I am not sure if I ll buy passport after this review. LoL.
Attachment 298373
BlackBerry Z30. The best smart phone.
Printable View
I am not sure if I ll buy passport after this review. LoL.
Attachment 298373
BlackBerry Z30. The best smart phone.
OT:
Sony predicts increased losses due to struggling mobile business
http://www.bbc.com/news/business-29233644
Sony forecasts loss of $2.1 billion, cancels dividend after cutting value of mobile business
https://ca.finance.yahoo.com/news/so...071536251.html
OT from the Related Technologies and Security files:
Huawei shelves Windows Phone plans, will use Android to challenge Samsung, Apple | ZDNet
The company is now the third-biggest smartphone maker behind Samsung and Apple, had built Windows Phone devices in the past, saying they were hard to sell and Huawei has now suspended plans to use the operating system.
http://www.zdnet.com/apple-healthkit...tag=TRE0fb9d06
Comments at the bottom are of increasing interest, at times much improved from the article authors.
Musical interlude from back in the day:
http://www.youtube.com/watch?v=c9TvhoqLUv0&sns=em
Eazzy Peazzy
This thread is great? Well, up to recently, I had a close friend who worked as a senior guy in BBRY, and I kept on surprising him with information and news I would get off of this thread, for which he was not yet up to speed on. That tells you a lot about the value of what goes on here. I wish I could contribute more, but I am grateful to all contributors.
Posted via CB10
Jeebers. You almost made me pissthebed!
My head needs stitches. B hahaha hahaha.
Easy peasy.
$BBRY.
BlackBerry Z30. The best smart phone.
who the hell holds there phone like that lol
Trolls? Shorties? LoL
OT: Kudos to Rogers. But, it seems these warrants are so easy to get. You'll never know if they are creeping you unless they charge you! Pretty scary.
Cops still ask telecoms for info without warrants despite court ruling
Cops still ask telecoms for info without warrants despite court ruling | The Chronicle Herald
Law enforcement agencies are still making warrantless requests for telecom customers’ personal data months after a Supreme Court ruling appeared to shut down the practice.
Police in Canada used to ask telecom companies to voluntarily hand over data on Canadian customers more than a million times per year.
In June, the Supreme Court struck down this warrantless method as an invasion of privacy.
But while the number of warrantless requests has dropped since the decision, they have not stopped, an investigation by The Chronicle Herald and Toronto Star has found. Key players, including the country’s largest police force and a major telecom, aren’t saying whether they still send or accept them.
Another of Canada’s Big Three telecoms, Rogers, started demanding warrants for all requests after the June ruling, known as the Spencer decision. Even after this policy change, the company continues to receive warrantless requests, said Ken Engelhart, vice-president of regulatory affairs at Rogers.
Engelhart said the warrantless requests are only a “handful,” compared with the approximately 90,000 the company fielded in 2013. But he also said that, overall, police requests are being made nearly as frequently as before the Spencer decision.
“People now understand that we don’t give it warrantless … so we’re getting a handful,” Engelhart said in an interview last week. “But we’re still getting the kind of requests we used to get without a warrant, but now they’re accompanied by a warrant.”
Warrantless requests are generally made for “basic subscriber information.” This data — such as a customer’s name, address, Internet protocol address and phone number — can be used to construct a telling profile when tied to someone’s online activity.
Telus confirmed in a statement that it also requires a warrant to access such data in all but the most extreme circumstances. The company did not disclose if it is still receiving warrantless requests.
Bell, the last of Canada’s Big Three telecoms, has repeatedly refused interview requests on the issue. In a one-line statement last week, the company would only say that it complies with Canadian law.
There does not seem to be consensus on whether the Supreme Court decision should apply to almost all requests.
“(The decision) specifically did not create a requirement for law enforcement to obtain judicial authorization for any and all basic subscriber information from a telecommunications service provider,” Sgt. Greg Cox, an RCMP spokesman, wrote in an email.
Cox wrote that the RCMP will continue to request data without a warrant in the case of emergencies — which the Supreme Court allowed — but would not clarify whether they will do so in other cases.
Federal agencies have not made up their minds on how broadly the ruling should apply. The government is still reviewing the decision “with a view to establishing a common interpretation,” said the Canada Border Services Agency.
The debate seems to be whether the decision applies to all warrantless data requests or only in the specific set of circumstances that were before the Supreme Court in the Spencer case.
That case centred on Matthew David Spencer, a Saskatchewan man who was charged with accessing child pornography. Police tracked him down after Shaw Communications gave them the name and address attached to Spencer’s IP address. No warrant was involved.
The top court unanimously ruled that police should not request customer information without a warrant. But Spencer’s conviction was upheld because the Supreme Court justices found police had acted in good faith at the time.
The lawyer who argued Spencer’s case said he has no doubt that the decision was clearly meant to apply very broadly.
“The fact that this was a child pornography case was almost irrelevant to the decision. The question was, ‘(Is) judicial authorization required before you could access that information?’” said Aaron Fox of McDougall Gauley LLP in Saskatchewan.
Customers are not informed when their data has been shared and most never find out unless it shows up as evidence in a court case.
“That’s the frightening part about this,” said Fox. “They could be accessing your Internet information right now. If you’re not charged with anything … you’ll never know.”
While Rogers no longer entertains warrantless requests, Engelhart said it’s up to police to judge whether trying to obtain information without a warrant could jeopardize their case.
“They need to analyze it to determine whether they are going to lose any convictions in court … but, frankly, that doesn’t affect us,” he said. “We’ve decided that we won’t be providing this information without a warrant.”
Is this article posted already?
http://seekingalpha.com/article/2501...and-smartglass
Posted via CB10
Cut out the shape in cardboard. It's how you have to hold it because it is very wide.
Posted via CB10
I think this must be Kofi from Seeking Alpha.
Eazzy Peazzy
OT: Congrats to you HALO holders! Hope it holds up for you guys ;)
I'd just like to give credit where credit is due. Good call, Morgan. I hope I'm not the only one here who picked up more shares under $9 yesterday. We are at 9.76 Up 0.72(7.96%) 11:56AM EDT and climbing! A nice bounce after touching some 1-month lows. Let the climb continue for HALO.
Also, BBRY is still holding up nicely in the $11's. I'd be pleased to close the week above $11 going into earnings week. A 20%+ pop on $11 sounds much nicer that 20%+ of somewhere in the $10's, right?
OT: More on Big Brother watching over us.
The covert cellphone tracking tech the RCMP and CSIS won’t talk about
The covert cellphone tracking tech the RCMP and CSIS won?t talk about - The Globe and Mail
Law enforcement and intelligence agencies in Canada won’t say whether they use covert tools called International Mobile Subscriber Identity (IMSI) catchers to track the location of mobile phones and devices – even as the extent of their use by U.S. government agencies is raising serious questions among civil libertarians.
The devices colloquially known as Stingrays – which is the trademarked name for a widely used model sold by Florida-based Harris Corp. – commonly work by masquerading as a legitimate cellular communications tower and tricking nearby devices into connecting and sharing your phone’s IMSI (a unique identifier tied to every mobile device), typically without the knowledge of device owners.
Once connected, an operator can collect identifying information on all connected devices in a geographic area, or home in on the location of a specific device. In certain circumstances, it can even intercept phone calls and text messages.
In the U.S., the American Civil Liberties Union has identified 43 agencies in 18 states that own Stingrays, including the FBI, NSA and DEA. Some agencies have attempted to hide their use of such technology from reporters and lawyers, going so far as to obscure references to IMSI catchers in court documents, for fear that criminals will learn how to evade such surveillance.
IMSI catchers are of particular concern to privacy groups because they capture data indiscriminately from all phones in a given area, many of which will not be the target of an investigation. It is also nearly impossible for most users, innocent or otherwise, to detect whether an IMSI catcher is being used.
The RCMP, in response to inquiries by journalists, has refused to confirm or deny whether Stingrays or other IMSI catchers have been used. RCMP spokesperson David Falls said the agency “[does] not release information pertaining to capabilities/tools as that can have an impact on our investigations.”
According to Tobi Cohen, a spokesperson for the Office of the Privacy Commissioner of Canada, “We have not been made aware by the RCMP of their use of this technology. If they were looking to use this type of technology, we would expect to be consulted.”
Mr. Cohen also said that the Commissioner’s Office has not been made aware of Stingray use by other government departments or agencies.
E-mails sent to the Harris Corporation were not returned.
Recently, the technology’s potential for misuse by criminals and foreign intelligence agencies has become more widely known. In July, former FBI deputy director Tim Murphy told Newsweek that there’s no doubt that IMSI catchers have been used illegally – at least, against the U.S. and its citizens.
“This type of technology has been used in the past by foreign intelligence agencies here and abroad to target Americans, both [in the] U.S. government and corporations,” Mr. Murphy is quoted as saying.
When deployed passively, IMSI catchers merely snoop on wireless signals as they travel through the air to a cellular base station, and do not interfere with or disrupt the signals while in transit. “These devices are thus far more covert in operation – indeed effectively invisible – but they can only detect signals of nearby phones when those phones are actually transmitting data,” according to a paper published in May by Christopher Soghoian, principal technologist for the American Civil Liberties Union, and Stephanie Pell, former federal prosecutor and non-residential fellow at The Center for Internet and Society at Stanford Law School.
More often, IMSI catchers are deployed actively, wherein they act as “cell site simulators.” In this mode a Stingray pretends to be a legitimate cell tower, forcing all nearby devices to connect. In this mode, a Stingray could be configured to identify nearby phones, locate them with “extraordinary precision,” according to Mr. Soghoian and Ms. Pell, intercept outgoing calls and text messages, as well as to block service to all or some devices in an area.
An IMSI identified using a Stingray can then be used to request other pieces of identifying information tied to that device from the network operator – such as the name and address of the owner. If the operator knows a device’s IMSI ahead of time, a Stingray could be used to monitor its location.
Tallahassee police testimony describing an investigation from 2008 is perhaps the best description on record of how Stingrays are used, testimony that was unsealed by a Florida judge at the behest of the ACLU in June of this year.
According to the ACLU’s description: “Police drove through the area using the vehicle-based [IMSI catcher] device until they found the apartment complex in which the target phone was located, and then they walked around with the handheld device and stood ‘at every door and every window in that complex’ until they figured out which apartment the phone was located in.”
The Globe and Mail asked Canada’s big three cellular providers whether Stingrays had been used against their subscribers, and whether they had the technical ability to detect when an IMSI catcher is in use.
Rogers spokesperson Patricia Trott, declining to get into specifics for “security reasons” would only say that “Rogers complies with the GSM [Global System for Mobile] Association’s network security and encryption requirements, and has deployed the most advanced versions of encryption available.”
However, security researchers such as cryptographer and John Hopkins University reseasrch professor Matthew Green have argued in the past that Stingrays can sidestep such encryption by forcing devices, in the case of GSM networks such as Rogers, or AT&T in the U.S., to fall back on less secure 2G networks that can then be exploited instead.
Mr. Trott did not reply to a follow-up question.
According to a Bell spokesperson, the company has “found no evidence that Bell’s wireless networks are exposed to IMSI Catchers.” The spokesperson claimed that IMSI catchers are focused on GSM networks, and that Bell’s legacy network relies on the incompatible Code division multiple access (CDMA) standard.
However, in the Tallahassee case, investigators used a Stingray to locate a subscriber belonging to Verizon, which also maintains a legacy CDMA network. Mr. Soghoian and Ms. Pell’s paper also notes that companies such as Harris Corp. have developed IMSI catchers that are compatible with CDMA networks, as well as GSM.
“As part of our regular conversations with law enforcement and industry partners, including carriers that employ GSM networks, IMSI catchers have not been identified as a significant issue in Canada,” the Bell spokesperson added.
Telus declined to comment.
Some mobile devices are now capable of recognizing and evading an IMSI catcher. GSMK, a German developer of secure phones, sells a hardened, high-end Android phone called the CryptoPhone 500 for over $3,000 that includes a so-called “baseband firewall” that can detect when a Stingray is likely in use, and then block that tower from connecting to the phone.
Elsewhere, researchers have been working on a freely available piece of software called Darshak, which also allows owners of certain Samsung Galxy S3 smartphones to detect possible Stingray use.
In late January, NDP Member of Parliament for Terrebonne-Blainville Charmaine Borg, tabled a list of questions to all government agencies on their tracking of communications devices, including the use of IMSI catchers.
Communications Security Establishment, Canada’s cyberspy agency, declined to reply, citing national security exemptions, as did CSIS. Both agencies reiterated this stance when contacted for this story. The RCMP, again, declined on the basis that doing so would “compromise the RCMP’s ability to conduct criminal investigations.”
Ms. Borg says that her office has received no new information on the use of Stingrays since.
Wow, what a beautiful device! If I had the money (to blow), I'd be all over it!
I take back my previous comment about the Porsche design...that thing is sexy as hell
I wish there was a Porsche Design Passport too. This one has small screen like Q10. That's so last year's phone in new box!
Seeing this makes me want one. What am I going to do with one Z10, one Z30, one Passport, one Classic and now one P9983? Start a museum to go with my Curve, Storm and Bold? Or should I start a thread called, "I support BBRY and I buy every device they make"?
i dont hold it at the corners thats for sure unless i want to drop it lol , nor do i dig the other corner into my head lol
HALO makes Viagra? :rotfl: :dancing: