://www.businessinsider.com/apple-general-counsel-bruce-sewell-statement-2016-3
Here's What Obama Said at SXSW About Apple vs. FBI
http://fortune.com/2016/03/12/obama-sxsw-apple-vs-fbi/
FBI warns it could demand Apple's iPhone code
In a court filing, the FBI said that if can't require Apple to create the weakened software, it may demand access to what it described as Apple's "crown jewels" instead. Source code is the list of programming code instructions used to create the software that runs the iPhone.
If the FBI got access ...... the bureau, or outside programming experts it hired, could try to write the security-weakened version of iOS and install it onto Farook's iPhone without Apple's assistance. But Apple would be likely to fight even harder to keep its source code and digital signature out of the government's hands.
http://finance.yahoo.com/news/fbi-threatens-to-demand-apple-s-secret-source-code-214832611.html
Why Apple will eventually lose its fight against the government
the courts have historically given the government — and private actors in legal cases — all kinds of power to violate our privacy in the name of preventing and prosecuting crime.
With the proper legal orders, the government may tap our phones, pick our locks, put hidden microphones in our homes and workplaces, and scour our computer records.
What's so special about an iPhone?
On a technical level, the techies are absolutely correct. Once you've broken security for one actor by building a back door, that security becomes a lot less valuable. It will still keep out the masses, but any technically sophisticated party will eventually be able to walk right through the back door, either with stolen tools or by developing their own.
In this particular case, Apple might win.
Nonetheless, it's hard to argue that the iPhone is different from any other kind of device. If the government wants a way to get data from it, the government will find a way.
This brings back the most important thing to remember about computer security, which older folks learned when computers first became common, but which folks who grew up online might not have absorbed yet: Nothing you do, or say, on your computer is private by default. Assume it's public. If you want privacy, you're responsible for providing it yourself.
http://www.businessinsider.com/apple-may-be-right-about-encryption-but-will-lose-eventually-2016-3
JOHN McAFEE: President Obama's cybersecurity advisers are incompetent
I must assume, no matter how shocking it sounds, that Obama’s cybersecurity advisers have not kept up with the dynamic and rapidly evolving landscape of the world of cybersecurity. It would partially explain, at least, why the US is hopelessly behind China and Russia in cybersecurity.
here is the issue: Any master key or backdoor to software or encryption that is given to the US government will reside in the hands of our enemies within a matter of weeks of its creation. This is an absolute truth no cybersecurity expert can deny.
http://www.businessinsider.com/john-mcafee-oped-on-obama-cybersecurity-2016-3
Tuesday, March 8, 2016
Tuesday night commentary from your editor and some useful links, too.
- Apple took swift measures to clobber the malware Arnold and I reported on Sunday. That said, if you use Transmission as your BitTorrent client, make sure to update to the latest version.
- Just in case, Macworld UK has instructions about disinfecting your Mac from this pest.
- J. R. Bookwalter reviews a device that brings OTA TV to your iPad on Macworld.com
- We are just three weeks away from Batman vs. Superman, so put on your costume and stand in line on Hollywood Blvd for tickets.
- Interesting article at Slate.com regarding Flowwrite, a new iPad that supposedly causes you to write more. But $10 for a combination text editor and stopwatch?
- Teenagers react to seeing Windows 95 on an old Dell PC and big for its time CRT monitor.
- Oculus Rift CEO says that Macs are not good enough for his brand of Virtual Reality. (And suddenly…his iPhone stopped working. Wonder why? )
- For those of you not wanting to be chased by trolls and dragons while wearing goggles, feast your eyes on these real reality pictures taken by astronaut Scott Kelly during his year in space.
- A new project brings a wireless dock to the iPad and Mac. You could use a mouse on your iPad Pro!
- Finally,Ray Tomlinson, the inventor of e-mail, has died at the age of 74. No, he didn’t invent the fake Viagra e-mail filling up your Inbox.
Tom Briant
Editor, MacValley Blog
Sunday, March 6, 2016
Ransomware appears on Apple for the first time!
Apple users targeted in first known Mac ransomware campaign
"This is the first one in the wild that is definitely functional, encrypts your files and seeks a ransom," Ryan Olson said in a telephone interview.
the malicious program first appeared on the Tranmission website, he said.
The Transmission site offers the open source software that was infected with the ransomware. Transmission is one of the most popular Mac applications used to download software, videos, music and other data through the BitTorrent peer-to-peer information sharing network, according to Olson.
Representatives with Transmission could not be reached immediately for comment.
The project's website, www.transmissionbt.com, on Sunday carried a warning saying that version 2.90 of its Mac software had been infected with malware.
http://www.reuters.com/article/us-apple-ransomware-idUSKCN0W80VX
For the first time, Mac users have to worry about malware that locks their computer and demands a ransom
Ransomware, a type of malware that encrypts all the data on your computer until you pay the attackers a ransom (often in bitcoins), has been a big problem for Windows users for years.
And now the first successful ransomware attack on Mac users occurred this weekend, using malware designed to lock files on a targeted computer three days after infection, reports Reuters' Jim Finkle. Targeted users could start seeing their files locked on Monday.
given the rise in popularity of Macs, particularly in businesses and other targets with deep pockets, this also might be just the beginning of ransomware in the wild for Macs, and comes into the your computer in other ways.
http://www.businessinsider.com/mac-users-attacked-with-ransomware-2016-3
Senior Correspondent Arnold Woodworth's Weekly Web Wrap-up for March 6, 2016
Apple’s new Twitter account has already helped thousands of users in its first day
Apple revealed a new Twitter account, @AppleSupport, which responds to technical questions from users and tweets out tips and tutorials.
On its first day, Apple Support has over 121,000 followers, and has tweeted over 2,200 times directly to Apple users with instructions for how to fix their problems.
http://www.techinsider.io/new-apple-support-twitter-account-sent-thousands-of-tweets-on-its-first-day-2016-3
This voice assistant app blows Siri out of the water
Keyvan Mohajer is pulling out the stops to show off the power of Hound, a voice recognition assistant his company SoundHound has been quietly building for the last 9 years.
http://www.techinsider.io/hound-voice-assistant-app-blows-siri-away-2016-3
The 20 best smartphones in the world
The iPhone 6 and iPhone 6S are in first and second place.
http://www.businessinsider.com/best-smartphones-2016-3
5 clever iPhone tricks only power users know about
http://www.techinsider.io/iphone-useful-map-timer-photo-tricks-2016-3
A Mac user asks
"I have an iPhone and an iMac and somehow when the phone rings, so does the computer. Any idea how to turn off the computer component so just the iPhone rings?”
http://www.nytimes.com/2016/03/01/technology/personaltech/making-the-mac-ignore-those-phone-calls.html?emc=edit_ct_20160303&nl=personaltech&nlid=11893479
iOS 9.3 Will Kindly Alert You If Your Work-Issued iPhone Is Being Monitored
This functionality is only enabled if an employer has its iPhones registered through Apple's Device Enrollment Program.
Even though Apple is giving you fair warning which activities are being monitored, it still doesn’t give the user the ability to turn off said functionality.
http://hothardware.com/news/ios-93-reminds-you-if-your-work-issued-iphone-is-monitored
Oculus founder explains why Macs can't do virtual reality
Oculus software needs the best graphics cards to work well.
Apple doesn’t use the best graphics cards in the Macs they make.
However, the cards that Apple does use are good enough for most users.
http://www.businessinsider.com/oculus-founder-explains-why-rift-doesnt-work-with-macs-2016-3
40 great websites where you can learn something new every day
http://www.businessinsider.com/40-great-websites-where-you-can-learn-something-new-every-day-2016-3
Archaeology’s Information Revolution
In the near future, every archaeological artifact could be digitally connected to every other artifact.
http://www.theatlantic.com/technology/archive/2016/03/digital-material-worlds/471858/
The dream of an uncensorable online marketplace just took a major step closer to reality
OpenBazaar has been in the works in some form since 2014, when it was conceived by controversial bitcoin developer Amir Taaki.
The vision is an online peer-to-peer market, in the vein of eBay or Etsy — but unlike eBay, transactions will take place using bitcoin, and the entire site will be decentralised across the network of people accessing it, making it impossible to close down.
There's now a functioning version of OpenBazaar running on the "testnet." This is a kind of open beta that anyone can download and run, but it uses "testnet bitcoin" — a "fake" version of the digital currency for running tests — that doesn't have any real value.
It means the developer team can test out the software with a larger audience and iron out the bugs without any real risk.
http://www.businessinsider.com/openbazaar-launches-testnet-trial-ahead-of-public-launch-2016-3
Apple, want to show you really care? Protect us from everyday hacking
Apple's App Store Terms and Conditions clearly absolves it from any responsibility for a hack, breach, or data loss stemming from the use of any apps you purchase from it.
In light of this, it's hard to make a case then that Apple is always looking out us. Can't Apple do better in protecting us from hackers?
Before we discuss that, let's pause to recognize that this is a problem not just with Apple but also every other major technology company, from Google to Facebook to Amazon, each of which is vying to become your gateway to the Internet.
most IoT gadgets are created by companies that have little to no information security experience, or that are simply negligent. Many have been shown to have serious vulnerabilities, and we have already seen successful breaches into everything from "smart" toys to thermostats.
It is one thing for Apple to take a stance against government intrusions into our privacy, but it is another to do something to better protect our data from hackers.
http://www.cnn.com/2016/03/02/opinions/can-apple-protect-us-from-hacking-vishwanath/
Everything You Need to Know About Apple vs. the FBI, Explained
Audio discussion
http://recode.net/2016/03/04/everything-you-need-to-know-about-apple-vs-the-fbi-explained/
Former heads of NSA and Homeland Security unlikely Apple supporters in encryption battle
At a panel discussion today at the RSA conference in San Francisco, Apple found two unlikely allies when the former heads of the NSA and Homeland Security threw their support behind encryption technologies.
Michael Chertoff, who was the head of Homeland Security under presidents George W. Bush and Barack Obama, and who helped author the USA Patriot Act, and former NSA head Mike McConnell both expressed strong support for encryption technology.
He believes that trust fuels the Internet’s economic engine and that weakening that trust puts those economic benefits at risk. “If you lose trust, you get to a tipping point where people flee to something else,” he said. As that happens, we could inadvertently fragment the internet as different countries go their own way in the name of privacy.
http://techcrunch.com/2016/03/03/former-heads-of-nsa-and-homeland-security-unlikely-supporters-in-encryption-battle/
Forget Apple's fight with the FBI – our privacy catastrophe has only just begun
Like climate change, the privacy catastrophes of the next two decades are already inevitable. That’s because of how much of our personal information we have already given to corporations and government.
The problem we face is preventing the much worse catastrophes of the following the decades.
And as computers are integrated into the buildings and vehicles and cities we inhabit, as they penetrate our bodies, the potential harms from breaches will become worse.
http://www.theguardian.com/technology/2016/mar/04/privacy-apple-fbi-encryption-surveillance
Tech Giants Agree: The FBI’s Case Against Apple Is a Joke
Google, Microsoft, Facebook, Amazon, Yahoo, etc., made clear just how outdated the All Writs Act of 1789 is:
That was fifty years before the telegraph originated and almost a century before Alexander Graham Bell made the first telephone call… Now, 200 years later, the government endeavors to reinterpret the All Writs Act as an open-ended source of new powers.
http://www.wired.com/2016/03/apple-fbi-tech-industry-support-amicus-brief/
Why Forcing Apple to Write and Sign Code Violates the First Amendment
The Electronic Frontier Foundation (EFF) filed an amicus brief in support of Apple's fight against a court order compelling the company to create specific software to enable the government to break into an iPhone.
https://www.eff.org/deeplinks/2016/03/deep-dive-why-forcing-apple-write-and-sign-code-violates-first-amendment
Beware of iOS hiding your email messages
This article describes an interesting bug that this author experienced.
His iOS device indicated that there were E-mails on it, but would not display them.
The problem was intermittent.
http://www.computerworld.com/article/3039155/apple-ios/beware-of-ios-hiding-your-email-messages.html
Amazon quietly removed encryption from its Fire devices
Amazon is one of several companies that’s backing Apple in its fight with the FBI over encryption.
And yet ... Fire OS 5, Amazon's latest update to its Fire operating system (OS), removed the ability to encrypt data.
http://www.techinsider.io/amazon-fire-os-5-removes-device-encryption-2016-3
Amazon reverses course, decides to bring back encryption for Fire devices
Amazon has decided to bring encryption back to its Fire devices after customers and privacy advocates complained about the latest Fire operating system (OS) update, which removed the ability to encrypt data.
http://www.techinsider.io/amazon-fire-devices-to-get-encryption-back-2016-3
How Hackers Recruit New Talent
http://www.theatlantic.com/technology/archive/2016/03/how-hackers-recruit/471729/
Attack against TLS shows the pitfalls of weakening encryption
The field of cryptography escaped the military domain in the 1970s and reached the general public through the works of pioneers like Whitfield Diffie and Martin Hellman, and ever since, the government has tried to keep it under control and limit its usefulness in one way or another.
This gave birth to so-called "export-grade" encryption algorithms that have been integrated into cryptographic libraries and have survived to this day. While these algorithms are no longer used in practice, researchers found that the mere support for them in TLS (Transport Layer Security) libraries and server configurations endanger Web communications encrypted with modern standards.
another team of researchers announced a third attack.
The attack is possible because of a fundamental weakness in the SSLv2 protocol that also relates to export-grade cryptography.
http://www.computerworld.com/article/3040206/security/attack-against-tls-shows-the-pitfalls-of-weakening-encryption.html
John McAfee reveals how to hack the iPhone without Apple's help
"There is only one way for a non-Apple employee to do this, without the help of Apple," McAfee said. "That is to decap the A6 chip, which is the processor chip inside the iPhone."
McAfee said that if the FBI wanted, it could literally strip the iPhone hardware apart and access the phone's chip. On this chip is a unique identifier, called a UID, which pairs up with the passcode to create the phone's encryption key.
If the FBI tried running a supercomputer right now to guess the unlock code, it would be up against a nearly-infinite number of possibilities. But if they had the UID, that number would come down to something more manageable.
"Then we've got it down to, I don't know, four or five trillion possibilities," McAfee said. "Good God, a supercomputer will give us an answer in five minutes.”
It's a solution that others in the technical community have been discussing recently.
it's extremely risky. If at any point in de-capping the chip and probing it an error is made, the chip could be destroyed and access to the phone's memory would be completely lost.
The method only applies to the shooter's version of the iPhone, the 5C. Apple implemented a major update to 5S and newer iPhones with its A7 chip featuring a "secure enclave" that theoretically can't be cracked into even if Apple wanted to.
http://www.techinsider.io/john-mcafee-hack-iphone-2016-3
Billboards can track your location, and privacy advocates don't like it
The next time you see a billboard on the side of the road, it may also be scanning you.
A geolocation-tracking feature on billboards owned by Clear Channel Outdoor gives the company new ways to target advertising and measure its effectiveness. The service has caught the eye of privacy advocates, who worry that the so-called Radar tracker will be able to collect massive amounts of information from smartphones in cars driving past.
http://www.computerworld.com/article/3040614/security/billboards-can-track-your-location-and-privacy-advocates-dont-like-it.html
Cryptography Pioneers Win Million-Dollar Turing Award
The Association of Computing Machinery on Tuesday named Whitfield Diffie and Martin E. Hellman recipients of the 2015 ACM A.M. Turing Award for their contributions to modern cryptography.
Their invention of public key cryptography and digital signatures revolutionized computer security, the organization said.
The award, considered the Nobel Prize of computing, includes a US$1 million prize, with financial support provided by Google.
http://www.technewsworld.com/story/83182.html