Last Active
  • Wemo Smart Video Doorbell review: The new HomeKit doorbell of choice

    AppleZulu said:
    mike1 said:
    AppleZulu said:
    mike1 said:
    ionicle said:
    Total Fail. Need a battery version. 
    Sorry, but so many people these days do not have wires for their doorbells. No new houses in the UK have wires installed. 
    Yes and no, i currently have a wireless one and changing the battery is a chore, im willing to whip out the drill and get some
    calking/silicone and do an install….. only has to be done once and then no more battery changes!

    From where would you get power? Drilling the hole is easy. Wiring is the pain-in-the-butt part.

    I too would like a battery-operated version. I already keep a spare battery for my Ring and swap out every 4-6 weeks. I wouldn't mind doing it more often if necessary to have this camera's functionality.
    It's my understanding that Apple's protocol for HomeKit precludes battery powered cameras. I believe this is due to the facial/object/pattern recognition activity used to trigger various functions, which means the camera is always active and looking, so batteries would drain fairly quickly. While you individually are o.k. with frequent battery changes, the inevitable resulting customer complaints and dissatisfaction for short battery life would be inconsistent with Apple's ethos. 

    Thanks for the response. May be a requirement for Secure Video to function, but I have several Arlo cameras that are battery operated. I use the solar panels to keep them charged, but they are recognized as battery powered and work through HK (not with Secure Video, though. I think that was Arlo's choice as they sell their own service.)
    I have some Arlo cameras with solar panels as well. I think plugging them into the solar panels 'tricks' HomeKit into seeing them as wired to the mains. I don't think HomeKit can see the difference, so long as the camera is plugged into an external power source. You're correct about Arlo's non-participation in HK Secure Video. I'm a little surprised they haven't totally forced the issue and eliminated the free tier option for using their cloud recording service if you have five or fewer cameras. 
    Eufy do HSV battery cameras. They work well, with or without the solar power option.  
  • Apple execs explain why you should use Apple Maps over competitors

    collin said:
    I love the street light icons in the intersections.  Makes judging distance to a turn so much easier.  But my only issue is that i can't find a way to set that it to always uses the fastest route.  I have a number of places that i go that are quicker if i take a toll road.  But apple maps always works so hard to make me navigate around them.  Even if i change the route at the start, by the time i get there, it has updated to navigate around the toll road normally adding time to my trip.  

    Please give me a setting that always picks the fastest route. 

    Just worth checking you have Avoid Tolls turned off?
  • Apple execs explain why you should use Apple Maps over competitors

    Identifying the correct destination is definitely a weak area.

    plus why does the new version make it so hard to swap from overview to turn by turn!? There used to be a nice giant one tap at the top. Not so now. Try zooming in a little on overview and then getting back to turn by turn at a junction; too many taps of tiny buttons. Awkward. 
  • NSO Group's exploits rival those of nation states, security researchers say

     h4y3s said:
    Anyone have more details?

    Here is the first part of the deep dive:

    to over-simplify it (because it truly is a nation-state level hack.)
    1. Overflow in a seldom used dependency that is actioned prior to blastdoor.
    2. That overflow is carefully manipulated to utilise certain features of an image decompressor to establish a basic set of operators (AND/OR/XOR etc.) These are the fundamental building blocks of electronics circuits, aka processing on a computer.
    3. Those building blocks are then used to build (I'm not joking) a full computer architecture including registers, a full 64-bit adder and comparator which then runs the relevant scripts to boot strap the next stage of the hack.
    4. The article stops here, but the next part will detail how this is used to break through the relevant sandboxing to the installation of the spyware.

    The fragility of it is exceptional, but the time and cost to develop such an exploit is what's more remarkable. It also forms a good argument about removing seldom used features and retiring old standards. The JBIG2 format provided the necessary tools for this exploit to run, but also is largely irrelevant and seldom used. It may just be better to remove that functionality altogether. (JBIG2 decoding is included as part of support for PDFs.)

    Edit: Just as follow-up, Apple made a number of changes to address this entry method. Moving more areas to inside Blastdoor as well as greatly restricting the number of available formats available for Messages (i.e. just the ones it's meant to support.)
    great summary! Loved the article. Just to add, at step 3 they use their homemade computer to search memory to find their next exploit step. Scary and so clever.
  • Clubhouse hides account bios, images to protect Afghan users

    Sounds good. But, isn’t there a slippery slope here the the Internet Archive is being subverted. If for this? What other awkward content might disappear?