‘I Slept With My Gun’: What It’s Like to Get Your Ring Camera Hacked

https://gizmodo.com/i-slept-with-my-gun-what-its-like-to-get-your-ring-cam-1840412276

He was on his way home from the grocery store when he got the call. After a weekend out of town, John’s kids were finally asleep in his Houston area home. His wife, too, had been getting ready for bed—until she heard a stranger’s voice echoing down the hallway.

“Is anyone home?” it asked.

“We’re gonna find out,” it promised.

The mysterious male voice was coming, she’d soon discovered, from a speaker on a camera posted near the TV in the living room. It had been there for a while, set up by the couple so they could monitor their babysitters remotely. It had brought them peace of mind. But that was over now.

Soon the voice paused and a loud alarm emanated from the device, piercing like a klaxon through the hallways, threatening to wake the kids. It had also begun taunting John’s dog.

The 33-year-old dad immediately pulled to the side of the road.

He rushed to open the Ring app on his phone. Disconnecting the five security cameras he’d placed around the house would do the trick, he hoped. As continued the drive, he wondered just how they had “broken in.” One scenario worried him more than the others.

If whoever had hacked his camera had broken in through his wifi, he thought to himself, then that means they must be close.

As he neared the driveway, John’s eyes darted up and down the street, searching for signs of anyone suspicious; a car perhaps, that didn’t belong. Inside, he peered into his backyard, scanning the fence line. But the light only stretched so far, and he was left wondering if someone was there, just beyond its reach.

“I slept with my gun next to my bed that night, which I never do,” he said.

“That was in the forefront of my mind and my wife’s mind, you know, with two kids and everything,” he continued. “I couldn’t see anybody in my front yard, on the street, and my backyard up until the fence. I didn’t see anybody. But beyond the fence its so dark. I didn’t know if somebody was spying on us to look for an opportunity to break in—or something. That’s the unnerving part.”

John’s family isn’t alone in their experience. In the past week, frightening tales of indoor cameras being hacked have gone viral. It’s now become apparent that Ring customers, in particular, are being targeted.

After buying one of the Amazon-owned company’s doorbell cameras, John installed four more Ring devices around the house: Two Stick Up cams to watch the kids and the doggy door, as well as two floodlights equipped with cameras outside. A rash of vehicle burglaries in the neighborhood had led to the purchase. Now he was forced to disconnect them all and then begin about the annoying task of changing the passwords on every internet-connected device he owned.

“You hear about celebrities being targeted,” John said. “But I didn’t think it would happen to me.”

A Ring official said by phone that the company’s own systems had not been compromised and that customers reusing old passwords, or whose passwords were too simple, to begin with, are the ones who are at risk.

“Recently, we were made aware of an incident where malicious actors obtained some Ring users’ account credentials (e.g., username and password) from a separate, external, non-Ring service and reused them to log in to some Ring accounts,” Ring said in a blog post. “Unfortunately, when the same username and password is reused on multiple services, it’s possible for bad actors to gain access to many accounts.”

Ring is advising users to change their passwords and to enable two-factor authentication.

In John’s case, the police weren’t called. He’s still on the fence about whether or not it’s worth it. “By the next morning we had moved on with our lives and didn’t think it was a big deal,” he said.

Ring initially responded quickly when he reported the incident, escalating the issue to its security team. But nearly a week has passed now and John’s yet to hear anything back. His Ring account predates his use of a password manager, he says, but important accounts are locked down and use randomized passwords. What he wants to know is if Ring has any actual evidence that his password was cracked. He’s gotten no answers so far. (A Ring official offered to speak directly with John after Gizmodo called the company for comment.)

Motherboard reported this week that hackers have developed dedicated software for breaking into Ring cameras. They appear to be doing it mostly for entertainment. A custom app that helps locate vulnerable cameras is being sold for a little as $6, the site reported, and a podcast on Discord, the voice app built for gamers, has taken to hacking the cameras live on air.

The hackers are brute-forcing their way in, according to Motherboard, “rapidly churning through usernames or email addresses and passwords and trying to use them to log into accounts.” None of the victims had set up two-factor authentication.

The seriousness of the hacking incidents became apparent after WMC 5, a local Tennessee news station, broadcast Ring footage taken in an 8-year-old girl’s bedroom that depicts a mysterious voice feeding her instructions. “It’s Santa. It’s your best friend,” the voice says.

In a separate incident in Florida, a camera hacker reportedly spewed racist slurs over a speaker.

Despite the hack, John said his cameras are now back online. He’s convinced all the steps he took to secure his network will prevent it from happening again. And his wife, he says, prefers having the ability to keep an eye on the kids.

“That’s a big deal to her, to make sure we don’t have any problematic baby sitters or anything like that. And I’m not sure she’s willing to give up that ability because of this. We don’t have it in bedrooms, obviously. I would never put one in the bedroom. We have baby monitors that satisfy that need that aren’t connected to the internet,” he said.

“We don’t do anything weird on the cameras. I’m kinda of the opinion that if you don’t do anything wrong, you have nothing to worry about. It’s not like there’s illicit drugs in my house. There’s not anything like that going on. So I don’t really care. But what I have a problem with is somebody getting access to live view and disrupting our lives,” he said.

“What could have been really bad is, had my wife gone to the camera. I told her the best thing she did was ignore it and walk away,” he said. “If she had gone to the camera they could have started to demand things, or say really threatening things, that could have taken that unnerving to another level.”

Asked if Ring could have done more, John said he didn’t remember ever receiving an email about setting up two-factor authentication. “That should be a mandatory thing, in my opinion,” he said. “It’s a real easy thing to set up and use.”

A Ring spokeswoman said that emails referencing the security measure are “definitely” sent out to customers after they sign up, but that she would check to see how the company is notifying its users about the option. “We’re always looking at ways we can be better for our customers,” she said.

When asked whether Ring is currently working with any law enforcement agencies to hunt down the hackers that are targeting its users, the official told Gizmodo that she currently had nothing to share.

Editor’s note: “John” is an alias used to protect the identity of the Ring footage’s owner.

via Gizmodo https://gizmodo.com

December 13, 2019 at 12:36PM

Google Maps helps you find EV chargers that work with your car

https://www.engadget.com/2019/12/15/google-maps-ev-charging-station-filters/

Google Maps can help you find available EV charging stations, but that doesn’t mean they’re stations you can use — and that might be a problem if you show up at the wrong station with a low battery. Thankfully, Google might help you avoid that slip-up in the future. It recently updated Maps on Android (it’s not clear that iOS has this yet) to allow filtering stations by those that your car supports. If you need a CHAdeMO station and don’t have an adapter, you’ll know just where you can go to recharge.

There’s also a new "electric vehicle settings" option in the app’s settings that you can use to set your plug preferences.

This filtering isn’t a novel concept among EV station finding apps. It does, however, bring the option to a much wider audience. And strictly speaking, additions like this will likely be necessary going forward. Car makers will electrify more and more of their lineups in the years ahead, and you’ll probably want to have these kinds of charger tools in the navigation apps you’re already using.

Via: Android Police

Source: Google Play

via Engadget http://www.engadget.com

December 15, 2019 at 09:03PM

Lyft debuts car rentals in Los Angeles and the SF Bay Area

https://www.engadget.com/2019/12/12/lyft-launches-car-rentals-los-angeles-san-francisco/

Lyft’s car rental service now exists as more than just an experiment. Rentals are now available for "select users" in Los Angeles and the San Francisco Bay Area, giving you an option when you’d rather drive yourself. As expected, the service relies on both tie-ins with Lyft’s usual ridesharing and the elimination of a few typical rental headaches. To start, you’ll get $20 in ride credit each way for the trips to and from your rentals. Lyft will also refuel your car for you (at a "local market price"), offers unlimted miles and promises cars with Apple CarPlay, Android Auto and optional gear like car seats, ski racks and tire chains.

The allure is fairly self-evident: you can rent a car from the same app you’d use to hail a ride or grab a bike, and you don’t have to stress about visiting a rental counter or driving limits.

For Lyft, this is part of both a larger effort to cover many forms of transportation and shore up its bottom line. It has long wanted to be your go-to provider no matter how you want to ride. And when Lyft expects to see its steepest losses this year, it needs options like car rentals to boost revenue and (eventually) turn a profit.

Source: Lyft Blog

via Engadget http://www.engadget.com

December 12, 2019 at 02:54PM

NASA finds ‘water ice’ just below the surface of Mars

https://www.engadget.com/2019/12/12/nasa-ice-surface-mars/

To explore the solar system beyond our planet, one important factor is the ability to locate water which can be used for drinking and for creating rocket fuel. To assist in the hunt for water on neighboring Mars, NASA has released a "treasure map" of potential ice locations on the red planet.

Researchers created the map of the Martian surface which shows where water ice (so-called because other chemical compounds can freeze) is believed to be located. In some places, the ice is as little as 2.5 centimeters below the surface, making it easily accessible to future visitors. Cool colors represent ice closer to the surface, while warm colors are ice deeper down.

Map of underground water ice on Mars

"You wouldn’t need a backhoe to dig up this ice. You could use a shovel," the paper’s lead author, Sylvain Piqueux of NASA’s Jet Propulsion Laboratory, said in a blog post. "We’re continuing to collect data on buried ice on Mars, zeroing in on the best places for astronauts to land."

Locating ice is important to enable manned missions to the planet, and could help identify sites for projects like SpaceX’s planned Mars base. Water is heavy to transport aboard rockets, so finding it on Mars will help humans to survive there. However, because the planet has such a thin atmosphere, most water on the surface evaporates quickly.

Scientists realized that looking below the Martian surface is the best hope of finding accessible water ice, and that there may even be liquid water beneath the polar ice caps. With this new map, researchers have a blueprint for where to start planning missions and eventually sending astronauts to Mars.

Source: NASA

via Engadget http://www.engadget.com

December 12, 2019 at 05:33AM

This 3D-printed Stanford bunny also holds the data for its own reproduction

https://arstechnica.com/?p=1630235

Courtesy ETH Zurich.

It’s now possible to store the digital instructions for 3D printing an everyday object into the object itself (much like DNA stores the code for life), according to a new paper in Nature Biotechnology. Scientists demonstrated this new “DNA of things” by fabricating a 3D-printed version of the Stanford bunny—a common test model in 3D computer graphics—that stored the printing instructions to reproduce the bunny.

DNA has four chemical building blocks—adenine (A), thymine (T), guanine (G), and cytosine (C)—which constitute a type of code. Information can be stored in DNA by converting the data from binary code to a base 4 code and assigning it one of the four letters. As Ars’ John Timmer explained last year:

Once a bit of data is translated, it’s chopped up into smaller pieces (usually 100 to 150 bases long) and inserted in between ends that make it easier to copy and sequence. These ends also contain some information where the data resides in the overall storage scheme—i.e., these are bytes 197 to 300. To restore the data, all the DNA has to be sequenced, the locational information read, and the DNA sequence decoded. In fact, the DNA needs to be sequenced several times over, since there are errors and a degree of randomness involved in how often any fragment will end up being sequenced.

DNA has significantly higher data density than conventional storage systems. A single gram can represent nearly 1 billion terabytes (1 zettabyte) of data. And it’s a robust medium: the stored data can be preserved for long periods of time—decades, or even centuries. But using DNA for data storage also presents some imposing challenges. For instance, storing and retrieving data from DNA usually takes a significant amount of time, given all the sequencing required. And our ability to synthesize DNA still has a long way to go before it becomes a practical data storage medium.

A 3D-printed plastic rabbit, aka the Stanford Bunny. The plastic contains DNA molecules in which the printing instructions have been encoded.
Enlarge /

A 3D-printed plastic rabbit, aka the Stanford Bunny. The plastic contains DNA molecules in which the printing instructions have been encoded.

ETH Zurich / Julian Koch

This latest breakthrough brings us one step closer to that goal. Several years ago, co-author Robert Grass of ETH Zurich developed a method for marking products with a DNA “barcode” embedded in minuscule glass beads (“nanobeads”), a technology now being commercialized by a spinoff company. That is one key development that enabled this latest approach. The other is a method for storing (at least theoretically) more than 250,000 terabytes of data in a gram of DNA, developed by co-author Yaniv Erlich, chief science officer at MyHeritage, a DNA-based genealogy company.

“All other known forms of storage have a fixed geometry: a hard drive has to look like a hard drive, a CD like a CD. You can’t change the form without losing information,” Erlich said. “DNA is currently the only data storage medium that can also exist as a liquid, which allows us to insert it into objects of any shape.”

The fabricated Stanford bunny holds about 100 kilobytes of data, thanks to the addition of the DNA-containing nanobeads to the plastic used to 3D print it. “Just like real rabbits, our rabbit also carries its own blueprint,” said Grass.

The lenses in ETH doctoral student Julian Koch's glasses contain a short video.
Enlarge /

The lenses in ETH doctoral student Julian Koch’s glasses contain a short video.

ETH Zurich / Jonathan Venetz

Grass and his colleagues were also able to cut off a piece of the rabbit’s ear to retrieve the embedded DNA. Then they used that information to fabricate a second bunny, repeating this process four times, for a total of five fabricated bunnies. The data did degrade a bit with each subsequent generation, but the decoding program can fill in any blanks so that useable data can still be retrieved.

As a further proof of principle, Grass et al. stored a short film in the glass nano beads and then embedded them into the plexiglass lenses of a pair of glasses. “It would be no problem to take a pair of glasses like this through airport security and thus transport information from one place to another undetected,” said Erlich. It would also be possible to embed blueprint instructions in objects like medical implants, car parts, electronic components, and building materials, which can be difficult to replace.

“Imagine a societal norm in which every object must encode the instructions for making the object,” Stanford University bioengineer Drew Endy told IEEE Spectrum. “Given the incredible information density of DNA data storage, such information could, in some commonplace objects such as refrigerators, also include a fully unabridged guide to rebuilding all of civilization.”

DOI: Nature Biotechnology, 2019. 10.1038/s41587-019-0356-z  (About DOIs).

Listing image by ETH Zurich / Julian Koch

via Ars Technica https://arstechnica.com

December 12, 2019 at 06:22AM

Intel Announces RealSense LiDAR Depth Camera for Indoor Applications

https://www.anandtech.com/show/15220/intel-announces-realsense-lidar-depth-camera-for-indoor-applications

Intel has introduced the first member of its RealSense LiDAR family of depth cameras, the RealSense LiDAR L515. The sensor is primarily designed for indoor use, with Intel optimizing their to capture typical indoor ranges with a small, high accuarcy device.

Intel’s RealSense LiDAR L515 comes equipped with a 1920×1080@30Hz RGB sensor, a 1024×768@30Hz depth sensor, and the Bosch BMI085 inertial measurement unit (i.e., accelerometer and gyro). When it comes to physical capabilities, the RealSense LiDAR L515 has a range of 0.25 meters to 9 meters, a 70° ±3° × 43° ±2° RGB field-of-view as well as a 70°±2° × 55°±2° depth field-of-view. The LiDAR can scan a scene with up to 23 million points of depth data per second. Furthermore, the built-in vision processor can capture high paced scenes with minimal motion blur due to an exposure time of less than 100 ns and offloard appropriate processing from host saving battery life and improving performance.

The LiDAR L515 uses Intel’s proprietary MEMS mirror scanning technology that promises a better power efficiency than other time-of-flight technologies. In fact, Intel goes as far as claiming that at 3.5 W, its RealSense L515 is the most power efficient high-resolution LiDAR in the industry.

Intel’s RealSense LiDAR L515 measures 61 mm by 26 mm and weighs around 100 grams. The small dimensions and low weight make it possible to install the RealSense L515 into most devices that need to support navigation or gesture recognition. Furthermore, the LiDAR uses Intel’s open source Intel RealSense SDK 2.0, connecting back to its host via a USB 3.1 Type-C interface. The sensor is reportedly compatible with Android, Windows, macOS, and Linux, which makes it compatible with virtually all compute platforms available today.

Intel’s first RealSense LiDAR is currently available for pre-order directly from the company for $349.

Related Reading:

Source: Intel

via AnandTech https://ift.tt/phao0v

December 11, 2019 at 10:14AM

Mysterious ‘Particle X17’ Could Carry a Newfound Fifth Force of Nature, But Most Experts Are Skeptical

https://www.space.com/fifth-force-could-exist.html

Our universe is governed by four fundamental forces. At least that’s what physicists have long thought. 

Now, however, new research suggests that there’s a fifth force, a discovery that could upend much of modern physics. 

Join our Space Forums to keep talking space on the latest missions, night sky and more! And if you have a news tip, correction or comment, let us know at: community@space.com.

via Space.com https://ift.tt/2CqOJ61

December 10, 2019 at 06:25AM