Another Galaxy S8 Leak + Vault 7 Leaked Documents On CIA + Nintendo Switch Joy Cons l Tech News #13

Hey guys Brainy here and today I have another
video for you. This is another episode of tech news and my
main source from today’s video is The I actually have a bunch of really interesting
things to talk about in this video and with that being said lets get into the video. It looks like we’re seeing another leak
of what the Samsung galaxy s8 will look like. New leaked pictures show off Galaxy S8 and
S8+ side by side. It’s not much of a surprise with the design
but it really is interesting that we’re getting so many “leaks” as we’re getting
closer and closer to the phones official announcement date. The smaller S8 on the left allegedly has a
5.7-inch display, the same size as last year’s ill-fated Galaxy Note 7, which makes the relative
size of the 6.2-inch S8+ even more impressive. That’s about all I have to say with this
leak but if you wanna keep updated on more tech leaks on either the galaxy s8 or iphone
8 don’t forget to pay attention to my uploads and video titles so that you can keep yourself
in the loop. Onto the next story, Twitch replaced its homepage
with a Twitter clone for gamers. Broadcasters can now post to their friends
and followers with a mix of text, links, images, and videos. These will appear to the broadcaster’s followers
on the Twitch homepage in a reverse- chronological stream, just as on Twitter. (They’re also coming to Twitch’s mobile
app, but not at launch.) If you’re a broadcaster, you suddenly have
an easy way to share highlights with fans who missed your last stream — as well as
promote your next stream, or anything else you want. Top Twitch streamers all have over 1 million
followers apiece, and it’s easy to imagine them turning to Pulse to grow their audiences
and keep them entertained while they’re not broadcasting. But as on Twitter, anyone can contribute,
and their posts will appear to friends and followers as well. Twitch has been thoughtful about how to moderate
on comments on Pulse. If a broadcaster chooses, they can limit reactions
to only their friends, or only people who subscribe to their channel. Broadcasters can also delete comments. This change in Twitch is not what I’d consider
ground breaking but it does make a major improvement to the site. While not everyone will embrace this change
fully I think it will be a major catalyst for this website. Streamers will be able to reach many more
people with this new update as far as I know and it seems to have given the site a really
interesting new look. Onto our next story, Nintendo’s Joy-Con
controllers also work with Windows, Mac, and Android devices. Yeah the Nintendo Switch is obviously still
in the news and with every bit of info that comes out, fans of the device are gravitating
towards it more and more. French Nintendo fan site Nintendo Actu has
been experimenting with Joy-Cons on Windows and Android devices, and software engineer
Sam Williams has discovered Nintendo’s controllers also work on macOS. On a Windows PC the separate Joy-Cons can
be paired over Bluetooth, but you’ll need an app like JoyToKey to map the buttons to
mouse and keyboard controls. Such functionality isn’t surprising, especially
given that you could use Nintendo’s Wiimote on PCs thanks to Bluetooth, and the Joy-Cons
are simply identifying as similar Bluetooth controllers. So yeah, you learn something cool everyday. Onto other news, The CIA is hacking Samsung
Smart TVs, according to WikiLeaks docs. WikiLeaks has published a new set of documents
that shed light on the CIA’s hacking capabilities. Dubbed “Vault7,” the publication contains
8,761 documents and files purportedly taken from a secure network within the CIA’s headquarters
at Langley, Virginia. The files contain numerous exploits for both
iOS and Android devices, dating from between 2014 and 2016. The agency seems to have had more success
targeting Android devices, with roughly 24 weaponized exploits, compared to 14 for iOS. The exploits come from a variety of sources,
including partner agencies like the NSA and GCHQ or private exploit traders. In one case, a published iOS 8 kernel attack
is listed as an exploit, credited to security researcher Stefan Esser. Another of the published exploits — codenamed
“Weeping Angel” — appears to target Samsung smart TVs, which drew criticism on
release for their always-on voice command system. According to WikiLeaks, the exploit makes
the television “operate as a bug, recording conversations in the room and sending them
over the Internet to a covert CIA server.” The documents themselves paint a more ambiguous
picture, with possible applications focusing on credential extraction rather than direct
audio recording. And that in itself is pretty, well, I wouldn’t
say scary, but it does raise up a few questions. What exactly does the CIA hope to gain from
all this information, and are they sharing it with other countries. I may not be the most educated on the ways
of the CIA but it does seem to me that this, if proven true is a breach of privacy, and
sticking with this topic we have another bit of news from Google. Google says it’s already fixed many exploits
from WikiLeaks’ CIA document dump. Google has fixed many of the vulnerabilities
in its Chrome and Android platforms identified. In a statement provided to Recode by Heather
Adkins — Google’s director of Information Security and Privacy — Google said that
it was “confident that security updates and protections in both Chrome and Android
already shield users from many of these alleged vulnerabilities,” that its analysis of remaining
security flaws was ongoing, and that it would “implement any further necessary protections.” Adkins’ statement came a day after WikiLeaks
released 8,761 documents and files it said that it obtained from the CIA’s Center for
Cyber Intelligence. Included in the files were a number of apparent
exploits for Google’s platforms, as well as methods for accessing iOS devices, and
Samsung Smart TVs. Apple released its own statement a short time
after the documents appeared online with a similar message to Google’s — the company
said it had patched out a number of vulnerabilities already and was working on fixes for remaining
problems. Both Google and Apple said that “many”
of the flaws had been patched, but both companies stopped short of specifying exactly how many
exploits had been removed, and how many still remained in Android, Chrome, and iOS. Those flaws could — the supposed CIA documents
claim — be used for a range of nefarious purposes, including monitoring incoming and
outgoing communications, tracking users, and even taking control of their devices. And it really is interesting that Both Google
and Apple are taking the necessary steps to keep the trust of their users. And that’s it for today’s episode of Tech
News!! If you liked this video feel free to hit that
like button down below, subscribe for new videos every single week and comment below
on what you think about any of the three stories that I mentioned in this video. As usual all needed source links will be listed
below as well as links to previous videos. Thanks for watching and I will be seeing you
in the next video.

, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Post navigation

Leave a Reply

Your email address will not be published. Required fields are marked *