OnePlus has started rolling out a software update that temporarily disables the 8 Pro’s controversial Color Filter camera function. In an announcement posted on Chinese social media platform Weibo, the manufacturer said it noticed that the camera may “cause a subtle see-through effect” when it’s in very close proximity to specific materials.
The phone’s Color Filter camera has a filter called Photochrom that uses the phone’s infrared sensors to give a specific effect. Users found that the feature could see through thin or tinted plastic, particularly electronic cases or materials that need to be able to absorb infrared. However, some claimed that it could even see through clothes.
Gizmodo UK tested the feature and found that it could only see electronic components inside devices in specific cases. It worked pretty well in showing what’s inside an Apple TV, but it couldn’t show what’s inside most phones, laptops and mice. And, yes, it didn’t make clothes see-through. Ben Geskin, who reported about the software update, also said that it didn’t see through any of the clothes they tested.
I’m sad that they decided to do this… I think it gives a unique feature to OnePlus 8 Pro, and it didn’t see through any of clothes I tested..
OnePlus’ statement continued that it has “always placed user privacy at the highest level.” That’s why, “in order to eliminate all possible inconveniences caused to user privacy under extreme conditions,” it has “decided to temporarily disable this filter camera function through a software update.” It will be done pushing the update to its users within a week.
All products recommended by Engadget are selected by our editorial team, independent of our parent company. Some of our stories include affiliate links. If you buy something through one of these links, we may earn an affiliate commission.
BMW has dropped the curtain on its next-generation 4 Series coupe, the first member of what will become a broad family of revamped right-sized offerings.
To not mention the redesigned 4 Series’ new schnoz would be akin to staying mum on a two-ton elephant scattering canapés at a garden party, so let’s get started with that.
Spy photos, as well as a heavily foreshadowing concept coupe, told us we’d be in for a surprise when the new 4 Series debuted. Well, consider us rattled. Not since Jennifer Grey went under the knife has there been this much ink spilled about a new beak. It’s big, and it’s tall — so tall, in fact, that the lower air opening is forced to partial wrap itself around it, making for a partial grille-within-a-grille. On either side are aggressive (and large) side vents.
If BMW’s plan was to make sure the new 4 Series gets noticed, its designers certainly did their job. And it may very well be the right thing to do, given the need for any passenger car still on the market to attract the attention of buyers.
Overall, the 4 Series coupe grows in every direction. Compared to the outgoing model, the new car grows 5.2 inches in length, 1 inch in width, and boasts a 1.6-inch longer wheelbase. Front and rear tracks grow 1.4 and 1.2 inches, respectively. The roofline now reaches four-tenths of an inch closer to heaven. Beneath it all, a new CLAR platform lends the model additional stiffness.
Despite the larger footprint, the 4 Series coupe slips through the air with more ease, what with a coefficient of drag lowered from .29 to .25.
Out back, L-shaped LED taillights share fascia room with slits designed to mimic (mock?) the breathable front gills. This styling flourish was more impressive before it showed up on the Toyota Camry. Of course, choosing the M Sport Package will increase the presence of mesh both front and rear.
Regardless of whether you opt for the four-cylinder 430i or six-cylinder M440i xDrive, you’re in line for more power. The base turbocharged 2.0-liter four now makes 255 horsepower and 294 lb-ft of torque, up from 248/258. The 3.0-liter turbo inline-six now sports a 48-volt mild hybrid system and an output of 382 hp and 369 lb-ft — up from 320/330.
Offered with standard rear-drive or optional xDrive all-wheel drive in 430i form, the 4 Series coupe will be joined by a convertible and gran coupe (sedan) before long, while the upcoming i4 will ditch internal combustion altogether. All 4 Series coupe models carry an updated eight-speed automatic, with M440i xDrive variants donning an M Sport rear differential for even torque distribution to the rear wheels during quick takeoffs.
As seen on the recently revealed 5 Series, the six-cylinder’s mild hybrid system will shut the engine off at 9 mph when braking to a stop. Under hard acceleration, the starter-generator can add 11 hp to the fray. Fuel economy for either engine is TBD.
Inside the cabin, drivers will be greeted by an analog gauge cluster, assuming they haven’t sprung for the 12.3-inch digital display. Found as standard fare in all 4 Series models are a healthy list driver-assist features; among them, lane departure warning with steering correction, pedestrian warning with braking function, automatic emergency braking, blind spot monitoring and rear cross traffic alert, rear collision preparation, and automatic high beams.
The rear seat is still a two-person affair, now with a threesome of pass-throughs for hauling large objects in the trunk.
Hitting global markets in October, the 2021 4 Series carries a U.S. base price of $45,600 (before destination) for the 430i Coupe, $47,600 for the 430i xDrive Coupe, and $58,500 for the M440i xDrive Coupe.
A new ransomware threat, a warning for GitHub users and Apple security updates.
Welcome to Cyber Security Today. It’s Wednesday June 3rd. I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.
For an organization being infected with ransomware is scary. Ransomware scrambles corporate data, with the criminals demanding money to get the decryption key. But a hacking group has found a new weapon to add to it: The threat of auctioning off stolen data to other criminals. So pay up to get the decryption key or not only won’t you get access to your data, any data we also copied will be sold to others. Then you’ll look really bad to customers. One of the first victims is a Canadian agriculture services company. To convince the company the crooks really have stolen data they released a couple of documents. One is a loan application with the customer’s name, address, social insurance number and date of birth. That information can easily be used for impersonation. Organizations used to be able to protect themselves with data backups. No more. With this evolution there’s more pressure on victim firms to pay up. Ransomware has emerged as one of the biggest threats to companies and governments. The best way to fight it is by regularly training employees to slow down and think before clicking on attachments. Malicious attachments can carry ransomware. Another defence for firms to make sure employees use multifactor authentication on top of usernames and passwords for logging into systems and applications.
Bad news for software developers who use the GitHub website for open source projects: Some have been infected with malware. For those who don’t know GitHub is a place where developers can use open source tools for honing software code. Some developers also allow others to collaborate on projects in an open source process. But this week GitHub’s security team issued a warning that 26 open source projects using a development environment called Netbeans had been compromised. The malware that had been installed is called a backdoor. It would have allowed hackers to secretly get into whatever company had installed the final version of each software application and copy data. The application developers didn’t know their projects had been hacked. One problem with GitHub is some developers allow all or parts of their projects to be copied by others. If their code is infected, that spreads to other projects. So GitHub — which is now owned by Microsoft — scans code to warn of vulnerabilities. But GitHub developers also have to use security scanning tools of their own to make sure their code hasn’t been tampered with.
Police in New York Cityhave charged a man with conspiracy to engage in computer hacking, trafficking in stolen payment card numbers and money laundering. This comes after his arrest in March after flying into the city from Ukraine carrying computers and other digital media with hundreds of thousands of stolen credit and debit card numbers. It is alleged the man was part of a gang that hacked into systems to steal data and sell it on criminal websites.
Finally, Apple device owners including those with iPads, iPhones, Mac computers, Apple TVs and Apple Watches should make sure they’re receiving security patches. A big one was released this week that plugs a big hole that can be created if users jailbreak their operating system. Jailbreaking allows users to install custom tweaks and apps not sold in the Apple store. However, they can also create security vulnerabilities. This patch also erases any jail breaking that has been done. Also recently fixed is a problem with the ‘Sign in with Apple’ capability that allows users to sign into websites with their Apple devices. Skilled owners of Android devices can also jailbreak their smart phones and tablets. It’s a dangerous activity on any platform that should be avoided.
That’s it for Cyber Security Today. Links to details about these stories can be found in the text version of each podcast at ITWorldCanada.com. That’s where you’ll also find my news stories aimed at businesses and cybersecurity professionals. Cyber Security Today can be heard on Mondays, Wednesdays and Fridays. Subscribe on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.
A proposed class-action lawsuit has been filed against Google for tracking users while they browse in Chrome’s Incognito mode.
Specifically, the lawsuit accuses Google of violating U.S. federal wiretapping laws by tracking users’ online activity, even in Incognito mode. Further, the complaint cites Google tools like Analytics, Ad Manager, smartphone and PC applications and website plugins, saying Google leverages them to monitor uses, even if they don’t click on any Google ads.
The lawsuit also says that “millions” of users who went online using Incognito mode since June 1st, 2016 have likely been affected.
The plaintiffs say that Google tracks and collects browsing data “no matter what safeguards” people use to protect themselves. Additionally, they argue that by tracking users in Incognito mode, Google intentionally deceives users into thinking they have control over the information they share with the company.
The lawsuit seeks $5 billion USD (roughly $6.76 billion CAD) in damages or at least $5,000 USD (about $6,758 CAD) per affected user for violations of the U.S. wiretap and California privacy laws.
In a statement to The New York Times, Jose Castaneda, a Google spokesperson, disputed the claims. You can read the statement in full below:
“Incognito mode in Chrome gives you the choice to browse the internet without your activity being saved to your browser or device. As we clearly state each time you open a new incognito tab, websites might be able to collect information about your browsing activity during your session.”
Is Incognito really that private?
It’s worth noting that Chrome does, in fact, warn users when they open an Incognito session in Chrome. When you open an Incognito tab, Chrome lists what it won’t save while you’re using Incognito and what websites can still see. That includes:
Further, Chrome’s Incognito mode has long been the subject of privacy concern. In 2018, a report detailed how Google could de-anonymize collected data from Incognito browsing if users signed into their Google accounts after visiting a site with a Google tool like DoubleClick.
At the time, a Google spokesperson said that the company doesn’t de-anonymize data like that. However, the possibility for Google to do so remains a concern, even if it doesn’t.
More recently, Google had to fix a loophole in Chrome’s Incognito mode that allowed websites to determine if a user was browsing in Incognito mode. Web pages that use a paywall feature, such as a free article limit, tended to use it to prevent Incognito users from bypassing the cap.
However, in fixing the loophole, Google created more ways for websites to determine if someone was in Incognito.
Ultimately, this lawsuit is something to keep an eye on, but I’m not sure it has merit. It’s hard to claim that Google intentionally misled users when it clearly states the limits of the Incognito feature. However, that’s not to say that Google and Chrome’s privacy issues shouldn’t be investigated. The search giant has long used its apps, ad systems and more to track users’ browsing data. However, specifically targeting Incognito mode may not be the best way to go about it.
Privacy & Cookies Policy
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.