See more on this here
James Losey from New America Foundation writes, "I thought you might be interested in a new 'feature' of the latest Android phone. Officially released tomorrow October 6, some T-mobile stores began selling the HTC G2 yesterday. Within 24 hours, users have discovered that the phone has built-in hardware that restricts what software a device owner might wish to install.
Specifically, one of the microchips embedded into the G2 prevents device owners from making permanent changes to the Android operating system, re-installing the original firmware."
Plugging a USB wireless modem into a laptop for T-Mobile's broadband services does not mean that T-Mobile can say that Ubuntu Linux is not an approved operating system, or that Skype is not an allowed voice service. Yet when unsuspecting members of the public buy Google's Android G2 at a T-Mobile store, they aren't getting a customizable mobile computer or phone but are instead getting a device where the hardware itself dramatically limits users' right to make changes to their computers and install the operating system of their choice.
Newest Google Android Cell Phone Contains Unexpected 'Feature' -- A Malicious Root Kit.
Clearly, this is a major new initiative to control users rights to run their computers as they see fit. Instead, the new Google Android hardware rootkit acts just like a virus -- overriding user's preferences to change settings and software to conform to the desires of a third party. And just like a virus, this kind of behavior should be just as illegal. Users of the new Google Android G2 should be warned that their device has a rootkit that will overwrite their software modifications. We are seeking further clarification as to the legality of this malicious software.
(Image: Fuck T-mobile, a Creative Commons Attribution (2.0) image from gillyberlin's photostream)
Philips has acquired Luciom, a French startup that makes Li-Fi products, which allow for very fast network connections over short distances by flickering an LED at speeds that are too fast to register on the human eye, and which can ever work in the dark by operating at low dimness settings the human eye perceives […]
Many insurers offer breaks to people who wear activity trackers that gather data on them; as Cathy “Mathbabe” O’Neil points out, the allegedly “anonymized’ data-collection is trivial to re-identify (so this data might be used against you), and, more broadly, the real business model for this data isn’t improving your health outcomes — it’s dividing […]
As the US government ramps up its insistence that visitors (and US citizens) unlock their devices and provide their social media accounts, the solution have run the gamut from extreme technological caution, abandoning mobile devices while traveling, or asking the government to rethink its policy. But Maciej Cegłowski has another solution: a “travel mode” for […]
DJI is the world’s leading designer and producer of easy-to-fly drones and aerial photography systems. If you’re a drone enthusiast, you want a DJI. If you know absolutely nothing about drones and think they’re weird, if you win a DJI you’re going to become a drone enthusiast.Enter this giveaway (for free, yes) and you’ll get a […]
Although there will never be a consensus about the best way to make coffee, any coffee connoisseur will agree that controlling the grind of your beans and balancing water temperature are the keys to a tasty cup. Since your plastic coffee pot doesn’t really allow for that kind of customization, going back to the French […]
Not all hackers are malicious information thieves—white-hat ethical hackers work with technology companies to ensure the security of their computer systems and user data. With all of today’s high-profile data breaches, ethical hackers are in considerable demand. To learn these critical skills and break into the high-paying cyber security field, try taking the courses in this […]