Tagged: Software

The First Camera Phone Picture – Who first put a camera in a cell phone?

Jumping ahead a century with an equally important image is the first cellular camera phone. In 1997, while in the hospital after the birth of her daughter, a man named Philippe Kahn software entrepreneur wanted to capture and share an image of Sophie in real time. He connected a digital camera to his flip phone using some original lines of code. After honing his prototype, Sharp first used the technology then to change the world.

Philippe Kahn is credited with the creation of the camera phone in 1997. On 11 June this year, Kahn took the first photo “camera phone” of his newborn daughter in a maternity ward, and then transmitted wirelessly photo more than 2,000 people worldwide. Since “camera phones” existed at that time, Kahn hacked together a primitive combining digital and cell phone camera to send photos in real time.

Kahn then begin LightSurf, a company that has considerable influence in picture messaging. The LightSurf technology is still used by Sprint, Verizon and other major carriers worldwide.

Researchers exploit the system that sends presidential emergency alerts

Researchers discovered a manner to exploit the system that sends presidential emergency alerts to our phones, simulating their method on a 50,000 seat football stadium in Colorado with a ninety percentage achievement charge.

Researchers at the university of Colorado Boulder posted a paper this month that details how they were capable of spoof assault the wi-fi Emergency Alert (WEA) software, which could ship out AMBER indicators, presidential signals, and each extreme and severe threats to safety.

Emergency alerts are sent to every cell tool within variety of the broadcasting mobile tower. but the researchers word that a malicious cell tower channel is capable of fooling the device, and in turn sending out an inauthentic emergency alert to all gadgets within its variety.

The researchers tested this LTE vulnerability by using developing their very own malicious cellular tower channel using off-the-shelf hardware and open-supply software to deploy their exploit, which in one instance become used in an test at Folsom subject on the college of Colorado Boulder.

The researchers didn’t perform an actual assault on a live crowd on the stadium or on real cell gadgets, Eric Wustrow, a researcher on the paper, instructed Gizmodo in an e mail. The assessments performed have been rather accomplished in remoted RF protect bins, Wustrow stated, “and our analysis of Folsom area changed into a aggregate of empirically collected data and simulation.” A screenshot from the paper beneath displays what those spoof attacks looked like on both a Samsung Galaxy S8 and an iPhone X.