Connect with us

Delhi

OnePlus’ latest flagship arrives May 22 for $529

OnePlus has never been the flashiest or most cutting edge — the Chinese company has mostly left that stuff to the Apples and Samsungs of the world. But in spite of some stumbles along the way, the upstart smartphone manufacturer has consistently delivered one of the best deals in mobile, a trend it most definitely maintains with the OnePlus 6.

Due out on May 22, with a starting price of $529, the new handset continues the company’s trend of definitely being ever-so-slightly behind the flagship smartphone curve, for the sake of keeping costs down. The handset does borrow a few cues from recent handsets, including, notably, the embrace of the top notch.

The company concedes that the cutout is an inevitability on handsets these days, particularly with Google’s newfound embrace through Android P. Though here it also arrives alongside the company’s largest-ever display, measuring 6.28 inches, at a 19:9 aspect ratio. Of course, OnePlus’ decision to focus on a single handset at a time means a single size option.

For some longtime fans, that might fly in the face of the company’s “never settle” mantra, but at this point in the smartphone game, it probably makes the most sense for a company of OnePlus’ size to focus on a single model. Besides, the company has managed to fit a fair amount of screen into a relatively small form factor, keeping it roughly the same footprint as the OnePlus 5T.

The design language has also been adjusted a bit, this moving to Gorilla Glass 5 on the back (same as the front), which looks nice and also makes it better for those radio waves to pass through. That backing comes in three different colors, including Mirror Black, Midnight Black and a snazzy Pearl White, which have limited availability, depending on the specific SKU.

This being a 2018 flagship, the OnePlus 6 sports dual rear-facing cameras, though the orientation has shifted to vertical. The sensors measure 16- and 20-megapixels, with improved optical image stabilization and improved shooting in the low-light settings — not quite as low-light as offered up on the latest Huawei and Samsung devices, however; ditto for the slow-motion feature, which doesn’t match the super-slow-motion offerings recently rolled out by Sony and Samsung.

The front-facing camera is getting a software upgrade, as well, bringing the faux bokeh portrait mode to selfies, courtesy of some on-board AI. The phone maintains the super-fast fake unlock you’ll find on other recent OnePluses — as ever, the caveat there is not to make that the primary unlock method. It’s not nearly as secure as handsets that use depth sensing to face unlock. Sure is fast, though.

OxygenOS is still the heart of the software experience here. As ever, the key is keeping the company’s proprietary Android skin as much in the background as possible, and using OnePlus’ actively online community as a sounding board for new features through the beta program. There’s not really a lot new to announce on the software front this time out, however, though the company’s done a good job rolling out updates to handsets after release.

Inside is a Snapdragon 845 — the latest flagship chip from Qualcomm. The base system is loaded with 6GB of RAM and 64GB of storage. Another $50 will get you 8GB of RAM and double the storage. Bumping things up to 256GB of storage, meanwhile, will cost another $50.

News Source = techcrunch.com

Continue Reading
Click to comment

Leave a Reply

Atlanta

A simple solution to end the encryption debate

Criminals and terrorists, like millions of others, rely on smartphone encryption to protect the information on their mobile devices. But unlike most of us, the data on their phones could endanger lives and pose a great threat to national security.

The challenge for law enforcement, and for us as a society, is how to reconcile the advantages of gaining access to the plans of dangerous individuals with the cost of opening a door to the lives of everyone else. It is the modern manifestation of the age-old conflict between privacy versus security, playing out in our pockets and palms.

One-size-fits all technological solutions, like a manufacturer-built universal backdoor tool for smartphones, likely create more dangers than they prevent. While no solution will be perfect, the best ways to square data access with security concerns require a more nuanced approach that rely on non-technological procedures.

The FBI has increasingly pressed the case that criminals and terrorists use smartphone security measures to avoid detection and investigation, arguing for a technological, cryptographic solution to stop these bad actors from “going dark.” In fact, there are recent reports that the Executive Branch is engaged in discussions to compel manufacturers to build technological tools so law enforcement can read otherwise-encrypted data on smartphones.

But the FBI is also tasked with protecting our nation against cyber threats. Encryption has a critical role in protecting our digital systems against compromises by hackers and thieves. And of course, a centralized data access tool would be a prime target for hackers and criminals. As recent events prove – from the 2016 elections to the recent ransomware attack against government computers in Atlanta – the problem will likely only become worse. Anything that weakens our cyber defenses will only make it more challenging for authorities to balance these “dual mandates” of cybersecurity and law enforcement access.

There is also the problem of internal threats: when they have access to customer data, service providers themselves can misuse or sell it without permission. Once someone’s data is out of their control, they have very limited means to protect it against exploitation. The current, growing scandal around the data harvesting practices on social networking platforms illustrates this risk. Indeed, our company Symphony Communications, a strongly encrypted messaging platform, was formed in the wake of a data misuse scandal by a service provider in the financial services sector.

(Photo by Chip Somodevilla/Getty Images)

So how do we help law enforcement without making data privacy even thornier than it already is? A potential solution is through a non-technological method, sensitive to the needs of all parties involved, that can sometimes solve the tension between government access and data protection while preventing abuse by service providers.

Agreements between some of our clients and the New York State Department of Financial Services (“NYSDFS”), proved popular enough that FBI Director Wray recently pointed to them as a model of “responsible encryption” that solves the problem of “going dark” without compromising robust encryption critical to our nation’s business infrastructure.

The solution requires storage of encryption keys — the codes needed to decrypt data — with third party custodians. Those custodians would not keep these client’s encryption keys. Rather, they give the access tool to clients, and then clients can choose how to use it and to whom they wish to give access. A core component of strong digital security is that a service provider should not have access to client’s unencrypted data nor control over a client’s encryption keys.

The distinction is crucial. This solution is not technological, like backdoor access built by manufacturers or service providers, but a human solution built around customer control.  Such arrangements provide robust protection from criminals hacking the service, but they also prevent customer data harvesting by service providers.

Where clients choose their own custodians, they may subject those custodians to their own, rigorous security requirements. The clients can even split their encryption keys into multiple pieces distributed over different third parties, so that no one custodian can access a client’s data without the cooperation of the others.

This solution protects against hacking and espionage while safeguarding against the misuse of customer content by the service provider. But it is not a model that supports service provider or manufacturer built back doors; our approach keeps the encryption key control in clients’ hands, not ours or the government’s.

A custodial mechanism that utilizes customer-selected third parties is not the answer to every part of the cybersecurity and privacy dilemma. Indeed, it is hard to imagine that this dilemma will submit to a single solution, especially a purely technological one. Our experience shows that reasonable, effective solutions can exist. Technological features are core to such solutions, but just as critical are non-technological considerations. Advancing purely technical answers – no matter how inventive – without working through the checks, balances and risks of implementation would be a mistake.

News Source = techcrunch.com

Continue Reading

Delhi

Delhi Max Hospital twin baby case: Police seek legal opinion after DMC rules out hospital's negligence

A senior officer, privy to the probe, said they were studying the report to ascertain the future course of action.

Continue Reading

Delhi

More than two child rape cases daily in Delhi, experts call for policy for rehabilitation

Till April 30, 282 cases of child rape were reported as opposed to 278 last year during the same period.

Continue Reading

Most Shared Posts

Follow on Twitter

Trending