Apple patents Watch band that could ID you from your wrist skin

It looks like Apple is playing with the idea of making the Apple Watch’s band a bit smarter.

As spotted by PatentlyApple, the company was granted a handful of patents this morning, all focused on bringing new tricks to the Watch by way of the band.

apple watch wrist 2

The first patent describes a sensor built into the Watch or the watch’s band that could use infrared to build a thermal image of your wrist and its identifying traits (like skin texture/arm hair) to identify who is wearing it — sort of like a fingerprint, but from your wrist.

Unlike most of Apple’s other devices, the Apple Watch doesn’t currently have any sort of built-in biometrics for unlocking — there’s no thumb print sensor for Touch ID, or camera for Face ID. Unlocking your Apple Watch means poking at the screen to punch in a PIN (or, if you’ve configured it to unlock when you unlock your phone, doing that.) A sensor setup like this could make the unlocking process automatic without the need to unlock your phone.

apple watch band

The second granted patent describes a Watch band that can adjust itself on the fly — think Nike’s self-tightening shoes, but on your wrist. If the Watch detects that it’s sliding while you’re running (or if the aforementioned thermal sensors need a closer look at your wrist skin) tensioners in the device could tighten or loosen the band on command.

apple watch meters

Finally, a third granted patent tinkers with the idea of a Watch band with built-in light up indicators — like, say, a notification light for incoming texts, or a meter that fills up to tell you at-a-glance how much distance you’ve got left on your run, or a stripe that glows yellow when you’ve got something on your calendar in the next hour. All of this can already be done on the Watch’s screen, of course — this would just allow for it without having to power up the entire display.

As always, it’s worth noting that patents being granted doesn’t guarantee that such any such features will make it to the final product — just that Apple found something cool in its R&D labs, and decided to lock it down.

Apple has kept its bands relatively simple so far for the sake of keeping them swappable; they come in all sorts of materials and colors, but the electronic bits are contained within the Watch itself. Adding sensors and indicators to the band complicates that. As the user you’d have to decide: do you want the band you like the most on your wrist, or the one with the fancy notification lights?


Source: Tech Crunch

13 ways to screw over your internet provider

Internet providers are real bastards: they have captive audiences whom they squeeze for every last penny while they fight against regulation like net neutrality and donate immense amounts of money to keep on lawmakers’ good sides. So why not turn the tables? Here are 13 ways to make sure your ISP has a hard time taking advantage of you (and may even put it on the defensive).

Disclosure: Verizon, an internet provider guilty of all these infractions, owns TechCrunch, and I don’t care.

1. Buy a modem and router instead of renting

The practice of renting a device to users rather than selling it or providing it as part of the service is one of the telecommunications industry’s oldest and worst. People pay hundreds or even thousands of dollars over years for equipment worth $40 or $50. ISPs do this with various items, but the most common item is probably the modem.

This is the gadget that connects to the cable coming out of your wall, and then connects in turn (or may also function as) your wireless and wired router. ISPs often provide this equipment at the time of install, and then charge you $5 to $10 per month forever. What they don’t tell you is you can probably buy the exact same item for somewhere between $30 and $100.

The exact model you need will depend on your service, but it will be listed somewhere, and they should tell you what they’d provide if you ask. Look online, buy a new or lightly used one, and it will have paid for itself before the year is out. Not only that, but you can do stuff like upgrade or change the software on it all you want, because it’s yours. Bonus: The ISP is limited in what it can do to the router (like letting other people connect — yes, it’s a thing).

2. Avoid service calls, or if you can’t, insist they’re free

I had an issue with my Comcast internet a while back that took them several visits from a service tech to resolve. It wasn’t an issue on my end, which was why I was surprised to find they’d charged me $30 or so every time the person came.

If your ISP wants to send someone out, ask whether it’s free, and if it isn’t, tell them to make it free or ask if you can do it yourself (sometimes it’s for really simple stuff like swapping a cable). If they charge you for a visit, call them and ask them to take it off your bill. Say you weren’t informed and you’ll inform the Better Business Bureau about it, or take your business elsewhere, or something. They’ll fold.

When someone does come…

3. Get deals from the installer

If you do end up having someone come out, talk to them to see whether there are any off the record deals they can offer you. I don’t mean anything shady like splitting cables with the neighbor, just offers they know about that aren’t publicized because they’re too good to advertise.

A lot of these service techs are semi-independent contractors paid by the call, and their pay has nothing to do with which service you have or choose. They have no reason to upsell you and every reason to make you happy and get a good review. Sometimes that means giving you the special desperation rates ISPs withhold until you say you’re going to leave.

And as long as you’re asking…

4. Complain, complain, complain

This sounds bad, but it’s just a consequence of how these companies work: The squeaky wheels get the grease. There’s plenty of grease to go around, so get squeaking.

Usually this means calling up and doing one of several things. You can complain that service has been bad — outages and such — and ask that they compensate you for that. You can say that a competing ISP started offering service at your location and it costs $20 less, so can they match that. Or you can say your friend just got a promotional rate and you’d like to take advantage of it… otherwise you’ll leave to that phantom competitor. (After all, we know there’s often little or no real competition.)

What ISPs, and, more importantly, what their customer service representatives care about is keeping you on as a customer. They can always raise rates or upsell you later, but having you as a subscriber is the important thing.

Note that some reps are more game than others. Some will give you the runaround, while others will bend over backwards to help you out. Feel free to call a few times and do a bit of window shopping. (By the way, if you get someone nice, give them a good review if you get the chance, usually right after the call or chat. It helps them out a lot.) Obviously you can’t call every week with new demands, so wait until you think you can actually save some money.

Which reminds me…

5. Choose your service level wisely

ISPs offer a ton of choices, and make it confusing on purpose so you end up picking an expensive one just to be sure you have what you need. The truth is most people can probably do pretty much everything they need on the lowest tier they offer.

A 1080p Netflix stream will work fine on a 25 Mbps connection, which is what I have. I also work entirely online, stream high-def videos at a dozen sites all day, play games, download movies and do lots of other stuff, sometimes all at the same time. I think I pay $45 a month. But rates like mine might not be advertised prominently or at all. I only found out when I literally asked what the cheapest possible option was.

That said, if you have three kids who like to watch videos simultaneously, or you have a 4K streaming setup that you use a lot, you’ll want to bump that up a bit. But you’d be surprised how seldom the speed limit actually comes into play.

To be clear, it’s still important that higher tiers are available, and that internet providers upgrade their infrastructure, because competition and reliability need to go up and prices need to come down. The full promise of broadband should be accessible to everyone for a reasonable fee, and that’s still not the case.

6. Stream everything because broadcast TV is a joke

Cord-cutting is fun. Broadcast TV is annoying, and getting around ads and air times using a DVR is very 2005. Most shows are available on streaming services of some kind or another, and while those services are multiplying, you could probably join all of them for well under what you’re paying for the 150 cable channels you never watch.

Unless you really need to watch certain games or news shows as they’re broadcast, you can get by streaming everything. This has the side effect of starving networks of viewers and accelerating the demise of these 20th-century relics. Good ones will survive as producers and distributors of quality programming, and you can support them individually on their own merits. It’s a weird transitional time for TV, but we need to drop-kick them into the future so they’ll stop charging us for a media structure established 50 years ago.

Something isn’t available on a streaming service? 100 percent chance it’s because of some dumb exclusivity deal or licensing SNAFU. Go pirate it for now, then happily pay for it as soon as it’s made available. This method is simple for you and instructive for media companies. (They always see piracy rates drop when they make things easy to find and purchase.)

This also lets you avoid certain fees ISPs love tacking onto your bill. I had a “broadcast TV fee” on my bill despite not having any kind of broadcast service, and I managed to get it taken off and retroactively paid back.

On that note…

7. Watch your bill like a hawk

Telecoms just love putting things on your bill with no warning. It’s amazing how much a bill can swell from the quoted amount once they’ve added all the little fees, taxes and service charges. What are they, anyway? Why not call and ask?

You might find out, as I did, that your ISP had “mistakenly” been charging you for something — like equipment — that you never had nor asked for. Amazing how these lucrative little fees tend to fall through the cracks!

Small charges often increase and new ones get added as well, so download your bill when you get it and keep it somewhere (or just keep the paper copies). These are really handy to have when you’re on the phone with a rep. “Why wasn’t I informed my bill would increase this month by $50?” “Why is this fee more now than it was in July?” “Why do I pay a broadcast fee if I don’t pay for TV?” These are the types of questions that get you discounts.

Staying on top of these fees also means you’ll be more aware when there are things like mass refunds or class action lawsuits about them. Usually these have to be opted into — your ISP isn’t going to call you, apologize and send a check.

As long as you’re looking closely at your bill…

8. Go to your account and opt out of everything

When you sign up for broadband service, you’re going to get opted into a whole heap of things. They don’t tell you about these, like the ads they can inject, the way they’re selling this or that data or that your router might be used as a public Wi-Fi hotspot.

You’ll only find this out if you go to your account page at your ISP’s website and look at everything. Beyond the usual settings like your address and choice of whether to receive a paper bill, you’ll probably find a few categories like “privacy” and “communications preferences.”

Click through all of these and look for any options to opt out of stuff. You may find that your ISP has reserved the right to let partners email you, use your data in ways you wouldn’t expect and so on. It only takes a few minutes to get out of all this, and it deprives the ISP of a source of income while also providing a data point that subscribers don’t like these practices.

9. Share your passwords

Your friend’s internet provider gets him streaming services A, B and C, while yours gives you X, Y and Z. Again, this is not about creators struggling to get their content online, but rather all about big media and internet corporations striking deals that make them money and harm consumers.

Share your (unique, not reused!) passwords widely and with a clean conscience. No company objects when you invite your friends over to watch “Fleabag” at your house. This just saves everyone a drive!

10. Encrypt everything and block trackers

One of the internet companies’ many dirty little deals is collecting and selling information on their customers’ watching and browsing habits. Encrypting your internet traffic puts the kibosh on this creepy practice — as well as being good security.

This isn’t really something you can do too much to accomplish, since over the last few years encryption has become the rule rather than the exception, even at sites where you don’t log in or buy anything. If you want to be sure, download a browser plug-in like HTTPS everywhere, which opts you into a secure connection anywhere it’s available. You can tell it’s secure because the URL says “https://” instead of “http://” — and most browsers have other indicators or warnings as well.

You should also use an ad blocker, not necessarily to block ads that keep outlets like TechCrunch alive (please), but to block trackers seeded across the web by companies that use sophisticated techniques to record everything you do. ISPs are among these and/or do business with them, so everything you can do to hinder them is a little mud in their eye.

Incidentally there are lots of ways you can protect your privacy from those who would invade it — we’ve got a pretty thorough guide here.

11. Use a different DNS

Bryce Durbin / TechCrunch

On a similar note, most ISPs will usually be set up by default with their own “Domain Name Service,” which is the thing that your browser pings to convert a text web URL (like “techcrunch.com”) to its numerical IP address.

There are lots of these to choose from, and they all work, but if you use your ISP’s, it makes it much easier for them to track your internet activity. They also can block certain websites by refusing to provide the IP for content they don’t like.

TechCrunch doesn’t officially endorse one, but lots of companies offer free, fast DNS that’s easy to switch to. Here’s a good list; there are big ones (Google, Cloudflare), “open” ones (OpenDNS, OpenNIC) and others with some niche features. All you need to do is slot those two numbers into your internet configuration, following the instructions they provide. You can change it back at any time.

Setting up a VPN is another option for very privacy-conscious individuals, but it can be complicated. And speaking of complicated…

12. Run a home server

This is a bit advanced, but it’s definitely something ISPs hate. Setting up your home computer or a dedicated device to host a website, script or service seems like a natural use of an always-on internet connection, but just about everyone in the world would rather you sign up for their service, hosted on their hardware and their connection.

Well, you don’t have to! You can do it on your own. Of course, you’ll have to learn how to run and install a probably Unix-based server, handle registry stuff, install various packages and keep up to date so you don’t get owned by some worm or bot… but you’ll have defied the will of the ISP. That’s the important thing.

13. Talk to your local government

ISPs hate all the things above, but what they hate the most by far is regulation. And you, as a valued citizen of your state and municipality, are in a position to demand it. Senators, representatives, governors, mayors, city councils and everyone else actually love to hear from their constituency, not because they desire conversation but because they can use it to justify policy.

During the net neutrality fight, a constant refrain I heard from government officials was how much they’d heard from voters about the issue and how unanimous it was (in support, naturally). A call or email from you won’t sway national politics, but a few thousand calls or emails from people in your city just might sway a local law or election. These things add up, and they do matter. State net neutrality policies are now the subject of national attention, and local privacy laws like those in Illinois are the bane of many a shady company.

Tell your local government about your experience with ISPs — outages, fees, sneaky practices or even good stuff — and they’ll file it away for when that data is needed, such as renegotiating the contracts national companies sign with those governments in order to operate in their territories.

Internet providers only do what they do because they are permitted to, and even then they often step outside the bounds of what’s acceptable — which is why rules like net neutrality are needed. But first people have to speak out.


Source: Tech Crunch

Revolut ramps up customer support with plans to hire 400 people in Porto

Fintech startup Revolut has been growing like crazy and now has 6 million customers. The company has to scale its support team accordingly. That’s why Revolut just announced plans to open a customer operations centre in Porto, Portugal.

There are already 70 people working for Revolut in Porto. Eventually, Revolut plans to hire 400 people in the country. They’ll work on customer support, complaints, investigations and compliance.

And Revolut has been quite successful in Portugal so far. There are currently 250,000 Revolut customers in Portugal, and the company is adding 1,000 new customers per day in the country.

It should help when it comes to hiring local talent. The company is also hiring a growth manager, a communication and PR lead and a community manager in Portugal. Ricardo Macieira, the new growth manager, is the former country manager for Airbnb in Portugal. Rebeca Venâncio, the communication and PR lead, has worked for Microsoft in Portugal. And Miguel Costa, the community manager, has worked for Mog and Nomad Tech.

Earlier this summer, Revolut also announced plans to open a tech hub in Berlin. Originally founded in London, Revolut is slowly building multiple offices across the U.K. and Europe in order to attract local talent.


Source: Tech Crunch

Another US visa holder was denied entry over someone else’s messages

It has been one week since U.S. border officials denied entry to a 17-year-old Harvard freshman just days before classes were set to begin.

Ismail Ajjawi, a Palestinian student living in Lebanon, had his student visa canceled and was put on a flight home shortly after arriving at Boston Logan International Airport. Customs & Border Protection officers searched his phone and decided he was ineligible for entry because of his friends’ social media posts. Ajjawi told the officers he “should not be held responsible” for others’ posts, but it was not enough for him to clear the border.

The news prompted outcry and fury. But TechCrunch has learned it was not an isolated case.

Since our story broke, we came across another case of a U.S. visa holder who was denied entry to the country on grounds that he was sent a graphic WhatsApp message. Dakhil — whose name we have changed to protect his identity — was detained for hours, but subsequently had his visa canceled. He was sent back to Pakistan and banned from entering the U.S. for five years.

Since 2015, the number of device searches has increased four-fold to over 30,200 each year. Lawmakers have accused the CBP of conducting itself unlawfully by searching devices without a warrant, but CBP says it does not need to obtain a warrant for device searches at the border. Several courts have tried to tackle the question of whether or not device searches are constitutional.

Abed Ayoub, legal and policy director at the American-Arab Anti-Discrimination Committee, told TechCrunch that device searches and subsequent denials of entry had become the “new normal.”

This is Dakhil’s story.

* * *

As a a Pakistani national, Dakhil needed a visa to enter the U.S. He obtained a B1/B2 visa, which allowed him to temporarily enter the U.S. for work and to visit family. Months later, he arrived at George Bush Intercontinental Airport in Houston, Texas, tired but excited to see his cousin for the first time in years.

It didn’t take long before Dakhil realized something wasn’t right.

Dakhil, who had never traveled to the U.S. before, was waiting in the immigration line at the border when a CBP officer approached him to ask why he had traveled to the U.S. He said it was for a vacation to visit his family. The officer took his passport and, after a brief examination of its stamps, asked why Dakhil had visited Saudi Arabia. It was for Hajj and Umrah, he said. As a Muslim, he is obliged to make the pilgrimages to Mecca at least once in his lifetime. The officer handed back his passport and Dakhil continued to wait in line.

At his turn, Dakhil approached the CBP officer in his booth, who repeated much of the same questions. But, unsatisfied with his responses, the officer took Dakhil to a small room close but separate from the main immigration hall.

“He asked me everything,” Dakhil told TechCrunch. The officer asked about his work, his travel history and how long he planned to stay in the U.S. He told the officer he planned to stay for three months with a plan to travel to Disney World in Florida and later New York City with his wife and newborn daughter, who were still waiting for visas.

The officer then rummaged through Dakhil’s carry-on luggage, pulling out his computer and other items. Then the officer took Dakhil’s phone, which he was told to unlock, and took it to another room.

For more than six hours, Dakhil was forced to sit in a bright, cold and windowless airport waiting room. There was nowhere to lie down. Others had pushed chairs together to try to sleep.

dhakil i213 front

A U.S. immigration form detailing Dakhil deportation.

Dakhil said when the officer returned, the questioning continued. The officer demanded to know more about what he was planning to do in the U.S. One line of questioning focused on an officer’s accusation that Dakhil was planning to work at a gas station owned by his cousin — which Dakhil denied.

“I told him I had no intention to work,” he told TechCrunch. The officer continued with his line of questioning, he said, but he continued to deny that he wanted to stay or work in the U.S. “I’m quite happy back in Karachi and doing good financially,” he said.

Two more officers had entered the room and began to interrogate him as the first officer continued to search bags. At one point he pulled out a gift for his cousin — a painting with Arabic inscriptions.

But Dakhil was convinced he would be allowed entry — the officers had found nothing derogatory, he said.

“Then the officer who took my phone showed me an image,” he told TechCrunch. It was an image from 2009 of a child, who had been murdered and mutilated. Despite the graphic nature of the image, TechCrunch confirmed the photo was widely distributed on the internet and easily searchable using the name of the child’s murderer.

“I was shocked. What should I say?” he told TechCrunch, describing the panic he felt. “This image is disturbing, but you can’t control the forwarded messages,” he explained.

Dakhil told the officer that the image was sent to him in a WhatsApp group. It’s difficult to distinguish where a saved image came from on WhatsApp, because it automatically downloads received images and videos to a user’s phone. Questionable content — even from unsolicited messages — found during a border search could be enough to deny the traveler entry.

The image was used to warn parents about kidnappings and abductions of children in his native Karachi. He described it as one of those viral messages that you forward to your friends and family to warn parents about the dangers to their children. The officer pressed for details about who sent the message. Dakhil told the officer that the sender was someone he met on his Hajj pilgrimage in 2011.

“We hardly knew each other,” he said, saying they stayed in touch through WhatsApp but barely spoke.

Dakhil told the officer that the image could be easily found on the internet, but the officer was more interested in the names of the WhatsApp group members.

“You can search the image over the internet,” Dakhil told the officer. But the officer declined and said the images were his responsibility. “We found this on your cellphone,” the officer said. At one point the officer demanded to know if Dakhil was organ smuggling.

After 15 hours answering questions and waiting, the officers decided that Dakhil would be denied entry and would have his five-year visa cancelled. He was also told his family would also have their visas cancelled. The officers asked Dakhil if he wanted to claim for asylum, which he declined.

“I was treated like a criminal,” Dakhil said. “They made my life miserable.”

* * *

It’s been almost nine months since Dakhil was turned away at the U.S. border.

He went back to the U.S. Embassy in Karachi twice to try to seek answers, but embassy officials said they could not reverse a CBP decision to deny a traveler entry to the United States. Frustrated but determined to know more, Dakhil asked for his records through a Freedom of Information Act (FOIA) request — which anyone can do — but had to pay hundreds of dollars for its processing.

He provided TechCrunch with the documents he obtained. One record said that Dakhil was singled out because his name matched a “rule hit,” such as a name on a watchlist or a visit to a country under sanctions or embargoes, which typically requires additional vetting before the traveler can be allowed into the U.S.

The record did not say what flagged Dakhil for additional screening, and his travel history did not include an embargoed country.

Screen Shot 2019 08 30 at 3.30.00 PM 2

CBP’s reason for denying entry to Dakhil obtained through a FOIA request.

One document said CBP denied Dakhil entry to the U.S. “due to the derogatory images found on his cellphone,” and his alleged “intent to engage in unauthorized employment during his entry.” But Dakhil told TechCrunch that he vehemently denies the CBP’s allegations that he was traveling to the U.S. to work.

He said the document portrays a different version of events than what he experienced.

“They totally changed this scenario,” he said, rebutting several remarks and descriptions reported by the officers. “They only disclosed what they wanted to disclose,” he said. “They want to justify their decision, so they mentioned working in a gas station by themselves,” he claimed.

The document also said Dakhil “was permitted to view the WhatsApp group message thread on his phone and he stated that it was sent to him in September 2018,” but this was not enough to satisfy the CBP officers who ruled he should be denied entry. The document said Dakhil stated that he “never took this photo and doesn’t believe [the sender is] involved either,” but he was “advised that he was responsible for all the contents on his phone to include all media and he stated that he understood.”

The same document confirmed the contents of his phone was uploaded to the CBP’s central database and provided to the FBI’s Joint Terrorism Task Force.

Dakhil was “found inadmissible” and was put on the next flight back to Karachi, more than a day after he was first approached by the CBP officer in the immigration line.

A spokesperson for Customs & Border Protection declined to comment on individual cases, but provided a boilerplate statement.

“CBP is responsible for ensuring the safety and admissibility of the goods and people entering the United States. Applicants must demonstrate they are admissible into the U.S. by overcoming all grounds of inadmissibility including health-related grounds, criminality, security reasons, public charge, labor certification, illegal entrants and immigration violations, documentation requirements, and miscellaneous grounds,” the spokesperson said. “This individual was deemed inadmissible to the United States based on information discovered during the CBP inspection.”

CBP said it also has the right to cancel visas if a traveler is deemed inadmissible to the United States.

It’s unlikely Dakhil will return to the U.S., but he said he had hope for the Harvard student who suffered a similar fate.

“Let’s hope he can fight and make it,” he said.


Source: Tech Crunch

Now Facebook says it may remove Like counts

Facebook could soon start hiding the Like counter on News Feed posts to protect users’ from envy and dissuade them from self-censorship. Instagram is already testing this in 7 countries including Canada and Brazil, showing a post’s audience just a few names of mutual friends who’ve Liked it instead of the total number. The idea is to prevent users from destructively comparing themselves to others and possibly feeling inadequate if their posts don’t get as many Likes. It could also stop users from deleting posts they think aren’t getting enough Likes or not sharing in the first place.

CEDA6502 FBFE 4C92 BDFE C77F81D58E45

Facebook prototypes hiding like counts [via Jane Manchun Wong]

Reverse engineering master Jane Manchun Wong spotted Facebook prototyping the hidden Like counts in its Android app. When we asked Facebook, the company confirmed to TechCrunch that it’s considering testing removal of Like counts. However it’s not live for users yet. Facebook declined to share results from the Instagram Like hiding tests, its exact motives, or any schedule for starting testing. If it does decide to go ahead with a test, Facebook would likely do so gradually and pull back if it significantly hurts usage or ad revenue.

Still, the prototype might indicate positive results from hiding Like tallies in Instagram, which we first reported in April after it was spotted by Wong there as well. After beginning testing in Canada later that month. Instagram added Brazil, Australia, New Zealand, Italy, Ireland, and Japan to the test in July. There, a post’s author can still see the Like total, but everyone else can’t. The expansion of that Instagram test and Facebook potentially trying it in its own app signals that it might have positive or negligible impacts on sharing while aiding mental health, or at least be worth a slight drop in engagement.

E5BAE141 89D6 4F76 9C19 6E8F3FD1CB3C

Instagram is already testing hiding Like counts and Facebook may soon do the same.

Facebook has gradually been relegated to the place for sharing showy life events like marriages or new jobs while Instagram and Snapchat take over for day-to-day sharing. The problem is that people have so many fewer of those big moments, and the large Like counts they attract can make other users self-conscious of their of own lives and content. That’s all problematic for Facebook’s ad views. Facebook wants to avoid scenarios such as “Look how many Likes they get. My life is lame in comparison” or “why even share if it’s not going to get as many Likes as her post and people will think I’m unpopular”.

Removing Like counts could put less pressure on users and encourage them to share more freely and frequently, as I wrote in 2017. It could also obscure Facebook’s own potential decline in popularity as users switch to other apps. Posts not getting as many Likes as they used to could hasten the exodus.

Come see my interview with Snapchat CEO Evan Spiegel at TechCrunch Disrupt SF (Oct 2nd-4th — tickets here) to learn more about how social networks are adapting to growing mental health concerns.


Source: Tech Crunch

India’s Oyo acquires Copenhagen-based data science firm Danamica for $10M

India’s Oyo said on Monday it has acquired Copenhagen-based data science firm Danamica as the fast-growing lodging startup works to expand its business in Europe.

Neither of the parties disclosed financial terms of the deal, but a source familiar with the matter told TechCrunch that Oyo paid about $10 million to acquire the Danish firm.

Danamica, which was founded in 2016, has built machine learning tools and “business intelligence capabilities” to specialize in dynamic pricing of rental properties. The firm’s algorithm analyzes 144,000 data points every hour and makes 60 million price changes every day with a prediction accuracy of 97% to help hotels boost their revenue, Oyo said. The Indian startup said Danamica would help it scale its technical expertise as it expands its footprint in overseas markets.

Oyo, which is the largest hotel chain in India, is rapidly expanding in other countries. It has already established presence in 80 countries, the six-year old startup said. About half of its 1 million rooms are in China, where it launched last year.

Today’s announcement comes weeks after Oyo said it planned to invest €300 million in its vacation rental business in Europe, and $300 million toward U.S. expansion over the coming years. In May this year, Oyo bought Amsterdam-based holiday rental company Leisure from Axel Springer for $415 million.

In a prepared statement, Maninder Gulati, Global Head of OYO Vacation and Urban Homes and Chief Strategy Officer of OYO Hotels & Homes, said, “We are delighted to announce our acquisition of Danamica, a Europe based, machine learning and business intelligence company specialized in dynamic pricing, that will help us be more accurate with pricing, leading to higher efficiencies and yield for our real estate owners and value for money for our millions of global guests, both everyday travellers and city dwellers, that choose an OYO Vacation Homes as their abode.”

In July this year, Oyo entered co-working spaces market with the launch of Oyo Workspaces. At a media conference in New Delhi, startup executives said they aim to make Oyo Workspaces the largest business in its category in Asia by end of next year. To immediately capture some market share, Oyo said it had acquired Indian co-working spaces startup Innov8. Sources told TechCrunch then that Oyo had paid about $30 million to acquire Innov8.

In the same month, 25-year-old Ritesh Agarwal (pictured above), founder of SoftBank-backed Oyo, invested $2 billion to triple his stake in the company as early investors Lightspeed and Sequoia partly cashed out. The deal pushed Oyo’s valuation to $10 billion.


Source: Tech Crunch

Police hijack a botnet and remotely kill 850,000 malware infections

In a rare feat, French police have hijacked and neutralized a massive cryptocurrency mining botnet controlling close to a million infected computers.

The notorious Retadup malware infects computers and starts mining cryptocurrency by sapping power from a computer’s processor. Although the malware was used to generate money, the malware operators easily could have run other malicious code, like spyware or ransomware. The malware also has wormable properties, allowing it to spread from computer to computer.

Since its first appearance, the cryptocurrency mining malware has spread across the world, including the U.S., Russia, and Central and South America.

According to a blog post announcing the bust, security firm Avast confirmed the operation was successful.

The security firm got involved after it discovered a design flaw in the malware’s command and control server. That flaw, if properly exploited, would have “allowed us to remove the malware from its victims’ computers” without pushing any code to victims’ computers, the researchers said.

The exploit would have dismantled the operation, but the researchers lacked the legal authority to push ahead. Because most of the malware’s infrastructure was located in France, Avast contacted French police. After receiving the go-ahead from prosecutors in July, the police went ahead with the operation to take control of the server and disinfect affected computers.

The French police called the botnet “one of the largest networks” of hijacked computers in the world.

The operation worked by secretly obtaining a snapshot of the malware’s command and control server with cooperation from its web host. The researchers said they had to work carefully as to not be noticed by the malware operators, fearing the malware operators could retaliate.

“The malware authors were mostly distributing cryptocurrency miners, making for a very good passive income,” the security company said. “But if they realized that we were about to take down Retadup in its entirety, they might’ve pushed ransomware to hundreds of thousands of computers while trying to milk their malware for some last profits.”

With a copy of the malicious command and control server in hand, the researchers built their own replica, which disinfected victim computers instead of causing infections.

“[The police] replaced the malicious [command and control] server with a prepared disinfection server that made connected instances of Retadup self-destruct,” said Avast in a blog post. “In the very first second of its activity, several thousand bots connected to it in order to fetch commands from the server. The disinfection server responded to them and disinfected them, abusing the protocol design flaw.”

In doing so, the company was able to stop the malware from operating and remove the malicious code to over 850,000 infected computers.

Jean-Dominique Nollet, head of the French police’s cyber unit, said the malware operators generated several million euros worth of cryptocurrency.

Remotely shutting down a malware botnet is a rare achievement — but difficult to carry out.

Several years ago the U.S. government revoked Rule 41, which now allows judges to issue search and seizure warrants outside of their jurisdiction. Many saw the move as an effort by the FBI to conduct remote hacking operations without being hindered by the locality of a judge’s jurisdiction. Critics argued it would set a dangerous precedent to hack into countless number of computers on a single warrant from a friendly judge.

Since then the amended rule has been used to dismantle at least one major malware operation, the so-called Joanap botnet, linked to hackers working for the North Korean regime.


Source: Tech Crunch

Week in Review: Apple makes a rare apology, Nintendo tries to reinvent its invention

Hey. This is Week-in-Review, where I give a heavy amount of analysis and/or rambling thoughts on one story while scouring the rest of the hundreds of stories that emerged on TechCrunch this week to surface my favorites for your reading pleasure.

Last week, I talked about Google’s Android naming switch-up.


The big story

Like clockwork, sources have been revealing to publications that Siri, Alexa, Google Assistant and Facebook M aren’t just digital assistants, they are portals into the AI workflows of Silicon Valley. Oh, and “AI workflows” means lots of contractors putting in quite a bit of manual work to understand what we want when we ask them questions.

This week, Apple announced that it’s completely changing how it handles reviewing audio from user Siri requests to ensure that users know exactly what they’re getting into privacy-wise.

The big change is that third-party contractors won’t have access to any of the clips for a process called “grading” and there is an explicit opt-in process for users. The company also gave a pretty explicit apology, which is pretty rare for an entity that seems to think its MacBook keyboards are still completely fine.

This whole situation is important for a couple reasons. One, Apple really sets the tone for consumer privacy among the tech giants so making notable changes here is positive and might push others to make similar updates. Two, Apple has the worst consumer-facing digital assistant. Like, Siri is just unquestionably worse than Alexa and Google Assistant so they arguably have the most to lose here and this is a decision that means less data for the company to hone its tech on.

Together, all of these gaffes really weren’t egregious, they were dealing with data that wasn’t nominally connected to users, but audio files should definitely be treated with a little more respect than anonymous crash reports. The journalism from publications like The Guardian pushing on “common” industry practices seemed to surface some positive change here.

Send me feedback
on Twitter @lucasmtny or email
lucas@techcrunch.com

On to the rest of the week’s news.

Nintendo Switch Lite

Trends of the week

Here are a few big news items from big companies, with green links to all the sweet, sweet added context:

  • Nintendo’s portable gets more portable
    The Nintendo Switch has been a huge success for the company, but in a new hardware update, the giant is doubling down on portability and simplicity in what might be a bid to capture some of the market it’s left behind from the DS line. Read more about it here.
  • Former Google engineer gets indicted
    Autonomous tech guru Anthony Levandowski who was as the center of the contentious Waymo-Uber lawsuit is back in the spotlight after he was handed a federal indictment with 33 counts of theft and attempted theft of trade secrets. Read more here.
  • Apple’s next hardware event is on its way
    The company just sent out invites to reporters for its iPhone event this month. Read more here.
  • Jack gets hacked
    Twitter like to dream about its impact and influence in ways that feel less realistic to the average user scrolling through spam and insults, but CEO Jack Dorsey got a taste of the seedy underbelly of the site when his Twitter account was hacked Friday and bomb threats and racial slurs were sent out. Read more here.

youtube

GAFA Gaffes

How did the top tech companies screw up this week? This clearly needs its own section, in order of badness:

  1. YouTube’s conspiracy theory devolution:
    [YouTube to reduce conspiracy theory recommendations]
  2. Facebook brings in some long overdue political advertising oversight:
    [Facebook will require political advertisers provide further credentials or have their ads paused]

An Amazon logo seen outside a building in Toronto

Photo by Dinendra Haria/SOPA Images/LightRocket via Getty Images

Extra Crunch

Our premium subscription service had another week of interesting deep dives. We published a roadmap for entrepreneurs looking to leverage Amazon and other ad platforms to create a direct-to-consumer startup.

How to use Amazon and advertising to build your D2C startup

“…This article focuses on customer acquisition, particularly Amazon and online advertising, for the direct-to-consumer (D2C) CPG venture. Selling on Amazon, specifically third-party (3P), has become an increasingly important component of the D2C playbook. About 46% of product searches start on Amazon, which makes it a compelling source of sales even for early-stage ventures….” (Extra Crunch membership required.)

Here are some of our other top reads this week for premium subscribers. This week, we published some analysis on the latest VMware deal and also looked at how startups should integrate customer success solutions early-on.

Sign up for more newsletters in your inbox (including this one) here.


Source: Tech Crunch

Sources say China used iPhone hacks to target Uyghur Muslims

A number of malicious websites used to hack into iPhones over a two-year period were targeting Uyghur Muslims, TechCrunch has learned.

Sources familiar with the matter said the websites were part of a state-backed attack — likely China — designed to target the Uyghur community in the country’s Xinjiang state.

It’s part of the latest effort by the Chinese government to crack down on the minority Muslim community in recent history. In the past year, Beijing has detained more than a million Uyghurs in internment camps, according to a United Nations human rights committee.

Google security researchers found and recently disclosed the malicious websites this week, but until now it wasn’t known who they were targeting.

The websites were part of a campaign to target the religious group by infecting an iPhone with malicious code simply by visiting a booby-trapped web page. In gaining unfettered access to the iPhone’s software, an attacker could read a victim’s messages, passwords, and track their location in near-real time.

Apple fixed the vulnerabilities in February in iOS 12.1.4, days after Google privately disclosed the flaws. News of the hacking campaign was first disclosed by this week.

These websites had “thousands of visitors” per week for at least two years, Google said.

After we published, Forbes confirmed our reporting and said the same websites targeting iPhones were also used to target Android and Windows users. That suggests the campaign targeting Uyghurs was far broader in scope than Google initially disclosed.

Victims were tricked into opening a link, which when opened would load one of the malicious websites used to infect the victim. It’s a common tactic to target phone owners with spyware.

One of the sources told TechCrunch that the websites also infected non-Uygurs who inadvertently accessed these domains because they were indexed in Google search, prompting the FBI to alert Google to ask for the site to be removed from its index to prevent infections.

A Google spokesperson would not comment beyond the published research. A FBI spokesperson said they could neither confirm nor deny any investigation, and did not comment further.

Google faced some criticism following its bombshell report for not releasing the websites used in the attacks. The researchers said the attacks were “indiscriminate watering hole attacks” with “no target discrimination,” noting that anyone visiting the site would have their iPhone hacked.

But the company would not say who was behind the attacks.

Apple did not comment. An email requesting comment to the Chinese consulate in New York was unreturned.

Updated with additional information from Forbes following our initial report. 


Source: Tech Crunch

Tesla’s Model 3 interior (even the steering wheel) is now 100% leather-free

Tesla said Saturday that its Model 3 interiors are now completely free of leather, fulfilling a promise made by CEO Elon Musk at this year’s annual shareholder meeting.

Tesla has been closing in on a leather-free interior for a couple of years now. But a sticking point was the steering wheel, which Musk made mention of at the company’s shareholder meeting in June in response to a request from PETA activist.

I believe we were close to having a non-heated steering wheel, that’s not leather,” Musk said at the time.There are some challenges when when heat the non-leather material and also how well it wears over time.”

Musk said Model Y and Model 3 would be vegan by 2020. He wasn’t sure if the company would be able to meet that same goal for the Model S and X.

 

 

Activist shareholders made a proposal in 2015 that Tesla no longer use animal-derived leather in the interiors of its electric vehicles by 2019. While stockholders rejected that proposal, Tesla did begin rolling out more “vegan” interior components in its cars.

The company began by offering leather-free seats as an option. Two years ago, Tesla made the synthetic material standard in its Model 3, Model X and Model S vehicles.


Source: Tech Crunch