Want to see something crazy? Open this link on your phone with WiFi turned off.

But what these services show us is even more alarming: US telcos appear to be selling direct, non-anonymized, real-time access to consumer telephone data to third party services — not just federal law enforcement officials — who are then selling access to that data.

Source: Want to see something crazy? Open this link on your phone with WiFi turned off.

The Next Generation of Wireless — “5G” — Is All Hype.

“5G” is a marketing term. There is no 5G standard — yet. The International Telecommunications Union plans to have standards ready by 2020. So for the moment “5G” refers to a handful of different kinds of technologies that are predicted, but not guaranteed, to emerge at some point in the next 3 to 7 years. (3GPP, a carrier consortium that will be contributing to the ITU process, said last year that until an actual standard exists, “’5G’ will remain a marketing & industry term that companies will use as they

Source: The Next Generation of Wireless — “5G” — Is All Hype. — Backchannel

Americans abandoning wired home Internet, study shows

In plain English, they’re abandoning their wired Internet for a mobile-data-only diet — and if the trend continues, it could reflect a huge shift in the way we experience the Web.

Source: Americans abandoning wired home Internet, study shows | The Seattle Times

Seventeen percent of households making between $75,000 and $100,000 are mobile-only now, compared with 8 percent two years ago. And 15 percent of households earning more than $100,000 are mobile-only, versus 6 percent in 2013.

Company Tracks Iowa Caucusgoers by their Cell Phones

When you open an app or look at a browser page, there’s a very fast auction that happens where different advertisers bid to get to show you an ad. Their bid is based on how valuable they think you are, and to decide that, your phone sends them information about you, including, in many cases, an identifying code (that they’ve built a profile around) and your location information, down to your latitude and longitude.

Source: Company Tracks Iowa Caucusgoers by their Cell Phones – Schneier on Security

The First Ubuntu Phone Won’t Rely On Apps. Here’s Why That’s Brilliant

“We’re producing an experience where content and services come directly to the screen in an unfragmented way,” says Cristian Parrino, VP of Mobile at Canonical. “It makes for a much richer and faster user experience

via The First Ubuntu Phone Won’t Rely On Apps. Here’s Why That’s Brilliant | Fast Company | Business + Innovation.

Upgrade to LTE Will Let Phones Talk without Cell Towers, Allowing New Forms of Social Apps and Advertising

Facebook is exploring how the technology could be used with its mobile app. “LTE Direct would allow us to create user experiences around serendipitous interactions with a local business or a friend nearby,” said Jay Parikh, Facebook’s vice president of infrastructure engineering. “You could find out about events or do impromptu meet-ups.”

via Upgrade to LTE Will Let Phones Talk without Cell Towers, Allowing New Forms of Social Apps and Advertising | MIT Technology Review.

However, carriers will control which devices on their networks can use LTE Direct because it uses the same radio spectrum as conventional cellular links. Wireless carriers might even gain a new stream of revenue by charging companies that want to offer services or apps using the technology, Qualcomm says.

Hacking Gmail with 92 Percent Success

The researchers monitor changes in shared memory and are able to correlate changes to what they call an “activity transition event,” which includes such things as a user logging into Gmail or H&R Block or a user taking a picture of a check so it can be deposited online, without going to a physical CHASE Bank. Augmented with a few other side channels, the authors show that it is possible to fairly accurately track in real time which activity a victim app is in.

There are two keys to the attack. One, the attack needs to take place at the exact moment the user is logging into the app or taking the picture. Two, the attack needs to be done in an inconspicuous way. The researchers did this by carefully calculating the attack timing.

via UCR Today: Hacking Gmail with 92 Percent Success.

The researchers created three short videos that show how the attacks work. They can be viewed here: http://bit.ly/1ByiCd3.

Apple and IBM Team Up to Push iOS in the Enterprise

Apple and IBM will collaborate on building a new class of applications specifically tailored for certain industries, including retail, health care, banking, travel and transportation. The first of those applications will be available in the fall and will be released into next year.

via Apple and IBM Team Up to Push iOS in the Enterprise | Re/code.

How MIT and Caltech’s coding breakthrough could accelerate mobile network speeds

An RLNC transmission can recover from errors with neither sender nor receiver retaining and updating transmission-state information and requesting lost packets to be retransmitted. This is because RLNC can recreate any packet lost on the receiving side from a later sequenced packet. In over-simplified terms, each RLNC encoded packet sent is encoded using the immediately earlier sequenced packet and randomly generated coefficients, using a linear algebra function. The combined packet length is no longer than either of the two packets from which it is composed. When a packet is lost, the missing packet can be mathematically derived from a later-sequenced packet that includes earlier-sequenced packets and the coefficients used to encode the packet.

Since the RLNC encoding sender doesn’t need to listen for acknowledgements of successful transmission and perhaps retransmit, the sender can continuously transmit at near-wire speed optimized for latency and network throughput.

via How MIT and Caltech’s coding breakthrough could accelerate mobile network speeds.

Update:  After posting this I remembered I had read about an algorithm recreating earlier lost packets from future packets.  So I clicked on the mit tag and on 10/25/2012 I posted this blurb:  A Bandwidth Breakthrough

… The technology transforms the way packets of data are sent. Instead of sending packets, it sends algebraic equations that describe series of packets. So if a packet goes missing, instead of asking the network to resend it, the receiving device can solve for the missing one itself. …

That must mean they’re still working on it.

When Will Google Try to Make Android More Profitable?

Despite Android’s size, do advertisers and developers really see the OS as the most effective platform for their (monetary) needs? A new study by ad-buyer Nanigans suggests that Facebook ads on the iPhone generate 1,790 percent more return than equivalent advertising on Google Android (hat tip to VentureBeat for the link). “Retailers are realizing significantly greater return from audiences on iOS than audiences on Android,” that study reported.

via When Will Google Try to Make Android More Profitable?.