Autodefentsa Digitala

Total Page:16

File Type:pdf, Size:1020Kb

Autodefentsa Digitala AUTODEFENTSA DIGITALA # 254 PRIBatutasunaREN ALDEKO Bataila EGILEA I LANDER ARBELAITZ MITXELENA AZALA I JOSEBA LARRATXE JOSEVISKY elefono mugikorra bilakatu da mun- rru bilakatu da. Eta galdera da: telefonoa beti duarekin harremanetan jartzeko gure gainean eramateari uzteaz gain, zer egin deza- bitartekaria. Behinola deiak egiteko ke masiboki zelatatutako gizarte batean bizi erabiltzen zen aparailuarekin ia dene- dela konturatu den herritarrak? Segurtasun Ttik egiten dugu orain. Ez da txantxetako kontua: digitaleko adituen ikuspegia eta aholku zen- telefono hauek beren jabeen informazio anda- bait eskaintzen saiatuko gara Larrun hone- na gordetzen doaz barnean, izan kontaktuen tan, aparteko koadroetan, erabilgarriak diren zerrendak, argazkiak, elkarrizketak, e-mai- aplikazio, zerbitzu eta lotura interesgarriekin lak, sarean bilatu dituen hitzak, ikusi dituen batera. Batez ere telefonoa aztertuko dugu gai- lu gisa, gure bizitzetan duen garrantziagatik, - ordenagailu eramangarrien, tableten eta bes- maziobideoak, oso fisikoki sentibera, bisitatu hirugarren dituen pertsona lekuak, batek sare telako asmakizunen aurretik. (baimeniksozialetako gabe) profilak, eskuratuz oharrak, gero, agendak... jabearen infor erre- Criptica-ko kideek Resistencia Digital libu- tratu zehatza egiteko moduko bilduma. Pertso- ruan dioten bezala, segurtasuna beti izan da na bat bere bizitzako azken hiru hilabeteetan non egon den baldin badakizu, adituen arabera, eta inbasiboagoa zaigun ingurune digitalean, %93ko eraginkortasunarekin aurreikus deza- arduragabekeriadirdira handirik handiagabeko litzateke ofizioa, antolatubaina geroz du- kezu non egongo den hurrengo hiruetan. Au- ten egitura zertan ari den jakingo ez bagenu rreikus dezakezu nora joango den, guk geuk ere bezala jokatzea. Gainera, segurtasunaren kul- tura garatzea erronka kolektiboa da, bestela, Pribatutasunaren defentsa, honenbestez, alferrikakoa da. Azken batean, kontua hau ere, gizaidentifikatu eskubideen gabeko aldeko patroien beste bidez. borroka espa- erabat politikoa da. LARRUN HIlaBETEKARI MONOGraFIKOA · ARGIAren 2.696 zenbakiarekin banatua. JABEA: KOMUNIKAZIO BIZIAGOA S.A.L. HELBIDEA: ZIRKUITU IBILBIDEA, 15. PABILOIA 20160 LASARte-ORIA TELEFONOA: (00 34) 943 37 15 45 POSTA ELEKTRONIKOA: [email protected] INPRIMATEGIA: ANTZA KOMUNIKAZIO GRAFIKOA DISEINUA: MAITANE GARTZIANDIA 2020ko uztailaren 26a 2020ko uztaila ERREPORTAJEA AUTODEFENTSA DIGITALA І 3 eitu norbaiek telefono ho- sotzeko aukera izateak esan nahi du Txina, Turkia eta Espainia, hego eus- netara eta baiezta dezagun gailu hori etengabe inguruko antena kalerritarrentzat zoritxarrez. tonoa ematen duela”, hasi batera dagoela konektatua. Norma- Tailerra ematera joandako gaz- da hacktibista segurta- lean altueran egoten dira, mendi edo teak errieta egin die gainontzeko Dsun digitalari buruzko ikastaroan, eraikinen gainean. Konexiorik gabe, ekintzaile sozialei, aurpegiratuz ea protesta sozialen astean Donostian ezin deirik egin edo jaso. Pertsona zergatik eramaten duten mugiko- okupatutako eraikinean. Bai, bada- bat leku batetik bestera mugitzen rra etengabe leku guztietara poltsi- bil, telefonoan deia sartu da, doi- denean, automatikoki antena batetik koan, baita legea haustea dakarten nu bizia horren froga. “Orain hartu bestera konektatzen doa, telekomu- ekimen politikoak egitean ere. Zein aluminiozko papera eta ikus deza- nikazio enpresen datu-baseetan ko- da kontua? Engantxatuta gaude? gun zer gertatzen den mugikorra kalekuaren arrastoa utziz. Enpresa Gehienek baietz ttiki bat egin dute inguratzen badugu, ogitartekoa bai- hauek guztiek, Europar Batasunean buruarekin, begirada desbideratzen litzan. Ea ba, hots egin berriro me- behintzat, legez bi urtez gorde behar dutela. Zilarrezko paperez ingura- sedez”. Aho zabalik geratzear dira dituzte erabiltzaileen geoposizio tuta telefonoaren seinalea etetean, eszenari begira dauden 20 parte erregistroak, eta zenbait estatutan behintzat, arrastoa desagertarazten hartzaileak. Telefono hau itzalita gobernuak bere buruari aitortua dio da; nahiz eta arrastorik gabe gera- edo seinalerik gabe dago. eskumena azpiegitura hauek esku tzea bera edo telefonoa etxean uz- Telefono mugikorretik egunaren hartzeko inolako agindu judizialik tea ere, susmagarri bilakatzen ari edozein unetan dei bat egin edo ja- gabe. Estatu horien artean daude den mundu orwelldar honetan. LONDRESEN ZELATAREN AURKAKO MURALA. Herritarrak gehien kontrolatzen dituzten hirietako bat da Ingalaterrako hiriburua. 2020ko uztaila 4 І AUTODEFENTSA DIGITALA ERREPORTAJEA NOLA EGIN AURRE ZELATARI? Dabid Martinez bermeotarrak ongi DABID MARTINEZ daki zertaz ari garen. Jakin bada- Hack.in#badakigu-ko kidea. kigu ahoskatzen den Hack.in#ba- dakigu informatika elkarte askeko kidea da, hacktibista/aktibista eta blogaria ere bai ARGIAn, besteren artean. Pribatutasunaren gaia kez- ka handiz bizi du, eta herritarren artean kontzientzia pizteko inurri lanean ari dira elkartean, hitzaldi eta tailerrak antolatuz. Taldea ha- siera batean Bermeon sortu bazen D ere, denborarekin zabaltzen joan A B da, Euskal Herri mailan halako era- ID M gile baten falta sumatu ostean. ARTINEZE “Burujabetza teknologikoa lan- tzen duen informatika taldea gara, K herritik eta herriarentzat sortua eta UTZIA euskaraz egiten dugu lan. Argi dugu teknologia ez dela gauza neutroa, teknologiaren parterik garrantzi- garen kontrako bidea egiten, trans- raztea pribatizazioaren logikarekin tsuena politika dela”. Urteak dara- nazionalei emanez diru publikoa”. bat datorren erabaki politikoa dela matzate software librea, Copyleft-a, Bermeotarrak argi du erakunde ikus daiteke. GAFAM plataformak hardware eta jakintza irekiak gisa- publikoetatik burujabetza tekno- sartzen ari dira [Google, Apple, Fa- ko gaiak lantzen. Azken aldian Pri- logikoa eta software librea bultza cebook, Amazon eta Microsoft izen- batutasunaren Behatokia proiek- behar direla, hori dela bide bakarra datzeko erabiltzen den akronimoa] tuan ari dira lanean. eskoletan, ospitaleetan edo admi- “Oso arduratuta nauka, adibidez, nistrazioan erakunde publikoen la- hezkuntzan Chromebook-ekin ger- guntzarekin, Euskal Herrian eta ia tatzen ari denak. Pentsaezina da mundu osoan. eskola bateko jantokia Mc Donalds Politika beraren erakusgarri da eta Burger Kingen artean banatzea. TEKNOLOGIA EZ DA artikulu honetan aurrera doan ira- Orduan, nola onar daiteke erakun- kurleari zuzenean eragiten dion GAUZA NEUTROA, de publikoek ikasleen informatika eta oso isilean pasa den kontu bat: Microsoft eta Googlen esku uztea? TEKNOLOGIAREN 2014tik Eusko Jaurlaritzak euska- Multinazionalen tresna hauek de- PARTERIK razko hedabideak behartzen ditu pendentzia sortzen dute, zaharki- GARRANTZITSUENA Google-i irakurleen datu guztiak tzea programatuta dakarte, ez dau- ematera, doakoa den [eta beraz pro- POLITika da” de euskaraz %100ean, eta gainera, duktua zu zeu zaren] Google Analy- milaka ikasleren datuak ematen DABID MARTINEZ tics zerbitzua ezartzeko exijituz dizkiete multinazionalei”. euskara sustatzeko diru-laguntzak Martinezek salatzen du Eusko jasotzeko baldintza gisa –eta gaine- Jaurlaritzaren aplikazio gehienak ra, Eusko Jaurlaritzari pasahitzare- ez dabiltzala software librean, eta burujabe izan nahi duen herri ba- kin sarbidea ematera derrigortuz–. berak adibidez, ezin duela bere or- tentzat. Horren ordez, neoliberalis- Honela zioen, beste baldintza ba- denagailuan errenta aitorpena egin moaren doktrina enpresa pribatuen tzuekin batera, euskara hutsezko PDF dokumentuak sinatzeko ara- alde zerbitzu publikoak murriztea egunkari eta aldizkariek diru-lagun- zoak daudelako. “Software libreak eta pribatizatzea dela ulertuz gero, tzak eskatzeko deialdiak 2013an: gure herrian duen gihar enpresa- erakunde publikoetatik interneten “Agerian edo ezkutuan egongo den rial eta sozialarekin, harrigarria da jabe diren multinazionalak oina- bisita-neurgailua eduki behar dute”. hor inbertitu beharrean, nola ari rrizko zerbitzu guztien jabe egina- Irizpidea aldatu zuten 2014an, eta 2020ko uztaila 5 Pribatutasuna errespetatzen duten aplikazioak ITURRIA: Resistencia digital, Criptica. F-DrOID SIGNAL FIREFOX OPEN KEYCHAIN ANDROIDEKO GOOGLE PLAY WHATSAPP ETA WEB NABIGATZAILEA EMAIL ZIFRATUAK BIDALI STore-ren ALTERNATIBA TELEGRAMEN ALTERNATIBA Mozilla fundazioak garatua, ETA JASOTZEKO SEGURUA Lizentzia librean eta kodea diru irabazi asmorik gabe eta PGP gakoen kudeatzailea modu publikoan erakusten Mezuak eta deiak zifratuta pribatutasunarekin eta kultura Androidentzat. K-9 Mailekin duten aplikazioak soilik egiteko aukera ematen du. librearekin konprometitua. bateragarria da. eskaintzen ditu. STANDARD NOTES KEEPASSDROID / OBSCURACAM MINIKEEPASS OHARRAK HARTZEKO APLIKAZIO SEGURUA ARGAZKI APLIKAZIOA PASAHITZEN KUDEATZAILEA ANDROIDENTZAT Idazten diren ohar guztiak zifratu Pasahitzak datu base zifratuan gordetzeko. egiten ditu defektuz, hornitzaileak Argazkiak atera edo editatzeko aukera pasahitz ezberdinak jarri eta buruz ikasi ere ezin du zure informazioa irakurri. ematen du. Ateratako argazkiei behar ez izateko erabiltzen da. Gailu guztiak modu seguruan zuzenean ezabatzen dizkie metadatuak. sinkronizatzeko aukera ematen du. OSMAND K-9 MAIL DAVX5 GOOGLE MAPS-en ALTERNATIBA E-POSTA KUDEATZAILEA ANDROIDENTZAT GOOGle-en EGUTEGIAREN ANDROIDENTZAT OpenStreetMap proiektuko mapa ALTERNATIBA Edozein e-mail helbide jar daiteke, beraz, irekiak erabiliz, autoz, bizikletan eta zerbitzu etiko batekin erabiliz gero, Kode irekiko proiektua da hasieratik, oinez egiteko ibilbideen azalpenak pribatutasunean jauzi erraldoia emateko nahi duzun pertsonarekin informazioa ematen ditu.
Recommended publications
  • Augmented Reality
    Augmented Reality: A Review of available Augmented Reality packages and evaluation of their potential use in an educational context November 2010 Stephen Rose Dale Potter Matthew Newcombe Unlocking the Hidden Curriculum University of Exeter Learning and Teaching Innovation Grants (04/08) 2 Contents 1. Augmented Reality Page 4 2. Augmented Reality in Education 6 3. Augmented Reality Applications 8 3.1 Marker-based Augmented Reality 8 3.2 Markerless Augmented Reality 10 4. Available Augmented Reality Technologies 12 4.1 Current Smartphone Ownership Patterns 12 4.2 Platforms 16 4.3 AR Software 19 5. Technical Considerations 22 5.1 Limitations of Current Platforms 24 6. Choosing an Augmented Reality System 24 7. Glossary 28 8. References 29 9. Appendix 1: Unlocking the Hidden Curriculum - a JISC- 31 funded Learning and Teaching Innovation Project at the University of Exeter This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 2.0 Licence. To view a copy of this licence, visit: http://creativecommons.org/licenses/by-nc-sa/2.0/uk or send a letter to: Creative Commons, 171 Second Street, Suite 300, San Francisco, California, 94105, USA. 3 1. ‘Augmented Reality’ Every now and again a ‘new technology’ appears which seems to capture the public imagination. Invariably the technology enables a new means of interacting with screen-based entertainment or a computer game - 3DTV, the Nintendo Wii. The proliferation of so-called ‘smartphones’ with their abilities to run once-complex computer applications, in-built cameras and ‘GPS’ capability has unleashed the potential of ‘Augmented Reality’ – to date a regular feature of science fiction or ‘near future’ movies.
    [Show full text]
  • The Usage of Smartphone and Mobile Applications from the Point of View of Customers in Poland
    information Article The Usage of Smartphone and Mobile Applications from the Point of View of Customers in Poland Witold Chmielarz Faculty of Management, University of Warsaw, 00-927 Warsaw, Poland; [email protected] Received: 20 March 2020; Accepted: 15 April 2020; Published: 17 April 2020 Abstract: The main objective of this article was to identify the conditions for the use of smartphones and mobile applications in Poland in the second half of 2018. The scope of the present analysis was limited to a selected sample of more than 470 respondents, and it examined the group of the most active users of smartphones and mobile applications. The author adopted the CAWI (computer associated web interview) method, which was previously verified by a randomly selected pilot sample, in his study. The obtained results were compared with the findings of other studies. They indicated that users of smartphones and mobile applications in Poland do not differ in their assessments from users in Europe and around the world. In this context, the key implication for researchers is the identified level of development of the use of smartphones and mobile applications in Poland at the end of 2018. The main limitation of the research was the selection of the research sample, which consisted only of members of the academic community. The scope of this article aimed to fill a gap in terms of the quantitative and qualitative methods that are applied to examine the use of mobile devices and mobile software. At the same time, this study creates the foundations for further research on intercultural differences.
    [Show full text]
  • Bancontact Payconiq Company
    Bancontact Payconiq Company SEPA Rulebooks Scheme Manuals Remote Domain 46D0 – Schedules 1, 2, and 3 – News 64 Mobile App Security Guidelines Android, iOS Newsletter 64 Classification: Confidential Confidential COPYRIGHT This document is confidential and protected by copyright. Its contents must not be disclosed or reproduced in any form whatsoever without the prior written consent of Bancontact Payconiq Company sa/nv. Except with respect to the limited license to download and print certain material from this document for non-commercial and personal use only, nothing contained in this document shall grant any license or right to use any of Bancontact Payconiq Company sa/nv’s proprietary material. AUTHORS This monthly newsletter is written by NVISO Labs, experts in mobile security, on behalf of Bancontact Company sa/nv. ABOUT NVISO NVISO is a consultancy firm exclusively focusing on IT security. NVISO has a very clear sector focus with several references in the financial and governmental sectors. The Research and Development department of NVISO is NVISO Labs, whose goals are to allow our people to increase their skills and knowledge, to come up with innovative service offerings, to contribute to the security community, and to give valuable insights to our clients. The fundamental values of NVISO are client satisfaction, focus, entrepreneurship, innovation, and ability to adapt. Our mission is to be an innovative and respected partner for our clients. For more information, we are happy to refer you to our website: https://www.nviso.be.
    [Show full text]
  • Application Migration Guide - Bada C++ Application with Bada 2.0 to OSP-Compatible Tizen Application
    Application Migration Guide - bada C++ Application with bada 2.0 to OSP-compatible Tizen Application Except as noted, this content - excluding the Code Examples - is licensed under Creative Commons Attribution 3.0 and all of the Code Examples contained herein are licensed under Flora 1.0. For details, see the Content License. Application Migration Guide - bada C++ Application with bada 2.0 to OSP-compatible Tizen Application Table of Contents 1. Converting a bada Application to OSP-compatible Tizen Application ........ 5 1.1. System Migration ...................................................................................................................... 7 1.1.1. Case Sensitivity ........................................................................................................ 7 1.1.2. enum Type Size ........................................................................................................ 7 1.1.3. wchar_t Type Size ................................................................................................. 7 1.1.4. Member Variable Initialization .................................................................................. 7 1.1.5. malloc() Allocation ................................................................................................ 7 1.1.6. Strong Two Phase Construction Mechanism Check ................................................ 7 1.1.7. Pure Virtual Method Implementation ........................................................................ 8 1.1.8. LLVM Compiler ........................................................................................................
    [Show full text]
  • Edetailing With
    Sustainable Business Relationship Building Through Digital Strategy Solutions Development of Mobile Applications Overview . Introduction . History of Mobile Applications . Current State of Mobile Applications . The Future of Mobile Applications . Development Introduction • A mobile application (or mobile app) is a software application designed to run on smart phones, tablet computers and other mobile devices. History of Mobile Application The history of the mobile app begins, obviously, with the history of the mobile device. The first mobile phones had microchips that required basic software to send and receive voice calls. But, since then, things have gotten a lot more complicated. NX3 Mobile Application Development Services Native And Non-Native Frameworks Native Application Environment: . Android . iOS . Windows Phone 8 . BlackBerry 10 Non-Native Application Environment: . Phone Gap . Titanium Mobile Android . Based on the Linux kernel, Android started life as a proposed advanced operating system for digital cameras until the company realized that the market was limited compared to that for mobile phones. The Open Handset Alliance unveiled the Android operating system in 2007, nearly two years after Google’s acquisition of Android. The launch of Google’s foray into the mobile world was delayed by the launch of the iPhone, which radically changed consumers’ expectations of what a smartphone should do. IOS . Apple’s iPhone set the standard for the new generation of smartphones when it was first released in June 2007 with its touchscreen and direct manipulation interface. There was no native SDK until February of 2008 (Apple initially planned to provide no support for third-party apps). The iOS lineage started with Next STEP, an object-oriented multitasking OS from the late eighties developed by NeXT Computer (acquired by Apple in 1996).
    [Show full text]
  • Physical Cyber Threats: What Do Criminals Leave When They Break In?
    03 | 2021 issue 68 Cybersecurity adaptability Physical cyber threats: What do criminals leave when they break in? Tips for boosting the Sec part of DevSecOps Homomorphic encryption: Myths and misconceptions 03 insecuremag.com | issue 68 Table of contents page 04 Physical cyber threats: What page 42 Enable secure remote workspaces do criminals leave when they without trashing your entire IT break in? infrastructure page 07 Review: Group-IB Fraud Hunting page 45 Protecting productivity within the Platform disappearing perimeter page 19 The transportation sector needs a page 48 Closing the data divide: How to standards-driven, industry-wide create harmony among data approach to cybersecurity scientists and privacy advocates page 22 Tips for boosting the Sec part of page 50 industry news DevSecOps page 55 Database encryption: Protecting the page 24 security world crown jewels page 30 When it comes to vulnerability page 58 Can we put a stop to cyber harassment? triage, ditch CVSS and prioritize exploitability page 62 Preparing for the CMMC onslaught page 33 Homomorphic encryption: Myths page 65 For SOC teams, the analytics and and misconceptions automation hype is real page 38 How to motivate employees to page 68 Three ways MITRE ATT&CK can take cybersecurity seriously improve your organizational security Featured experts marc gaffan, CEO, Hysolate alex livshiz, Research Team Lead, SCA, Checkmarx balaji ganesan, CEO, Privacera greg martin, VP & GM of Security, Sumo Logic toni grzinic, Security Researcher nathaniel meron, CPO & CMO, C2A Security brian hajost, President & CEO, SteelCloud ganesh pai, CEO, Uptycs richard hughes, Head of Technical Cybersecurity nigel seddon, VP of EMEA West, Ivanti Division, A&O IT Group nigel thorpe, Technical Director, SecureAge Technology ellison anne williams, CEO, Enveil Visit the magazine website and subscribe at www.insecuremag.com Mirko Zorz Zeljka Zorz Berislav Kucan Editor in Chief Managing Editor Director of Marketing without permission.
    [Show full text]
  • Momentum Grows for Alternative Phone System Tizen 26 February 2013, by Peter Svensson
    Momentum grows for alternative phone system Tizen 26 February 2013, by Peter Svensson Yves Maitre, the executive in charge of handsets at Orange, France Telecom's wireless arm, said the carrier expects to launch Tizen phones in France this year and in developing countries next year. He spoke Tuesday to reporters and industry insiders at an event in Barcelona, Spain, on the sidelines of Mobile World Congress, the world's largest cellphone trade show. Sprint Nextel Corp. is a member of the Tizen Association, but it hasn't said if it has any plans to bring Tizen handsets to the U.S. Other major backers include Intel Corp. and Huawei Technologies Ltd., China's largest phone maker. Tizen phones will look and work much like Android phones, except that the familiar square app icons are round. By coincidence, that's the shape chosen for the Firefox OS, which was revealed in The junior league of smartphone operating Barcelona on Sunday. Phones from that project are systems is getting more competitive. Phones from also expected this year. yet another contender—Tizen—will go on sale this year with a view to eventually competing with the Both Firefox and Tizen are "open source" projects, industry leaders, Apple's iOS and Google's managed by non-profit associations. That means Android. the software is freely available to customize, giving phone carriers control over how the software works For now, Tizen will compete with another on the phones they sell. By contrast, Apple newcomer, Firefox OS, as well as Microsoft's maintains complete control over the workings of the Windows Phone and a revamped BlackBerry iOS software in iPhones.
    [Show full text]
  • Samsung Bada Developers' Day Session 1
    SamsungbadaDevelopers'Day Session1bada2.0:thenextwave *Justreleased *More3000APIs *Enrichedfunctions,ExtendedcoverageforFlashandwebdevelopers,Enhancedd evelopmenttoolsfordevelopers,Expandedbusinessopportunitiestosellers *Multitasking,WIFIdirect,NFC,PushNotifications,OpenAL,JavascriptFramew ork,HTML5,Extendedflashfunctions *DevelopmentTools:Emulator,Profiler,PerformanceAnalyzer *Business:InAppAds,InAppPurchase,SamsungApps *7Wavedeviceslaunchedtillnow *badadevicesmorepopularinEurope,Asia *badadevicesnotyetlaunchedinUS *bada2.0devicesWave3,WaveM,WaveY *NewUXServices:HomeScreen,LivePanel,ChatOn,FindMyMobile,SamsungApp s *badaAppdownloadtop5countriesFrance,India,Germany,China,Spain *badadeveloperprogram *Indialargestmembersatbadadevelopersite,2ndlargestinSDKdownload,3 rdlargestinAppSelling Session2bada2.0Device,UXandService *Stylishusers,Socialconnections,Myfirstsmartphone *GloballaunchfromOct2011 *Wave3,WaveX,WaveY(Entrysmartphoneforpeople) *badaphonesweresold5MLastyear,thisyear10M+ *SamsungAppsTryandplay(limitedperiodtrial),Rentandplay(payonlyfo rtheperiodyouuse),AppRecommendation Session3bada2.0SDKfeatures *EnhancedUIControlsColorpicker,Datetimepicker,ContextMenu,ListView ,SearchBar,ExpendableEditArea,FormandTabBar,Gallery *Clipboard,voiceenabled,WebApp *BasicsForm(Basic)ContainsHeader,TabBar,Footer *Keyframebasedanimation *Layoutusinglogicalorder *Dynamic/Relativelayoutbasedonresolutionofthescreen *WebcontrolsupportsCSS3,HTML5,JavascriptandJSON(Improvedfrombada1) *AbilitytouseThemes *Facerecognition,Expressions,Eyepositionetc.,canbetrackedandusediny
    [Show full text]
  • Mobile OS and Security Aspects
    …… Lecture 11 Market Overview of Mobile Operating Systems and Security Aspects Mobile Business I (WS 2015/16) Prof. Dr. Kai Rannenberg . Deutsche Telekom Chair of Mobile Business & Multilateral Security . Johann Wolfgang Goethe University Frankfurt a. M. Overview - Market Overview of Mobile Operating …… Systems and Security Aspects § The Market for mobile devices and mobile OS § Mobile OS unavailable to other device manufacturers § Overview § Palm OS § Apple iOS (Unix-based) § Manufacturer-independent mobile OS § Overview § Symbian platform (by Symbian Foundation) § Embedded Linux § Android (by Open Handset Alliance) § Microsoft Windows CE, Pocket PC, Pocket PC Phone Edition, Mobile § Microsoft Windows Phone 10 . § Firefox OS . § Security features of selected mobile OS . 2 Worldwide Smartphone Sales to End …… Users by Operating System (2009-2015) Market share Market . OS [Statista 2015a] 3 Worldwide Smartphone Sales to End …… Users by Operating System (Q2 2012) Android 64,2% Others 0,6% Symbian 5,9% Bada 2,7% BlackBerry OS 5,2% [Gartner2013] Windows 2,6% . iOS 18,8% . Android iOS Windows BlackBerry OS Bada Symbian Others 4 Worldwide Smartphone Sales to End …… Users by Operating System (Q2 2013) Android 79,0% Others 0,2% Symbian 0,3% Bada 0,4% BlackBerry OS 2,7% Windows 3,3% iOS 14,2% [Gartner2013] . Android iOS Windows BlackBerry OS Bada Symbian Others 5 Worldwide Smartphone Sales to End …… Users by Operating System (Q2 2014) Android 84,7% Others 0,6% BlackBerry OS 0,5% Windows 2,5% iOS 11,7% . Android iOS Windows BlackBerryBlackBerry OS Symbian Bada Others [Statista 2014a] 6 Worldwide Smartphone Sales to End …… Users by Operating System (Q2 2015) Android 82,8% Others 0,4% BlackBerry OS 0,3% Windows 2,6% iOS 13,9% .
    [Show full text]
  • Spb Tv Mobile Tv Solution
    SPB TV end-user Mobile TV service SPB TV MOBILE TV SOLUTION has more than Bring your TV service to the viewers’ fingertips subscribers with access to their favorite films, TV series 30 million users Smartphones and tablets are the irreplaceable and programs on their mobile phone or tablet and they companions of the modern man. At home and at work, will never think about swapping to another operator. on the street and on public transportation, standing in With SPB TV’s mobile television, your subscribers will lines and on vacation – no other electronic devices are as be able to watch major sporting events and the most popular. Give your subscribers the most compelling and anticipated premieres anywhere, anytime while enjoying socially enriched television in a user-friendly interface, playback quality equal to that of traditional TV with available right from their mobile devices. Provide your a much more sophisticated and versatile interface. Turnkey service provided by a single supplier Reliable performance SPB TV offers a comprehensive technological under changing network conditions solution for the launch and continued support of When working with mobile networks, it is important Mobile TV services over any network. The solution to take into account the frequency and magnitude is based on cloud technologies and includes of variations in bandwidth capacity. In order to avoid server side support for video broadcasting, a dropouts, pauses and re-buffering of videos, SPB client program offering a convenient interface for TV supports all modern technologies in adaptive users to interact with the service and advanced broadcasting: Adaptive RTSP, Apple HTTP Live middleware services.
    [Show full text]
  • Abstract View of System Components
    Tizen Introduction Minsoo Ryu Real-Time Computing and Communications Lab. Hanyang University [email protected] Real-Time Computing and Communications Lab., Hanyang University http://rtcc.hanyang.ac.kr What is Tizen Tizen is an open-source operating system based on . the Linux kernel and GNU C library . HTML5 Tizen targets a wide variety of devices . Smartphones, tables, IVI (in-vehicle infotainment), smart TVs, wearable devices, home appliances, … Tizen is a project governed by . A TSG (Technical Steering Group) within the Linux Foundation . Two major members of the Tizen association are Samsung and Intel Real-Time Computing and Communications Lab., Hanyang University http://rtcc.hanyang.ac.kr 22 History of Tizen Tizen roots back to . the Samsung SLP (Samsung Linux Platform) . The LiMo (Linux Mobile) project Samsung's collaboration with the EFL project, and especially Carsten Haitzler, was known as LiMo for years . It was renamed Tizen when Intel joined the project in September 2011, after leaving the MeeGo project . A common misconception is that Tizen is a continuation of MeeGo . In fact, it builds on Samsung Linux Platform (SLP), a reference implementation delivered within LiMo Real-Time Computing and Communications Lab., Hanyang University http://rtcc.hanyang.ac.kr 33 History of Tizen January 2012 & In 2013 . The LiMo Foundation was renamed Tizen Association . Samsung merged Bada into Tizen October 2013 . Samsung’s NX3000M smart camera was the first consumer product based on Tizen January 2015 . Samsung released Tizen-based Z1 smartphone to the Indian market September 2015 & In 2016 . Samsung released Tizen-reference phone TM1 and Tizen-based Z3 smartphone in Indian Real-Time Computing and Communications Lab., Hanyang University http://rtcc.hanyang.ac.kr 44 Tizen Feature Tizen leads all other mobile platforms in support of HTML5 .
    [Show full text]
  • GHA (Global Hexadecimal Administrator) Assignment Guidelines and Procedures for Mobile Equipment Identifier (MEID) and Short Form Expanded UIM Identifier (SF EUIMID)
    3GPP2 SC.R4002-0 v12.0 December 2016 GHA (Global Hexadecimal Administrator) Assignment Guidelines and Procedures for Mobile Equipment Identifier (MEID) and Short Form Expanded UIM Identifier (SF_EUIMID) © 2016 3GPP2 3GPP2 and its Organizational Partners claim copyright in this document and individual Organizational Partners may copyright and issue documents or standards publications in individual Organizational Partner's name based on this document. Requests for reproduction of this document should be directed to the 3GPP2 Secretariat at [email protected]. Requests to reproduce individual Organizational Partner's documents should be directed to that Organizational Partner. See www.3gpp2.org for more information. 3GPP2 SC.R4002-0 v12.0 Revision History Revision Description of Changes Date Version 1.0 Republished S.R0089-0 to SC.R4002-0 v1.0 Initial Publication February 2004 Version 2.0 SC.R4002-0 updates October 2004 Version 3.0 SC.R4002-0 updates March 2006 Version 4.0 SC.R4002-0 updates to address EUIM_ID SF 26 July 2007 Version 5.0 SC.R4002-0 updates to clarify MFR Code segment assignments 18 January 2008 Version 6.0 SC.R4002-0 updates to clarify multimode assignments & SF June 2010 UIMID Version 7.0 SC.R4002-0 updates multimode assignment form and editorials March 2011 Version 8.0 SC.R4002-0 updates including MEID form updates, Annex re: April 2012 MEID db and editorials Version 9.0 SC.R4002-0 updates including Form “A” LTE band updates & March 2013 contact Title boxes, New TIA address location & editorials Version 10.0 Updates include Form “A” multimode sections with equipment 6 December 2013 types and editorial updates.
    [Show full text]